Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

The employee profile report is used by ?

 

A. the manager 

B. the individual department 

C. the personnel department 

D. All of the above 

E. None of the above 

user-image
Question ajoutée par Emad Mohammed said abdalla , ERP & IT Software, operation general manager . , AL DOHA Company
Date de publication: 2015/02/01
Ibrahim Hussein Mayaleh
par Ibrahim Hussein Mayaleh , Sales & Business Consultant and Trainer , Self-employed

They are using it, so it is D

VENKITARAMAN KRISHNA MOORTHY VRINDAVAN
par VENKITARAMAN KRISHNA MOORTHY VRINDAVAN , Project Execution Manager & Accounts Manager , ALI INTERNATIONAL TRADING EST.

C. the personnel department

and all intended users on the basis of permissions.

Vinod Jetley
par Vinod Jetley , Assistant General Manager , State Bank of India

Defining which records and information users can access is fundamental to HRMS security.

As part of your implementation plan, you identify who will use Oracle HRMS, what information they require, and how they use it. You can control a user's access to database elements such as records, fields, forms, and functions, and you can also control a user's access to other user records and data.

All Oracle Applications users access the system through a responsibility that is linked to a security group and a security profile. The responsibility is the primary means of defining security. The security group determines which business group the user can access. The security profile determines which records (related to organizations, positions and payrolls) the user can access within the business group. For example, you can restrict a manager's security permissions so that the manager can only access the person records for those employees and workers within a supervisor hierarchy. This restriction enables secure, reliable data access and ensures that only people with the correct permissions can access personal data.

More Questions Like This