Go to BeeCastle
All Collections
Privacy, Security and Data
Privacy, Security and Data
2 articles in this collection
Written by
Tom Hilton
Roles and Permissions in BeeCastle
An explanation of the different roles a user can hold in BeeCastle and what they enable
Written by
Tom Hilton
Updated this week
How BeeCastle handles possible security incidents
A detailed explanation of how BeeCastle will respond to possible or real security threats and breaches
Written by
Tom Hilton
Updated over a week ago