Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

For Discussion

#QuestionCommentOwner
1an Can the security model be applied at the 2nd level? i.e. exclude certain functionality from particular user types?
Alex Dobre Former user (UnlicensedDeleted) to discuss w/ Graham
2will the team managing ref tables be central v local?
3will the team managing users be central v local?
4could there be an overlap of the two roles? So that one or both teams would need access to both areas
5how many groupings should there be (roughly) for reference tables and what are they? (Go through known reference tables and group them up

DRAFT

(1) Marital Status, Sexual Orientation, Ethnic Origin, Gender, Religious Belief, Title

(2) College, GDC Status, GMC Status, Designated Body Code (DBC)

(3) Settled, Immigration

(4) Grade, Training Number, Training Number Type

(5) Programme Membership Type

(6) Curriculum, Specialty, Specialty Group, Curriculum Sub-Type

(7) Site, Local Office, Trust

(8) Medical School

(9) Country

(10) Nationality

(11) Funding Type, Placement Type, Assessment Type, Leaving Destination

(12) Status, Inactive Reason, Role?


...