User roles can leverage metadata-based security, which is the ability to secure objects based on metadata. This is done by selecting the Edit Query option for Record Access and configuring the security as desired.
Example
Step 1
Navigate to User Roles in the security administration, and open a role that needs to be configured.
Step 2
A report appears, where the filter can be edited; modify the filter and save.
Step 3:Test
While other users can view the full list of contacts, signing in with the talent manager role will only show Pierce in the list.