Get Started. It's Free
or sign up with your email address
Rocket clouds
PIXEL by Mind Map: PIXEL

1. PDI scanning

1.1. Structured

1.1.1. Marketing

1.1.2. Consumer

1.1.3. Risk and Ops

1.1.4. PDW

1.1.5. Adjacencies

1.1.6. Cloud

1.1.7. PayPal APIs

1.2. Unstructured

1.2.1. E-Mail

1.2.2. Case Memo

1.2.3. Non-English

1.2.4. Voice Transcripts

1.2.5. Trans Memos & Msgs

1.2.6. Documents & Images

1.3. Metrics

1.4. Expand to non sensitive data

1.5. Adjacencies

2. Lineage

2.1. Structured

2.1.1. Rule Modeling

2.1.2. Cryptoserv Prefix

2.1.3. PDW

2.1.4. Subsidaries

2.1.5. FI

2.1.6. Axon

2.1.7. DQ for data consistency

2.1.8. Enterprise lineage scanning and automation

2.1.9. EIC for more classifiers

2.1.10. App tag. Prod/App catalogue

2.1.11. Detecting Data Protection

2.1.12. Addition of Hirton/Stampy

2.1.13. Automate EDC Metadata

2.1.14. API - DB mapping

2.1.15. TPA

3. Data Subject Profile

3.1. Customer Master

3.1.1. 15 Attributes

3.1.2. Social Media

3.1.3. Subsidaries

3.1.4. Employee Data

3.1.5. Lithium

3.2. Consents

3.2.1. Marketing

3.2.2. Personalization

3.2.3. Cookie Mgmt

3.2.4. Non-Core Products

3.2.5. Third Party

3.2.6. Legitimate Interest

3.2.7. Core Products

3.2.8. Metrics

3.2.9. SMS, Voice, Paper Channel

3.2.10. More Non Core products

3.2.11. Merchant Procuts

3.2.12. Marketing pref for merchants

3.2.13. New countries

3.2.14. Consent externalization

3.2.15. Centralize all campaign systems

3.2.16. Identify and maintain consents from adjacencies

3.2.17. Un-subscription of data from UNP

4. TPA

4.1. Systematic solution to identify PII

4.2. Identify 10 high risk vendors

4.3. Pii spread across region/state

5. Process Registry

5.1. Risk and Ops

5.2. Process - DBs mapping

5.3. Wildcard & Dynamic search

5.4. UI enhancements

5.5. Metrics

5.6. Apps - DB for all functional areas

5.7. TIP Risks & setup alert

5.8. Automate PR to PDI

5.9. File download option

5.10. Hierarchical view

5.11. Process Search

6. Data Protection

6.1. SPDR Infosec scanning results

7. Data Curation

7.1. Reduce False +ves

8. Metrics

9. Agreement Templates

10. Breach Mgmt

10.1. IM Systems

10.2. Multi Tenant Arch

10.3. Dememsto Incidents

10.4. Privacy Impact Assessment

11. Data Access Rights

11.1. Understand

11.2. Data elements

11.3. Operational Cockpit

11.4. Trans Data

11.5. Service Oriented Arch

11.6. Metrics

11.7. Data Rendering to Customers

12. Data Deletion

13. Data Leakage

13.1. Linking consent data with outgoing comms

14. Data Validation

14.1. Better Classifier Results

14.2. Cleansed Dara

15. Investigative Cockpit

15.1. Interactive Investigation in BI platforms

15.2. Data Migration to TD

15.3. ZOOMData

15.4. Visual Gadgets for UI

16. Permissions Cockpit

17. Reporting Cockpit

18. Risks

18.1. Low

18.2. Medium

18.3. High

18.4. Risk score derivation

18.5. TIP Risks

19. Data Subject Rights

19.1. Access DAR

19.2. Data Eraser

19.3. Rectify Data

19.4. Restrict Data

19.5. Port Data

20. Incident/Issue Mgmt

21. RIG Assessment

22. Privacy Dashboard

22.1. PIA - Privacy Impact Assessment

22.2. CNI - Customer complaints and queries

22.3. PBM - Privacy Breach Mgmt

22.4. Socialization Tracker

23. Phase 1

24. Phase 2