Assign Follow-Up Task Privileges

You can assign aggregate privileges to secure the visibility of follow-up tasks.

The following are granted by default to the Recruiter role.
  • View Candidate Follow-Up Task (ORC_IRC_VIEW_CANDIDATE_FOLLOW_UP_TASK)
  • Manage Pending Candidate Follow-Up Task (ORC_IRC_MANAGE_PENDING_CANDIDATE_FOLLOW_UP_TASK)
The following is granted by default to the Recruiting Manager role. This role includes the ability for a recruiting administrator to delete already completed follow-up tasks for the purposes of cleanup or other reasons.
  • Manage Completed Candidate Follow-Up Task (ORC_IRC_MANAGE_COMPLETED_CANDIDATE_FOLLOW_UP_TASK)

These aggregate privileges handle candidate follow-up tasks for which the user is the owner. Additionally, your organization might need to give some specific people a super-user access to follow-up tasks so that they can view and manage tasks for which they aren’t the owner.

As an IT Security Manager, you can grant access to all follow-up tasks through data security using the Security Console for manage or view Candidate Follow-up Task.

Using the Security Console, edit the data role to which you want to grant full access to candidate follow-up tasks, and create a new data security policy. In the Create Data

Security Policy, configure the fields as follows:

  • Data Resource: Candidate Follow Up Task
  • Data Set: Select All values for the data set
  • Actions: Select the actions you want: Manage Candidate Follow-Up Task, View Candidate Follow-Up Task