About compliance in Access Control Management and Data Delivery

On this page:


Overview

In Access Control Management (ACM) and in Data Delivery Apply Security, compliance is used to ensure that certain tutorial requirements have been met before a user is given access to various functionalities. These constraints can then be enforced within an ACM group or on an Apply Security request. Each place where constraints are required has its own unique set of compliances. When these sets interact or overlap, they create a superset of required compliances.

For example, suppose an ACM group requires signature of the Acceptable Use Agreement (AUA) and completion of the HRMS Data Use tutorial; further suppose that this group has security applied to a Tableau workbook that requires AUA signature and completion of the FERPA tutorial. Each user will need to be in compliance with AUA, FERPA, and HRMS to be a valid member of the Tableau group and be able to view the workbook.

Use compliance in ACM Group Management

On an ACM group page, under "Members", you can add or check compliance requirements. Click the Require Compliance arrow to enable the options; all options are disabled by default. Choose any compliance requirement to apply it for all users wherever the group is used, and to enforce IU's requirements for signing the Acceptable Use Agreement and taking the FERPA tutorial and HRMS Data Use tutorial. If users are not in compliance with the chosen options, the page will highlight the user with an alert about the missing compliance requirements. Compliance requirements are also enforced for any subgroups nested in this group.

Active and compliant users are added to your group as full members and are displayed with white backgrounds. Only full members are granted access privileges.

If compliance requirements are in place for the group, non-compliant users are added to the group as provisional members and are displayed in a box titled "Out of compliance".

Use compliance in Data Delivery Apply Security

For details about using compliance in Apply Security, see the "Compliance" step of Use Data Delivery Apply Security to assign security to Tableau workbooks.

Determine which compliances a data system requires

For information about institutional data systems and their corresponding Data Managers and Data Stewards, go to the Enterprise Information Governance (EIG) system's search page. Allow data to populate the page, and then use the Application drop-down menu to locate the appropriate source system or systems. Be aware that DM responsibility for some subject areas is divided among DMs by individual campus, and for some subject areas is designated for all campuses ("systemwide").

This is document bhfw in the Knowledge Base.
Last modified on 2023-07-13 11:47:17.