Overview of Securing Incentive Compensation

Access to Incentive Compensation functionality and data is secured using role-based access control.

There are tasks that you must perform to implement these controls so that users have appropriate access to Incentive Compensation data and functions. Some of the tasks are performed only or mainly during the implementation. Most, however, can be performed at any time and as new requirements emerge.