Group users based on their role in the business - then define what they can and can't access.
- Put users into "Role" groupings.
- Control access (using roles) on a project by project basis.
- Encrypt sensitive files.

CONTROL ACCESS TO INFO. BASED ON ROLES OF INDIVIDUALS - YOU ONLY NEED TO ASSIGN RIGHTS TO EACH ROLE
Next Page -> Workable Configuration
