Data Protection (GDPR) : Version 10.0 - Service Release 2 April 2020
Data Protection (GDPR) : Version 10.0 - Service Release 2 April 2020
SOFTWARE AG
Document content not changed since release 10.0.6. It applies to the current version without changes.
Document content not changed since release 10.0.0. It applies to version 10.0.7 without changes.
. This document applies to ARIS Version 10.0 and to all subsequent releases
Specifications contained herein are subject to and these changes will be reported in
subsequent release notes or new editions.
Copyright © 2010 - 2020Software AG, Darmstadt, Germany and/or Software AG USA Inc.,
Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
The name Software AG and all Software AG product names are either trademarks or registered
trademarks of Software AG and/or Software AG USA Inc. and/or its subsidiaries and/or its
affiliates and/or their licensors. Other company and product names mentioned herein may be
trademarks of their respective owners.
Detailed information on trademarks and patents owned by Software AG and/or its subsidiaries
is located at http://softwareag.com/licenses.
Use of this software is subject to adherence to Software AG's licensing conditions and terms.
These terms are part of the product documentation, located at http://softwareag.com/licenses
and/or in the root installation directory of the licensed product(s).
This software may include portions of third-party products. For third-party copyright notices,
license terms, additional rights or restrictions, please refer to "License Texts, Copyright Notices
and Disclaimers of Third Party Products". For certain specific third-party license restrictions,
please refer to section E of the Legal Notices available under "License Terms and Conditions for
Use of Software AG Products / Copyright and Trademark Notices of Software AG Products".
These documents are part of the product documentation, located at
http://softwareag.com/licenses and/or in the root installation directory of the licensed
product(s).
DATA PROTECTION (GDPR)
Contents
Contents ..................................................................................................................... I
4 Glossary ............................................................................................................. 18
I
DATA PROTECTION (GDPR)
1 Text conventions
Menu items, file names, etc. are indicated in texts as follows:
▪ Menu items, key combinations, dialogs, file names, entries, etc. are displayed in bold.
▪ User-defined entries are shown as <bold text in angle brackets>.
▪ Example texts that are too long to fit on a single line, such as a long directory path, are
wrapped to the next line by using at the end of the line.
▪ File extracts are shown in this font format:
This paragraph contains a file extract.
▪ Warnings have a colored background:
Warning
This paragraph contains a warning.
1
DATA PROTECTION (GDPR)
2
DATA PROTECTION (GDPR)
3
DATA PROTECTION (GDPR)
4
DATA PROTECTION (GDPR)
2.6 Collaboration
The user name is stored Collaboration when a user creates a group, is coordinator of a group,
follows a group, likes a post ( ), writes a comment. These entries can be anonymized for
deleted users (page 7).
Warning
If you delete log files (page 15), Software AG might no longer be able to support you in order
to resolve software problems.
2.9 PPM
Log files may contain private data of ARIS users, such as IP addresses, MAC addresses, or user
names. In order to comply with the General Data Protection Regulation (GDPR), please refer
to the PPM Operation Guide. This guide explains how to handle personal data in PPM related
log files.
5
DATA PROTECTION (GDPR)
6
DATA PROTECTION (GDPR)
Prerequisite
You have the User administrator function privilege.
Warning
Do not delete your system user. Having more than one system user can avoid problems. If
your single system user was deleted accidentally, create a new one by using the superuser.
The superuser cannot be deleted.
Procedure
Tip
To delete several users at the same time, enable the check boxes for the relevant users, and
click Delete.
7
DATA PROTECTION (GDPR)
Prerequisites
▪ The user was deleted in ARIS Administration.
▪ ARIS must be running.
▪ ARIS Server installation
Users need the function privileges License administrator, User administrator,
Technical configuration administrator.
▪ Users need to login as superuser or they need either an ARIS Architect license or an
ARIS UML Designer license. For LOCAL systems they need to login as system user
system.
Procedure
1. Open a Command Prompt and navigate to:
ARIS installation path>/server/bin/work/word_umcadmin_< your installation size, for
example, s,m, or l>/tools/bin for Windows® operating systems
and
ARIS installation path>/cloudagent/bin/work/word_umcadmin_< your installation size, for
example, s,m, or l>/tools/bin for Linux operating systems.
2. Enter this command to import all documents into ARIS document storage of each tenant
you use, for example, default:
y-tenantmgmt.bat -t <URL of the server> anonymize -u <user name> -p
<password> -type user.
If a user group is deleted, the type is user group.
If the port used is other than the default ports 80 or 1080, add the port to the URL.
The audit logs are anonymized.
8
DATA PROTECTION (GDPR)
Warning
Make sure to only anonymize deleted users. If you anonymize existing users, the user names
are anonymized in all attributes, such as Creator, Last modifier, and the user names in
change list descriptions.
Prerequisites
▪ ARIS Server Administrator is installed.
▪ You know the credentials of the superuser, or you have the Server administrator function
privilege.
▪ The database must be locked for other users.
Procedure
1. Click Start > Programs > ARIS > Administration > ARIS Server Administrator
10.0 if you accepted the program group suggested by the installation program. Under a
Linux operating system, execute the arisadm.sh shell script instead. The command
prompt opens and ARIS Server Administrator is launched in interactive mode.
2. Establish a connection to the server and tenant:
Syntax: server <server name>:<port number> <tenant> <user name>
<password>
Example: server arissrv:1080 default system manager
3. Enter userwipeout <dbname>|all [<user>][,<user>].
User identifications of one or multiple users are deleted from one or all databases. The
attributes Last modifier, Creator, and the user name in change list descriptions is set to
unknown.
9
DATA PROTECTION (GDPR)
Prerequisites
▪ The user was deleted in ARIS Administration.
▪ ARIS must be running.
Procedure
1. Open a Command Prompt and navigate to:
<ARIS installation path>/server/bin/work/work_apg_< your installation size, for example,
s,m, or l>/tools/bin for Windows® operating systems
and
/home/ARIS/cloudagent/bin/work/work_apg_< your installation size, for example, s,m, or
l>/tools/bin for Linux operating systems.
2. Enter this command to import all documents into ARIS document storage of each tenant
you use, for example, default:
y-admintool.bat -s <URL of ARIS document storage> -t <tenant name>
anonymize -u <user name> -p <password>.
If the port used is other than the default ports 80 or 1080, add the port to the URL.
The users are anonymized.
Please note:
If you delete only one user from the user list or from user groups that have access to the
folder and then anonymize the folder data, all actions related to the folder data are
anonymized. This means that the anonymization does not affect the data of the deleted user
only.
Before you delete a user, get the user ID of a specific user from the user details in the user
management.
In this case, add the following parameter with y-admintool.bat or y-admintool.sh:
-ownerName <owner of the folder> -ownerType USER
10
DATA PROTECTION (GDPR)
Prerequisites
▪ The user was deleted in ARIS Administration.
▪ ARIS Server is running.
Procedure
1. Open a Command Prompt and navigate to:
<ARIS installation path>/server/bin/work/work_apg_<s,m, or l>/tools/bin for Windows®
operating systems
or:
/home/ARIS/cloudagent/bin/work/work_apg_<s,m, or l>/tools/bin for Linux operating
systems.
2. Enter this command to import all documents into ARIS document storage of each tenant
you use, for example, default:
y-ageclitool.bat --apg <Process Governance endpoint> -ht <ID of the human
task> -p <password of the executer> * -t <tenant name> -umc <user
management endpoint> -u <user name of the executer>
The user name is replaced by the string anonymous.
11
DATA PROTECTION (GDPR)
Prerequisites
The user was deleted in ARIS Administration.
Procedure
1. Start ARIS Cloud Controller.
ACC is a command-line tool for administrating and configuring an ARIS installation. It
communicates with ARIS Agents on all nodes.
To start ACC under a Windows operating system click Start > All Programs > ARIS >
Administration > Start ARIS Cloud Controller. If you have changed agent user
credentials you must enter the user name and/or the password.
To start ACC under a Linux operating system, execute the acc10.sh shell script instead.
Enter help or help <command> to get information about the usage of the commands.
2. To anonymize, for example, the deleted y4711 user on ecp_m enter:
invoke anonymizeUser on ecp_m anonymize.user=y4711
Activities of this Collaboration user, such as posts, comments, groups, are shown with
Anonymized user instead with the y4711 user name. If several users are anonymized a
number is added, such as Anonymized user 2.
12
DATA PROTECTION (GDPR)
Procedure
1. Open your browser and enter the URL:
syntax: http://<server name>:<port>/acc/ui
for example
http://aris10srv.eur.co.umg:1080/acc/ui
The infrastructure tenant's login dialog opens. The tenant cannot be changed. Having
performed a standard installation, the master tenant is the infrastructure tenant by
default.
2. Select the interface language.
3. Enter the system user's or the superuser's credentials.
4. Click Log in. The infrastructure tenant's node view is displayed. It gives an overview on
the node's runnables.
5. If you want to collect all log files, click More > Download log files.
6. If you want to collect log files of a specific runnable, move the mouse pointer to the
related row and click Download log file.
A ZIP archive created to be opened or saved.
If you cannot solve the problems and have a maintenance agreement, please send an error
description and the ZIP archives containing collected log files as well as the entire contents of
the log and config directories to the ARIS Global Support via Empower
(http://www.softwareag.com/premiumsupport).
13
DATA PROTECTION (GDPR)
Procedure
1. Start ARIS Cloud Controller.
ACC is a command-line tool for administrating and configuring an ARIS installation. It
communicates with ARIS Agents on all nodes.
To start ACC under a Windows operating system click Start > All Programs > ARIS >
Administration > Start ARIS Cloud Controller. If you have changed agent user
credentials you must enter the user name and/or the password.
To start ACC under a Linux operating system, execute the acc10.sh shell script instead.
Enter help or help <command> to get information about the usage of the commands.
2. To collect log files, for example related to the abs_l runnable, enter:
collect log files for abs_l
To collect all log files, enter:
collect log files
or
collect logfiles
You can use additional parameters. Enter help or help <command> to get information
about the usage of the commands.
All log files are stored as a ZIP archive.
If you cannot solve the problems and have a maintenance agreement, please send an error
description and the ZIP archives containing collected log files as well as the entire contents of
the log and config directories to the ARIS Global Support via Empower
(http://www.softwareag.com/premiumsupport).
14
DATA PROTECTION (GDPR)
Warning
If you delete log files (page 15), Software AG might no longer be able to support you in order
to resolve software problems.
In order to delete all log files, you must stop the related runnables to allow unhindered access
to all files. If you do not stop the runnables, some files may be locked and cannot be deleted.
Procedure
1. Start ARIS Cloud Controller (ACC)..
2. To delete log files, for example related to the abs_l runnable, enter: delete log files for
abs_l
To delete all log files, enter: delete log files or delete logfiles
All log files that are not accessed by a runnable are deleted. Log files that were not deleted are
listed.
15
DATA PROTECTION (GDPR)
Prerequisites
You have the System administrator role.
Procedure
1. Start ARIS Risk & Compliance Manager.
5. Click Edit in the row of the parameter you want to change. The Specify parameter
value dialog opens.
6. Copy the current value to the New value box.
7. Make the relevant changes, for example, change the value that is to be displayed for the
user ID.
8. Click OK.
The changes are immediately applied and stored in the database.
Click Reset in the row of the relevant parameter to reset the default value.
Now you can anonymize (page 17) users in ARIS Risk & Compliance Manager.
16
DATA PROTECTION (GDPR)
Prerequisites
▪ You have the System administrator role.
▪ You have the ARCM administrator and the User administrator function privileges.
Procedure
1. Start ARIS Risk & Compliance Manager.
2. Click Administration.
3. Click System management > Users. The list is displayed.
4. Select the option Yes for the Deactivated filter and click Apply filter. The
deactivated users are displayed.
5. Click the name of the user whose user data you want to anonymize. The form is displayed.
Example
A dismissed employee is deleted from ARIS Administration. Then the user data in ARIS Risk &
Compliance Manager is refreshed with user data based on ARIS Administration/User
Management (Synchronize users with ARIS Administration/User Management). The user data
is deactivated in ARIS Risk & Compliance Manager. However, there is still data containing the
name of this user, such as objects the user edited. This user data must be anonymized.
17
DATA PROTECTION (GDPR)
4 Glossary
GDPR
The General Data Protection Regulation (GDPR) protects the rights of individuals’ personal
data within the European Union. It also regulates the export of personal data outside the EU.
GDPR is a regulation by the European Parliament, the Council of the European Union, and the
European Commission.
PERSONAL DATA
Any information related to an identified or identifiable data subject, such as a natural person.
CONTROLLER
Determines the purpose and means of processing personal data. (Role according to article 4 of
the GDPR.)
PROCESSOR
Processes personal data on behalf of the controller (page 18). (Role according to article 4 of
the GDPR.)
18
DATA PROTECTION (GDPR)
5 Legal information
Name Includes
ARIS products Refers to all products to which the license regulations of
Software AG standard software apply.
ARIS Client Refers to all programs that access shared databases by using
ARIS Server.
ARIS Download Client Refers to an ARIS Client that can be accessed using a
browser.
19
DATA PROTECTION (GDPR)
5.2 Disclaimer
ARIS products are intended and developed for use by persons. Automated processes, such as
the generation of content and the import of objects/artifacts via interfaces, can lead to an
outsized amount of data, and their execution may exceed processing capacities and physical
limits. For example, processing capacities are exceeded if models and diagrams transcend the
size of the modeling area or an extremely high number of processing operations is started
simultaneously. Physical limits may be exceeded if the memory available is not sufficient for
the execution of operations or the storage of data.
Proper operation of ARIS products requires the availability of a reliable and fast network
connection. Networks with insufficient response time will reduce system performance and may
cause timeouts.
If your product contains ARIS document storage, the following applies:
ARIS document storage was tested with 40.000 document items. This includes documents,
document versions or folders. We recommend monitoring the number and overall size of
stored document items and archiving some document items if needed.
If ARIS products are used in a virtual environment, sufficient resources must be available there
in order to avoid the risk of overbooking.
The system was tested using scenarios that included 100,000 groups (folders), 100,000 users,
and 1,000,000 modeling artifacts. It supports a modeling area of 25 square meters.
If projects or repositories are larger than the maximum size allowed, a powerful functionality is
available to break them down into smaller, more manageable parts.
Some restrictions may apply regarding the use of process administration, ARIS Administration,
ARIS document storage, and ARIS Process Board, and the generation of executable processes.
Process Governance has been tested and approved for 1000 parallel process instances.
However, the number may vary depending on process complexity, for example, if custom
reports are integrated.
20