User Roles

Guide 2 Nov 19, 2025

WEEE Waste Manager implements a robust role-based access control system to ensure secure and efficient operations. Each role has specific permissions and responsibilities tailored to their function within the waste management process.


Administrator
Full system access with complete control over all features and settings.

  • Manage user accounts and permissions
  • Create and process waste notes
  • Access all reports and statistics
  • Configure system settings
  • Monitor staff performance
  • Manage client relationships
  • Handle compliance documentation
  • Oversee fleet management

Staff Member
Operational access focused on waste collection and processing tasks.

  • View and manage assigned collections
  • Update job status in real-time
  • Record waste collection details
  • Capture digital signatures
  • Access route information
  • Communicate with team members
  • Submit collection reports
  • View personal performance metrics

Client
Limited access to relevant waste collection information and documentation.

  • View collection history
  • Access waste documentation
  • Download compliance certificates
  • Track ongoing collections
  • View environmental reports
  • Update contact information
  • Request new collections
  • Access support resources

Role-Based Security
Our role-based access control system ensures data security and operational efficiency:
Access Control

  • Granular permission settings
  • Secure authentication system
  • Activity logging and auditing
  • IP-based access restrictions

Account Management

  • Self-service password reset
  • Two-factor authentication
  • Session management
  • Account recovery options

Role Transitions
Process for changing user roles:

  1. Submit role change request
  2. Administrator approval required
  3. Automatic permission updates
  4. Notification to affected user
  5. Access level adjustment

Custom Permissions
Additional role customisation options:

  • Department-specific access
  • Time-based restrictions
  • Feature-level permissions
  • Geographic limitations
  • Client-specific access

Access History
Comprehensive audit trail features:

  • Login activity tracking
  • Permission change logs
  • Action history recording
  • Security event monitoring
  • Compliance reporting