{"id":45356,"date":"2022-01-14T09:29:11","date_gmt":"2022-01-14T17:29:11","guid":{"rendered":"https:\/\/policies.wsu.edu\/prf\/?page_id=45356"},"modified":"2025-11-07T14:38:51","modified_gmt":"2025-11-07T22:38:51","slug":"bppm-85-33","status":"publish","type":"page","link":"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-85-33\/","title":{"rendered":"85.33 Accessing Workday Modules"},"content":{"rendered":"\n<h1 class=\"wp-block-heading wsu-font-size--xxmedium\">University Policies and Procedures Manual&nbsp;(previously Business Policies and Procedures Manual)<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Accessing Workday Modules<\/h2>\n\n\n<div class=\"wsu-row wsu-row--single\" >\r\n    \n<div class=\"wsu-column\"  style=\"\">\r\n\t\n\n<p><strong>UPPM 85.33<\/strong><\/p>\n<p><strong>For more information contact:<\/strong><br>&nbsp; &nbsp;Modernization Initiative<br>&nbsp; &nbsp;509-335-3955<br>&nbsp; &nbsp;Information Technology Services<br>&nbsp; &nbsp;509-335-4357 \/ <a href=\"mailto:crimsonservicedesk@wsu.edu\">crimsonservicedesk@wsu.edu<\/a><\/p>\n<hr>\n<div id=\"toc_container\">\n<h3>Contents<\/h3>\n<ul class=\"toc_list\">\n<li><a href=\"#one_0\">1.0&nbsp;&nbsp; Overview<\/a><\/li>\n<ul>\n<li><a href=\"#one_1\">1.1&nbsp;&nbsp; Workday System<\/a><\/li>\n<li><a href=\"#one_2\">1.2&nbsp;&nbsp; Security<\/a><\/li>\n<li><a href=\"#one_3\">1.3&nbsp;&nbsp; Release of Data<\/a><\/li>\n<li><a href=\"#one_4\">1.4&nbsp;&nbsp; Privacy Training<\/a><\/li>\n<li><a href=\"#one_5\">1.5&nbsp;&nbsp; Documentation<\/a><\/li>\n<li><a href=\"#one_6\">1.6&nbsp;&nbsp; Training<\/a><\/li>\n<\/ul>\n<li><a href=\"#two_0\">2.0&nbsp;&nbsp; Workday Request Completion<\/a><\/li>\n<\/ul>\n<\/div>\n<h3 id=\"one_0\">1.0&nbsp; Overview<\/h3>\n<p>University departments use modules and functions in the Workday system to conduct various University functions. For security reasons, the University controls access to Workday modules and functions.<\/p>\n<h4 id=\"one_1\">Workday System<\/h4>\n<p>Access to specific Workday modules and functions is assigned based upon work roles performed by employees. Role-based security assignments are linked to a position. Additional user-based security access may also be assigned to employees based upon additional tasks which they need to perform that are not covered by their role-based security assignments.<\/p>\n<p>To authorize, remove, or change an employee&#8217;s access to a Workday module and\/or function, departmental personnel complete and route a request to approve or assign security groups or access requests, or a request for security changes in Workday. Completion and routing instructions for these requests are included in the following <a href=\"https:\/\/confluence.esg.wsu.edu\/display\/WKB\/Workday\">Workday Security reference guides<\/a>:<\/p>\n<ul>\n<li>Security Access Request for Security Partner<\/li>\n<li>Security Access Request for PII Approver<\/li>\n<li>Security Access Request for Role Assigner<\/li>\n<\/ul>\n<p><strong>Note:<\/strong> When an employee transfers to another department, the former department must review and remove any user-based security assignments for the employee. (See the Workday reference guides listed above for instructions.)<\/p>\n<h4 id=\"one_2\">1.2&nbsp; Security<\/h4>\n<p>Many Workday modules and functions provide access to sensitive University data. Administrators are to exercise discretion when authorizing employee access to University systems and data. University employees with a demonstrated &#8220;need-to-know&#8221; may access this information. Administrators are responsible for ensuring that authorized employees are aware of data security requirements. See <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/\">UPPM Chapter 87<\/a> regarding information security requirements.<\/p>\n<h4 id=\"one_3\">1.3&nbsp; Release of Data<\/h4>\n<p>University employees and administrators are to refer questions regarding release of data in a Workday module or function to the responsible administrative office. Data is released in accordance with regulations in <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-90-05\/\">UPPM 90.05<\/a>, <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-90-06\/\">90.06<\/a>, and <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-90-07\/\">90.07<\/a>. <\/p>\n<h4 id=\"one_4\">1.4&nbsp; Privacy Training<\/h4>\n<p>Each employee receiving access to any Workday module\/function and\/or AIS application that involves student records must complete the online student records privacy training before access is given. To access the online training, select the <strong>FERPA Training<\/strong> link at <a href=\"http:\/\/ronet.wsu.edu\/\">Registrar&#8217;s Office Network<\/a>.<\/p>\n<h4 id=\"one_5\">1.5&nbsp; Documentation<\/h4>\n<p>Help and documentation are available in the Workday reference guides for most Workday functions.<\/p>\n<h4 id=\"one_6\">1.6&nbsp; Training<\/h4>\n<p>Training for commonly-used Workday modules and functions is provided by the Modernization Initiative and the responsible administrative office.<\/p>\n<h3 id=\"two_0\">2.0&nbsp; Workday Request Completion<\/h3>\n<p>See the applicable Workday Security reference guides for instructions on requesting and approving role-based security requests for access to Workday modules and functions.<\/p>\n<p style=\"font-size: .8rem\">_______________________<br><strong>Revisions:<\/strong>&nbsp; Mar. 2023 (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-610\/\">610<\/a>); Jan. 2022 (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-586\/\">586<\/a>); Jan. 2021 (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-560\/\">560<\/a>); Aug. 2017 (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-496\/\">496<\/a>); July 2015 (Rev. 451); Apr. 2011 (Rev. 377); Dec. 2007 (Rev. 312); Mar. 2003 &#8211; moved from UPPM 80.33 (Rev. 225); Apr. 2001 (Rev. 183); May 1997 &#8211; new policy (Rev. 103).<\/p>\n\n<\/div>\r\n\n<\/div>","protected":false},"excerpt":{"rendered":"<p>University Policies and Procedures Manual&nbsp;(previously Business Policies and Procedures Manual) Accessing Workday Modules<\/p>\n","protected":false},"author":1061,"featured_media":0,"parent":50633,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"wsuwp_university_location":[],"wsuwp_university_org":[],"_links":{"self":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/45356"}],"collection":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/comments?post=45356"}],"version-history":[{"count":26,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/45356\/revisions"}],"predecessor-version":[{"id":68792,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/45356\/revisions\/68792"}],"up":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/50633"}],"wp:attachment":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/media?parent=45356"}],"wp:term":[{"taxonomy":"wsuwp_university_location","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_location?post=45356"},{"taxonomy":"wsuwp_university_org","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_org?post=45356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}