Force System Management Roles

Force Officer

An individual with the Force Officer role is often assigned to the person in charge of the Force System. They can setup and maintain prerequisite components for Force Systems processes and create and assign Force records. This role has the highest functional level of access to the Force Systems module.

Functions:

  • Authorizations
  • Force Entries
  • Force Hierarchy
  • Assignments
  • Authorizations

For a complete list of accessible functions for this role, please refer to the Roles Spreadsheet.

DPAS eLearning Course: DPAS3010

Data Coordinator

An individual with the FSM Data Coordinator role is responsible for uploading authorizations via the import utility to the FSM module for specific force elements. This role provides support to the Force Officer.

Functions:

  • Utility

For a complete list of accessible functions for this role, please refer to the Roles Spreadsheet.

DPAS eLearning Course: DPAS3020

Inquiry

An individual with the FSM Inquiry role has read only access for information within the FSM module. This role provides support to the Force Officer.

Functions:

  • Inquiry
  • History Inquiry

For a complete list of accessible functions for this role, please refer to the Roles Spreadsheet.

DPAS eLearning Course: DPAS3130

Authorization Manager

An individual with the Authorization Manager role is responsible for the creating, updating, applying, and reviewing authorizations within the Force Systems module. This role provides support to the Force Officer.

Functions:

  • Authorizations

For a complete list of accessible functions for this role, please refer to the Roles Spreadsheet.

DPAS eLearning Course: DPAS3220

Information Owner

An individual with the Information Owner is responsible for managing the risks to personal information and business critical information held within the module. This role understands what information is held, what is added, what is removed, how information is moved, and who has access and why. This means making sure that information assets are properly protected and used to their highest value.

For a complete list of accessible functions for this role, please refer to the Roles Spreadsheet.