Powerful & Granular Permissions
Complete control over who can create, view, edit, or delete specific forms and submissions across your entire organisation, with precision down to individual records.
- Granular control for viewing, editing, and deleting own or others' records.
- Entry-level permissions for granting access to individual submissions on the fly.
- Group-based mapping for rapid, site-specific deployment.
- Comprehensive audit logs of all security-related changes.
Granular Logic
Rather than all-or-nothing access, our granular model lets you specify rights for View, Create, and Edit actions. Distinguish between a user's own records and those submitted by others for precise data privacy.
Entry-Level Access
Grant immediate visibility to specific submissions without altering broader form permissions. Perfect for involving stakeholders in one-off reviews or providing temporary access to a critical incident report.
Automatic Revision Sync
Permission changes are instantly propagated across all historical revisions. This prevents "permission leakage" by ensuring that if a user loses access to a form, they also lose access to all its historical records.
Interactive Permission Matrix
Toggle checkboxes below to see how access rights change live for each user group.
| User Group | Create | Can View Own | Can View Others | Can Edit Own | Can Edit Others |
|---|---|---|---|---|---|
|
|
|
|
|
|
Uncompromising Security Architecture
Designed for highly regulated industries, our permissions engine ensures that data only reaches the eyes of those authorised to see it.
Superseding Logic
Our security model intelligently resolves access. Entry-level permissions (granted via the "Shield" interface) supersede broader form/pack mappings, ensuring that specific record access is always honoured.
Dedicated Permission Audit Log
All security events are logged to a specialised channel. Track exactly who assigned or unassigned access, from which IP address, and see the precise \"before\" and \"after\" JSON payload of granular changes.
Automated Schedule Syncing
When a schedule is activated or reassigned, the system automatically creates the necessary visibility mappings and granular access rights, ensuring field workers have the tools they need the moment they are assigned.
Pack-Level Synchronisation
Managing complex Form Packs is simplified with one-click synchronisation. Replicate the Header form's permissions across every inner form in the pack instantly, maintaining consistent security without tedious manual work.
Built for Compliance & Data Integrity
Discover how our robust permission controls can help your organisation meet strict data protection requirements while empowering your workforce.
Learn More About Our Security