Blueworks Live security considerations

Security is an integral consideration when you are discovering and documenting models in IBM Blueworks Live and in the day-to-day usage of Blueworks Live.

Important: To ensure compliance with data protection regulations, use care and discretion when you enter data in Blueworks Live to avoid disclosure of any Personal Identifiable Information (PII), such as names, addresses, contact details, and so on. For more information, see Personally Identifiable Information (PII) External link opens a new window or tab. Make sure that only non-confidential and anonymized data is used in process blueprints, decisions, artifacts, properties, or any part of the application.

Accounts in Blueworks Live are secured through a number of elements such as authentication, access control, data integrity, privacy, and identity propagation. For the Blueworks Live policy and practices, see IBM® Blueworks Live Security practices.

For information about how to set up authentication for users, see Configuring Authentication. For information about access control, specifically controlling what users can do in each space, see Spaces and Controlling access and permissions.

For information about your responsibilities and the responsibilities of IBM for security and privacy, click the Blueworks Live Service Agreement link at the bottom of the Blueworks Live window after you log in to Blueworks Live.