Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Subject Access Request (SAR) Registry Tool

Use this tool as a starting point to track all types of subject access requests throughout the process.

HID Now Supports Seos-Enabled Student IDs in Apple Wallet

HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users...

VMware Acquires Carbon Black for $2.1 Billion

VMware acquires Carbon Black, a cloud-based endpoint protection solution, at $26 per share, representing an enterprise value of $2.1 billion.

Security Incident Metrics Tool

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us