Skip to content
  • There are no suggestions because the search field is empty.

Understanding Casebook’s Security and Permissions

Security and permissions in Casebook are designed to protect sensitive client data while allowing your staff to work efficiently and collaboratively. Every agency’s confidentiality needs are different from small community programs to statewide organizations, and Casebook provides flexible tools to ensure the right people have the right level of access at the right time.

 

🧭 Overview

Human services organizations handle highly sensitive information every day. Casebook helps you maintain client privacy, comply with regulations, and support real-world teamwork through a clear, role-based permissions structure. You can use Casebook’s security settings to:

  • Control who can view, edit, or delete information

  • Reflect how your organization is structured (by team, program, or region)

  • Give supervisors oversight while maintaining staff-level confidentiality

  • Meet privacy and compliance standards confidently

🧩 How It Works

1. Roles — Setting the Foundation

Roles define what each user can do in Casebook, such as view, create, edit, or delete. They apply across all modules such as People, Intake, Engage, and many others. 


You can use Casebook’s preconfigured roles or create new ones that match your agency’s structure.

 

Common Role Examples

Role

Description

Admin

Access to system configuration settings only.

All Access

Full access across Casebook for system administrators.

Worker (Intake / Engage / Provider)

Can view, create, and edit records within assigned areas.

Observer

View-only access (no edits).

Supervisor

Full control within their assigned area (view, create, edit, delete).

Reporting Admin / Observer

Manages who can access or view reports.

2. Assigning Roles

Roles are managed in Admin → Users. Each user can have more than one role, and Casebook automatically layers their permissions.

Screenshot 2025-10-17 at 9.51.25 AM

For Example:

 

“Our Intake Workers need full access to Intake but only read access to Engage.”
Assign Intake Supervisor and Engage Observer roles.

This setup keeps collaboration open where it’s needed and restricted where it’s not.

 

3. Record-Level Permissions — Access Lists

For programs that handle confidential client data, Casebook lets you control access at the record level. Each record (such as a Case or Intake Report) has an Access panel that shows who can view or edit it. You can manage this in two ways:

 

From a Record

  • Open a Case, Intake, or Person record.

  • Click Access on the right-hand side.

  • Add or remove users or teams as needed.

From a Workload View

  • Go to Engage, Intake, or Providers.

  • Select multiple records using the checkboxes.

  • Click Bulk Update Access to manage visibility for several at once.

Deny Lists — Adding Extra Privacy Control

While access lists grant visibility, Deny Lists restrict it. A Deny List removes access to specific records even for users or teams who would normally have permission through their role or team membership. This gives administrators an added layer of privacy control without changing the overall permission structure.

 

Common Uses for Deny Lists:

  • Restricting a single record with highly sensitive client information.

  • Separating visibility between specialized teams (for example, Victim Services vs. Crisis Response).

  • Temporarily limiting access during an internal review or investigation.

Best Practice:

Use Deny Lists sparingly. They’re designed for exceptions that require additional confidentiality, not as your primary way to manage permissions.

 

🧠 Think of a Deny List as an extra layer of security for special cases that need tighter protection

4. Automatic Security Logic

Casebook automatically adds the right users to access lists to reduce setup time and ensure consistency:

  • The creator of a record automatically gains access.

  • Any assignees are automatically included.

  • The team of an assignee is also added automatically.

🧠 Permissions follow your real-world workflows, so data stays protected and staff stay productive.

 

5. Teams — Scaling Security Easily

Teams help you manage access for groups of users in a consistent and scalable way. When a team member creates or is assigned a record:

  • Their entire team gains access automatically.

  • Supervisors can see the full scope of their team’s work.

Screenshot 2025-10-17 at 9.53.29 AM


For Example:

A multi-county agency uses “Central Office” and “East Region” teams.
Staff in each region automatically share access within their group, while remaining fully secure from other programs.

🧠 Teams help organizations scale securely without exposing unnecessary data.

 

6. Inherited Permissions — Supporting Complete Workflows

When a user can view a Case or Intake, Casebook automatically includes limited, relevant details about linked People or Providers.

 

For example:

A worker viewing a case can see key identifiers for the people involved, even without full access to their entire profile.

This ensures staff have the information needed to act, while still maintaining strong privacy boundaries.

 

💼 Security Models for Different Needs

Setup Type

Description

Best For

Open Access

All staff can view and edit records.

Programs emphasizing transparency, like outreach or resource navigation.

My Work Only

Staff see only what they’re directly assigned.

Casework where client confidentiality is essential.

Team-Based Access

Teams share visibility within their own group only.

Multi-program or regional agencies.

Restricted Access

Access is granted per record or case.

Programs with strict privacy requirements (e.g., behavioral health or domestic violence).

💡 When to Adjust Permissions

Adjust security settings when your organization needs to:

  • Protect client confidentiality and sensitive information

  • Limit visibility between programs or departments

  • Maintain compliance with local or federal privacy laws

  • Prevent over-sharing between teams or contractors

🧠 Best Practices

  • Start with roles. Use Casebook’s default roles as your foundation.

  • Use teams for efficiency. They simplify large-scale access management.

  • Review permissions regularly. Confirm that staff only see what’s relevant to their role.

  • Rely on automation. Casebook automatically handles common access patterns.

❓FAQs

Q: Will staff automatically have access to their assigned cases?
Yes. Casebook automatically adds the assigned user and their team to the record’s access list.

Q: Can supervisors see what their team is working on?
Yes. Supervisors automatically see their team’s assigned cases when team access is enabled.

Q: How can I let two programs collaborate on a shared client?
Add users or teams from another program directly to the case’s access list.

Q: Do I have to update access manually each time?
No. Casebook automates most access updates for common workflows. Manual edits are only needed for exceptions.

 

📘 Related Articles

Use these guides to dive deeper into how permissions work across Casebook:

📞 Need Help?

If you're unsure how to update roles, build teams, or apply access changes, contact our Support Team. We're happy to help.