1. Docs
  2. arrow-right
  3. Users Overview

Users Overview

ItemPath is secure, and only your appointed system administrators can allow and assign specific users and roles. This way not just anyone can access your data or make changes. 

With different employees needing varying types of information in order to perform their jobs effectively, it’s helpful to have the necessary users added to the system. You can sort users who need similar data or are from the same team into separate groups.

Below you will find links with instructions on how to:

  1. Create a new user
  2. Add or edit user roles
  3. Update user information
  4. Reset forgotten password

 

End User Confidentiality

When using the software system, end users have a responsibility to protect confidential data to ensure the safety of information. Here is a set of guidelines for users to follow to maintain data confidentiality:

1. Use Strong Passwords

  • Complexity: Create strong, unique passwords with a combination of uppercase and lowercase letters, numbers, and symbols.
  • Avoid Reuse: Do not reuse passwords across multiple platforms. Each system should have its own unique password.
  • Password Manager: Consider using a password manager to store and generate secure passwords.

2. Two-Factor Authentication (2FA)

  • Enable 2FA: Whenever possible, enable two-factor authentication (2FA) or multi-factor authentication (MFA) for an extra layer of security.

3. Avoid Sharing Credentials

  • Company Policies: Follow organizational policies regarding credential management and report any violations.

4. Limit Access to Confidential Data

  • Least Privilege Principle: Only access the data necessary for your work. Administrators can allow access to information for authorized users to view.
  • Log Out When Not in Use: Always log out of software systems when they are not in use, particularly on shared or public computers.

5. Follow Organizational Policies and Legal Requirements

  • Adhere to Policies: Follow your company's policies and procedures regarding data protection and confidentiality.
  • Legal Compliance: Be aware of and comply with relevant data protection laws (e.g., GDPR, HIPAA) that apply to the data you handle within the software.

6. Backup Confidential Data (On-Premise)

  • Secure Storage: If you need to back up sensitive data, ensure it is stored securely (e.g., encrypted cloud storage) and complies with your company's policies.
  • Follow Backup Procedures: Always follow your company's backup policies for storing or transferring sensitive data.

By adhering to these guidelines, end users can help protect confidential data and reduce the risks associated with unauthorized access or data breaches.