Docs For Ledsak
Go To Website
Ledsak Documentation
Ledsak Documentation
  • Introduction to LEDSAK
  • Getting Started
    • Creating Account
    • Integrations
    • Roles and Permission
    • Staff
    • Automation
    • Lead Distribution
  • Lead Management
    • 🟦All Lead
      • Send To Meta
      • Send To Google
      • Activity
      • Notes
      • Emails
      • Calls
      • Meeting
      • Task
      • Deals
      • Ticket
    • 🟩Lead Setup
    • 🟥Lead Distribution
    • ⬜Export History
  • Deal Management
    • All Deals
    • Won Deals
  • Actions
  • Automation
  • Integrations
    • Facebook
    • Website
    • Brevo
    • GallaBox
    • Indiamart
    • Tawk
  • Reports
  • Staff Management
    • Staff
    • Attendance
    • Roles and Permissions
    • Login History
  • Settings
    • Customize
    • Template
Powered by GitBook
On this page

Staff Management

Efficient staff management is critical to the smooth operation of any organization. This system encompasses various aspects of handling staff information, attendance, roles, permissions, and login activity. Below are the key components:

Staff

Manage detailed information about all employees, including:

  • Personal details (e.g., name, contact information, email).

  • Job-related information (e.g., Role, Branch).

  • Status (e.g., active, inactive).

Attendance

Track and monitor employee attendance accurately to ensure compliance and efficiency:

  • Daily attendance logs.

  • Leave tracking.

  • Overtime and late arrivals.

  • Reports on attendance patterns.

Roles & Permissions

Define and control user access within the system:

  • Assign specific roles to staff members (e.g., Admin, Manager, Employee).

  • Set permissions for accessing or modifying data based on roles.

  • Maintain security and ensure sensitive data is only accessible to authorized personnel.

Login History

Monitor system usage and login activity for better accountability:

  • Track login and logout times.

  • Generate reports on user activity.

  • Identify potential security risks or misuse of the system.

PreviousReportsNextStaff

Last updated 5 months ago