workers the people part of business services worker-employee, contractor or temporary
TRANSCRIPT
Workers the people part of business services Worker-Employee, Contractor or Temporary
Worker PartyGuest Employee
User
EmployeeGuest
Access and Entitlement for WorkersGuest or employee
Define Worker Human Resource Party Management WorkerContact associated to organization and suppliers in resource services. Employee – access based on internal rightsContractor – guest only employed by a supplierTemporary – guest based on employee backfill employed by a supplier
Worker
Employee
Internal
Contractor
Guest
Supplier
Temporary
Guest
Supplier
User ID
Party ManagementGAAP/GRAPEnsures the semantic relationships maintain referential integrity and information for the right purpose at the right time.
Customera legal entity with a pre-defined commerce relationship proving evidence of arrangement governing the terms of the engagements.
SupplierA legal entity with a pre-defined commerce relationship.
Person Party WorkerA contact with a relationship to your organization as an employee or a contractor or temporary worker.
Prin
cipl
e 1
C
usto
mer
ISO
81 s
tand
ards
4 pu
blic
atio
ns
272
site
s
Prin
cipl
e su
pplie
r
76 s
tand
ards
1 pu
blic
atio
n
414
stan
dard
s5
publ
icat
ions
• Princ
iple
us
ers
176
site
s
295
site
s
IT Service ManagementConfiguration Items in Configuration Management
Driving Discreet and Threat Prevention for Service Value
Generic design of related componentsConfiguration Items
• Ensures appropriate controls on threats without weighing down business models which can be managed with higher risk when the CI has been designed into the service management model.
• Appropriately respond to critical service events with confidence in the priorities around risk
Financial, Party and Offer Configuration ItemsService Management
• Integration of the management and transactional use enables less cost on non-critical services and better savings on storage cost.
• Complete and accurate performance measurements based on design patterns and known threats
Prevention rather than re-actRisk Management
• Protect rather than expose threats• Prevent rather than respond• Taking a pro-active approach to protecting an organizations intellectual and human capital
All workers can create a request for an expense.
All Managers with headcount either employee, contract or temporary will have a headcount expense.
Business Service Generic service delivery for recovery and security
Business Service Value Stream
Protects the company and it’s valued employees from unknowingly putting either at risk.
Reduces access and issues caused by change
Protects your personal information Produces more value for every userProduces better and cheaper support
models
A generic business service ensures the right services connect the users
Access Management Business
Service
Reference from the Party Management System of Record
Application
Presentation
Layer
User Business Service Based on the
capability aligned to execute the strategy
Party Management System Of Record
Historical Transaction
Records
Based on activities performed by the role in the past three years
Connectivity
Business Service ensure no new threats with recovery time sequence for test.
Reference MDM Data Layer
Presentation Layer
Financial Party Offer
System of Record
Access and Security by
WorkerParty
Entitlement by function
Application
Connectivity
Storage
Business Service
Application Layer
IT service providers secure presentation
A service to the users
Part VI
This concludes the business and enterprise architecture performance model
Anything else is moving towards the target state◦Or in contrast regressing back into the outcome
model.