Introduction to Data Security

What are the levels of data access?

- Organization- Objects- Fields- Records

What are organization?

At the highest level, you can secure access to your organization by maintaining a list of authorized users, setting password policies, and limiting login access to certain hours and certain locations

What are object-level security?

- Provides the simplest way to control which users have access to which data- By seeing permissions on a particular type of object, you can prevent a group of users from creating, viewing, editing, or deleting any records of that object

What are field-level security?

To restrict access to certain fields, even for objects a user has access to

What are records?

To control data with greater precision, you can allow particular users to view and object, but then restrict the individual object records they're allowed to see

What is a "private" field?

Only the record owner, and users above that role in the hierarchy, can view, edit, and report on those records

What is a "public read only" field?

All users can view and report on records but not edit them. Only the owner, and users above that role in the hierarchy, can edit those records

What is a "public read/write" field?

All users can view, edit, and report on all records

What is "controlled by parent" field?

A user can perform an action (such as view, edit, or delete) on a contact based on whether he or she can perform that same action on the record associated with it

Field-level security allows you to:

Restrict access to certain fields on object records

You can manage record-level access in your organization using:

- Organization-wide defaults- Roles hierarchies- Sharing rules- Manual sharing