Differenze tra le versioni di "Data Sources"
| Riga 43: | Riga 43: | ||
|- | |- | ||
| − | |Data Subjects|| It contains | + | |Data Subjects|| It contains the possible categories of data subjects (e.g. employees, clients) |
|- | |- | ||
| − | |Data Types|| It contains | + | |Data Types|| It contains the possible categories of data which are processed (e.g. identification data) |
| + | |||
| + | |- | ||
| + | |Extra EU Measures|| It contains the possible categories of risk mitigation measures when data are processed out of EU countries | ||
|- | |- | ||
Versione attuale delle 17:00, 4 giu 2018
Data sources are set of information that can be used to populate the fields of Privacy-Now®.
The following is a list of the "data sources" used:
| Data Source Name | Description |
|---|---|
| Access Applications | It contains the information about the (sw) applications used to access data |
| Access Connections | It contains the information about the connections (e.g. WAN, LAN) used to access data |
| Access Devices | It contains the information about the devices (e.g. PCs, tablets) used to access data |
| Access Request Types | It contains the information about the type of subject access request |
| Action Types | It contains the information about the type of action |
| Channels | It contains the possible communication channels (e.g. to communicate the results of a subject access request) |
| Consent Categories | It contains the categories of consents (e.g. consent to send commercial information) |
| Consent Sources | It contains possible sources of consents (e.g. website subscription) |
| Consent Subjects | It contains the person information (e.g. name, address) the consent refers to |
| Data Locations | It contains locations where data van be stored (e.g. a specific Data Center in a specific city) |
| Data Processing Purposes | It contains the possible purposes for data processing (e.g. customer satisfaction analysis) |
| Data Repositories | It contains the possible data repositories (e.g. a sql database) |
| Data Subjects | It contains the possible categories of data subjects (e.g. employees, clients) |
| Data Types | It contains the possible categories of data which are processed (e.g. identification data) |
| Extra EU Measures | It contains the possible categories of risk mitigation measures when data are processed out of EU countries |
| Processors/Controllers Entities | It contains the data processors and data controllers information (e.g. name, address, country, etc.) |
| Processors/Controllers Officers | It contains the data processors and data controllers referents information (e.g. name, mail, etc.) |
| Issue Types | It contains the types of issues (e.g. a non conformity or a generic issue) |
| Lawful Basis for Processing | It contains the list of the possible lawful basis justifying data processing |
| PIA Reference Periods | It contains the periods to which a processing impact assessment can refer to |
| Processing Activities | It contains the list of categorized processing activities |
| Provision Agreements | It contains the list of the type of provision agreements used for applications, connections, devices and repositories used to support the processing activities |
| Recipients | It contains the list of the recipients of personnel data in the scope of the processing activities (e.g. an internal department, external suppliers, etc.) |
| Relationships to Data Subject | It contains the list of the possible relationships between the representative of the data subject and the data subject (this relationship is used in the subject access requests) |
| Result Notification Methods | It contains the list of the method which can be used to notify the results of a subject access request |
| Risk Impacts | It contains the levels (qualitative) for the impact of a risk (e.g. low, medium, high) |
| Risk Impacts | It contains the levels(qualitative) for the probability of a risk (e.g. low, medium, high) |
| Risk Scores | It contains the levels (qualitative) for the evaluation (score) of a risk (e.g. low, medium, high) |
| Suppliers | It contains the list of suppliers |
| Types of Breach | It contains the possible types (a categorization) of the breaches (e.g. hacking) |
Data sources content is initialized when the Privacy-Now® environment is provisioned. The contents can be modified directly in the records where the Data sources are used or via Settings by authorized users (see Users).