Skip to main content
All CollectionsRoles and PermissionsTailoring Custom Permission Sets
Managing Permissions for Employee and Contractor Management
Managing Permissions for Employee and Contractor Management

Tailor who can view, add, and manage data for your employees and contractors with custom permission sets.

Updated over a month ago

To effectively manage access to sensitive information within your organization, Productive offers customizable permission sets, including options for different user types such as employees and contractors.

Here’s how you can customize these permissions to ensure that only authorized users have access to data specific to your employees and contractors.

Custom permission sets are available on the Ultimate subscription plan.

Setting Up Custom Permission Sets

1) Create a New Permission Set

To begin, navigate to Settings > Permission sets and select "+ New permission set." This will allow you to build a tailored set of permissions that you can apply to your users.


2) Adjusting Permissions for Employees & Contractors

In this section, you can customize permissions related to viewing, adding, managing, and editing employee and contractor information.

Specific options include:

  • View Employee Fields
    Set who can view non-sensitive employee fields.

  • Add, Edit, and Delete Employee Fields
    Decide who can modify or delete employee fields.

  • View Sensitive Employee Fields
    Restrict access to sensitive employee information, ensuring only authorized users can view these fields.

  • Add, Edit, and Delete Sensitive Employee Fields
    Define who can manage sensitive employee data.

  • View Employees and Contractors
    Determine which users can view employee and contractor profiles.

  • Add and Manage Employees and Contractors
    Control who can add new employees or contractors and manage existing ones.

  • Change Users' Permission sets

    Decide who can change and assign permission sets to your employees (Superadmin).

Finalizing and Applying Permissions

After configuring the permissions to suit your needs, save and assign your new permission set to the relevant users.

This setup ensures that your organization’s data is protected, with access granted only to those who need it.

Did this answer your question?