
Why use our Data Flow Mapping Tool?
Personal data.
Every organisation uses it. But it’s how you use it and what you do with it that’s important.
Since the GDPR has come into force there is now more pressure than ever to understand how data is processed.
Designed to help you achieve GDPR compliance, our Data Flow Mapping Tool simplifies the data mapping process, offering you full visibility.
Easy-to-use
Using the tool will simplify how you map data flows, giving you more time to spend on identifying and resolving data protection issues.
It features a simple toolbar to create and edit maps, a user-friendly interface and a helpful tutorial to guide you round the tool.
Geared for repeatability
Data flow maps created with the tool can be easily reviewed, edited and updated by multiple people as your organisation evolves.
Creating data flow maps should become a standard part of proposing and setting up any projects or processes that will involve personal data.
Logs personal data item
Log details of the personal data items involved in a process and generate an inventory of personal data.
You can specify what the lawful basis for processing is, the types of personal data you are processing and the categories of data subjects.
Generates data flow reports
Generate a version-controlled data flow report that compiles information from your data flow map in an easy-to-read format to share with stakeholders.
You can update the process map and details whenever changes are made to the process.
Embeds data protection by design
Data flow mapping is essential for organisations seeking to embed data protection by design and by default into their processes.
Doing so means that processes are geared towards data protection from the beginning.
Gives optional access to security controls
The Data Flow Mapping Tool integrates with Compliance Manager, so you can record what security controls have been applied to a process.
You can also use this integration to keep track of whether a process is governed by specific regulatory, statutory or contractual requirements.
Jeffrey S. Cochran
Information Security Manager, Thompsons Online Benefits
By the way, this vsRisk package rocks!
I do very much like how it is laid out and operates. This is just what I needed.