Security of critical data is ensured by enforcing separate access privileges for different users to different objects in the system.
In order to log in to the system or to open another database, valid username and password are required, and once authenticated, users actions in the system are logged, while all passwords are stored in encrypted form.
A-Number CRM administrators may limit user's access to various menu items, Contact Business Card elements, database fields, structural objects, etc.