ClickTime uses a role-based method to control access to the data. This ensures that only authorized users can carry out specified functions and that sensitive data is not visible to people who do not have the privilege to view it and maintain it. ...
Please follow the below steps to create a custom security role for your contractor or subcontractor. 1- Create a new security role for the supervisor / office user and grant the level of access for the role they will be performing. See how to create ...
Our ClickTime web and mobile application were built to take into consideration small, medium and large organizations. Medium and large organizations have two types of employees as follows: Remote or field workers These employees will be able to use ...
Watch the video below to learn how to: Edit or rename an existing security profile. Create a new security profile. Assign screens and functions that users within the security profile can access or manage.
This article explains how ClickTime handles adding employees, assigning them to contractors or internal company users, and managing access to sites and teams. Adding Employees When you add a new employee (direct or contractor) in ClickTime, you do ...