Position Opening Adapter
|
|
- Howard McKenzie
- 5 years ago
- Views:
Transcription
1 Position Opening Adapter
2 Position Opening Adapter Contents Position Opening Adapter 2 Commercial In Confidence 3 Position Opening Adapter 4 Overview 4 Events 4 OAGIS Message 4 Foreign Keys 5 Concurrent Updates 5 Methods 5 Get 5 Get Message Mapping 5 Notes 5 Show Message Mapping 5 Message Examples 8 Get 8 Show 9
3 Commercial In Confidence Copyright 2018 ABB All Rights Reserved Confidential and Proprietary Legal Disclaimer The product described in this documentation may be connected to, and/or communicate information and data via, a network interface, which should be connected to a secure network. It is your sole responsibility to ensure a secure connection to the network and to establish and maintain appropriate measures (such as but not limited to the installation of firewalls, application of authentication measures, encryption of data, installation of antivirus programs, etc.) to protect the product, the network, your systems, and the interface against any kind of security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data. We are not liable for damages or losses related to any such security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data.
4 Position Opening Adapter Overview Positions define roles within the hierarchy of an organisation. When a profile of the optimum work force is built, position requirements are used to declare the resource types (skills, etc.) required for position occupants. Each resource type may have a competency level associated with it, as well as an indicator of whether or not it is mandatory. This information is used as a comparison for new recruits, to determine training where a skills gap is revealed, and as a basis for succession and development of employees. Positions have two other important aspects: Security profiles are attached to positions. Positions may have multiple incumbents, and employees can occupy more than one position. Employees may be assigned a Primary position, and may also have secondary and higher duty positions. The occupant of a position inherits the security and authorisation characteristics of that position. For example, authority levels are set for each position, with a number of criteria governing items such as the upper and lower limit, the level of checking and who it is referred to for authorisation if not passed at this level. When an employee is attached to a position, it is possible to grant a percentage of the authority level that this particular employee is entitled to exercise. Also, an employee can be provided with a security profile that overrides the position profile, if needed. Partial authorities can be recorded, where appropriate. This is best illustrated in the situation where an employee relieves in a position for a percentage of their time. The employee still performs his or her own duties but is authorised to perform some of the relieving position duties and a percentage of the authority levels. For the Position Opening adapter, the Ellipse business elements outlined below can be accessed: Position The information contained within the position entity covers: Attributes Reporting Codes Authorities Details Evaluation Details Duties Selection Criteria Requirements Context Objectives Note To obtain Requirements (Competencies) related to a Position, refer to the Position Requirements adapter. The OAGIS request messages to be processed by the Position adapter will be obtained from the MIB.COMMMON.GW queue. The OAGIS response messages returned from the Position adapter will be output to the MIB.COMMON.REPLY queue. Events Where the property mib.positionhierarchy.eventsenabled is set to true (refer EIP Console, Runtime menu, Configuration option), event processing will be handled for Position data. The event processing will be triggered by a change to the Position table (MSF870). The specific change will be where the Position table has a record created or updated. An event message for the Position table will be generated and passed to EIP. EIP maintains the named subscription Position1 under the EllipseServices topic to process these event messages. This will result in GetPositionOpening messages being generated and processed for the specified Position, with ShowPositionOpening messages then being output to the queue MIB.Common.Reply, for consumption by an external system. OAGIS Message PositionOpening noun The OAGIS standard DOES NOT contain any suitable nouns to represent Ellipse Positions. Therefore the following noun has been created: PositionOpening
5 The OAGIS verbs get and show will be supported. Foreign Keys N/A Concurrent Updates The potential exists for Position entity attributes to be updated by both Ellipse and the 3rd party system. In these cases, the last update wins, meaning if the 3rd party system sends updates after Ellipse has performed an update, the 3rd party system updates will be applied (and vice versa). Methods Get The get method calls the following Ellipse services to process the data passed: Position A specific Position Id value can be provided (Ellipse Id). In this case the Position service will read the database for the specified Id value. Note Any other search criteria provided will NOT be used. General search criteria can also be provided. In this case the Position service will search the database using the specified criteria. For each Position returned, the related details from the Position file (MSF870) will be returned. Get Message Mapping Mapping of ABB GetPositionOpening message attributes to Ellipse web service: Field Description Validation Service Attribute <DocumentID> <ID>string Position Id value. Position position </DocumentID> <ChangedSince>Date Last modified date. lastrundatetime Notes Multiple Position Entries Multiple Position search requests can be processed via a single GetPositionOpening message. Use of this facility though is not recommended practice. Processing multiple Position search requests in a single GetPositionOpening message will elongate the time taken to process the message. This can lead to adapter processing times exceeding the Ellipse transaction timeout period, causing the message processing to fail. Where that occurs no Show response message will be returned. In addition large result sets will result in large XML messages which will impact the amount of memory available for the JVM, this can then result in server processing failures. Search Limit Where a search is required to return all matching position entries for the specified search criteria, the result set will be limited to a specified number. The number is set via the property ellipse.defaultmaxinstances (refer EIP Console, Runtime > Configuration). This property applies to search processing for all adapters. As per Multiple Position Entries, large result sets will result in large XML messages which will impact the amount of memory available for the JVM, this can then result in server processing failures. Show Message Mapping Mapping of ABB ShowPositionOpening message attributes to Ellipse web service: Field Service Attribute <DocumentID> <ID>string Position position <Status> <Code>string status statusdesc </Status> <EffectiveTimePeriod> <ValidFrom>Date effectivedate
6 <ValidTo>Date reviewdate </EffectiveTimePeriod> <PostingRequester> <PartyID>String approvedby <PartyName>String approvedbyname </PostingRequester> <PositionProfile> position <JobCategoryCode name=occupationcodedesc>string occupationcode <JobGradeCode name=salarygradedesc>string salarygrade <OfferedRemunerationPackage> <RemunerationRange> <RemunerationMaximumAmount>String maximumsalary <RemunerationMinimumAmount>String minimumsalary <MinimumRate> minimumratedesc <Frequency>String minimumratefreq <Reference>String minimumrateref <Value>String minimumratevalue </MinimumRate> <MaximumRate> maximumratedesc <Frequency>String maximumratefreq <Reference>String maximumrateref <Value>String maximumratevalue </MaximumRate> </RemunerationRange> <RemunerationEvaluation> <MidPoint>String salarymidpoint <MinimumSalary> salarymin <MaximumSalary> salarymax <PolicyLine>String policyline <PolicyLineDesc>String policylinedesc </RemunerationEvaluation> </OfferedRemunerationPackage> <OfficialPositionClassification> <USPositionClassification> <AffirmativeActionPlanJobGroupID name=jobgroupdesc>string jobgroup <EEOCJobCategoryCode name=eeocjobcatdesc>string eeocjobcategory </USPositionClassification> </OfficialPositionClassification> <PositionLocation> <LocationID>String worklocation <LocationName>String worklocationdesc <FaxNumber>String faxnumber <MobileNumber>String mobilephone <WorkExtension>String workextension <WorkNumber>String workphone <PayLocation> paylocation paylocationdesc </PayLocation> </PositionLocation> <PositionTitle>String positiontitle <AssociatedPosition id="1"> Position assocposition1 assocposition1title </AssociatedPosition> <AssociatedPosition id="2"> assocposition2 assocposition2title </AssociatedPosition> <AwardCode name=awardcodedesc>string awardcode <Classification number=1-8> (populated from PostionClass fields 1 through 8) <ClassificationCode>String positionclass1 -> positionclass8 <ClassificationDescription>String positionclassdesc1 -> positionclassdesc8 <ClassificationName>String positionclassname1 -> positionclassname8 </Classification> <Defaults> <Distribution> <EnterpriseUnit>
7 <CostCenterID name=defaultaccountdesc>string defaultaccountcode </EnterpriseUnit> </Distribution> <DocumentReference> <DocumentID> defaultworkorder </DocumentID> defaultworkorderdesc </DocumentReference> <PlantReference> defaultplantref defaultplantdesc </PlantReference> <Project> defaultproject defaultprojectdesc </Project> <Reference>String defaultreference <SLCode> defaultslcode <Description> defaultsldesc </SLCode> </Defaults> <Distribution> <EnterpriseUnit> <GLEntityID name=labourcostingdistrictdesc>string labourcostingdistrict </EnterpriseUnit> <HomeCostCenter name=homecostcenterdesc>string homecostcentre <LabourClass name=labourclassdesc>string labourclass <LabourCost>String incumblabourcostind </Distribution> <EntitlementID>string entitlementidescription <Evaluation> <EvaluationFactor number=1-8> (up to 8 occurrences) <CodeA>String evalfactorcodea1 -> evalfactorcodea8 <CodeB>String evalfactorcodeb1 -> evalfactorcodeb8 <CodeC>String evalfactorcodec1 -> evalfactorcodec8 <Points>String evalfactorpoints1 -> evalfactorpoints8 <UserDefined>String evalfactoruserdef1 -> evalfactoruserdef8 </EvaluationFactor> <Notes>String evalstdtextref <Reason name=evaluationreasondesc>string evaluationreason <RecentEvaluationDate>String evaluationdate <TotalPoints>String evaltotalpoints </Evaluation> <Incumbents> <Actual>String currentactualincumbents <Authorised>String currentauthorisedincumbents <Budget>String currentbudgetincumbents </Incumbents> <Notes>String genstdtextref <Occupancy> <Reason name=occupancyreasondesc>string occupancyreason <Status name=occupancystatusdesc>string occupancystatus <Strategy name=occupancystrategydesc>string occupancystrategy </Occupancy> <Occupation> <Type>String occupationtype occupationtypedesc </Occupation> <PerformanceAppraisal>string perfappraisal <PositionCategory name=positioncategorydesc>string positioncategory <PositionReference>string reference <PositionReportingCode number=9-18> (populated from PostionClass fields 9 through 18) <ReportingCode>String positionclass9 -> positionclass18 <ReportingCodeDescription>String positionclassdesc9 -> positionclassdesc18 <ReportingCodeName>String positionclassname9 -> positionclassname18 </PositionReportingCode> <PrimaryReportingCode>String primrepcode <ResourceType>String resourcetypes <StaffCategory name=staffcategorydesc>string staffcategory </PositionProfile> <EffectiveTimePeriod> <ValidFrom>Date detaileffdate </EffectiveTimePeriod> <StatusReason>
8 <Code>String </StatusReason> statusreason statusreasondesc Message Examples Get Obtain details for a specific Position Id: <?xml version="1.0" encoding="utf-8"?> <GetPositionOpening xmlns:xsi=" xmlns:ip=" xsi:nonamespaceschemalocation="file:///c:/git-clones/mib/mib-common/schema/ip/1_0_0/bods/getpositionopening.xsd"> <ApplicationArea> <ip:sender> <ip:logicalid>testing</ip:logicalid> <ip:taskid>getpositionopening</ip:taskid> <ip:referenceid>positionopening</ip:referenceid> </ip:sender> <ip:creationdatetime> t11:17:03</ip:creationdatetime> <ip:bodid>junit Test</ip:BODID> <ip:extension> <ip:anyextension> <ip:servicecontext> <ip:servicename>getpositionopening</ip:servicename> <ip:serviceversion>1.0</ip:serviceversion> <ip:messagetype>positionopening</ip:messagetype> </ip:servicecontext> <ip:authorizationcontext> <ip:proxy> <ip:userid>integrat</ip:userid> <ip:orgid>r100</ip:orgid> <ip:role>integrat</ip:role> </ip:proxy> </ip:authorizationcontext> </ip:anyextension> </ip:extension> </ApplicationArea> <DataArea> <Get/> <PositionOpening> <!-- Position Id --> <DocumentID> <ID>SYSAD</ID> </DocumentID> </PositionOpening> </DataArea> </GetPositionOpening> Obtain Positions changed since last extract: <?xml version="1.0" encoding="utf-8"?> <GetPositionOpening xmlns:xsi=" xmlns:ip=" xsi:nonamespaceschemalocation="file:///c:/git-clones/mib/mib-common/schema/ip/1_0_0/bods/getpositionopening.xsd"> <ApplicationArea> <ip:sender> <ip:logicalid>testing</ip:logicalid> <ip:taskid>getpositionopening/ip:taskid> <ip:referenceid>positionopening</ip:referenceid> </ip:sender> <ip:creationdatetime> t11:17:03</ip:creationdatetime> <ip:bodid>junit Test</ip:BODID> <ip:extension> <ip:anyextension> <ip:servicecontext> <ip:servicename>getpositionopening</ip:servicename> <ip:serviceversion>1.0</ip:serviceversion> <ip:messagetype>positionopening</ip:messagetype> </ip:servicecontext> <ip:authorizationcontext> <ip:proxy>
9 <ip:userid>integrat</ip:userid> <ip:orgid>r100</ip:orgid> <ip:role>integrat</ip:role> </ip:proxy> </ip:authorizationcontext> </ip:anyextension> </ip:extension> </ApplicationArea> <DataArea> <Get/> <PositionOpening> <!-- Last Modified Date --> <ChangedSince> </ChangedSince> </PositionOpening> </DataArea> </GetPositionOpening> Show Show details for a requested Position Id: <?xml version="1.0" encoding="utf-8"?> <ShowPositionOpening xmlns:ip=" xmlns:xsi=" xsi:nonamespaceschemalocation="file:///c:/git-clones/mib/mib-common/schema/ip/1_0_0/bods/showpositionopening.xsd"> <ApplicationArea> <ip:sender> <ip:logicalid>ellipse</ip:logicalid> <ip:componentid>positionopening</ip:componentid> <ip:taskid>showpositionopening/ip:taskid> <ip:referenceid>getresponse</ip:referenceid> <ip:authorizationid/> </ip:sender> <ip:receiver> <ip:logicalid/> </ip:receiver> <ip:creationdatetime> t15:12:10</ip:creationdatetime> <ip:bodid>10af832d-ca53-4f3f-9fbc-576eb64b3567</ip:bodid> <ip:extension> <ip:anyextension> <ip:servicecontext> <ip:servicename>showpositionopening</ip:servicename> <ip:serviceversion>1.0</ip:serviceversion> <ip:messagetype>positionopening</ip:messagetype> </ip:servicecontext> <ip:authorizationcontext> </ip:authorizationcontext> </ip:anyextension> </ip:extension> </ApplicationArea> <DataArea> <Show> <oa:responsecriteria xmlns:oa=" <oa:responseexpression expressionlanguage="xpath" actioncode="accepted">[*]</oa:responseexpression> <oa:changestatus> <oa:code>ok</oa:code> <oa:description>retrieved 1 positions.</oa:description> <oa:reasoncode>getposition</oa:reasoncode> <oa:reason/> </oa:changestatus> </oa:responsecriteria> </Show> <PositionOpening> <DocumentID> <ID>SYSAD</ID> </DocumentID> <Status> <Code/> </Status> <EffectiveTimePeriod> <ValidFrom> </ValidFrom> <ValidTo/> </EffectiveTimePeriod> <PostingRequester> <PartyID/> <PartyName/> </PostingRequester> <PositionProfile> <ID>SYSAD</ID> <JobCategoryCode name=""/> <JobGradeCode name=""/> <OfferedRemunerationPackage> <RemunerationRange> <RemunerationMaximumAmount>0</RemunerationMaximumAmount> <RemunerationMinimumAmount>0</RemunerationMinimumAmount> <MinimumRate> <Frequency/> <Reference/> <Value>0</Value> </MinimumRate> <MaximumRate> <Frequency/> <Reference/> <Value>0</Value> </MaximumRate> </RemunerationRange> <RemunerationEvaluation>
10 <RemunerationMidPoint>0</RemunerationMidPoint> <MinimumSalary>0</MinimumSalary> <MaximumSalary>0</MaximumSalary> <PolicyLine/> <PolicyLineDesc/> </RemunerationEvaluation> </OfferedRemunerationPackage> <OfficialPositionClassification> <USPositionClassification> <AffirmativeActionPlanJobGroupID name=""/> <EEOCJobCategoryCode name=""/> </USPositionClassification> </OfficialPositionClassification> <PositionLocation> <LocationID/> <LocationName/> <FaxNumber/> <MobileNumber/> <WorkExtension/> <WorkNumber/> <PayLocation> </PayLocation> </PositionLocation> <PositionTitle>SYSTEM ADMINISTRATOR</PositionTitle> <AssociatedPosition id="1"> </AssociatedPosition> <AssociatedPosition id="2"> </AssociatedPosition> <AwardCode name=""/> <Classification number="1"> <ClassificationCode>AA01</ClassificationCode> <ClassificationDescription>Expenses</ClassificationDescription> <ClassificationName>Job/Posn Classif</ClassificationName> </Classification> <Classification number="2"> <ClassificationCode>Y</ClassificationCode> <ClassificationDescription>Yes</ClassificationDescription> <ClassificationName>Job/Posn Classif</ClassificationName> </Classification> <Classification number="3"> <ClassificationCode>B0635</ClassificationCode> <ClassificationDescription>Building Trades Public Sector</ClassificationDescription> <ClassificationName>Job/Posn Classif</ClassificationName> </Classification> <Defaults> <Distribution> <EnterpriseUnit> <CostCenterID name=""/> </EnterpriseUnit> </Distribution> <PlantReference> </PlantReference> <Project> </Project> <Reference/> <SLCode> </SLCode> </Defaults> <Distribution> <EnterpriseUnit> <GLEntityID name="r100 - AUD/USD">R100</GLEntityID> </EnterpriseUnit>
11 <HomeCostCenter name=""/> <LabourClass name=""/> <LabourCost/> </Distribution> <EntitlementID/> <Evaluation> <EvaluationFactor number="1"> <CodeA>1A</CodeA> <CodeB>1B</CodeB> <CodeC>1C</CodeC> <Points>12</Points> <UserDefined>User Defined 1</UserDefined> </EvaluationFactor> <EvaluationFactor number="2"> <CodeA>2A</CodeA> <CodeB>2B</CodeB> <CodeC>2C</CodeC> <Points>14</Points> <UserDefined>User Defined 2</UserDefined> </EvaluationFactor> <Notes>OESYSAD</Notes> <Reason name="organisation Change">AO</Reason> <RecentEvaluationDate> </RecentEvaluationDate> <TotalPoints>26</TotalPoints> </Evaluation> <Incumbents> <Actual>0</Actual> <Authorised>1</Authorised> <Budget>1</Budget> </Incumbents> <Notes>POSYSAD</Notes> <Occupancy> <Reason name="base Establishment">ES</Reason> <Status name="vacant">v</status> <Strategy name=""/> </Occupancy> <Occupation> <Type/> </Occupation> <PositionCategory name=""/> <PositionReference/> <PositionReportingCode number="9"> <ReportingCode>1</ReportingCode> <ReportingCodeDescription>Administrative</ReportingCodeDescription> <ReportingCodeName>Position Reporting</ReportingCodeName> </PositionReportingCode> <PositionReportingCode number="10"> <ReportingCode>2</ReportingCode> <ReportingCodeDescription>Office Worker</ReportingCodeDescription> <ReportingCodeName>Position Reporting</ReportingCodeName> </PositionReportingCode> <PrimaryReportingCode name=""/> <StaffCategory name=""/> </PositionProfile> <EffectiveTimePeriod> <ValidFrom> </ValidFrom> </EffectiveTimePeriod> <StatusReason> <Code/> </StatusReason> </PositionOpening> </DataArea> </ShowPositionOpening>
Standard Job Adapter
Standard Job Adapter Standard Job Adapter Contents Standard Job Adapter 2 Commercial In Confidence 3 Standard Job Adapter 4 Overview 4 Events 4 OAGIS Message 4 Foreign Keys 5 Concurrent Updates 5 Methods
More informationCatalogue Adapter. Contents
Catalogue Adapter Catalogue Adapter Contents Catalogue Adapter 2 Commercial In Confidence 3 Catalogue Adapter 4 Overview 4 OAGIS Message 4 Foreign Keys 4 Concurrent Updates 4 Methods 4 Sync 4 Sync Message
More informationEllipse 8 Licence Audit. Contents
Licence Audit Guide Ellipse 8 Licence Audit Contents Ellipse 8 Licence Audit 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 Compliance with Licence Restrictions 4 Audit Process Description
More informationDevelop Java Webservice Client
Develop Java Webservice Client Develop Java Webservice Client Contents Develop Java Webservice Client 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who
More informationEllipse Web Services Overview
Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5
More informationLinkOne Webview Setup Guide
LinkOne Webview Setup Guide LinkOne Webview - Integration with Ellipse 8 Contents LinkOne Webview - Integration with Ellipse 8 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality
More informationVIP Troubleshooting Guide
VIP Troubleshooting Guide EIP Trouble Shooting Guide Contents EIP Trouble Shooting Guide 2 Commercial In Confidence 3 Preface Information 4 Overview 5 Server Tuning and Troubleshooting 6 Memory Settings
More informationEllipse Legacy Conversion Guide
Ellipse Legacy Conversion Guide Ellipse 8 Legacy Conversion Guide Contents Ellipse 8 Legacy Conversion Guide 2 Commercial In Confidence 3 Conversion for Ellipse versions 5 & 6 to 8 4 Additional Components
More informationEllipse Support. Contents
Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer
More informationEllipse C# Client. Contents
Ellipse C# Client Ellipse C# Client Contents Ellipse C# Client 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who should use this guide? 4.NET Ellipse
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationesoms Suite / Mobile Operator Rounds User Guide
esoms Suite / Mobile Operator Rounds User Guide Release 2.2 GMDDB-1008-1606-03 June 2016 Copyright 2016 ABB All Rights Reserved Confidential and Proprietary June 2016 Legal Disclaimer The product described
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationANZ TRANSACTIVE ADMINISTRATOR GUIDE
ANZ TRANSACTIVE ADMINISTRATOR GUIDE Table of Contents Introduction to ANZ TRANSACTIVE About this guide 3 Learning about ANZ Transactive 3 Minimum specifications 5 ANZ Transactive security information 6
More informationData Compliance Guidelines Version 1.2
Version 1.2 January 2007 (This page is intentionally blank) Published By: STAR Organization 2007 i Table of Contents 1. Introduction... 1 2. General Data Compliance Criteria... 2 2.1 Implementation Versions...
More informationGDPR Draft: Data Access Control and Password Policy
wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR
More informationData Processor Agreement
Data Processor Agreement Data Controller: Customer located within the EU (the Data Controller ) and Data Processor: European Representative Company: ONE.COM (B-one FZ-LLC) One.com A/S Reg.no. Reg.no. 19.958
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationI/O adapter 520ADD03 Connections and settings
RTU520 product line I/O adapter 520ADD03 Connections and settings Application, characteristics and technical data have to be taken from the hardware data sheet: 520ADD03 data sheet 1KGT 150 904 Rack No
More informationIT risks and controls
Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles
More informationThis Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).
PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationThe Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:
Unit Title: OCR unit number 38 Level: 3 Credit value: 12 Guided learning hours: 100 Unit reference number: Security of ICT Systems D/500/7220 Candidates undertaking this unit must complete real work activities
More informationUSER SUMMARY. for Computer Systems of the Commissariat à l Énergie Atomique L ATOME, DE LA RECHERCHE À L INDUSTRIE
USER SUMMARY for Computer Systems of the Commissariat à l Énergie Atomique L ATOME, DE LA RECHERCHE À L INDUSTRIE Field of Application Computer Systems Concerned These notes outline the rules concerning
More informationQ&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )
Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection
More informationAnalog output 520AOD01 Data sheet
RTU520 product line Analog output 520AOD01 Data sheet ERR RTU I/O bus Microcontroller RAM Flash Output register DC DC D D A A Adjustment Output range O1 O2 Adjustment Output range IOC UE Figure 1: Block
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationPolicy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationCA Nimsoft Monitor. Probe Guide for DHCP Server Response Monitoring. dhcp_response v3.2 series
CA Nimsoft Monitor Probe Guide for DHCP Server Response Monitoring dhcp_response v3.2 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More informationSchedule EHR Access Services
This document (this Schedule") is the Schedule for Services ( EHR Access Services ) related to access to the electronic health records ( EHR ) maintained by ehealth Ontario and the use of information in
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationSecurity Console Drop Down Menu Items. Version 2015
Security Console Drop Down Menu Items Version 2015 Contents Overview... 3 Mapping Previous to Current... 4 The Access Group of Menu Items... 5 Access User Role Membership... 5 Access - Zones... 5 Access
More informationTerms and Conditions for External accounts Service
Terms and Conditions for External accounts Service You must read these Terms and Conditions before using External accounts service. IMPORTANT INFORMATION External accounts service is an account aggregation
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationANZ TRANSACTIVE TRADE ADMINISTRATOR GUIDE
ANZ TRANSACTIVE TRADE ADMINISTRATOR GUIDE October 2017 ANZ Transactive Trade Administrator Guide INTRODUCTION TO ANZ TRANSACTIVE TRADE 1 DISCLAIMER Copyright Australia and New Zealand Banking Group Limited
More informationAcceptable Use Policy
1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage
More informationCA Nimsoft Monitor. Probe Guide for iseries Job Monitoring. jobs v1.3 series
CA Nimsoft Monitor Probe Guide for iseries Job Monitoring jobs v1.3 series Contact CA Contact CA Support For your convenience, CA Technologies provides one site where you can access the information that
More informationCA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for Network Connectivity Monitoring net_connect v2.9 series Legal Notices This online help system (the "System") is for your informational purposes only and
More informationPolicy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationAcceptable Use Policy
Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech
More informationOne Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems
One Identity Manager 8.0 Administration Guide for Connecting Unix- Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationANZ TR ANSACTIVE TR ADE ADMINISTR ATOR GUIDE
ANZ TR ANSACTIVE TR ADE ADMINISTR ATOR GUIDE JUNE 2016 DISCLAIMER Copyright Australia and New Zealand Banking Group Limited (ANZ) 100 Queen Street, Melbourne 3000, ABN 11 005 357 522. ANZ s colour blue
More informationBinary output and supervision 520CSD01 Data sheet
RTU520 product line Binary output and supervision 520CSD01 Data sheet R01 C01 O01 R02 O02 RTU I/O bus ERR Microcontroller RAM Flash IOC Output register DC DC (1 out of n) check Output state monitoring
More informationSeven West Media Privacy Policy (Updated)
Seven West Media Privacy Policy (Updated) About this Privacy Policy This Privacy Policy has been published to provide a clear and concise outline of how and when personal information is collected, disclosed,
More informationCertification Report
Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common
More informationBinary output 520BOD01 Connections and settings
RTU520 product line Binary output 520BOD01 Connections and settings Application, characteristics and technical data have to be taken from the hardware data sheet: 520BOD01 Data sheet 1KGT 150 864 Operation
More informationUser Management. User Guide June 2016 Version 1.5
User Management User Guide 4 24 June 2016 Version 1.5 CONTENTS 1. Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 1.3 Document History... 3 2. User Management Overview... 4 3. User
More informationAnalog input 520AID01 Connections and settings
RTU520 product line Analog input 520AID01 Connections and settings Application, characteristics and technical data have to be taken from the hardware data sheet: 520AID01 data sheet 1KGT 150 866 Operation
More informationConsultancy for Trade and Supply Chain Finance Track Criteria
Consultancy for Trade and Supply Chain Finance Track Criteria This document introduces the framework of the SWIFT Certified Specialist programme in the scope of consultancy for trade and supply chain finance.
More informationF O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00
F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...
More informationSPECTRUM. QoS Manager User Guide (5165) r9.1.1
SPECTRUM QoS Manager User Guide (5165) r9.1.1 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationTalenom Plc. Description of Data Protection and Descriptions of Registers
Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationINNOVENT LEASING LIMITED. Privacy Notice
INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established
More informationDIN Rail RTU 540CMD01 Data sheet
RTU540 product line DIN Rail RTU 540CMD01 Data sheet 4 3 RS232C RS232C RS232C or RS485 or RS485 or RS485 1 2 E1 E2 10/100 MB LAN Protocol Protocol Controller Controller MPU Cortex-A8 AM3352 Application
More informationUser Guide. Dynamics 365 / CRM / XRM Platform. CRM Versions Supported: 2015/2016/D 365
Dynamics 365 / CRM / XRM Platform User Guide CRM Versions Supported: 2015/2016/D 365 Multi-File Uploader is a handy Dynamics 365 / CRM add-on specifically built to allow CRM users and administrators to
More informationSample Security Risk Analysis ASP Meaningful Use Core Set Measure 15
Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice
More informationRelease Notes. BlackBerry Enterprise Identity
Release Notes BlackBerry Enterprise Identity Published: 2018-03-13 SWD-20180606100327990 Contents New in this release...4 Fixed issues...5 Known issues... 6 Legal notice...8 New in this release New in
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationConfigure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3
Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create
More informationCompatibility Matrix. Good Control and Good Proxy. June 4, 2018
Compatibility Matrix Good Control and Good Proxy June 4, 2018 Published: 2018-06-04 SWD-20180604161707961 Contents Introduction... 4 Legend... 4 Good Control server... 5 Operating system...5 Database server...5
More informationOne Identity Manager Data Archiving Administration Guide
One Identity Manager 8.0.1 Data Archiving Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationInformation Security Management System
Information Security Management System Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationFLOOR COVERING INSTALLER
FLOOR COVERING INSTALLER Occupation Description Floor Covering Installer means a person who installs, applies, replaces, repairs, services and prepares rugs, carpets, organic and synthetic materials, linoleum,
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy
More informationEnterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later
Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationTerms and Conditions 01 January 2016
Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to
More informationOne Identity Manager Administration Guide for Connecting to SharePoint
One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationGreen Deal Advisor Checklist (Domestic)
Green Deal Advisor Checklist (Domestic) This guidance document outlines the process for becoming an authorised (domestic) Green Deal Advisor and the necessary steps to allow you to undertake a Green Deal
More informationPolicy & Procedure Privacy Policy
NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationApex Information Security Policy
Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8
More informationDATA PROCESSING AGREEMENT
DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej
More informationEnviro Technology Services Ltd Data Protection Policy
Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:
More information(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and
SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc
More informationEIP Installation Guide
EIP Installation Guide Ellipse Integration Platform Installation Guide Contents Ellipse Integration Platform Installation Guide 2 Commercial In Confidence 4 Preface 5 Summary Information 5 Confidentiality
More informationHaaga-Helia University of Applied Sciences Privacy Notice for the Laura Recruitment Service
Haaga-Helia University of Applied Sciences Privacy Notice for the Laura Recruitment Service In compliance with the requirements of the EU General Data Protection Regulation (GDPR, Articles 13, 14 and 30)
More informationABB 520BID01 Binary Input datasheet
ABB 520BID01 Binary Input datasheet http://www.manuallib.com/abb/520bid01-binary-input-datasheet.html The binary input module 520BID01 provides 16 galvanic isolated inputs for up to 16 binary process signals.
More informationPrivacy Policy Wealth Elements Pty Ltd
Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy
More informationCertification Report
Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
More informationANZ TRANSACTIVE USER GUIDE
ANZ TRANSACTIVE USER GUIDE DISCLAIMER Copyright Australia and New Zealand Banking Group Limited (ANZ) 100 Queen Street, Melbourne 3000, ABN 11 005 357 522. ANZ s colour blue is a trade mark of ANZ. The
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationSDR Guide to Complete the SDR
I. General Information You must list the Yale Servers & if Virtual their host Business Associate Agreement (BAA ) in place. Required for the new HIPAA rules Contract questions are critical if using 3 Lock
More information