Self Help Documentation

Table of Contents

Overview of Command and Zones Assignments

← All Topics

The processes described in this chapter forms the second layer of protection of information concerning contracts by adding extra credibility and value to the projects monitoring information from the website. The next chapter will describe the third layer, which assigns operational roles to users.