Overview of Command and Zones Assignments

← All Topics
Table of Contents

The processes described in this chapter forms the second layer of protection of information concerning contracts by adding extra credibility and value to the projects monitoring information from the website. The next chapter will describe the third layer, which assigns operational roles to users.

Top