MANUALS > Production > Production Module > Production, Print Menu > Customer Contract Print
Customer Contract Print
The Customer Contract Print, General tab allows the user to query for a customer contract using the following fields:

This window and the print options in this window are security controlled via Security Explorer/ Production/ Print/ Customer Contract Print. For additional information, refer the the Security Explorer, via the System Administration Training Manual.
The following information/options are available in this window: _____________________________________________________________________________________
Contract Number
The unique Customer Contract number.
Location
The Location for maintenance events, inventory stores, orders, transactions, or training events.
Priority
The priority placed on the transaction (e.g., routine, AOG, etc.).
Customer
The customer being invoiced for the work.
Contract Type
Classification of Contract Type may be defined here (i.e., Heavy Check, AOG,TPW, PBH, Line, etc.).
Company
The company the order is being created for.
_____________________________________________________________________________________
The Print button is used to generate the report in the Print Queue. For more information, please refer to the Print Queue topic.
The Print Preview button can be selected to view a pdf sample of the print. This preview opens in a new window.
The Schedule Print button can be selected to allow users to schedule specific prints with unique filters to be automatically generated through a pre-configured schedule. For more information, please refer to the Schedule Print button topic.
The Export as Excel button can be selected to view the queried data (including all pages) in an Excel spreadsheet. This Excel file can be saved for later use. For more information refer to the Export as Excel Button via the eMRO System Standards manual.
Note: The Export as Excel print functionality is security controlled via System Administration/Update/Logged In Session/Excel Export Functionality. For more information, refer to the Security Explorer via the System Administration Training manual.
|