w UTMS implements certain security
and administration mechanisms, that allow streamlining work practices and
access control to the various parts of the UTMS functionality/features and
related data. List Groups, User Groups, UTMS Roles and UTMS Tasks are the
major building blocks for establishing and implementing security and user
administration within the product.
w Each UTMS user is defined within
the system in association with a set of accessible list groups and tasks, and
from the moment of Login the system knows exactly what UI parts are visible
and can be presented to the user. An authorized Administrator can use
no-nonsense dedicated screens to define a User profile on-line. We implemented
best practices in user access management and system administration appropriate
to the level of UTMS product sophistication.
w You can plan and define specific
UTMS roles – Selector (to prepare selections based on demographic data),
Content Specialist (to prepare actual Messages from presentation point of
view), Campaign Manager (who designs, plans and defines promotion campaigns)
and so on – so your staff can specialize in certain tasks and become highly
productive in what they do.
ã Intellectual
property of G.S.S. Consulting Pty. Ltd.
70 Howitt Road, Caulfield North, Victoria 3161, Australia
Ph. +61 3 9528-7179, e-mail: Greg_Shadur@hotmail.com
Not to be used without written permission