Security Information for SAP Asset Strategy and Performance Management
|
|
- Edgar Arnold
- 5 years ago
- Views:
Transcription
1 Master Guide SAP Asset Strategy and Performance Management Document Version: Security Information for SAP Asset Strategy and Performance Management
2 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Textual cross-references to other documents. Example EXAMPLE Example Example <Example> Emphasized words or expressions. Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation. Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. EXAM PLE Keys on the keyboard, for example, F2 or EN TER SAP SE or an SAP affiliate company. All rights reserved. Typographic Conventions
3 Document History Version Date Change 1.0 November 2017 Created for 1711 release 2.0 February 2018 Updated for 1802 release. Included Data Privacy and Protection topics Document History 2018 SAP SE or an SAP affiliate company. All rights reserved. 5
4 Table of Contents 1 Introduction Overview of the Main Sections Before You Start Security Aspects of Data, Data Flow and Processes User Administration and Authentication Data Storage Security Other Security-Relevant Information Data Privacy and Protection Introduction Glossary Read Access Logging Information Report SAP SE or an SAP affiliate company. All rights reserved. Table of Contents
5
6 1 Introduction The Security Guide provides an overview of the security-relevant information that applies to SAP Asset Strategy and Performance Management from a System Administrator perspective. Note: This guide does not replace the administration or operation guides that are available for productive operations. Target Audience System Administrators This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas the Security Guides provide information that is relevant for all life cycle phases. Why Is Security Necessary? With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to SAP Asset Strategy and Performance Management. To assist you in securing the SAP Asset Strategy and Performance Management, we provide this Security Guide. 1.1 Overview of the Main Sections The Security Guide comprises the following main sections: Before You Start This section contains information about why security is necessary, how to use this document, and references to other Security Guides that build the foundation for this Security Guide. Security Aspects of Data, Data Flow and Processes This section provides an overview of security aspects involved throughout the most widely-used processes within SAP Asset Strategy and Performance Management. User Administration and Authentication This section provides an overview of the following user administration and authentication aspects: o Recommended tools to use for user management o Standard users that are delivered with SAP Asset Strategy and Performance Management o Overview of how integration into Single Sign-On environments is possible Data Storage Security SAP SE or an SAP affiliate company. All rights reserved. Introduction
7 This section provides an overview of any critical data that is used by the SAP Asset Strategy and Performance Management and the security mechanisms that apply. Data Protection This section provides information about how SAP Asset Strategy and Performance Management protects personal or sensitive data.
8 2 Before You Start SAP Asset Strategy and Performance Management is built on top of SAP HANA Cloud Platform (HCP) using SAP UI5 as user interface technology as well as SAP ID Service as Identity and Access Management solution. Table 1: Fundamental Security Information Security-Related Material Description SAP HANA Cloud Solution Brief SAP HANA Cloud Solution Overview SAP Data Center Data center home page with focus on security and certification SAP Security Certificates General SAP IT Security Certifications For a complete list of the available SAP Security Guides, see SAP Service Marketplace at Additional Information For more information about specific topics, see the Quick Links as shown in the table below. Content Quick Link on SAP Service Marketplace or SCN Security Security Guides Related SAP Notes Released platforms Network security SAP Solution Manager SAP SE or an SAP affiliate company. All rights reserved. Before You Start
9 Content Quick Link on SAP Service Marketplace or SCN SAP NetWeaver
10 3 Security Aspects of Data, Data Flow and Processes The following general security measures are in place, and are applicable to all scenarios: Encrypted connection through HTTPS User and role mapping with functional restrictions Access control lists limiting access to data only to permitted roles, companies and users The table below shows the security aspect to be considered for the process step and what mechanism applies. Step Description Security Measure User authentication The user logs on to the system. Authentication process based on SAML 2.0 Standard takes place. Access credentials are not stored on site. Invalid session IDs and cookies are intercepted. Document upload Users can upload documents, including Microsoft Excel files, images, VDS files etc. Virus scanning is in place for all uploaded documents. MIME Type check in place to prevent malicious uploads. User administrative tasks Administrators can add and remove user accounts, and change the role assignments of user accounts Division of responsibilities ensures that only company Administrators can carry out the listed user administrative tasks SAP SE or an SAP affiliate company. All rights reserved. Security Aspects of Data, Data Flow and Processes
11 4 User Administration and Authentication SAP Asset Strategy and Performance Management uses the authentication mechanisms provided by SAP ID Service. The user management itself is specific to SAP Asset Strategy and Performance Management and does not rely on any external tools. Information about user administration and authentication that specifically applies to SAP Asset Strategy and Performance Management is provided in the following topics: User Management This topic lists the tools to use for user management in SAP Asset Strategy and Performance Management. Integration into Single Sign-On Environment This topic describes how SAP Asset Strategy and Performance Management supports Single Sign-On mechanisms. User Management User management for SAP Asset Strategy and Performance Management uses the SAP HANA Cloud Platform as well as making use of SAP ID Service facilities. For an overview of how these mechanisms apply to SAP Asset Strategy and Performance Management, see the sections below. User Administration Tools SAP Asset Strategy and Performance Management uses the user administration provided by the SAP HANA Cloud Platform to manage Users. System Administrators can add, remove and edit users. They can also provide/revoke multiple pre-defined roles to users. SAP Asset Strategy and Performance Management Provides three predefined roles per application: READ Provides read authorizations to the selected user on selected application. EDIT Provides read and write authorizations to the selected user on selected application. DELETE Provides read, write and delete authorizations to the selected user on selected application. Integration into Single Sign-On Environments SAP Asset Strategy and Performance Management supports the Single Sign-On (SSO) mechanisms provided by SAP HANA Cloud Platform in conjunction with SAP ID Service. SAP Asset Strategy and Performance Management also allows customer trust accounts to be integrated with SAP HANA Cloud Platform to facilitate SSO using their own trust system.
12 5 Data Storage Security SAP Asset Strategy and Performance Management saves data in a dedicated database provided by SAP HANA Cloud Platform. Access to the database comes preconfigured with the infrastructure environment. The database contains personal data (user profiles and company profiles), operational business data, and preferences and configurations. Information is updated continuously upon change. Documents, such as media files and PDFs, are stored in the SAP HANA Cloud document management system. Data Protection SAP Asset Strategy and Performance Management complies with data privacy and protection regulations. SAP Asset Strategy and Performance Management supports the following functionality: helps customers delete personal data stored on the network using the user management application. supports sharing personal data of a person whose details have been stored on SAP Asset Strategy and Performance Management when the user requests for it. maintains audit trial information such as the name of person who changed the personal data, time and date of the data changed or data deleted SAP SE or an SAP affiliate company. All rights reserved. Data Storage Security
13 6 Other Security-Relevant Information SAP Asset Strategy and Performance Management is an SAP UI5-based application, and as such makes use of HTML5 and JavaScript. Active content (at least HTML5 and JavaScript) has to be enabled. This is mandatory, as SAP Asset Strategy and Performance Management will not work without it. Session Security Protection SAP Asset Strategy and Performance Management is restricted to operating with Secure Socket Layer (SSL) and activated cookie handling in the browser only. Security Lifecycle Management SAP Asset Strategy and Performance Management is hosted and operated by SAP. The Cloud Operations, Business Operations, and Development Team continuously monitor security-relevant issues and keep the system and software up to date.
14 7 Data Privacy and Protection 7.1 Introduction Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance with general data privacy regulation, it is necessary to consider compliance with industry specific legislation in different countries. SAP provides specific features and functions to support compliance with regards to relevant legal requirements, including data protection. SAP does not give any advice on whether these features and functions are the best method to support company, industry, regional, or country specific requirements. Furthermore, this information does not give any advice or recommendation in regards to additional features that would be required in particular IT environments; decisions related to data protection must be made on a casebycase basis, under consideration of the given system landscape and the applicable legal requirements. Note: In the majority of cases, compliance with applicable data protection and privacy laws will not be covered by a product feature. SAP software supports data protection compliance by providing security features and specific data protection-relevant functions, such as simplified blocking and deletion of personal data. SAP does not provide legal advice in any form. Definitions and other terms used in this document are not taken from any given legal source. 7.2 Glossary Term Definition Blocking A method of restricting access to data for which the primary business purpose has ended. Consent The action of the data subject confirming that the usage of his or her personal data shall be allowed for a given purpose. A consent functionality allows the storage of a consent record in relation to a specific purpose and shows if a data subject has granted, withdrawn, or denied consent. Data subject An identified or identifiable natural person. An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person SAP SE or an SAP affiliate company. All rights reserved. Data Privacy and Protection
15 Term Definition Deletion Deletion of personal data so that the data is no longer available. End of business Date where the business with a data subject ends, for example, the order is completed, the subscription is canceled, or the last bill is settled. End of purpose (EoP) End of purpose and start of blocking period. The point in time when the primary processing purpose ends, for example, a contract is fulfilled. End of purpose (EoP) check A method of identifying the point in time for a data set when the processing of personal data is no longer required for the primary business purpose. After the EoP has been reached, the data is blocked and can only be accessed by users with special authorization, for example, tax auditors. Personal data Any information relating to an identified or identifiable natural person (a data subject). Purpose The information that specifies the reason and the goal for the processing of a specific set of personal data. As a rule, the purpose references the relevant legal basis for the processing of personal data. Residence period The period of time between the end of business and the end of purpose (EoP) for a data set during which the data remains in the database and can be used in case of subsequent processes related to the original purpose. At the end of the longest configured residence period, the data is blocked or deleted. The residence period is part of the overall retention period. Retention period The period of time between the end of the last business activity involving a specific object (for example, a business partner) and the deletion of the corresponding data, subject to applicable laws. The retention period is a combination of the residence period and the blocking period. Sensitive personal data A category of personal data that usually includes the following type of information: Special categories of personal data, such as data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data, data concerning health or sex life or sexual orientation. Personal data subject to professional secrecy Personal data relating to criminal or administrative offenses Personal data concerning insurances and bank or credit card accounts
16 Term Definition Where-used check (WUC) A process designed to ensure data integrity in the case of potential blocking of business partner data. An application's where-used check (WUC) determines if there is any dependent data for a certain business partner in the database. If dependent data exists, this means the data is still required for business activities. Therefore, the blocking of business partners referenced in the data is prevented. 7.3 Read Access Logging Read Access Logging (RAL) is used to monitor and log read access to sensitive data. This data may be categorized as sensitive by law, by external company policy, or by internal company policy. These common questions might be of interest for an application that uses Read Access Logging: Who accessed the data of a given business entity, for example a bank account? Who accessed personal data, for example of a business partner? Which employee accessed personal information, for example religion? Which accounts or business partners were accessed by which users? These questions can be answered using information about who accessed particular data within a specified time frame. Technically, this means that all remote API and UI info structures (that access the data) must be enabled for logging. SAP Asset Strategy and Performance Management does not store any sensitive data. 7.4 Information Report To retrieve a list of the information stored about a user, you can search for the user in the Data Privacy and Protection app SAP SE or an SAP affiliate company. All rights reserved. Data Privacy and Protection
Security Information for SAP Asset Strategy and Performance Management
Master Guide SAP Asset Strategy and Performance Management Document Version: 1.0 2017-11-30 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example
More informationSAP Policy Management, group insurance add-on 1.1
Security Guide Document Version: 1.1 2017-05-03 1.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
More informationSecurity Guide SAP Sports One Document Version: CUSTOMER. SAP Sports One
Security Guide Document Version: 2 2018-01-05 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels,
More informationSecurity Guide SAP Sports One Document Version: CUSTOMER. SAP Sports One
Security Guide Document Version: 1.4 2018-11-27 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationConfiguring Client Keystore for Web Services
Configuration Guide SAP Information Collaboration Hub for Life Sciences Document Version: 1.1 Released to Customer Date: Non-SAP Backend System on SAP Information Collaboration Hub for Life Sciences Typographic
More informationGeorgia Institute of Technology EU GDPR Lawful Basis Form
Georgia Institute of Technology EU GDPR Lawful Basis Form Introduction Beginning May 25, 2018, some of Georgia Tech s activities will be subject to more stringent regulations governing the use of personal
More informationNon-SAP Backend System Readiness Check
Configuration Guide SAP Information Collaboration Hub for Life Sciences Document Version: 1.1 Final Date: SAP Information Collaboration Hub for Life Sciences Typographic Conventions Type Style Example
More informationThis Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).
PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our
More informationWithin the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):
Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this
More informationData Protection Policy
Data Protection Policy Introduction Stewart Watt & Co. is law firm and provides legal advice and assistance to its clients. It is regulated by the Law Society of Scotland. The personal data that Stewart
More informationSAP Business One Upgrade Strategy Overview
Upgrade Strategy SAP Business One, SAP Business One, version for SAP HANA and SAP Business One analytics powered by SAP HANA Document Version: 1.1 2016-02-03 Release 2004 and higher Typographic Conventions
More informationCatalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1
Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and
More informationGeneral Data Protection Regulation Frequently Asked Questions (FAQ) General Questions
General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into
More informationTechnical Requirements of the GDPR
Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with
More informationCognizant Careers Portal Privacy Policy ( Policy )
Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationKSi Malta Privacy Policy
KSi Malta Privacy Policy CONTENTS KSi Malta Privacy Policy 6 Details about the data controller & Scope 6 How information is collected from you 7 Legal basis of data processing 8 What information we collect
More informationEmergency Compliance DG Special Case DAMA INDIANA
1 Emergency Compliance DG Special Case DAMA INDIANA Agenda 2 Overview of full-blown data governance (DG) program Emergency compliance with a specific regulation We'll use GDPR as an example What is GDPR
More informationStandalone Retrofit. Required Steps when Upgrading to SAP Solution Manager 7.2, SP03
Configuration Guide Document Version: 1.0 2017-01-10 Required Steps when Upgrading to SAP Solution Manager 7.2, SP03 Typographic Conventions Type Style Example Description Words or characters quoted from
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationSAP Workforce Performance Builder 9.5
Security Guide Workforce Performance Builder Document Version: 1.0 2016-07-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Producer Table of Contents 1 Introduction... 3 2 SSL
More informationBusiness Add-Ins (BAdIs) for SD Jam Integration Document Version:
Document Version: 1.0 2014-08-22 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names,
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationYou will see lots of references in the Checklist to the GDPR Pack if you would like to purchase this, go to
Suzanne Dibble 2018. Copyright in this document belongs to Suzanne Dibble. You may not copy or use it for any purpose unless you have purchased this template document from Suzanne Dibble. You may not allow
More informationDeleting SAP HANA Delivery Units and Products
User Documentation SAP HANA Document Version: 1.0 2015-12-02 SAP HANA SPS 10 / SPS 11 Typographic Conventions Type Style Example Example EXAMPLE Example Example EXAMPLE Description Words or characters
More informationSAP ERP, add-on for Polish SAF-T regulatory requirements 1.0
Application Help Document Version: 1.9 Released to Customer Date: September 14, 2018 SAP ERP, add-on for Polish SAF-T regulatory requirements 1.0 Typographic Conventions Type Style Example Description
More informationSAP Business One Hardware Requirements Guide
Hardware Requirements Guide Document Version: 1.05 2015-08-21 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
More informationA practical guide to using ScheduleOnce in a GDPR compliant manner
A practical guide to using ScheduleOnce in a GDPR compliant manner Table of Contents Glossary 2 Background What does the GDPR mean for ScheduleOnce users? Lawful basis for processing Inbound scheduling
More informationCognizant Careers Portal Terms of Use and Privacy Policy ( Policy )
Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which
More informationPrivacy Shield Policy
Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This
More informationPrivacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose
Privacy Notice - Stora Enso s Supplier and Stakeholder Register Date 29.1.2018 1 Purpose Purpose of this privacy notice is to provide the persons communicating with Stora Enso in the role of a supplier
More informationConfiguring the SAP Cryptolibrary on the ABAP Application Server
Configuration Guide Document Version: 1.0 Final Date: Configuring the SAP Cryptolibrary on the ABAP Application Server Sap Backend Systems on the SAP Pharma Network Typographic Conventions Type Style Example
More informationWhat's New in SAP Landscape Transformation Replication Server 2.0 SP15
What's New Document Version: 1.0 2018-09-10 What's New in SAP Landscape Transformation Replication Server 2.0 SP15 Typographic Conventions Type Style Example Description Words or characters quoted from
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationSAP Business One Hardware Requirements Guide
Hardware Requirements Guide Document Version: 1.08 2016-03-09 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
More informationEU DATA PROTECTION COMPLIANCE WHEN SECURING SAAS APPLICATIONS
White Paper EU DATA PROTECTION COMPLIANCE WHEN SECURING SAAS APPLICATIONS Introduction Palo Alto Networks takes data protection very seriously. Complying with data protection requirements and enabling
More informationUNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction
UNTITLED HIP HOP PROJECT Privacy Policy 1. Introduction This site ( Site ) is operated by etribez Inc. on behalf of JCE Games, Inc. ( Producer ) to accept, process and administer online auditions and other
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION
ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or
More informationVisual Business Configuration with SAP TM
SAP Transportation Management Visual Business Configuration with SAP TM CUSTOMER Document Version: 3.0 December 2013 SAP AG 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document
More informationCreating RFC Destinations
Configuration Guide Information Collaboration Hub for Life Sciences Document Version: 1.1 Released to Customer Date: SAP Information Collaboration Hub for Life Sciences Typographic Conventions Type Style
More informationThis guide is for informational purposes only. Please do not treat it as a substitute of a professional legal
What is GDPR? GDPR (General Data Protection Regulation) is Europe s new privacy law. Adopted in April 2016, it replaces the 1995 Data Protection Directive and marks the biggest change in data protection
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller
More informationRights of Individuals under the General Data Protection Regulation
Rights of Individuals under the General Data Protection Regulation 2018 Contents Introduction... 2 Glossary... 3 Personal data... 3 Processing... 3 Data Protection Commission... 3 Data Controller... 3
More informationAdkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts
Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy
More informationJefferies EMEA Privacy Notice
Jefferies International Limited Vintners Place 68 Upper Thames St London United Kingdom Jefferies EMEA Privacy Notice 1. Introduction This Privacy Notice explains what we do with your personal data. It
More informationWebsite and Marketing Privacy Policy
Website and Marketing Privacy Policy In this policy Endemol Shine UK and its group of companies (Company or we) informs you about how we collect, use and disclose personal data from and about you and your
More informationFeature Scope Description Document Version: CUSTOMER. SAP Analytics Hub. Software version 17.09
Feature Scope Description Document Version: 2017-09-23 Software version 17.09 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names,
More informationHow to Set Up and Use Electronic Tax Reporting
How-To Guide SAP Business One 8.82 PL09 and higher Document Version: 1.0 2012-10-01 Country: Netherlands Typographic Conventions Type Style Example Description Words or characters quoted from the screen.
More informationGLOBAL DATA PROTECTION POLICY
GLOBAL DATA PROTECTION POLICY BRS UK Version 1.0 TABLE OF CONTENTS SCOPE 2 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 2 Compliance with the European data protection law and any additional applicable
More informationPolemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.
Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business
More informationThe Corporate Website and the Product Websites are together referred to hereafter as the website.
PRIVACY POLICY Version July 2018 The website www.advanzia.com (hereafter, the Corporate Website ) and the following associated websites listed below: www.gebuhrenfrei.com www.free.at www.cartezero.fr www.advanziakonto.com
More informationPOMONA EUROPE ADVISORS LIMITED
POMONA EUROPE ADVISORS LIMITED Personal Information Notice Pomona Europe Advisors Limited (Pomona, we/us/our) wants you to be familiar with how we collect, use and disclose personal information. This Personal
More informationPRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes
PRIVACY STATEMENT The Island with Bear Grylls (the Programme ) Introduction and main purposes Shine TV Limited ("Company" or "we, us, our") is the data controller in respect of your personal data and will
More informationYou can find a brief summary of this Privacy Policy in the chart below.
In this policy Shine TV Limited with registered office at Shepherds Building Central, Charecroft Way, Shepherds Bush, London, W14 0EE, UK (Company or we) informs you about how we collect, use and disclose
More informationSAP Enable Now. Desktop Components (Cloud Edition)
Installation Guide 1704 SP1 Document Version: 1.0 2017-07-15 2017 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Desktop Components (Cloud Edition) Table of Contents 1 Introduction...
More informationPrivacy Notice - Stora Enso s Customer and Sales Register. 1 Controller
Privacy Notice - Stora Enso s Customer and Sales Register Date 29.1.2018 1 2 Purpose of this privacy notice is to provide the persons communicating with Stora Enso or otherwise registered in Stora Enso
More informationSAP Assurance and Compliance Software Release 1.2 SP04
Extensibility Guide Document Version: 1.0 2016-11-21 SAP Assurance and Compliance Software Release 1.2 SP04 SAP Tax Compliance Typographic Conventions Type Style Example Description Words or characters
More informationData processing policy
Data processing policy MBM Adventures Kft. Data protection policy I. The data controller and his/her availabilities MBM Adventures Kft (registered seat: 1068 Budapest, Király utca 80, website: www.mbmadventures.com,
More informationIslam21c.com Data Protection and Privacy Policy
Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach
More informationGLOBAL DATA PROTECTION POLICY
GLOBAL DATA PROTECTION POLICY Last update: April 2nd, 2018 SCOPE 3 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 3 Compliance with the European Data Protection Law and any additional applicable data
More informationSAP Business One Upgrade Strategy Overview
Upgrade Strategy,, version for SAP HANA and analytics powered by SAP HANA Document Version: 1.2 2017-12-06 Typographic Conventions Type Style Example Description Words or characters quoted from the screen.
More informationIf you have any questions about this notice, please contact the Head Master.
Parent Privacy Notice Introduction This notice is to help you understand how and why we collect personal information about you and what we do with that information. It also explains the decisions that
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationPRINCIPLES OF PROTECTION OF PERSONAL DATA (GDPR) WITH EFFICIENCY FROM
PRINCIPLES OF PROTECTION OF PERSONAL DATA (GDPR) WITH EFFICIENCY FROM 25.5.2018 Through our Privacy Policy ("Policy"), we inform the entities of the data we process our personal data, as well as all the
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationSAP Business One, version for SAP HANA Platform Support Matrix
Platform Support Matrix Document Version: 1.17 2017-05-04 Platform Support Matrix Release 9.0 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen.
More informationPUBLIC RabbitMQ Service SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN
PUBLIC 2017-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Overview.... 3 1.1 The RabbitMQ Cluster....3 1.2 Access the Service....5 1.3 Use the Service.... 5
More informationRecruitment Privacy Notice
Rev. A May 22, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.
More informationVIACOM INC. PRIVACY SHIELD PRIVACY POLICY
VIACOM INC. PRIVACY SHIELD PRIVACY POLICY Last Modified and Effective as of October 23, 2017 Viacom respects individuals privacy, and strives to collect, use and disclose personal information in a manner
More informationPRIVACY POLICY SECTION 1 CONTACTS
PRIVACY POLICY SECTION 1 CONTACTS Topics related to personal data collection and processing are the responsibility of the Person in Charge for Personal Data Processing. Any communication on this topic
More informationDevelopment Information Document Version: CUSTOMER. ABAP for Key Users
Development Information Document Version: 1.0 2015-11-30 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
More informationLast updated 31 March 2016 This document is publically available at
PRIVACY POLICY Last updated 31 March 2016 This document is publically available at http://www.conexusfinancial.com.au/privacy 1. INTRODUCTION This Privacy Policy sets out our commitment to protecting the
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationAmbition Training. Privacy Policy
Ambition Training Privacy Policy Privacy Protection Ambition Training is a Registered Training Organisation with responsibility for delivering vocational education and training. Ambition Training collects
More informationData Privacy for Multinationals: How to Build and Implement a Compliance Plan
Data Privacy for Multinationals: How to Build and Implement a Compliance Plan Augusta Speiser is responsible for guiding DENTSPLY Internationals efforts relating to ethics and compliance worldwide with
More informationIntegration between Digital Compliance Service User Interface and esign Application Service Provider User Interface
esign ASP User Interface Integration Guide Document Version: 1.1 2017-08-14 Integration between Digital Compliance Service User Interface and esign Application Service Provider User Interface Version 1.1.0
More informationSAP Pharma Network Onboarding Guide
Onboarding Guide - Final Review SAP Pharma Network Document Version: 0.18 2016-08-10 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
More informationConfiguring Job Monitoring in SAP Solution Manager 7.2
How-To Guide SAP Solution Manager Document Version: 1.0 2017-05-31 Configuring Job Monitoring in SAP Solution Manager 7.2 Typographic Conventions Type Style Example Example EXAMPLE Example Example
More informationSAP Business One Hardware Requirements Guide
Hardware Requirements Guide Document Version: 1.0 2014-02-18 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationData Privacy for Multinationals: How to Build and Implement a Compliance Plan
Data Privacy for Multinationals: How to Build and Implement a Compliance Plan Augusta Speiser is responsible for guiding DENTSPLY Internationals efforts relating to ethics and compliance worldwide with
More informationGlobalSign Privacy Policy Statement Version 1.4
GlobalSign Privacy Policy Statement Version 1.4 1 In support of GlobalSign s Public Certification Services Version 1.4 1999-2007, GlobalSign Important Notice: You must read the GlobalSign Certification
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationHow to Package and Deploy SAP Business One Extensions for Lightweight Deployment
How To Guide SAP Business One 9.1 Document Version: 1.0 2014-05-09 How to Package and Deploy SAP Business One Extensions for Lightweight Deployment All Countries Typographic Conventions Type Style Example
More informationBrasenose College ICT Systems Privacy Notice (v1.2)
Brasenose College ICT Systems Privacy Notice (v1.2) A summary of what this notice explains Brasenose College is committed to protecting the privacy and security of personal data. This notice applies to
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationPRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.
PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationPrivacy Policy Wealth Elements Pty Ltd
Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy
More informationCNH Industrial Privacy Policy. This Privacy Policy relates to our use of any personal information you provide to us.
CNH Industrial Privacy Policy General Terms The CNH Industrial Group appreciates your interest in its products and your visit to this website. The protection of your privacy in the processing of your personal
More informationConfiguring the Web Service Runtime for ATTP
Configuration Guide Document Version: 1.0 Final Date: SAP Backend Systems on the SAP Pharma Network Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationEU GDPR: The General Data Protection Regulation
EU GDPR: The General Data Protection Regulation A Brief Overview Duke Privacy The General Data Protection Regulation Became effective May 25, 2018. Formally codifies privacy as a fundamental right and
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationGDPR. What is GDPR? GDPR is extraterritorial, meaning it applies to any company, processing EU resident data, irrespective of their location.
1 3 5 What is GDPR? The European Union s ( EU ) General Data Protection Regulation ( GDPR ) replaces the 1995 Data Protection Directive, and while the new requirement became effective May 25, 2018, Data
More informationInstalling and Updating SAP HANA Products and Software Components
Product Documentation Document Version: 1.0 2015-10-09 Installing and Updating SAP HANA Products and Software Components SAP HANA SPS 10, as of Database Maintenance Revision 102.1 Typographic Conventions
More informationPRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust
PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we
More information