Tenant Rep
Tenant mode changes workflow emphasis and reminders only; shared security and data boundaries stay intact.
Security
theCREmodel keeps one shared security model across tenant and landlord workflows. Representation mode changes product behavior, not authorization boundaries, data ownership, or storage rules.
Authentication + Access
Protected actions rely on authenticated user context, server-side verification, and account-scoped access controls before workflows, exports, or storage operations run.
Workspace Isolation
Documents, deals, surveys, obligations, reminders, tasks, activities, and CRM state stay attached to the active client workspace so one account cannot read another account’s records.
Representation mode is an adaptive UX layer. It changes onboarding, dashboards, default views, AI suggestions, reminders, templates, exports, and workflow emphasis while leaving the shared data model untouched.
Dashboard hierarchy updates that surface command metrics, grouped insights, and drill-down workspaces are presentation-only changes and do not alter authorization, workspace isolation, or storage boundaries.
CRM intake building autocomplete and add-building actions still write into the same client-scoped building records, so this workflow change does not expand access or bypass existing workspace protections.
Shared CoStar Excel imports publish into a platform-wide market inventory source for building reference data only. They do not expose client documents, deals, surveys, obligations, or workspace-specific overrides, and upload access still requires authenticated user context.
Manual stacking-plan edits, floor and suite records, and optional economics still persist inside the same client-scoped CRM state and occupancy records, so lease economics remain governed by the existing workspace boundary and audit path.
The dedicated Buildings module reads shared market inventory for common building reference data, while focused-building context, stack-plan edits, suite records, and downstream workflow handoffs remain client-scoped.
Intentional document and building deletions now persist as client-scoped workspace tombstones, which prevents stale local or cloud snapshots from resurrecting records a user explicitly removed.
Suite-level selection inside Buildings can create survey rows from the active client workspace only. Those handoffs do not publish private suite economics globally and continue to inherit the same client-scoped survey storage boundary.
Financial Analysis handoff from Buildings uses the same client-scoped pending-scenario storage path as the existing analysis module, so selected suites are staged for the active workspace only and do not leak into other clients or users.
Shortlist and tour workflow records created from Buildings persist in the same client-scoped CRM workspace state as deal notes, stack edits, and reminders, so those actions stay isolated to the active client and remain covered by the existing audit path.
The new deal-room layer stores overview metadata, current-location constraints, negotiation trackers, and client-portal settings inside the same client-scoped deal record. It does not create a second transaction store or broaden cross-client visibility.
The dedicated CRM shortlist and tour boards are presentation and workflow-management layers over those same client-scoped records. They do not introduce a new storage boundary or a separate cross-client dataset.
Inline board edits for attendees, tour notes, and follow-up actions still write into the same client-scoped CRM workflow records, and AI tour-brief or proposal-request actions only read from the active workspace context before logging their result.
Drag-and-drop status movement on shortlist and tour boards is only a UI interaction for changing the same client-scoped workflow status fields. It does not create a separate workflow store or bypass existing deal audit history.
Inline shortlist owners and tour assignees persist inside the same client-scoped CRM workflow records as the rest of the board state, so responsibility can be updated without creating a second assignment system or expanding access boundaries.
Saved board views can now be stored either for the active deal or as team-wide client views. Team-wide views still only persist reusable filters for the current client workspace and do not publish private CRM slices across clients or accounts.
Team-wide board views are now role-aware. Users without a sharing-capable role can still load applicable shared views for their client team, but they cannot overwrite or delete the shared view definitions.
Client Access and Client View toggles in the deal room are presentation controls only. They determine which curated transaction summary is exposed to approved client contacts; they do not bypass authentication, change workspace ownership, or reveal internal-only notes by default.
Bulk reassignment on shortlist and tour cards updates the same underlying client-scoped workflow records one time per selected card. It does not create hidden secondary queues or bypass the normal audit history.
AI-generated post-tour recap drafts remain workspace-bound until a user explicitly sends them. The send action now goes through an authenticated backend route, and logging a recap into deal activity writes a new timeline event inside the same deal record and follows the existing audit path.
Automatic stacking-plan updates are limited to current lease, amendment, abstract, and sublease uploads. Proposal, LOI, and counter documents remain non-authoritative for occupancy so speculative deal motion cannot overwrite live building stack data.
Tenant Rep
Tenant mode changes workflow emphasis and reminders only; shared security and data boundaries stay intact.
Landlord Rep
Landlord mode changes leasing-console behavior and reporting emphasis only; shared security and client boundaries remain unchanged.
AI-triggered actions, workflow changes, reminders, tasks, exports, and linked-record updates are recorded in centralized logs so teams can review operational history and understand how a workspace changed over time.
Data is transmitted over HTTPS/TLS. Persisted records and files rely on managed encryption at rest, and account-scoped settings continue to use row-level isolation controls where supported.
Report security concerns to info@thecremodel.com.