Blueworks Live security considerations
Security is an integral consideration when you are discovering and documenting models in IBM Blueworks Live and in the day-to-day usage of Blueworks Live.
. Make sure that only
non-confidential and anonymized data is used in process blueprints, decisions, artifacts,
properties, or any part of the application.Accounts in Blueworks Live are secured through a number of elements such as authentication, access control, data integrity, privacy, and identity propagation. For the Blueworks Live policy and practices, see IBM® Blueworks Live Security practices.
For information about how to set up authentication for users, see Configuring Authentication. For information about access control, specifically controlling what users can do in each space, see Spaces and Controlling access and permissions.
For information about your responsibilities and the responsibilities of IBM for security and privacy, click the Blueworks Live Service Agreement link at the bottom of the Blueworks Live window after you log in to Blueworks Live.