Security checks and audit of user actions were involved during all LMS design and developing period.
There are more then 20 different user roles defined in the system. User roles are tight releated and checked in all main proceses of LMS modules.
Database securely works with user data by issolating them from each others and ensuring no data loss by custom and standard RDBMS solutions.
- Data is secured by RDBMS
- Role based Security
- Audited actions
- User working sessions
- Most important data Changes