{"id":353,"date":"2023-10-15T11:49:00","date_gmt":"2023-10-15T16:49:00","guid":{"rendered":"https:\/\/performancescoring.com\/?p=353"},"modified":"2025-10-29T15:10:37","modified_gmt":"2025-10-29T20:10:37","slug":"company-reports-to-function","status":"publish","type":"post","link":"https:\/\/securedb.io\/kb\/?p=353","title":{"rendered":"Reports To"},"content":{"rendered":"\n<p>Managing who in an organization can see what is a real challenge in the software world. You could drive yourself crazy trying to create all sorts of role, each with slightly different permissions, and you would still run into privacy and visibility issues. That&#8217;s why it&#8217;s important to understand how SecureDB manages visibility and privacy. We call it, &#8220;the <strong>Reports To<\/strong> function&#8221;.<\/p>\n\n\n\n<p>In every user&#8217;s profile, there&#8217;s a dropdown where you can select who this person &#8220;reports to&#8221; primarily.   In this way, a hierarchy is built.  Users can see DOWN that hierarchy, to everyone that reports to them and everyone who reports to those that report to them, and so on.  However, that user CAN NOT see UP the hierarchy. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Company Example<\/h2>\n\n\n\n<p>Here&#8217;s an example company. In the following <a href=\"https:\/\/securedb.io\/kb\/?p=3577\" data-type=\"post\" data-id=\"3577\">Accountability Chart<\/a>, you&#8217;ll see all the people Avery Sinclair can see data for, because all of them report-up to him in one way or another.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-1024x512.png\" alt=\"\" class=\"wp-image-20582\" srcset=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-1024x512.png 1024w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-300x150.png 300w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-768x384.png 768w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-1536x768.png 1536w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-2048x1024.png 2048w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-868x434.png 868w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/1-980x490.png 980w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If we looked at that same org chart from Thomas Li&#8217;s point of view, he would only see the people and data for his team because these are the only three that &#8220;report to&#8221; him. He cannot, however, see UP the chain (Avery) or ACROSS the train (Sofia and Nina).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1320\" height=\"660\" src=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1.png\" alt=\"\" class=\"wp-image-20573\" srcset=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1.png 1320w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1-300x150.png 300w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1-1024x512.png 1024w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1-768x384.png 768w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1-868x434.png 868w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/2-1-980x490.png 980w\" sizes=\"auto, (max-width: 1320px) 100vw, 1320px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding Secondary &#8220;Reports To&#8221;<\/h2>\n\n\n\n<p>Now that you understand &#8220;Reports To,&#8221; you may have already noticed its limitation. What if Nina, who is in charge of HR, needs to see Thomas&#8217; data except Thomas does not report to Nina up the chain? That&#8217;s why you&#8217;ll find a second field in each user&#8217;s profile called <strong>Reports To Secondary<\/strong>. In Thomas&#8217; profile, we would add all the users who need to see his data, even if he does not report to them primarily through the hierarchy.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-1024x512.png\" alt=\"\" class=\"wp-image-20578\" srcset=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-1024x512.png 1024w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-300x150.png 300w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-768x384.png 768w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-1536x768.png 1536w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-2048x1024.png 2048w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-868x434.png 868w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/KB-Article-Images-11-980x490.png 980w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Exceptions to &#8220;Reports To&#8221; Function<\/h2>\n\n\n\n<p>Between Reports to and Reports to Secondary, we can confidently build the hierarchy of your organization with the right visibility and protect privacy, with just two simple fields.  However, there are a few exceptions that skip these two functions.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In a meeting, <a href=\"https:\/\/securedb.io\/kb\/?cat=33\" data-type=\"category\" data-id=\"33\">meeting attendees<\/a> who have accepted the meeting invitation can see all the information added to that meeting that involve any other attendee in the meeting.<\/li>\n\n\n\n<li>In a Project, <a href=\"https:\/\/securedb.io\/kb\/?cat=33\" data-type=\"category\" data-id=\"33\">Project team members<\/a> can see the Task and Task status for any other member who is a part of the Project.<\/li>\n\n\n\n<li>When initially creating an organization, the organization may be in temporary <a href=\"https:\/\/securedb.io\/kb\/?tag=implementation\" data-type=\"post_tag\" data-id=\"27\">Implementation Mode<\/a>, which skips all visibility while admins are building-out their organization. <\/li>\n<\/ol>\n\n\n\n<p>There is one more super-admin example where a particular user may be granted &#8220;Integrator&#8221; status permanently.  You&#8217;ll know this user has been granted this special privilege to skip all visibility rules when their is a &#8220;crown&#8221; next to their name in the <a href=\"https:\/\/securedb.io\/kb\/?p=10952\" data-type=\"post\" data-id=\"10952\">Users table<\/a>.  This special permission can ONLY be granted by your account manager.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"172\" src=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-1024x172.png\" alt=\"\" class=\"wp-image-14733\" srcset=\"https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-1024x172.png 1024w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-300x50.png 300w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-768x129.png 768w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-954x160.png 954w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin-980x164.png 980w, https:\/\/securedb.io\/kb\/wp-content\/uploads\/super-admin.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If your <a href=\"https:\/\/securedb.io\/kb\/?p=12000\">user role<\/a> has permission to access it, you can also manage the &#8220;Reports To&#8221; hierarchy using the <a href=\"https:\/\/securedb.io\/kb\/?p=12000\">Setup Wizard<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-right\"><strong>UP NEXT:<\/strong> <a href=\"https:\/\/securedb.io\/kb\/?p=14735\" data-type=\"link\" data-id=\"https:\/\/securedb.io\/kb\/?p=14735\">Meeting Invites<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You could drive yourself crazy trying to create all sorts of roles with slightly different permissions for everybody.  That&#8217;s why the application manages visibility and privacy through something we call &#8220;Reports To.&#8221;<\/p>\n","protected":false},"author":3,"featured_media":16122,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_helpful_status":1,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-getting-started"],"wps_subtitle":"Super-Important Stuff","_links":{"self":[{"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/posts\/353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=353"}],"version-history":[{"count":27,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/posts\/353\/revisions"}],"predecessor-version":[{"id":20584,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/posts\/353\/revisions\/20584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=\/wp\/v2\/media\/16122"}],"wp:attachment":[{"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securedb.io\/kb\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}