- Created by Carl Brown, last modified by Carolyn Groessl on Apr 12, 2021
User roles are permission levels that are assigned to contacts within the system regardless of the person's access to eICS. There are five roles, four of which are internal roles and one that is external.
- Domain Administrator — Individual who establishes facilities, manages contacts, and administers libraries for the facilities within their domain.
- Facility Administrator — Individual who manages plans, contacts and libraries for their facility.
- Facility Staff — Individual who is associated with emergency management planning, response, and/or recovery at the facility level; who can manage incidents; and who may be called on to respond to an incident.
- Facility Staff Limited — Individual who is associated with emergency management planning, response, and/or recovery at the facility level; and who may be called on to respond to an incident. However, they are not able to start incidents.
- External Contact — Individual associated with a facility who may need to be notified of incidents, but who does not usually have access to eICS. For example, a vendor who delivers goods or services or the county emergency management coordinator could both be considered external contacts.
All internal roles are considered contacts and have access to the system. As such, they are assigned roles to specify and differentiate their jobs and permissions within the system.
External Contacts do not necessarily have access to the system. These are usually people or businesses that interact with facilities. They are identified to promote communication and send notifications regarding incidents.
For more information on the five main roles and their access and responsibilities, refer to Permissions.
Users
Users are contacts, but contacts are not necessarily users. As an administrator, you must decide whether a new contact needs to use the eICS system. If they do, you assign a username, specify at least one phone number and email address for the contact, and assign a user role.
Domain Administrator
Domain Administrators manage information about the incident command system (ICS) and domains within the ICS. They also provide support for facilities within their domain.
Role | Description and Tasks |
---|---|
System | A Domain Administrator has the highest level of access. They can:
|
Incident | For incidents, Domain Administrators can add to and change information in any Incident Dashboard. They can add events to the log, update the status of their position's objectives, send messages to other participants, and much more. |
Facility Administrator
Facility Administrators manage information about their facility, including the contacts, library, and plan. They can also create an incident and assign themselves and others to positions on an active incident.
Role | Description and Tasks |
---|---|
System | All Facility Administrators can manage facility roles within their specific facility. In addition, they have access to the system's administrative features. They can:
|
Incident | During an incident, an administrator assigned to a position defined in the associated incident response guide (IRG) takes on that position's role. These individuals can add to and change information in the Incident Dashboard, adding events to the log, updating the status of their position's objectives, sending messages to other participants, and much more. In addition, a Facility Administrator can:
|
Facility Staff
Facility Staff can work within eICS to update their profile information. They can also create an incident and assign themselves and others to positions on an active incident.
Role | Description and Tasks |
---|---|
System | In general, Facility Staff members can access any non-administrative features in the system. They can:
|
Incident | When an incident occurs, a staff member assigned to a position defined in the associated IRG takes on that position's role. These individuals can add to and change information in the Incident Dashboard by adding events to the log, adding to the incident's library, updating the status of their position's objectives, sending messages to other participants, and much more. |
Facility Staff Limited
Facility Staff Limited can work within eICS to update their profile information. They can also assign themselves to positions on an active incident.
Role | Description and Tasks |
---|---|
System | In general, Facility Staff Limited members can access non-administrative features in the system. They can:
|
Incident | When an incident occurs, a staff member assigned to a position defined in the associated IRG takes on that position's role. These individuals can add to and change information in the Incident Dashboard by adding events to the log, adding to the incident's library, updating the status of their position's objectives, sending messages to other participants, and much more. |
External Contact
You can add partners, vendors, and other external individuals or entities to eICS. By doing so, you ensure these individuals and entities are notified as appropriate when an incident occurs. These individuals are known as External Contacts and have limited access to facilities. In most cases, these contacts do not need access to eICS. However, when necessary, you can provide these individuals with credentials so they can access eICS on a limited scale.
Role | Description and Tasks |
---|---|
System | Some of your External Contacts may also be system users, enabling you to call on them to respond to incidents. Other External Contacts, however, may be included in your system simply to ensure that these individuals are notified of incidents. If an External Contact has a username, login email, and password, they can:
|
Incident | When an incident occurs, an External Contact who is assigned to a position defined in the associated incident response guide (IRG) takes on that role. These individuals have access to the Incident Dashboard for the life of the incident. They can add to and change information in the Incident Dashboard by adding events to the log, adding to the incident's library, updating the status of their position's objectives, sending messages to other participants, and much more. Once the incident is ended, these users can no longer access the dashboard. External Contacts without user accounts do not have access to eICS. Generally, these are individuals in your Other Contacts to Notify group. |