Skip to main content

Shipper Data Access Control

Strengthen security by allowing admins to control the visibility of shipper data across different user roles.

Updated over 2 weeks ago

Overview

The shipper data access control feature enhances data security by allowing admins to control the visibility of shipper data across different user roles within the organization.

This feature is designed to prevent unauthorized access to sensitive shipper data by agents. It ensures that shipper data visibility is limited to specific roles within the organization, enhancing compliance and protecting business operations.


Prerequisites

Shipper data access control has a few prerequisites. Youโ€™ll need:

  • Admin access to the platform

  • A list of user roles and associated permissions

  • Agency ID included in your loads file.

    Shape

Enabling Shipper Data Access Control

To activate this feature:

  1. Contact your Customer Success Manager or Greenscreens Support.

  1. Provide the necessary agent grouping data as outlined in the onboarding documentation.

Our team will confirm the activation of the feature and initiate the setup process.


Configuring User Roles

  • Admin Users: Can view and manage all shipper data across the organization. Admin users can determine what data is available to standard users or custom groups.

  • Standard Users: Visibility is restricted to their respective parent or child company data only. Agents will be able to see only data associated with their loads.

  • Role Customization: Admins can create custom roles and define specific data access permissions through the preferences page.


Data Management

  • Adding New Users: Admins can assign users to specific roles during creation. Ensure that the 'officeCode' matches the designated user group ID for proper data segmentation.

  • Visibility Settings: Configure data visibility settings from the admin dashboard to control what each user can see based on their role.

  • Monitoring and Logs: Regularly monitor access logs and adjust settings as necessary to maintain security compliance.

Shape

Did this answer your question?