![]() They're all shown directly in the contact's record alongside their other data. ![]() Never go looking for a contact's consents. Let contacts manage their consentsĬontacts can return to their preferences page at any time to change their consents, freeing up your employees up from having to act as an intermediary. This saves your employees time making the request and maximizes your contacts' likelihood of consenting. Automatic, just-in-time consent requestsĪutomatically request consent the moment it's needed. Customize this page to let them control their communication preferences and provide consents for data storage, usage, tracking, and other purposes. Let your contacts control their privacy preferences from their preferences page - accessible in an emailed link. Use consent as a lawful basis for processing Easily investigate access with audit trailsĪll attempts to un-obfuscate sensitive data are logged and searchable in the audit tool, facilitating and accelerating investigations into data misuse. Restrict access to sensitive dataĬontrol which users have permission to un-obfuscate sensitive data fields, minimizing the risk of potential misuse. Users can still use these fields to verify contacts' identities, without exposing the full value to the risk of misuse. Partially obfuscate the default view of sensitive data fields, such as only showing the last 4-digits of a credit card number. This minimizes their risk of loss to intrusion, reduces potential legal penalties, and lessens legal disclosure requirements in the event of certain losses. Encrypt, obfuscate, and control access to data fields you mark as sensitive.Įncrypt fields holding sensitive data, such as a national ID number or credit card number.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |