Workday: Data Privacy and Security Overview

Slides:



Advertisements
Similar presentations
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Advertisements

Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Social Mobility Big data Cloud Social connections, mobility, cloud delivery and pervasive information are converging in a powerful way. This convergence.
Security Controls – What Works
ISA 562 Summer Information Security Management CISSP Topic 1 ISA 562 Internet Security Theory and Practice.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Examine Quality Assurance/Quality Control Documentation
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Certificate and Key Storage Tokens and Software
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Used by employees who work remotely. Diary Management Software.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Enterprise 2.0 Portals Using portals as web browsers Ensuring continued interest by internal users Creative design techniques and navigating content Consistent.
Introduction to Information System Development.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SEC835 Database and Web application security Information Security Architecture.
Findly Leads the World in Talent Innovation with Its Enterprise-Cloud for Global Talent Acquisition COMPANY PROFILE: FINDLY Findly is a SaaS ISV founded.
Q5 Systems Limited “Pay me now or pay me later!” Reducing field data capture, reporting, trend analysis and corrective action by up to 70%
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy.
SALES PERFORMANCE MANAGEMENT T Owen Group. Sales Performance Management T Owen Group The T Owen Group Consultants work with Sales Leaders, HR Business.
Adra Match BALANCER: Balance Sheet Reconciliation Software Powered by the Microsoft Azure Cloud MICROSOFT AZURE ISV PROFILE: ADRA MATCH Adra Match develops.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Chapter 6 of the Executive Guide manual Technology.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Rick Segal CEO Fixmo, Inc.. The Starting Point The Mobile Device is the most personal computer you will ever own.The Mobile Device is the most personal.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
St. Joseph Health Human Resources Value Initiative This course contains audio narration. Please use headphones or turn on your computer’s speakers. If.
Building a Fully Trusted Authentication Environment
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
HRMS Implementation Project HRMS Security Overview Module.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
Moving to BYOD Gary Audin 1.
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Total Enterprise Mobility Comprehensive Management and Security
Workday is our new HR system
Clouding with Microsoft Azure
Workday roles – access and responsibilities
Review of IT General Controls
Understanding The Cloud
Cloud-First, Modern Windows Management and Security
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Control system network security issues and recommendations
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
HCM Cloud: Person Spotlight Redesigned
Microsoft Office Users Get Instant Information on Key Decisions Without Leaving Their Inbox “Biztera is a perfect complement to Microsoft Outlook when.
Identity & Access Management
Brandon Hixon Jonathan Moore
Contact Center Security Strategies
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Cloud Computing LegalRun Solutions Why It’s Right for You!
Revision PowerPoint By Nicole Davidson.
Modern benefits administration and HR software, supported by us.
Procurement & Contract Management Solution on Azure Helps to Boost Business Performance “Microsoft Azure gives us the cloud infrastructure to quickly and.
Presentation transcript:

Workday: Data Privacy and Security Overview The privacy and security of HR data is the no.1 priority of the Workday project Significant due diligence has been conducted on data protection A legal workstream is underway to ensure compliance in each operating country Workday has implemented tight controls, an overview of their security approach can be found here: http://www.workday.com/why_workday/reliable_and_secure.php Workday is the group-wide system for Human Resources (HR), it provides a platform for consistent HR processes and holds personal and job details for each employee in the company

Workday security controls Compliance, privacy and security considerations are core to the overall design of Workday, which employs a unified approach to security at all computing layers. Access for end users to view or modify data is granted only via browser/mobile application. Access for systems to view or modify data granted only via web services. No access is provided at the database layer. Access utilizes single role‐based security logic to authenticate the user and to make sure they have been granted a role that allows the update. Workday provides a complete audit trail of changes made Workday delivers applications via a software as a service (SaaS) model, also known as the “Cloud”. In this service delivery model, Workday is responsible for providing the infrastructure (i.e. hardware and middleware that comprise the Workday infrastructure), data security, software development and operational processes Workday are fully ISO and Safe Harbour certified and our data will be hosted within the European Economic Area (in Dublin, Ireland) Detailed Workday security reports: Workday’s Service Organization Controls 3 (SOC3) report is available here: http://www.workday.com/Documents/workday_soc3_october_2014.pdf If required, the very detailed SOC1 and 2 reports are available here: https://hyperiongrp.thruinc.net/Desktop/Distro/Open/006P1FFIBSZ

Accessing Workday Workday will be available via browser, Single Sign On within company network Workday will also be available via mobile device, such as tablet or smartphone Employees will see their own data Managers will see their team Executives will see dashboard analytics HR and Finance will see information required by their role Naturally, security guidelines apply at all times – everyone must always: follow password guidelines lock computer or mobile device when not in use avoid exporting/emailing/printing personal data

Keys roles and access Employees Own information Org chart with basic data, i.e. name, location, contact details Managers Details of own direct team “Drill down” if multiple levels of org directly report into them Executives Aggregated dashboard views Divisional CEO and Finance approve compensation changes HR Assigned to roles which support the business

Workday security Important: Security access can be reported for visibility and confidence Workday is fully audited Organisation Roles Groups, Policies and Domains