diff --git a/entity/Address_entity/recordcontainers/db/conditionProcess.js b/entity/Address_entity/recordcontainers/db/conditionProcess.js
index c4efac40ae8a5341a729f2731f5dbf1c2ab995f5..a938934f9b9642e9935641e62b1a9f8d957e1fbc 100644
--- a/entity/Address_entity/recordcontainers/db/conditionProcess.js
+++ b/entity/Address_entity/recordcontainers/db/conditionProcess.js
@@ -3,9 +3,14 @@ import("system.vars");
 import("system.db");
 import("Sql_lib");
 
-var cond = newWhereIfSet("ADDRESS.CONTACT_ID", "$param.ContactId_param");
+var cond = newWhere()
+
+if (vars.exists("$param.ContactId_param")) // Todo: shouldn't be needed, but sometimes in the filter view of pers / org the param doesn't exist?? --> It should be null if it's not set...
+    cond.andIfSet("ADDRESS.CONTACT_ID", "$param.ContactId_param");
+
+if (vars.exists("$param.OrganisationId_param")) // Todo: shouldn't be needed, but sometimes in the filter view of pers / org the param doesn't exist??' --> It should be null if it's not set...
+    var organisationId = vars.get("$param.OrganisationId_param");
 
-var organisationId = vars.get("$param.OrganisationId_param");
 if (organisationId)
 {
     var organisationContactId = newSelect("CONTACT.CONTACTID")
diff --git a/entity/DocumentTemplate_entity/entityfields/bindata/onValueChange.js b/entity/DocumentTemplate_entity/entityfields/bindata/onValueChange.js
index 65023ac01660847511633352c0b28e9228d7ee66..67f3a29c537f716f715291f86030ac7bf728e6f1 100644
--- a/entity/DocumentTemplate_entity/entityfields/bindata/onValueChange.js
+++ b/entity/DocumentTemplate_entity/entityfields/bindata/onValueChange.js
@@ -6,7 +6,7 @@ import("system.vars");
 // --> only set in $field.Content.valueProcess if $field.Content is null and set it from here only if MASK triggered change
 if((vars.get("$sys.operatingstate") == neon.OPERATINGSTATE_EDIT || vars.get("$sys.operatingstate") == neon.OPERATINGSTATE_NEW))
 {
-    [content, type] = DocumentTemplateUtils.getTemplateContent(vars.get("$field.DOCUMENTTEMPLATEID"), new FileUpload(vars.get("$local.value")));
+    var [content, type] = DocumentTemplateUtils.getTemplateContent(vars.get("$field.DOCUMENTTEMPLATEID"), new FileUpload(vars.get("$local.value")));
 
     vars.set("$context.currentTemplateType", type);
     vars.set("$field.Content", content)
diff --git a/entity/DocumentTemplate_entity/entityfields/content/valueProcess.js b/entity/DocumentTemplate_entity/entityfields/content/valueProcess.js
index 5158388e7c2042154859ba89649d91e398eb12da..fbecd887105302ba21c9e5b44e764daeb1c11d65 100644
--- a/entity/DocumentTemplate_entity/entityfields/content/valueProcess.js
+++ b/entity/DocumentTemplate_entity/entityfields/content/valueProcess.js
@@ -6,7 +6,7 @@ import("system.vars");
 
 if((vars.get("$sys.operatingstate") == neon.OPERATINGSTATE_EDIT || vars.get("$sys.operatingstate") == neon.OPERATINGSTATE_NEW) && vars.get("$this.value") == null)
 {
-    [content, type] = DocumentTemplateUtils.getTemplateContent(vars.get("$field.DOCUMENTTEMPLATEID"), new FileUpload(vars.get("$field.BINDATA")));
+    var [content, type] = DocumentTemplateUtils.getTemplateContent(vars.get("$field.DOCUMENTTEMPLATEID"), new FileUpload(vars.get("$field.BINDATA")));
     vars.set("$context.currentTemplateType", type);
     result.string(content);
 }
diff --git a/entity/DuplicateScannerIndexConfig_entity/entityfields/entity_field_name/dropDownProcess.js b/entity/DuplicateScannerIndexConfig_entity/entityfields/entity_field_name/dropDownProcess.js
index d4796d833a5d5c213fdb3282b2bac83ede763c6d..50a80994966abea65093e0451058fdd68510e9d7 100644
--- a/entity/DuplicateScannerIndexConfig_entity/entityfields/entity_field_name/dropDownProcess.js
+++ b/entity/DuplicateScannerIndexConfig_entity/entityfields/entity_field_name/dropDownProcess.js
@@ -8,7 +8,7 @@ var model = project.getEntityStructure(currentEntity);
 let entityFields = [];
 for (fieldname in model.fields) 
 { 
-    field = model.fields[fieldname]; 
+    let field = model.fields[fieldname]; 
     if(field.fieldType == project.ENTITYFIELDTYPE_FIELD)
     {
         entityFields.push([field.name, currentEntity + "." + field.name]);
diff --git a/entity/LogHistory_entity/recordcontainers/jdito/contentProcess.js b/entity/LogHistory_entity/recordcontainers/jdito/contentProcess.js
index 3a533bb36dc76380d281f23cbbb8bd06977f7e42..21e881f3538fbf8173275dafb2b9a2a437e7a038 100644
--- a/entity/LogHistory_entity/recordcontainers/jdito/contentProcess.js
+++ b/entity/LogHistory_entity/recordcontainers/jdito/contentProcess.js
@@ -61,8 +61,7 @@ function _groupData(pData)
         return [];
 
     var res = [];
-    var logDatetime, logUser, logDesc;
-    [logDatetime, logUser, logDesc] = pData[0];
+    var [logDatetime, logUser, logDesc] = pData[0];
     var previousGroupingIdentifier = _makeGroupingIdentifier(logDatetime, logUser);
     var logUid = previousGroupingIdentifier;//maybe add more information? But for not thats okay
 
@@ -77,7 +76,7 @@ function _groupData(pData)
         {
             res.push([logUid, logDatetime, logUser, logDesc]);
             [logDatetime, logUser, logDesc] = pData[i];
-            previousGroupingIdentifier = _makeGroupingIdentifier(logDatetime, logUser);
+            previousGroupingIdentifier = _makeGroupingIdentifier(, logUser);
             logUid = previousGroupingIdentifier;
         }
     }
diff --git a/entity/PermissionDetail_entity/entityfields/field/stateProcess.js b/entity/PermissionDetail_entity/entityfields/field/stateProcess.js
index a28f5c86f9be5e45e9d693571091ce4a7fd1d03a..d32cd4fbebf1eb7d206da2179868048a2eb4951b 100644
--- a/entity/PermissionDetail_entity/entityfields/field/stateProcess.js
+++ b/entity/PermissionDetail_entity/entityfields/field/stateProcess.js
@@ -14,7 +14,7 @@ if (rootPermSet == "") {
 } else {
     entityStructure = project.getEntityStructure(entity);
     for (fieldname in entityStructure.fields) {
-        field = entityStructure.fields[fieldname];
+        var field = entityStructure.fields[fieldname];
         if (field.usePermissions == true) {
             result.string(neon.COMPONENTSTATE_EDITABLE)
         }
diff --git a/entity/PermissionDetail_entity/entityfields/permissionactions/children/permissionid_param/valueProcess.js b/entity/PermissionDetail_entity/entityfields/permissionactions/children/permissionid_param/valueProcess.js
index 0348c341db644ef51ec87d5a056f3c3c499f6982..17eccf6fb293fb7cfc0bd1ee58b86616127392ce 100644
--- a/entity/PermissionDetail_entity/entityfields/permissionactions/children/permissionid_param/valueProcess.js
+++ b/entity/PermissionDetail_entity/entityfields/permissionactions/children/permissionid_param/valueProcess.js
@@ -23,6 +23,7 @@ if (permSetId != "") {
         
         var sqlHelper = new SqlMaskingUtils(alias);
         
+        // Why a loop which breaks instantly??
         for each (let perm in permsWithCond) {
             rootPermId = newSelect("ASYS_PERMISSIONID", alias)
                             .from("ASYS_PERMISSION")
@@ -30,12 +31,6 @@ if (permSetId != "") {
                             .where("ASYS_PERMISSION.COND", cond, sqlHelper.cast("#", SQLTYPES.VARCHAR, cond.length) + " = ?")
                             .and("ASYS_PERMISSIONSET.FIELD_ID", field)
                             .cell();
-                            
-            logging.log(JSON.stringify([newSelect("ASYS_PERMISSIONID", alias)
-                            .from("ASYS_PERMISSION")
-                            .join("ASYS_PERMISSIONSET", "ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID = ASYS_PERMISSION.ASYS_PERMISSIONSET_ID")
-                            .where("ASYS_PERMISSION.COND", cond, sqlHelper.cast("#", SQLTYPES.VARCHAR, cond.length) + " = ?")
-                            .and("ASYS_PERMISSIONSET.FIELD_ID", field).toString()], null, "\t"))
             break;
         }
     }
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js b/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
index c6bf07a7d71bd034a2df97aa6099924bc3fe9aef..d47bb91dfd65bde6189c530fb4d25e7de0597e33 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
@@ -6,6 +6,7 @@ import("system.result");
 import("Permission_lib");
 import("system.project");
 
+var alias = SqlUtils.getSystemAlias();
 var selectedPermission = vars.get("$local.idvalues");
 var sqlStr;
 var querySelect = newSelect("ASYS_PERMISSION.ASYS_PERMISSIONID, ASYS_PERMISSIONSET.ENTITY_ID, ASYS_PERMISSIONSET.ROLE_ID,"
@@ -15,7 +16,6 @@ var querySelect = newSelect("ASYS_PERMISSION.ASYS_PERMISSIONID, ASYS_PERMISSIONS
                         .join("ASYS_PERMISSIONACTION", "ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID = ASYS_PERMISSION.ASYS_PERMISSIONID")
                         .orderBy("ASYS_PERMISSION.ASYS_PERMISSIONID")
                         
-var alias = SqlUtils.getSystemAlias();
 var entitiesMetaData = project.getDataModels(project.DATAMODEL_KIND_ENTITY);
 var entityStructure;
 var entitiesUsePermFlagSet = [];
@@ -38,14 +38,18 @@ for each (let entityMetaData in entitiesMetaData) {
 }
 
 var sqlRes = [];
-
+if (vars.get("$local.idvalues") && vars.get("$local.idvalues").length > 0)
+{
+    sqlRes = querySelect.where("ASYS_PERMISSION.ASYS_PERMISSIONID", vars.get("$local.idvalues"))
+                        .table();
+} 
 // load nothing if no entity uses permissions
-if (entitiesUsePermFlagSet.length > 0)
+else if (entitiesUsePermFlagSet.length > 0)
 {
     querySelect.where("ASYS_PERMISSIONSET.ENTITY_ID", entitiesUsePermFlagSet, SqlBuilder.IN());
     
     // if fieldsUsePermFlagSet is empty it checks only for "is null" (that's why newWhereIfSet and not newWhere)
-    querySelect.and(newWhereIfSet("ASYS_PERMISSIONSET.FIELD_ID", fieldsUsePermFlagSet, SqlBuilder.IN())
+    querySelect.and(newWhereIfSet("ASYS_PERMISSIONSET.FIELD_ID", fieldsUsePermFlagSet, SqlBuilder.IN(), undefined, alias)
                               .or("FIELD_ID is NULL"));
     
     if (vars.get("$param.RoleTitle_param")) {
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js b/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
index a527405ae5687963a6042818c137b72d0d442b0f..0a6bc9e065076c1f6f04508a7a9dfc2b499c8828 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
@@ -1,3 +1,4 @@
+import("system.logging");
 import("Sql_lib");
 import("Permission_lib");
 import("system.neon");
@@ -20,10 +21,10 @@ var condtype = vars.get("$field.CONDTYPE").trim();
 var condition = vars.get("$field.CONDITION");
 
 if (checkInput([role, entity, accesstype, condtype])) {
-    
+
     // permission set
     var permissionsetid = PermissionUtil.getSet(role, entity, accesstype, field);
-    
+
     if (permissionsetid == "") {
         // no fitting permissionset found - insert new permissionset
         var rootpermissionset;
diff --git a/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js b/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
index c9659992f7227dc9bbbfb4cea5479bdf88ac56b5..84f4b2e49feaad52274092837a33e37cb592d82e 100644
--- a/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
+++ b/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
@@ -27,7 +27,7 @@ for each (let entityMetaData in entitiesMetaData) {
     }
 }
 
-var rolesOrEntitiesSelect = new SqlBuilder(alias);
+var rolesOrEntitiesSelect = new SqlBuilder(alias).where();
 var rolesOrEntities = [];
 // select nothing if no entities have the perm flag set
 if (entitiesUsePermFlagSet.length > 0)
@@ -36,14 +36,14 @@ if (entitiesUsePermFlagSet.length > 0)
         roleTitle = vars.getString("$param.RoleTitle_param");
         rolesOrEntitiesSelect.select("distinct ENTITY_ID")
                             .from("ASYS_PERMISSIONSET")
-                            .where("ASYS_PERMISSIONSET.ROLE_ID", roleTitle)
+                            .and("ASYS_PERMISSIONSET.ROLE_ID", roleTitle)
     } 
     else if (vars.exists("$param.EntityTitle_param") && vars.get("$param.EntityTitle_param")) 
     {
         entityTitle = vars.getString("$param.EntityTitle_param");
         rolesOrEntitiesSelect.select("distinct ROLE_ID")
                             .from("ASYS_PERMISSIONSET")
-                            .where("ASYS_PERMISSIONSET.ENTITY_ID", entityTitle)
+                            .and("ASYS_PERMISSIONSET.ENTITY_ID", entityTitle)
     }
     
     rolesOrEntities = rolesOrEntitiesSelect
@@ -117,9 +117,11 @@ function prepareOverview(pPermSetId, pCurrOverview, pMode) {
             break;
         case "conditional":
             var permIds = PermissionUtil.getPermissionWithCond(pPermSetId);
-            for each (let permId in permIds) {
+            
+            permIds.forEach(function(permId) {
                 conditionalPermActionId.push(PermissionUtil.getActions([permId]));
-            }
+            });
+           
             currOverview = pCurrOverview;
             
             for each (let actionSets in conditionalPermActionId) {
diff --git a/entity/Person_entity/recordcontainers/db/onDBInsert.js b/entity/Person_entity/recordcontainers/db/onDBInsert.js
index 5f069680c3cd50ac7a7b062d6a9c55a22a176dcc..60c78c1ebd2d44dd31bad36d14d429790a79bdd2 100644
--- a/entity/Person_entity/recordcontainers/db/onDBInsert.js
+++ b/entity/Person_entity/recordcontainers/db/onDBInsert.js
@@ -23,7 +23,7 @@ let fieldValue = "";
 let entityFields = [];
 for (fieldname in entityModel.fields) 
 { 
-    field = entityModel.fields[fieldname]; 
+    var field = entityModel.fields[fieldname]; 
     if(field.fieldType == project.ENTITYFIELDTYPE_FIELD)
     {
         fieldValue = vars.get("$field." + field.name);
diff --git a/entity/Prod2prod_entity/onDelete.js b/entity/Prod2prod_entity/onDelete.js
index db58c1cefaa25343e74adc63beaf54214f7389e3..ab2c10fb558736441e8e83a6777c37049726d4fb 100644
--- a/entity/Prod2prod_entity/onDelete.js
+++ b/entity/Prod2prod_entity/onDelete.js
@@ -1,4 +1,4 @@
-import("system.vars");
-import("system.db");
+import("Sql_lib");
 
-db.deleteData("PROD2PROD", "PROD2PRODID = '" + vars.get("$field.UID") + "'");
\ No newline at end of file
+newWhere("PROD2PROD.PROD2PRODID", "$field.UID")
+    .deleteData(true, "PROD2PROD");
\ No newline at end of file
diff --git a/entity/Prod2prod_entity/onUpdate.js b/entity/Prod2prod_entity/onUpdate.js
index 55e282082f1857e64dc6048897e904b4905a1d81..a2834dd3ef42b887903d8b4de5ed989f4f2fa16d 100644
--- a/entity/Prod2prod_entity/onUpdate.js
+++ b/entity/Prod2prod_entity/onUpdate.js
@@ -1,6 +1,5 @@
-import("system.datetime");
+import("Sql_lib");
 import("system.vars");
-import("system.db");
 
 var cols = [ "DEST_ID"
            , "SOURCE_ID"
@@ -14,6 +13,5 @@ var vals = [ vars.get("$field.DEST_ID")
            , vars.get("$field.OPTIONAL")
            , vars.get("$field.TAKEPRICE") ];
 
-var colTypes = db.getColumnTypes("PROD2PROD", cols);
-
-db.updateData("PROD2PROD", cols, colTypes, vals, "PROD2PRODID = '" + vars.get("$field.UID") + "'");
\ No newline at end of file
+newWhere("PROD2PROD.PROD2PRODID", "$field.UID")
+    .updateData(true, "PROD2PROD", cols, null, vals);
\ No newline at end of file
diff --git a/entity/Prod2prod_entity/recordcontainers/jdito/onUpdate.js b/entity/Prod2prod_entity/recordcontainers/jdito/onUpdate.js
index 0dff9d0fdd1ee895b0c9a497806550dfa376e6c8..c71a9c41db27fb3478fde565b44b9c5b7643c1c3 100644
--- a/entity/Prod2prod_entity/recordcontainers/jdito/onUpdate.js
+++ b/entity/Prod2prod_entity/recordcontainers/jdito/onUpdate.js
@@ -1,6 +1,6 @@
+import("Sql_lib");
 import("system.datetime");
 import("system.vars");
-import("system.db");
 
 var cols = [ "SOURCE_ID"
            , "QUANTITY"
@@ -12,4 +12,5 @@ var vals = [ vars.get("$field.SOURCE_ID")
            , vars.get("$field.OPTIONAL")
            , vars.get("$field.TAKEPRICE") ];
 
-db.updateData("PROD2PROD", cols, null, vals, "PROD2PRODID = '" + vars.get("$field.PROD2PRODID") + "'");
\ No newline at end of file
+newWhere("PROD2PROD.PROD2PRODID", "$field.PROD2PRODID")
+    .updateData(true, "PROD2PROD", cols, null, vals);
\ No newline at end of file
diff --git a/entity/SupportTicket_entity/SupportTicket_entity.aod b/entity/SupportTicket_entity/SupportTicket_entity.aod
index 8907222fcda32f16e8cf7b141b1c4f9e03bfa7c6..13bc554239d5d61b4cc8742f07dbac112c1e5dd7 100644
--- a/entity/SupportTicket_entity/SupportTicket_entity.aod
+++ b/entity/SupportTicket_entity/SupportTicket_entity.aod
@@ -8,7 +8,6 @@
   <afterUiInit>%aditoprj%/entity/SupportTicket_entity/afterUiInit.js</afterUiInit>
   <onValidation>%aditoprj%/entity/SupportTicket_entity/onValidation.js</onValidation>
   <iconId>VAADIN:CHAT</iconId>
-  <usePermissions v="true" />
   <titlePlural>Support Tickets</titlePlural>
   <recordContainer>db</recordContainer>
   <entityFields>
diff --git a/process/ActivityTask_lib/process.js b/process/ActivityTask_lib/process.js
index 03479693220e9baa036176867baba53f2580b487..443b3194147011e93c5fa9db48a20cbed0531f27 100644
--- a/process/ActivityTask_lib/process.js
+++ b/process/ActivityTask_lib/process.js
@@ -125,8 +125,7 @@ ActivityUtils.insertDocuments = function (pActivityId, pDocuments)
 {
     pDocuments.forEach(function (document)
     {
-        var filename, b64Content, isMainDocument;
-        [filename, b64Content, isMainDocument] = document;
+        var [filename, b64Content, isMainDocument] = document;
         if (isMainDocument)
             SingleBinaryUtils.insertMainDocument("ACTIVITY", "DOCUMENT", pActivityId, b64Content, filename);
         else
diff --git a/process/IncomingEmailExecutor_lib/process.js b/process/IncomingEmailExecutor_lib/process.js
index 27532e621d43c937fa28fa4d1c9bea88f8b8361c..374296409d465f9df4fa95274d9f724a6d5d3b9f 100644
--- a/process/IncomingEmailExecutor_lib/process.js
+++ b/process/IncomingEmailExecutor_lib/process.js
@@ -229,8 +229,7 @@ IncomingEmailExecutor.prototype.autoProcess = function(pUnlinkedMailId)
 IncomingEmailExecutor.prototype._getProcessingFunction = function (pIsSender, pTargetArray)
 {
     return function(contactInfoRow) {
-        var contactId, contactStatus, contactPersonId, languageIso3;
-        [contactId, contactStatus, contactPersonId, languageIso3] = contactInfoRow;
+        var [contactId, contactStatus, contactPersonId, languageIso3] = contactInfoRow;
         
         //there *should* only exist no or one user per contactid, never two or more - so getUser (not getUsers) should be fine
         var user = tools.getUserByAttribute(tools.CONTACTID, [contactId]);
diff --git a/process/Permission_lib/process.js b/process/Permission_lib/process.js
index cf725e6f01011373a500fcda94a65e212b42c1fa..930bd8b3ad18f7e6bc02f1fd9e44e552fda9030e 100644
--- a/process/Permission_lib/process.js
+++ b/process/Permission_lib/process.js
@@ -1,4 +1,3 @@
-import("system.logging");
 import("system.SQLTYPES");
 import("system.util");
 import("system.db");
@@ -40,7 +39,7 @@ function PermissionUtil () {}
     {   
         return newSelect("ASYS_PERMISSIONSETID", alias)
                     .from("ASYS_PERMISSIONSET")
-                    .whereIfSet("ASYS_PERMISSIONSET_ID", pSetId)
+                    .whereIfSet("ASYS_PERMISSIONSET.ASYS_PERMISSIONSET_ID", pSetId)
                     .arrayColumn(true);
     }
 
@@ -70,11 +69,11 @@ function PermissionUtil () {}
     PermissionUtil.getActions = function(pPermIds) {
         if (pPermIds.length <= 0)
             return [];
-        
+                
         return newSelect("ASYS_PERMISSIONACTIONID", alias)
                 .from("ASYS_PERMISSIONACTION")
                 .whereIfSet("ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID", pPermIds, SqlBuilder.IN())
-                .table(true);
+                .arrayColumn(true);
     }
 
     /**
@@ -145,7 +144,7 @@ function PermissionUtil () {}
     PermissionUtil.getActionDiff = function(pPermId, pActionNew) {
         var actionOld = newSelect("ACTION", alias)
                             .from("ASYS_PERMISSIONACTION")
-                            .whereIfSet("ASYS_PERMISSION_ID", pPermId)
+                            .whereIfSet("ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID", pPermId)
                             .arrayColumn(true);
     
         return arrDiff(actionOld, pActionNew);
@@ -167,7 +166,7 @@ function PermissionUtil () {}
     PermissionUtil.isDiff = function(pId, pString, pDbCol, pDbTable) {
         var stringDb = newSelect(pDbCol, alias)
                             .from(pDbTable)
-                            .whereIfSet(pDbTable + "ID", pId)
+                            .whereIfSet([pDbTable, pDbTable + "ID"], pId)
                             .cell(true);
         return stringDb != pString ? true : false;
     }
@@ -190,7 +189,7 @@ function PermissionUtil () {}
             var cols = [pDbCol];
             var vals = [pValue];
             
-            var cond = new SqlBuilder(alias).whereIfSet(pDbTable + "ID", pId);
+            var cond = new SqlBuilder(alias).whereIfSet([pDbTable, pDbTable + "ID"], pId);
             
             return cond.updateData(true, pDbTable, cols, null, vals)
         }
@@ -198,27 +197,25 @@ function PermissionUtil () {}
     }
 
     /**
-    * Gets the number of permissions which are linked to the given entity-role-combination. 
-    * It is possible to set one parameter to null to get the number of permissions of a role or entity. 
-    * Both parameter null gets the number of all permissions in the system.
- * 
-    * @param {String} pEntityName name of the entity, can be null
- * 
-    * @param {String} pRole name of the role, can be null
-    * 
-    * @result {Integer} returns number of permissions linked to the entity-role-combination.
- */
+     * Gets the number of permissions which are linked to the given entity-role-combination. 
+     * It is possible to set one parameter to null/undefined to get the number of permissions of a role or entity. 
+     * Both parameter null/undefined gets the number of all permissions in the system.
+     *  
+     * @param {String} [pEntityName] name of the entity, can be null
+     * 
+     * @param {String} [pRole] name of the role, can be null
+     * 
+     * @result {Integer} returns number of permissions linked to the entity-role-combination.
+     */
     PermissionUtil.getNumberOfPermissions = function(pEntityName, pRole) {
         return newSelect("COUNT(*)", alias)
                     .from("ASYS_PERMISSIONSET")
-                    .whereIfSet("ENTITY_ID", pEntityName)
-					.andIfSet("ROLE_ID", pRole)
+                    .whereIfSet("ASYS_PERMISSIONSET.ENTITY_ID", pEntityName)
+                    .andIfSet("ASYS_PERMISSIONSET.ROLE_ID", pRole)
                     .cell(true, "0");
     }
 
-// TODO: use SqlBuilder in whole lib (why? --> Prepared statements should be used always)
-
-    /**
+/**
  * Gets the default permission of the root permission set.
  * 
  * @param {String} pPermId id of the permission
@@ -229,122 +226,149 @@ function PermissionUtil () {}
         var parentSet = [PermissionUtil.getParentSet(pPermId)];
 
         while (parentSet[0] != "") {
-            let sqlStr = "select ASYS_PERMISSIONSET_ID, ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET where ASYS_PERMISSIONSETID = '" + parentSet[0] + "'";
-            parentSet = db.array(db.ROW, sqlStr, alias);
+            parentSet = newSelect("ASYS_PERMISSIONSET_ID, ASYS_PERMISSIONSETID", alias)
+                            .from("ASYS_PERMISSIONSET")
+                            .where("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID", parentSet[0])
+                            .arrayRow();
         }
     
         return PermissionUtil.getPermissionWithoutCond(parentSet[1]);
     }
 
     /**
- * Gets the default permission of a given permission set.
- * 
- * @param {String} pSetId id of the permission set
- * 
- * @result {String} returns id of default permission of given set. Never 'null', empty string if there is no result.
- */
+     * get the entity for a specific permissionset.
+     * 
+     * @param {String} pSetId the id of the permission set
+     * 
+     * @return {String} the entity name or an empty string if not found
+     */
+    PermissionUtil._getEntity = function(pSetId) {
+        return newSelect("ENTITY_ID", alias)
+                    .from("ASYS_PERMISSIONSET")
+                    .whereIfSet("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID", pSetId)
+                    .cell(true, "");
+    }
+
+    /**
+     * Gets the default permission of a given permission set.
+     * 
+     * @param {String} pSetId id of the permission set
+     * 
+     * @result {String} returns id of default permission of given set. Never 'null', empty string if there is no result.
+     */
     PermissionUtil.getPermissionWithoutCond = function(pSetId) {
-        var sqlStr = "select ENTITY_ID from ASYS_PERMISSIONSET where ASYS_PERMISSIONSETID = '" + pSetId + "'";
-        var entityName = db.cell(sqlStr, alias);
-        var emptyCond = PermissionUtil.getEmptyCondString(entityName);
-    
-        sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION"
-        + " where ASYS_PERMISSIONSET_ID = '" + pSetId + "'"
-        + " and (COND is null"
-        + " or " + sqlHelper.castLob("ASYS_PERMISSION.COND", 254) + " = '" + emptyCond + "')";
-        
-        return db.cell(sqlStr, alias);
+        var emptyCond = PermissionUtil.getEmptyCondString(PermissionUtil._getEntity(pSetId));
+
+        return newSelect("ASYS_PERMISSIONID", alias)
+                    .from("ASYS_PERMISSION")
+                    .whereIfSet("ASYS_PERMISSION.ASYS_PERMISSIONSET_ID", pSetId)
+                    .and(new SqlBuilder(alias).where()
+                            .or("COND is null")
+                            .or("ASYS_PERMISSION.COND", emptyCond, sqlHelper.castLob("#", 254) +" = ?")
+                    )
+                    .cell();
     }
 
     /**
- * Gets the permissions with conditions of a given permission set.
- * 
- * @param {String} pSetId the id of the permission set
- * 
- * @result {String[]} returns the ids of permissions with conditions of a given permission set. The result can never be null.
- */
+     * Gets the permissions with conditions of a given permission set.
+     * 
+     * @param {String} pSetId the id of the permission set
+     * 
+     * @result {String[]} returns the ids of permissions with conditions of a given permission set. The result can never be null.
+     */
     PermissionUtil.getPermissionWithCond = function(pSetId) {
-        var sqlStr = "select ENTITY_ID from ASYS_PERMISSIONSET where ASYS_PERMISSIONSETID = '" + pSetId + "'";
-        var entityName = db.cell(sqlStr, alias);
-        var emptyCond = PermissionUtil.getEmptyCondString(entityName);
+        var emptyCond = PermissionUtil.getEmptyCondString(PermissionUtil._getEntity(pSetId));
     
-        sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION"
-        + " where ASYS_PERMISSIONSET_ID = '" + pSetId + "'"
-        + " and COND is not null"
-        + " and " + sqlHelper.castLob("ASYS_PERMISSION.COND", 254) + " != '" + emptyCond + "'";
-        return db.table(sqlStr, alias);
+        return newSelect("ASYS_PERMISSIONID", alias)
+                    .from("ASYS_PERMISSION")
+                    .whereIfSet("ASYS_PERMISSION.ASYS_PERMISSIONSET_ID", pSetId)
+                    .and(new SqlBuilder(alias).where()
+                            .or("COND is not null")
+                            .or("ASYS_PERMISSION.COND", emptyCond, sqlHelper.castLob("#", 254) +" != ?")
+                    )
+                    .arrayColumn();
     }
 
     /**
- * Gets the permission set id of a given role-entity-accesstype-combination.
- * 
- * @param {String} pRole name of the role
- * 
- * @param {String} pEntity name of the entity
- * 
- * @param {String} pAccessType name of the access type (E,R,F)
- * 
- * @param {String} pField name of the field
- * 
- * @result {String} returns id of the matching permission set. The result can never be null.
- */
+     * Gets the permission set id of a given role-entity-accesstype-combination.
+     * 
+     * @param {String} pRole name of the role
+     * 
+     * @param {String} pEntity name of the entity
+     * 
+     * @param {String} pAccessType name of the access type (E,R,F)
+     * 
+     * @param {String} [pField] name of the field
+     * 
+     * @result {String} returns id of the matching permission set. The result can never be null.
+     */
     PermissionUtil.getSet = function(pRole, pEntity, pAccessType, pField) {
-        var sqlStr = "select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET"
-        + " where ROLE_ID = '" + pRole + "' and ENTITY_ID = '" + pEntity + "' and ACCESSTYPE = '" + pAccessType + "'";
-        if (pField != null && pField != "" && pField != undefined) {
-            sqlStr += " and FIELD_ID = '" + pField + "'";
+        
+        var query = newSelect("ASYS_PERMISSIONSETID", alias)
+                        .from("ASYS_PERMISSIONSET")
+                        .where("ASYS_PERMISSIONSET.ROLE_ID", pRole)
+                        .and("ASYS_PERMISSIONSET.ENTITY_ID", pEntity)
+                        .and("ASYS_PERMISSIONSET.ACCESSTYPE", pAccessType);
+        
+        if (pField) {
+            query.and("ASYS_PERMISSIONSET.FIELD_ID", pField)
         }
-        return db.cell(sqlStr, alias);
+        return query.cell();
     }
 
     /**
- * Gets the root permission set of a entity-role-combination.
- * 
- * @param {String} pRole id of a role
- * 
- * @param {String} pEntity id of an entity
- * 
- * @result {String} returns id of the root permission set of the given entity-role-combination. Never 'null', empty string if there is no result.
- */
+     * Gets the root permission set of a entity-role-combination.
+     * 
+     * @param {String} pRole id of a role
+     * 
+     * @param {String} pEntity id of an entity
+     * 
+     * @result {String} returns id of the root permission set of the given entity-role-combination. Never 'null', empty string if there is no result.
+     */
     PermissionUtil.getSetRoot = function(pRole, pEntity) {
-        var sqlStr = "select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET"
-        + " where ROLE_ID = '" + pRole + "' and ENTITY_ID = '" + pEntity +"' and ACCESSTYPE = 'E'";
-        return db.cell(sqlStr, alias);
+        return newSelect("ASYS_PERMISSIONSETID", alias)
+                    .from("ASYS_PERMISSIONSET")
+                    .where("ASYS_PERMISSIONSET.ROLE_ID", pRole)
+                    .and("ASYS_PERMISSIONSET.ENTITY_ID", pEntity)
+                    .and("ASYS_PERMISSIONSET.ACCESSTYPE", "E")
+                    .cell();
     }
 
     /**
- * Gets the parent permission set of a permission.
- * 
- * @param {String} pPermId id of the permission
- * 
- * @result {String} returns id of the parent set of the given permission. Never 'null', empty string if there is no result.
- */
+     * Gets the parent permission set of a permission.
+     * 
+     * @param {String} pPermId id of the permission
+     * 
+     * @result {String} returns id of the parent set of the given permission. Never 'null', empty string if there is no result.
+     */
     PermissionUtil.getParentSet = function(pPermId) {
-        var sqlStr = "select ASYS_PERMISSIONSET_ID from ASYS_PERMISSION"
-        + " where ASYS_PERMISSIONID = '" + pPermId + "'";
-        return db.cell(sqlStr, alias);
+        return newSelect("ASYS_PERMISSIONSET_ID", alias)
+                    .from("ASYS_PERMISSION")
+                    .where("ASYS_PERMISSION.ASYS_PERMISSIONID", pPermId)
+                    .cell();
     }
     
     /**
- * Gets the parent permission set of a set.
- * 
- * @param {String} pSetId id of the permission set
- * 
- * @result {String} returns id of the parent permission set of the given set. Never 'null', empty string if there is no result.
- */
+     * Gets the parent permission set of a set.
+     * 
+     * @param {String} pSetId id of the permission set
+     * 
+     * @result {String} returns id of the parent permission set of the given set. Never 'null', empty string if there is no result.
+     */
     PermissionUtil.getParentSetOfSet = function(pSetId) {
-        var sqlStr = "select ASYS_PERMISSIONSET_ID from ASYS_PERMISSIONSET"
-        + " where ASYS_PERMISSIONSETID = '" + pSetId + "'";
-        return db.cell(sqlStr, alias);
+        return newSelect("ASYS_PERMISSIONSET_ID", alias)
+                    .from("ASYS_PERMISSIONSET")
+                    .where("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID", pSetId)
+                    .cell();
     }
 
     /**
- * Checks if the given permission set has any children left.
- * 
- * @param {String} pSetId id of the permission set
- * 
- * @result {Boolean} returns true if permission set has no children, otherwise false
- */
+     * Checks if the given permission set has any children left.
+     * 
+     * @param {String} pSetId id of the permission set
+     * 
+     * @result {Boolean} returns true if permission set has no children, otherwise false
+     */
     PermissionUtil.setIsEmpty = function(pSetId) {
         var subSets = PermissionUtil.getChildSetsOfSet(pSetId);
         var subPerms = PermissionUtil.getPermissions([pSetId]);
@@ -356,42 +380,48 @@ function PermissionUtil () {}
     }
 
     /**
- * Returns all subordinated permissions of the given permission sets.
- * 
- * @param {String[]} pSetIds ids of the permission sets
- * 
- * @result {String[]} array with ids of all subordinated permissions. The result can never be null.
- */
+     * Returns all subordinated permissions of the given permission sets.
+     * 
+     * @param {String[]} pSetIds ids of the permission sets
+     * 
+     * @result {String[]} array with ids of all subordinated permissions. The result can never be null.
+     */
     PermissionUtil.getPermissions = function(pSetIds) {
-        return db.table("select ASYS_PERMISSIONID from ASYS_PERMISSION where ASYS_PERMISSION.ASYS_PERMISSIONSET_ID in ('" + pSetIds.join("','") + "')", alias);
+        return newSelect("ASYS_PERMISSIONID", alias)
+                    .from("ASYS_PERMISSION")
+                    .whereIfSet("ASYS_PERMISSION.ASYS_PERMISSIONSET_ID", pSetIds, SqlBuilder.IN())
+                    .arrayColumn(true); // returns empty array if pSetIds is an empty array
     }
 
     /**
-    * Returns the condition type of the given permission.
- * 
-    * @param {String} pPermId the id of the permission, mandatory
- * 
-    * @result {String} returns the value of condtype (1 or 0). Never 'null', empty string if there is no result.
- */
+     * Returns the condition type of the given permission.
+     * 
+     * @param {String} pPermId the id of the permission, mandatory
+     * 
+     * @result {String} returns the value of condtype (1 or 0). Never 'null', empty string if there is no result.
+     */
     PermissionUtil.getCondType = function(pPermId) {
-        return db.cell("select CONDTYPE from ASYS_PERMISSION where ASYS_PERMISSION.ASYS_PERMISSIONID = '" + pPermId + "'", alias);
+        return newSelect("CONDTYPE", alias)
+                    .from("ASYS_PERMISSION")
+                    .where("ASYS_PERMISSION.ASYS_PERMISSIONID", pPermId)
+                    .cell();
     }
     
     /**
- * Inserts a new instance of a permission set into ASYS_PERMISSIONSET.
- * 
- * @param {String} pParentPermSetId parent permission set, empty if root node
- * 
- * @param {String} pEntity entity to which the PermissionSet is linked, mandatory
- * 
- * @param {String} pRole Role to which the PermissionSet is linked, mandatory
- * 
- * @param {String} pField Field to which the PermissionSet is linked, empty if no field permission
- * 
- * @param {String} pAccessType Entity, Record or Field (E, R, F), mandatory
- * 
- * @result {Integer} returns id of the inserted permission set
- */
+     * Inserts a new instance of a permission set into ASYS_PERMISSIONSET.
+     * 
+     * @param {String} pParentPermSetId parent permission set, empty if root node
+     * 
+     * @param {String} pEntity entity to which the PermissionSet is linked, mandatory
+     * 
+     * @param {String} pRole Role to which the PermissionSet is linked, mandatory
+     * 
+     * @param {String} pField Field to which the PermissionSet is linked, empty if no field permission
+     * 
+     * @param {String} pAccessType Entity, Record or Field (E, R, F), mandatory
+     * 
+     * @result {Integer} returns id of the inserted permission set
+     */
     PermissionUtil.insertSet = function(pParentPermSetId, pEntity, pRole, pField, pAccessType) {
         var table = "ASYS_PERMISSIONSET";
         var cols = [
@@ -403,24 +433,24 @@ function PermissionUtil () {}
             "ROLE_ID"
         ];
         var setId = util.getNewUUID();
-        var vals = [pAccessType, setId, pParentPermSetId, pEntity, pField, pRole];
+        var vals = [pAccessType, setId, pParentPermSetId, pEntity, pField, pRole]; 
         db.insertData(table, cols, null, vals, alias);
         return setId;
     }
 
     /**
- * Inserts a new instance of a permission into ASYS_PERMISSION.
- * 
- * @param {String} pParentSetId parent permission set, mandatory
- * 
- * @param {String} pCond condition of the permission, empty if no condition
- * 
- * @param {String} pCondType condition Type of the permission, should nearly always be "true"
- * 
- * @param {String} pPermId id of the new permission (can be empty/null)
- * 
- * @result {Integer} returns id of the inserted permission
- */
+     * Inserts a new instance of a permission into ASYS_PERMISSION.
+     * 
+     * @param {String} pParentSetId parent permission set, mandatory
+     * 
+     * @param {String} pCond condition of the permission, empty if no condition
+     * 
+     * @param {String} pCondType condition Type of the permission, should nearly always be "true"
+     * 
+     * @param {String} pPermId id of the new permission (can be empty/null)
+     * 
+     * @result {Integer} returns id of the inserted permission
+     */
     PermissionUtil.insertPermission = function(pParentSetId, pCond, pCondType, pPermId) {
         var table = "ASYS_PERMISSION";
         var cols = [
@@ -441,16 +471,16 @@ function PermissionUtil () {}
     }
 
     /**
- * Inserts a new instance of a permission action into ASYS_PERMISSIONACTION.
- * 
- * @param {String} pParentPermId parent permission, mandatory
- * 
- * @param {String} pAction title of action (view, create,...), mandatory
- * 
- * @param {String} pActionId id of the new permission action
- * 
- * @result {Integer} returns id of the inserted permission action, returns null if insert was not possible
- */
+     * Inserts a new instance of a permission action into ASYS_PERMISSIONACTION.
+     * 
+     * @param {String} pParentPermId parent permission, mandatory
+     * 
+     * @param {String} pAction title of action (view, create,...), mandatory
+     * 
+     * @param {String} pActionId id of the new permission action
+     * 
+     * @result {Integer} returns id of the inserted permission action, returns null if insert was not possible
+     */
     PermissionUtil.insertAction = function(pParentPermId, pAction, pActionId) {
         var table = "ASYS_PERMISSIONACTION";
         var cols = [
@@ -458,10 +488,14 @@ function PermissionUtil () {}
             "ASYS_PERMISSIONACTIONID",
             "ASYS_PERMISSION_ID"
         ];
+        
+        var actionNotExists = newSelect("ASYS_PERMISSIONACTIONID", alias)
+                                        .from("ASYS_PERMISSIONACTION")
+                                        .whereIfSet("ASYS_PERMISSIONACTION.ASYS_PERMISSIONACTIONID", pActionId)
+                                        .cell(true) == "";
+                                        
         var actionId;
-        var sqlStr = "select ASYS_PERMISSIONACTIONID from ASYS_PERMISSIONACTION where ASYS_PERMISSIONACTIONID = '" + pActionId + "'";
-
-        if (pActionId != null & pActionId != "" && pActionId != undefined && db.cell(sqlStr, alias) == "") {
+        if (pActionId != null & pActionId != "" && pActionId != undefined && actionNotExists) {
             actionId = pActionId;
         } else {
             actionId = util.getNewUUID(); // if same id is already in db -> create new UID
@@ -481,9 +515,10 @@ function PermissionUtil () {}
      * @result {String} returns the condition of a permission
      */
     PermissionUtil.getCond = function(pPermId) {
-        var table = "ASYS_PERMISSION";
-        var sqlStr = "select COND from " + table + " where ASYS_PERMISSIONID = '" + pPermId + "'";
-        return db.cell(sqlStr, alias);
+        return newSelect("COND", alias)
+                    .from("ASYS_PERMISSION")
+                    .where("ASYS_PERMISSION.ASYS_PERMISSIONID", pPermId)
+                    .cell();
     }
 
     /**
@@ -494,12 +529,12 @@ function PermissionUtil () {}
      * @result {Boolean} true if permission exists, otherwise false
      */
     PermissionUtil.permissionExists = function(pPermId) {
-        var table = "ASYS_PERMISSION";
-        var sqlStr = "select COUNT(*) from " + table + " where ASYS_PERMISSIONID = '" + pPermId + "'";
-        if (db.cell(sqlStr, alias) != "0") {
-            return true;
-        }
-        return false;
+        var permissionCount = newSelect("COUNT(*)", alias)
+                                .from("ASYS_PERMISSION")
+                                .whereIfSet("ASYS_PERMISSION.ASYS_PERMISSIONID", pPermId)
+                                .cell(true, "0");
+        
+        return permissionCount != "0";
     }
 
     /**
@@ -512,11 +547,13 @@ function PermissionUtil () {}
      * @result {Boolean} true if action exists, otherwise false
      */
     PermissionUtil.actionExists = function(pAction, pPermId) {
-        var sqlStr = "select COUNT(*) from ASYS_PERMISSIONACTION where ACTION = '" + pAction + "' and ASYS_PERMISSION_ID = '" + pPermId + "'";
-        if (db.cell(sqlStr, alias) != "0") {
-            return true;
-        }
-        return false;
+        var permissionActionCount = newSelect("COUNT(*)", alias)
+                                .from("ASYS_PERMISSIONACTION")
+                                .where("ASYS_PERMISSIONACTION.ACTION", pAction)
+                                .and("ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID", pPermId)
+                                .cell();
+
+        return permissionActionCount != 0;
     }
 
     /**
@@ -538,36 +575,39 @@ function PermissionUtil () {}
      *
      */
     PermissionUtil.getPermission = function(pRole, pEntity, pField, pAccesstype, pCondition, pCondtype) {
-        var sqlStr = "";
-        var sqlExt = "";
+        var permissionSelect = newSelect("ASYS_PERMISSION.ASYS_PERMISSIONID", alias)
+                                    .from("ASYS_PERMISSIONSET")
+                                    .join("ASYS_PERMISSION",  "ASYS_PERMISSION.ASYS_PERMISSIONSET_ID = ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID")
+                                    .where("ASYS_PERMISSIONSET.ENTITY_ID", pEntity)
+                                    .and("ASYS_PERMISSIONSET.ROLE_ID", pRole)
+                                    .and("ASYS_PERMISSIONSET.ACCESSTYPE", pAccesstype)
+
         var emptyCond = PermissionUtil.getEmptyCondString(pEntity);
     
         if (checkInput([pCondition])) {
             if (pCondition == emptyCond) {
-                sqlExt += " and (" + sqlHelper.castLob("ASYS_PERMISSION.COND", 254) + " = '" + emptyCond + "' or COND is null)";
+                permissionSelect.and(new SqlBuilder(alias).where()
+                                        .or("ASYS_PERMISSION.COND", emptyCond, sqlHelper.castLob("#", 254) + " = ?")
+                                        .or("COND is null")
+                                    );
             } else {
                 // SqlMaskingUtils.castLob causes an error in this case (at least on derby-db)
                 // derby-db max size of char is 254 and castLob casts to char first, then to varchar
                 // size of a condition varies and can be bigger than 254
                 // this can cause errors on DBMS with small varchar max size
-                sqlExt += " and cast(ASYS_PERMISSION.COND as varchar(" + pCondition.length + ")) = '" + pCondition + "'";
+                permissionSelect.and("ASYS_PERMISSION.COND", pCondition, "# as varchar(" + pCondition.length + ") = ?")
             }
         }
     
         if (checkInput([pField])) {
-            sqlExt += " and FIELD_ID = '" + pField + "'";
+            permissionSelect.and("ASYS_PERMISSIONSET.FIELD_ID", pField)
         }
     
         if (checkInput([pCondtype])) {
-            sqlExt += " and CONDTYPE = " + pCondtype + "";
+            permissionSelect.and("ASYS_PERMISSION.CONDTYPE", pCondtype)
         }
-    
-        sqlStr = "select ASYS_PERMISSION.ASYS_PERMISSIONID from ASYS_PERMISSIONSET"
-        + " join ASYS_PERMISSION on ASYS_PERMISSION.ASYS_PERMISSIONSET_ID = ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID"
-        + " where ENTITY_ID = '" + pEntity + "' and ROLE_ID = '" + pRole + "'"
-        + " and ACCESSTYPE = '" + pAccesstype + "'" + sqlExt;
-        var permId = db.cell(sqlStr, alias);
-        return permId;
+
+        return permissionSelect.cell();
     }
 
     /**
@@ -578,9 +618,8 @@ function PermissionUtil () {}
      * @result {Integer} returns number of deleted records
      */
     PermissionUtil.deleteAction = function(pActionId) {
-        var table = "ASYS_PERMISSIONACTION";
-        var cond = " ASYS_PERMISSIONACTIONID = '" + pActionId + "'";
-        return db.deleteData(table, cond, alias);
+        return newWhereIfSet("ASYS_PERMISSIONACTION.ASYS_PERMISSIONACTIONID", pActionId, undefined, undefined, alias)
+                 .deleteData(true, "ASYS_PERMISSIONACTION");
     }
     
 } //end of block
diff --git a/process/ctiServerEvents/process.js b/process/ctiServerEvents/process.js
index dd4304b26befdea3f4a230ff65bdbc6f558d0620..d199d0b8378b703cd78a1fc2a8c5ccd44f9a49da 100644
--- a/process/ctiServerEvents/process.js
+++ b/process/ctiServerEvents/process.js
@@ -91,8 +91,7 @@ var disconnectingHandlerFn = function()
     if (lastCallData.length == 0)
         return null;
 
-    var lastAnswermode, callBeginTime;
-    [lastAnswermode, callBeginTime] = lastCallData
+    var [lastAnswermode, callBeginTime] = lastCallData
     var isMissedCall = lastAnswermode == "" || lastAnswermode == $KeywordRegistry.callAnswerMode$missed();//no TALKING state was called -> this means that the call has been missed
 
     var cols = ["DATE_EDIT"];