...
For Discussion
# | Question | Comment | Owner |
---|---|---|---|
1 | an Can the security model be applied at the 2nd level? i.e. exclude certain functionality from particular user types? | ||
2 | will the team managing ref tables be central v local? | ||
3 | will the team managing users be central v local? | ||
4 | could there be an overlap of the two roles? So that one or both teams would need access to both areas | ||
5 | how many groupings should there be (roughly) for reference tables and what are they? (Go through known reference tables and group them up | DRAFT (1) Marital Status, Sexual Orientation, Ethnic Origin, Gender, Religious Belief, Title (2) College, GDC Status, GMC Status, Designated Body Code (DBC) (3) Settled, Immigration (4) Grade, Training Number, Training Number Type (5) Programme Membership Type (6) Curriculum, Specialty, Specialty Group, Curriculum Sub-Type (7) Site, Local Office, Trust (8) Medical School (9) Country (10) Nationality (11) Funding Type, Placement Type, Assessment Type, Leaving Destination (12) Status, Inactive Reason, Role? |
...