Glossary
Authorizations Insight
The Authorizations Insight classifies the security
data.
Access Management Insight
The Access Management Insight streamlines the
security change management (User provisioning, User de-provisioning and Role
change management) to prevent control and compliance issues.
Application
The ERP application being monitored.
Application Instance
Application Instance represents the virtual data
streamed from the Data Lake, for an Application that is being monitored.
Application Instances are connections between the Infor GRC application and the
Data lake. An Application Instance fetches the real time data from an ERP
application to the Infor GRC application. This data is analyzed against the
pre-defined rule conditions
Approval process
An Infor GRC process that ensures a provision is
verified and approved by a defined set of authorized users, before any change
is implemented in the ERP application.
Approval Process Templates
An Approval Process Template(APT) consolidates the
stages and the approval process conditions to define an approval process. The
APT helps us automate the process of User Provisioning.
Active Reviews
Reviews assigned to the signed-in user for taking
appropriate action.
Bulk Exclusion
The process of excluding the same set of violating
objects from all the rules in a rule book or across multiple rule
books.
Certification Manager Insight
Certification Manager automates the end-to-end
process of reviewing users and roles across ERP systems. Certification Manager
gathers data for each review from enterprise applications, routes the
information to the appropriate reviewers, tracks actions taken, facilitates
sign-off and maintains a complete record for auditors.
Compensating controls
Compensating controls are documents that contain the business
justification, the processes or agreements that are used for mitigating rule
violations.
Conflict rule
A conflict rule identifies the users or the roles
that have access to the conflicting activities in business transactions.
Conditions
Conditions are a definition of a business process or
a business activity.The conditions are the part of a rule. Data extracted from
an ERP application are analyzed based on the rule conditions. Violations are
generated when the analyses results comply with the rule conditions.
Custom role
The roles that are customized based on the user
requirement. Permissions are added to the custom roles based on the
requirement. Custom Roles are provided the page level access. The data
displayed is controlled with Ownership privileges .
Commit
Reviews are committed after a stage reviewer approves
or denies a process. The review process is forwarded to the next stage
reviewer.
Data sources
Data source is a virtual entity that points to
applications instances that helps users monitor one or more
applications.
Duplicate rule
A duplicate rule identifies the duplicate records of
an object by comparing one or more attributes of the object and the related
objects.
Exclusion
The process of excluding the violating objects from a
rule for a specified amount of time.
Functional areas
Functional Area helps to define a custom Approver for an Approval
Process. The approval process is dynamically resolved for an User Provision
approval process. The FA definition can be hierarchical. The leaf node of the
hierarchy contains the Approvers for a process.
Favorites
The Favorites section on the
Conditions tab of the
Rule page on the
Conditions tab of the
Rule page, displays the permissions or the roles
added as favorites by the logged-on user.
To add the permissions or roles to the Favorites section, select the
permission or the role and click
. You can also drag and
drop the permissions or roles from the Recent section to the Favorites section.
GDPR
General Data Protection Regulation (GDPR) is a
regulation in the European Union(EU) law, on the data protection and privacy
for all individual citizens of the European Union (EU) and the European
Economic Area (EEA). The GDPR regulation also addresses the export of personal
data outside the EU and EEA areas. The GDPR aims primarily to give control to
individuals over their personal data and to simplify the regulatory environment
for international business by unifying the regulation within the EU.
GDPR object anonymization
The Data Anonymization task anonymizes a user and all
the information related to the user. This functionality helps to secure the
user data.
GDPR Stop Monitoring
This functionality stops monitoring all the
activities of a user by excluding the user from the application.
Insights
Insights include the definition to classify the data to be
monitored in an ERP application.
Infor GRC roles
Infor GRC roles have permissions that allow or deny a
user to execute tasks in the Infor GRC application. Based on the roles
assigned, you can review information in the application and perform action on
the required pages. Permissions are predefined in the standard Infor GRC roles
but can be configured in the custom roles.
Math rule
A math rule specifies the calculations to be performed for a defined
object and fetch the data from the Datasource accordingly.
The calculations such as sum of, maximum of, Date difference between
two date fields, variance of can be performed.
Master Application Instance
This entity represents the source of record for
providing and updating the monitored data information.
Mitigation
The Infor GRC functionality that enables you to act
on the violations by excluding the violating object or by implementing the
changes manually in the ERP application.
Notifications
The functionality of notifying the users by emails
when events occur in the Infor GRC.
Objects
The Infor GRC business objects used in creating the
rule conditions and monitoring certification processes. Possible values:
Primary violating objects
The objects based on which the Business Controls are defined are
called the primary objects.
When violations are generated corresponding to the primary objects,
the objects are termed as primary violating objects.
Preferences
The first page that is displayed when you first sign
in. You can configure the various settings to personalize and customize your
Infor GRC experience.
Provisions
A Provision is a request raised for the User
Provisioning. A provision can include a user creation or modifying the access
for a user. A provision can be initiated only by an authorized Infor GRC
user.
Process Insight for Infor
Process Insight enables business users to monitor
the business transactions to identify any accounting errors and/or any
fraudulent transactions such as duplicate suppliers, process supplier invoice
without purchase order reference, duplicate payments to same suppliers, journal
entries posted on weekends, modification in credit limits of
customers.
Personal Data Protection
The Personal Data Protection functionality enables
users, with the DPO (Data Protection Officer) role, to collect personal data
pertaining to any specific object from all possible areas in the IRC
application. The users assigned the DPO role can also use this functionality to
anonymize objects based on the request received.
Rule Books
Rule books are a collection or group of rules.
Rules
Rules include one or more conditions to identify
risks in a business process. Data extracted from the ERP tables are analyzed
against the rules.
Recent
The Recent section on the
Conditions tab of the
Rule page, displays the permissions or the roles
used most recently by the users for creating the rule condition.
To add the permissions or roles to the rule condition, you can drag
and drop the permissions and roles from the Recent section.
Reports
Infor GRC reports are the formatted and the organized
presentation of the data monitored and managed by the Infor GRC application.
Remediation
The action taken by a business owner to address a
violation generated by Infor GRC.
Simple rule
A simple rule specifies the criteria to filter and
fetch data from the Datasource accordingly.
Secondary violating objects
The objects based on which the Business Controls are
defined are called the primary objects. For Process Insights, the primary
objects control the next level of objects in the hierarchy. The hierarchal
objects are called the secondary objects. When violations are generated
corresponding to the secondary objects, the objects are termed as secondary
violating objects.
Stage
A Stage is a component of the Approval Process. You
can create a stage to define a set of Approvers for a specific stage, along
with other approval conditions.
Sensitive rule
A sensitive rule identifies the users or the roles
that have access to the sensitive activities in business transactions.
Task
A task is an execution of a process in the Infor GRC
application.
Users
Users are an entity in the Infor GRC application. The
Users can be directly created in IFS with their Role Assignments or they can
also be created using Infor GRC.
Violation
Violations are risks related to a business process.
Violations are generated when data from an ERP application is analyzed based on
the predefined conditions in a rule.
What-if analysis
The What-if functionality determines the impact of
any modifications in the ERP application, before modifying the data in the
application. The What-If functionality is supported by the Authorizations
Insight only.