Security facilities within the software (which are very easy to set up) allow appropriate levels of access to be assigned to respective people.  Appropriate levels of access facilitate efficient everyday administration and decision making, while at the same time tending to protect the integrity of the data.

For instance:
Basic users might be given read-only access to client and basic job information (so that they can obtain telephone numbers, site addresses, etc.), and the ability to access and update items in their own To-Do List and enter their own timesheets.

Job managers might be permitted to update relevant client and job data that they manage, including financial planning figures on these jobs, and drill down to (ie view read-only) all the associated timesheet, invoice, debtor balance and history, and client/job history notes for the jobs they manage.  They may also be allowed to preview and print relevant management reports, and create and edit draft invoices for their jobs.

Accounts personnel might be given full access to the Accounts Receivable and Payable modules and the General Ledger. The Office Manager and one or two other key directors or other staff (for safety in case something unfortunate happens to him/her) would be given full supervisor privileges, permitting them to access special administrative functions that are denied to everyone else.