Post operations
View post schedules
- Permission
- View post
- Min. clearance
- None
- Has permission?
- No
- Meets clearance?
- Yes
Stay audit-ready with automated task tracking, robust access control, and audit trails.
Schild enforces dual-layer security: users must have both the required role-based permission and meet the minimum sensitivity clearance. Access is denied if either requirement fails.
User has required permission and meets clearance level
User lacks the required permission
User's clearance is below the minimum required
Below are access evaluations for various data types using this user context.
View post schedules
Sensitive report content
Organization policies
Clearance hierarchy: None → Controlled, unclassified → Confidential → Secret → Top secret
Document special incidents that require law enforcement or emergency service contact with granular sensitivity controls. Set clearance levels from "Controlled, unclassified" to "Top secret" to ensure only authorized personnel can view sensitive incident details and officer narratives.
Manage organizational policies with automated distribution. View policy statistics, monitor active vs. terminated policies, and track average document size and lifecycle—ensuring all personnel have access to current policies while maintaining proper access controls.
Personnel access organization policies and NDAs directly from any device. View and download Use of Force, Weapons, Appearance Standards, Vehicle Use, and other critical policies—all filtered by their clearance level and with one-tap downloads.
Create ops with required tasks that enforce compliance with organizational policies. Set task order, require completion, and track acknowledgments—ensuring personnel read policies, complete knowledge checks, and demonstrate understanding before and during assignments.
Personnel complete training sessions and other duties with ordered tasks including policy acknowledgments, knowledge checks, and scenario responses. Tasks are presented in sequence with clear requirements, geolocation tracking, and timestamps—ensuring everybody is internally compliant.