Atlas improves upon typical visualizations such as spreadsheets or swimlane type process maps to present data in an easily digestible, organized way. Atlas depicts the flow of data from system to system and entity to entity in a graphical format, with additional metadata attached to each step. Users can follow processing activities graphically, through text descriptions of each step, or in any combination. You can also modify maps through drag-and-drop or text-based methods, for example zooming in on certain parts of a process map or re-organizing it to group the steps in a way that works for you.
No matter how large your complete body of data processing maps and activities is, Atlas always makes it easy to search on multiple attributes and tags to find exactly the information you need to visualize.
Atlas 6 offers multiple ways to spot, analyze, and address risk. Whether risk comes from policy violations, new regulations, new vulnerabilities, or anything else, Atlas can help you detect risk and take appropriate actions.
Your policies and procedures are meant to protect your organization and reduce risk. Atlas can detect deviations from the expected processing activities and alert you when it finds unsanctioned results. For example, data following an unauthorized path or unexpected data sets in use could lead to alerts that you can respond to, reducing risk. You can use Atlas to track data risk, such as product or vendor related, regulatory, or other. Atlas can also quickly identify all your processing activities that use a tool or vendor impacted by a new vulnerability or breach, as well as activities impacted by a new data protection law.
Whatever Personal Information your organization collects and processes, your use of this information is subject to limitations such as requiring a Lawful Basis under GDPR. Elsewhere, your data uses may be limited by your disclosures and promises to consumers. Because use limitations follow your data, you need to know your data’s provenance and history to know what you can use it for.
Atlas makes it easy to trace the source of your data and what your organization is using it for. When you display your processing activities and data flows graphically with Atlas, you can trace your the path from collection through use, sharing, storage, and disposal. You can easily see unauthorized uses that exceed your permitted purposes and respond appropriately. In addition to viewing uses and data flows in graphical form, the additional metadata associated with each data set or processing and customizable tags can track other use limitation factors for you.
Multiple stakeholders have an interest in maintaining controller and compliant data flows. For security personnel, controlling data flows can limit attack surface and exposure to vulnerabilities. Companies also need to restrict data usage to comply with their stated purposes of processing, to protect company IP or competitive secrets or comply with contractual obligations or licensing agreements.The customizable data maps in Atlas make it easy for you to track your actual reported data flows and note any instances of noncompliance. In addition, you can tell Atlas your expected data flows and other attributes of your processing activities and set alerts for when unexpected processing activities are found.