In order to bring you the best possible user experience, this site uses Javascript. If you are seeing this message, it is likely that the Javascript option in your browser is disabled. For optimal viewing of this site, please ensure that Javascript is enabled for your browser.
Login  |   Cloud ERP  |   Home  |

The QAD CRM system provides multiple types and levels of security that should be viewed within the context of your organization’s overall security framework. While it is beyond the scope of this guide to discuss the details of information security, the fundamental components involve measures to assure the preservation of:
Confidentiality—ensuring that information is accessible only to those authorized to have access
Integrity—safeguarding the accuracy and completeness of information and processing methods
Availability—ensuring that authorized users have access to information when required
Security properly starts with a comprehensive policy statement that demonstrates management support and commitment to security, and defines the principal security components important to the organization
After the policy statement is prepared, procedures, guidelines, and other supporting administrative controls are typically defined to support the policy. Finally, technical controls are designed and implemented to support the administrative controls.
For details about planning and implementing security within QAD CRM, see System Security.