The Data Privacy Management Tool provides an efficient and effective means to administer data privacy regulations, such as the European General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and Brazil’s General Data Protection law (LGPD).
K2View’s DPM tool provides a flexible system that allows a company to define data request types for the regulations affecting the company’s use of customer data, the processes, and flows for how data is tasked to completion to fulfill regulations compliant to one or more data privacy regulators.
Admin module: The Admin module is used by the DPM Administrator for the tool configuration. The Administrator defines all DPM aspects, such as the supported regulations, the types of requests allowed for each regulation, the task flow required to fulfill each request, and customer consent configuration.
Data subject requests and consent management: Role-based components that serve different users, including:
The preceding role-based components cover the end-to-end life cycle of data privacy-related requests, including:
The Data Privacy Management Tool provides an efficient and effective means to administer data privacy regulations, such as the European General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and Brazil’s General Data Protection law (LGPD).
K2View’s DPM tool provides a flexible system that allows a company to define data request types for the regulations affecting the company’s use of customer data, the processes, and flows for how data is tasked to completion to fulfill regulations compliant to one or more data privacy regulators.
Admin module: The Admin module is used by the DPM Administrator for the tool configuration. The Administrator defines all DPM aspects, such as the supported regulations, the types of requests allowed for each regulation, the task flow required to fulfill each request, and customer consent configuration.
Data subject requests and consent management: Role-based components that serve different users, including:
The preceding role-based components cover the end-to-end life cycle of data privacy-related requests, including: