As Security Policy you have to choose up to where you are willing to compromise on security at the expense of comfort in the use of your computer system.
The administrator is free to choose the Security Policy to apply at your firm.
GEDEX allows all the following security policies. Read about all of them, and afterwards choose the best for your firm.
Thus, GEDEX will not care to check who is allowed to access your data, including cases and contacts.
Useful for offices with only one member, or fully trusted members. Anyone who starts GEDEX will be able to use the program.
Select the menu Configuration → Users → Only one user.
Thus, GEDEX will treat each Windows user as a different GEDEX user.
Select the Configuration → Users → Distinguish users based on local network.
This way, GEDEX will treat each Windows user as a distinct GEDEX user.
Check that each computer starts a Windows session really with a different user name. If any computer does not show the Windows logon screen or Welcome screen asking for the username and password (that is, the Start button or orbe appears directly, without requiring passwords or usernames), please first change the network configuration of that computer.
If you really trust in your network users (you trust that they will not impersonate others), select the menu Configuration → Users → Distinguish users based on local network.
Thus, GEDEX will treat each Windows user as a distinct GEDEX user.
If your system requires the use of passwords on the network login, or if you have enough confidence (on the users of your network) to trust that some users will not supplant others, select the menu → Configuration → Users → Distinguish users based on local network.
Thus, GEDEX will require a password to differentiate between members of the office.
GEDEX can request a password to each member of the firm (in GEDEX, called users). If a member of your firm does not have his own personal password (and neither knows the Master Password) he will not be able to use GEDEX.
Select the Configuration → Users → Distinguish users based on passwords.
To manage high-level personal data of your customers, or if you have documents with your customers personal data on your hard drive, the GDPR urges the implementation of encryption and double factor authentication systems.
To achieve that level of security, please check for example the VeraCrypt and Microsoft BitLocker services.
Use in a law firm or by multiple people
GEDEX Frequently Asked Questions & its Answers
What is the GEDEX Master Password
GEDEX Administrators are GEDEX Users
Access Permissions to GEDEX Case Cards