Business Policies and Procedures Manual
Chapter 85: Computing and Telecommunications

Accessing Workday Modules

BPPM 85.33

For more information contact:
   Modernization Initiative
   509-335-3955
   Information Technology Services
   509-335-4357 / crimsonservicedesk@wsu.edu


1.0  Overview

University departments use modules and functions in the Workday system to conduct various University functions. For security reasons, the University controls access to Workday modules and functions.

Workday System

Access to specific Workday modules and functions is assigned based upon work roles performed by employees. Role-based security assignments are linked to a position. Additional user-based security access may also be assigned to employees based upon additional tasks which they need to perform that are not covered by their role-based security assignments.

To authorize, remove, or change an employee’s access to a Workday module and/or function, departmental personnel complete and route a request to approve or assign security groups or access requests, or a request for security changes in Workday. Completion and routing instructions for these requests are included in the following Workday Security reference guides:

  • Security Access Request for Security Partner
  • Security Access Request for PII Approver
  • Security Access Request for Role Assigner

Note: When an employee transfers to another department, the former department must review and remove any user-based security assignments for the employee. (See the Workday reference guides listed above for instructions.)

1.2  Security

Many Workday modules and functions provide access to sensitive University data. Administrators are to exercise discretion when authorizing employee access to University systems and data. University employees with a demonstrated “need-to-know” may access this information. Administrators are responsible for ensuring that authorized employees are aware of data security requirements. See EP37 and BPPM Chapter 87 regarding information security requirements.

1.3  Release of Data

University employees and administrators are to refer questions regarding release of data in a Workday module or function to the responsible administrative office. Data is released in accordance with regulations in BPPM 90.05, 90.06, and 90.07.

1.4  Privacy Training

Each employee receiving access to any Workday module/function and/or AIS application that involves student records must complete the online student records privacy training before access is given. To access the online training, select the FERPA Training link at Registrar’s Office Network.

1.5  Documentation

Help and documentation are available in the Workday reference guides for most Workday functions.

1.6  Training

Training for commonly-used Workday modules and functions is provided by the Modernization Initiative and the responsible administrative office.

2.0  Workday Request Completion

See the applicable Workday Security reference guides for instructions on requesting and approving role-based security requests for access to Workday modules and functions.

_______________________
Revisions:  Mar. 2023 (Rev. 610); Jan. 2022 (Rev. 586); Jan. 2021 (Rev. 560); Aug. 2017 (Rev. 496); July 2015 (Rev. 451); Apr. 2011 (Rev. 377); Dec. 2007 (Rev. 312); Mar. 2003 – moved from BPPM 80.33 (Rev. 225); Apr. 2001 (Rev. 183); May 1997 – new policy (Rev. 103).