Enforcing Office-Level Data Isolation

Configure office isolation so agents only view data for their assigned office or branch.

Gravatar
Juliana Menendez
  • 6 days ago
  • Published

Goal

Enable office-level data isolation so an agent assigned to Office A cannot browse, search, or report on records owned by Office B.

When You Should Enable It

  • Multiple branches with distinct P&L or compliance separation.
  • Need to reduce accidental data exposure across geographically distinct teams.
  • Desire to simplify agent UI (hide irrelevant offices' customers, policies, tasks).

Pre‑Requisites

  • All existing agents assigned to the correct office.
  • Customer & policy records have an office association (system default if created through standard forms).
  • Administrators have validated reporting needs for cross-office metrics (they will retain cross-office visibility).

Key Access Right (How Isolation Actually Works)

Office isolation is enforced by a single high‑level access right. If the user DOES NOT have the right below, their visibility is automatically restricted to records belonging to their assigned office. Granting the right restores multi‑office visibility (unless other feature‑level rights further restrict a module).

Important interplay: This right only controls cross‑office visibility. Even with it disabled (set to No), an agent can still view records owned by other agents in the same office if they have “Agency: Access to data related to any agent”. Disable both rights to confine an agent strictly to their own records. See: Agent Visibility Restriction.
Access right row: 'Agency: Access to data all across the offices' with its description and a toggle set to No
The single access right that governs cross‑office visibility. Set to No for isolated groups; only grant to administrators or designated oversight roles.

Steps to Enforce Isolation

  1. Navigate to Administration > Security > Permission Groups (or open an individual user’s Permissions panel).
  2. Create a new group (top‑right Create Permission Group) if you need a distinct isolated role, or locate and Edit an existing agent group.
  3. Select (or if creating, name and configure basics for) the permission group applied to agents who must remain limited to their own office (e.g. Agents).
  4. Use the permissions search box and type part of the access right name (e.g. across the offices).
  5. Set Agency: Access to data all across the offices to No.
  6. (Optional tightening) Also set Agency: Access to data related to any agent to No if agents should only see records tied directly to themselves. This pairs with office isolation to become the strictest model. See Agent Visibility Restriction.
  7. Save / apply the permission group changes.
  8. Log in (or impersonate) a test agent from Office A and confirm they cannot see Office B’s customers/policies via search, list views, or dashboards. If you also disabled the agent‑level visibility right, verify they only see their own assigned records.

Immediate Effects

  • Global searches filtered to agent's office unless user is Administrator or has a cross-office permission flag.
  • Customer/policy lists exclude other offices.
  • Dashboards reflect only local office metrics for isolated roles.

Audit & Monitoring

Perform a monthly spot check using an agent test account in each office to confirm no cross‑office data bleed. Review access logs for unusual cross-office queries (if available in your subscription tier).

Rollback Procedure

  1. Open the affected permission group (or user permissions).
  2. Set Agency: Access to data all across the offices to Yes.
  3. Save the change; agents inheriting that group immediately regain multi‑office visibility.
Was this article helpful?

0 out of 0 found this helpful