Only those that you provide access to can use your system.
Access the system using a PIN number or user name.
Roles & permissions
Assign your employees different roles and access levels.
Loss prevention, fraud detection, and audit logs
Track and report on sale item changes and voids.
Track business data changes.
Authorisation checkpoints on key data.