Ensuring Privacy of Data Collection

Personal information (PI) in CIC depends on the changes made in source applications such as P6 EPPM. When PI data is modified or deleted in the source applications, run the ETL process to ensure it is automatically reflected in CIC. If a user is deleted in a source application, they can no longer access <0P_ProdName_CIC_Suite.



Last Published Monday, July 1, 2024