


How Felcorp and clients ensure least-privilege access is configured correctly across client-owned systems and software.

When Felcorp delivers outsourced services, staff frequently need access to systems and software that belong to the client. These might include practice management platforms, accounting software, CRM systems, document management tools or cloud storage environments.
Because these systems sit on the client's side, the client controls user permissions. Felcorp's role is to work with the client to ensure the right level of access is configured from the outset and maintained throughout the engagement.
Felcorp staff should hold only the minimum user privileges and access requirements needed to comfortably deliver the agreed services. This means enough access to perform the work efficiently, without unnecessary visibility into areas of the system that fall outside the scope of the engagement.
Granting full administrative access or unrestricted permissions creates risk that can be avoided through considered role configuration. The goal is to match system access precisely to the responsibilities outlined in the engagement terms.
The specifics of access configuration depend on the client's systems and internal policies, but the general approach follows a consistent pattern.
At the start of an engagement, Felcorp provides the client with a clear outline of what access is required, which staff members need it and what tasks they will be performing. The client then provisions user accounts with the appropriate role and permission levels within their own platform.
Where a system supports role-based access controls, Felcorp recommends configuring a dedicated role that reflects the scope of work rather than assigning generic or elevated permission sets. This keeps access contained and makes it easier to audit.
While Felcorp cannot enforce permissions on client-owned systems, we provide guidance to support secure configuration:
These recommendations align with Felcorp's internal access management practices described under Identity and Access Management.
Access requirements can change as an engagement evolves. New tasks may require additional permissions, or a shift in scope may mean certain access is no longer needed.
Felcorp communicates access changes to the client as they arise, and recommends periodic review of user permissions to confirm they remain appropriate. Where a temporary staff substitution is required, the client is notified and must provide written approval before the substitute is given access to any client system.
When an engagement ends, Felcorp requests that the client revoke all associated user accounts and access credentials. On Felcorp's side, all stored client data is securely transferred back and permanently removed from internal systems within the agreed timeframe, as described under Operational Processes and Policies.
Client-side system access sits at the intersection of the Security By Design and Security By Engagement layers. The principle of least privilege is a design-level standard, while the specific permissions configured for each client reflect engagement-level controls.
For detail on how Felcorp governs access on its own systems, refer to Identity and Access Management.