Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Complex Queries in Business Objects

Complex Queries in Business Objects

Ratings: (0)|Views: 231|Likes:
Published by razakashif
complex queries, business objects, sap , erp, SAP BO, Making and working with complex queries in sap business objects 3.
complex queries, business objects, sap , erp, SAP BO, Making and working with complex queries in sap business objects 3.

More info:

Published by: razakashif on Apr 03, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/12/2013

pdf

text

original

 
Complex Queries inBusinessObjects
 
 
2 Complex Queries in BusinessObjects
 Appropriate Use And Security Of Confidential AndSensitive Information
Due to the integrated nature of the various Human Resources, Finance and Studentmodules in Banner and the reporting information in the Enterprise Data Warehouse(EDW), you may have access to information beyond what you need to perform yourassigned duties. Your access to Banner and the EDW has been granted based onbusiness need, and it is your responsibility to ensure the information you access is usedappropriately.Here are some reminders of good data stewardship to help you carry out yourresponsibility:
 
Do not share your passwords or store them in an unsecured manner. Do not leaveyour workstation unattended while logged on to administrative informationsystems. You are responsible for any activity that occurs using your logon id.
 
Do not share confidential and sensitive information with anyone, includingcolleagues, unless there is a business reason.
 
Retrieve printed reports quickly, and do not leave the reports lying around in plainview.
 
Secure reports containing confidential and sensitive information (e.g., FERPA, EEOor HIPAA protected data).
 
When disposing of reports containing confidential or sensitive information, shredthe documents in a timely manner. Your responsibilities regarding the protection and security of administrativeinformation are outlined in the University of Illinois Information Security Policy postedat http://www.obfs.uillinois.edu/manual/central_p/sec19-5.htm. Any violation couldsubject you to disciplinary action, which could include dismissal or, in those caseswhere laws have been broken, legal action. You should have signed a compliance formthat indicates you have read, understand and agree to comply with the University'sInformation Security Policy for Administrative Information. If you have not alreadysigned the compliance form, please see your Unit Security Contact, who is responsiblefor maintaining these forms.
File:
 
e:\trainingdevelopment\businessobjects\businessobjects6 - complex queries\complex queries inbusinessobjects v3.doc
 
Last Printed:
 
3/14/2006 8:47 AM
 
 
 
Complex Queries in BusinessObjects 3
Complex Queries in BusinessObjects Table of Contents

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->