Differenze tra le versioni di "Data Sources"
(7 versioni intermedie di uno stesso utente non sono mostrate) | |||
Riga 16: | Riga 16: | ||
|- | |- | ||
− | |Access | + | |Access Request Types|| It contains the information about the type of ''[[Glossary|subject access request]]'' |
+ | |||
+ | |- | ||
+ | |Action Types|| It contains the information about the type of ''[[Glossary|action]]'' | ||
+ | |||
+ | |- | ||
+ | |Channels|| It contains the possible communication channels (e.g. to communicate the results of a ''[[Glossary|subject access request]]'') | ||
+ | |||
+ | |- | ||
+ | |Consent Categories|| It contains the categories of consents (e.g. consent to send commercial information) | ||
+ | |||
+ | |- | ||
+ | |Consent Sources|| It contains possible sources of consents (e.g. website subscription) | ||
+ | |||
+ | |- | ||
+ | |Consent Subjects|| It contains the person information (e.g. name, address) the consent refers to | ||
+ | |||
+ | |- | ||
+ | |Data Locations|| It contains locations where data van be stored (e.g. a specific Data Center in a specific city) | ||
+ | |||
+ | |- | ||
+ | |Data Processing Purposes|| It contains the possible purposes for data processing (e.g. customer satisfaction analysis) | ||
+ | |||
+ | |- | ||
+ | |Data Repositories|| It contains the possible data repositories (e.g. a sql database) | ||
+ | |||
+ | |- | ||
+ | |Data Subjects|| It contains the possible categories of data subjects (e.g. employees, clients) | ||
+ | |||
+ | |- | ||
+ | |Data Types|| It contains the possible categories of data which are processed (e.g. identification data) | ||
|- | |- | ||
− | | | + | |Extra EU Measures|| It contains the possible categories of risk mitigation measures when data are processed out of EU countries |
|- | |- | ||
Riga 26: | Riga 56: | ||
|- | |- | ||
|Processors/Controllers Officers|| It contains the data processors and data controllers referents information (e.g. name, mail, etc.) | |Processors/Controllers Officers|| It contains the data processors and data controllers referents information (e.g. name, mail, etc.) | ||
+ | |||
+ | |- | ||
+ | |Issue Types|| It contains the types of issues (e.g. a non conformity or a generic issue) | ||
+ | |||
+ | |- | ||
+ | |Lawful Basis for Processing|| It contains the list of the possible lawful basis justifying data processing | ||
+ | |||
+ | |- | ||
+ | |PIA Reference Periods|| It contains the periods to which a ''processing impact assessment'' can refer to | ||
+ | |||
+ | |- | ||
+ | |Processing Activities|| It contains the list of categorized processing activities | ||
+ | |||
+ | |- | ||
+ | |Provision Agreements|| It contains the list of the type of provision agreements used for applications, connections, devices and repositories used to support the processing activities | ||
+ | |||
+ | |- | ||
+ | |Recipients|| It contains the list of the recipients of personnel data in the scope of the processing activities (e.g. an internal department, external suppliers, etc.) | ||
+ | |||
+ | |- | ||
+ | |Relationships to Data Subject|| It contains the list of the possible relationships between the representative of the data subject and the data subject (''this relationship is used in the subject access requests'') | ||
+ | |||
+ | |- | ||
+ | |Result Notification Methods|| It contains the list of the method which can be used to notify the results of a ''subject access request'' | ||
+ | |||
+ | |- | ||
+ | |Risk Impacts|| It contains the levels (qualitative) for the impact of a risk (e.g. low, medium, high) | ||
+ | |||
+ | |- | ||
+ | |Risk Impacts|| It contains the levels(qualitative) for the probability of a risk (e.g. low, medium, high) | ||
+ | |||
+ | |- | ||
+ | |Risk Scores|| It contains the levels (qualitative) for the evaluation (score) of a risk (e.g. low, medium, high) | ||
+ | |||
+ | |- | ||
+ | |Suppliers|| It contains the list of suppliers | ||
+ | |||
+ | |- | ||
+ | |Types of Breach|| It contains the possible types (a categorization) of the breaches (e.g. hacking) | ||
|} | |} | ||
− | ''Data sources'' content is initialized when the Privacy- | + | ''Data sources'' content is initialized when the Privacy-Now® environment is provisioned. The contents can be modified directly in the records where the ''Data sources'' are used or via ''[[Settings|Settings]]'' by authorized users (see ''[[Users|Users]]''). |
Versione attuale delle 17:00, 4 giu 2018
Data sources are set of information that can be used to populate the fields of Privacy-Now®.
The following is a list of the "data sources" used:
Data Source Name | Description |
---|---|
Access Applications | It contains the information about the (sw) applications used to access data |
Access Connections | It contains the information about the connections (e.g. WAN, LAN) used to access data |
Access Devices | It contains the information about the devices (e.g. PCs, tablets) used to access data |
Access Request Types | It contains the information about the type of subject access request |
Action Types | It contains the information about the type of action |
Channels | It contains the possible communication channels (e.g. to communicate the results of a subject access request) |
Consent Categories | It contains the categories of consents (e.g. consent to send commercial information) |
Consent Sources | It contains possible sources of consents (e.g. website subscription) |
Consent Subjects | It contains the person information (e.g. name, address) the consent refers to |
Data Locations | It contains locations where data van be stored (e.g. a specific Data Center in a specific city) |
Data Processing Purposes | It contains the possible purposes for data processing (e.g. customer satisfaction analysis) |
Data Repositories | It contains the possible data repositories (e.g. a sql database) |
Data Subjects | It contains the possible categories of data subjects (e.g. employees, clients) |
Data Types | It contains the possible categories of data which are processed (e.g. identification data) |
Extra EU Measures | It contains the possible categories of risk mitigation measures when data are processed out of EU countries |
Processors/Controllers Entities | It contains the data processors and data controllers information (e.g. name, address, country, etc.) |
Processors/Controllers Officers | It contains the data processors and data controllers referents information (e.g. name, mail, etc.) |
Issue Types | It contains the types of issues (e.g. a non conformity or a generic issue) |
Lawful Basis for Processing | It contains the list of the possible lawful basis justifying data processing |
PIA Reference Periods | It contains the periods to which a processing impact assessment can refer to |
Processing Activities | It contains the list of categorized processing activities |
Provision Agreements | It contains the list of the type of provision agreements used for applications, connections, devices and repositories used to support the processing activities |
Recipients | It contains the list of the recipients of personnel data in the scope of the processing activities (e.g. an internal department, external suppliers, etc.) |
Relationships to Data Subject | It contains the list of the possible relationships between the representative of the data subject and the data subject (this relationship is used in the subject access requests) |
Result Notification Methods | It contains the list of the method which can be used to notify the results of a subject access request |
Risk Impacts | It contains the levels (qualitative) for the impact of a risk (e.g. low, medium, high) |
Risk Impacts | It contains the levels(qualitative) for the probability of a risk (e.g. low, medium, high) |
Risk Scores | It contains the levels (qualitative) for the evaluation (score) of a risk (e.g. low, medium, high) |
Suppliers | It contains the list of suppliers |
Types of Breach | It contains the possible types (a categorization) of the breaches (e.g. hacking) |
Data sources content is initialized when the Privacy-Now® environment is provisioned. The contents can be modified directly in the records where the Data sources are used or via Settings by authorized users (see Users).