With a roles-based security and permissions system, each user is mapped to a role based upon the types of tasks that the user will perform inside of the system. These may be changed at any time. Once the roles are established for users i.e., staff, suppliers, inter-company sites, etc., then each user is assigned to an individual role. A user may only be assigned to one role. Each role defines a user’s access to reports, menu items, types of quality functions that may be performed, etc.