AI-based solution designed to automate personal data discovery and classification
Discover personal data across multiple systems in the cloud or on-premise
Turn data subjects request into an automated workflow with a clear insight into data every step of the way
Collaborate with stakeholders and manage DPIA and LIA in real-time with Assessment Automation
Privacy portal allows customers to communicate their requests and preferences at any time
Introducing end-to end automation of personal data removal

Latest Blog posts

Learn the terms

General Data Protection Regulation

Here you can find the official content of the Regulation (EU) 2016/679 (General Data Protection Regulation) in the current version. All Articles of the GDPR are linked with suitable recitals.

Latest papers

Access Control

Access control is a security measure that is used to regulate who is authorized to access certain resources, systems, or physical areas.

It involves controlling the access to information or resources by enforcing policies and procedures to grant or deny permission to authorized individuals or entities. Access control is used to protect sensitive data and assets from unauthorized access, theft, or damage.

Access control can be implemented in different ways, such as physical access control, which regulates entry to buildings or rooms, and logical access control, which controls access to digital resources and systems. Logical access control is commonly implemented through authentication mechanisms like passwords, biometric scanning, or smart cards.

Authorization processes can also be used to ensure that users only have access to the resources that they are authorized to access, based on their role, job function, or security clearance level.

Access control is a critical component of information security, and it is important for organizations to implement access control measures that align with their security requirements and compliance obligations.

Proper access control can help organizations prevent unauthorized access to sensitive data, minimize the risk of data breaches, and protect their reputation and brand image.

All glossaries
  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • Glossaries
  • H
  • I
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
Scroll to Top