Core Use Cases Flashcards
Correlation
Identify and orrelate Entity
Relationships Across Data
Stores
Classification
Find Data By Its Pattern, Metadata, Type and Context
Cluster Analysis
Find Similar and Derivative Files With File Clustering
Catalog
Catalog Data Elements With
Metadata
Policies
Monitor and Alert on Privacy Policy Violations and
Anomalies
Access Requests
Fulfill CCPA and GDPR Data Rights Requests Automatically
Business Flows
Automate GDPR Data Record Keeping and CCPA 3 rd -Party Sharing
Consent and Agreements
Centrally Govern and Track
Decentralized Consent Logs
Risk
Manage and Action Data Residency and Privacy Risk.
Get 360° View of Data-at-risk
via Identifiability, Residency,
Type, Usage, Consent,
Purpose-of-use
Breach Response
Simplify Breach Response
Investigation
Access Intelligence
▪ Identify PI objects, files and data sources with open
access permissions to drive prioritization for security and
privacy compliance
▪ Addresses GDPR Articles 5 and 24 for ensuring adequate security measures - as well as liability under CCPA for maintaining ‘adequate
security features’
Inventory
Inventory, Classify and Map Personal Data By Category,
Data Source, Location and
App
Document Classification
Classify Documents by Type.
AI-Driven Classification of
Whole Documents by Their Content, Grouping Them
Under Known Types
Trigger Deletion Requests
Initiate Deletion Workflow for Right-to-be-Forgotten
Access Requests
Customize Customer-Facing
Data Reports