Skip to content
English
  • There are no suggestions because the search field is empty.

Introduction to Wired Relations

- a helicopter view of the system

Introduction

Welcome to Wired Relations. Whether it's your first of hundredth time here it's always nice to get a reminder of what each area is for. Therefore I've here written a short description of what every area of Wired Relations is for.

Core product

Dashboard
Get an overview of how far you are in the mapping of data in Wired Relations. And see how your tasks are spread out throughout the next 12 months.

Systems
Map all systems, where you store data, and build out your annual cycle of tasks maintaining and deleting the data.

Vendors
Map out all of your vendors, including data processors. Make sure you have up to date data processing agreements with all of them, and manage your auditing of those vendors.

Manage which vendors have third country transfers and your legal basis for these.

Processing activities
The meat and bones of the system is your Records of Processing Activities. Keep a constant overview of how you process data, and make it into a living document.

Task Manager
Your complete overview of every task, whether recurring or ad hoc.

Delegate tasks to decentralize Privacy and information security.

Additional Functionality

See our pricing page for what plans include what functionality, or whether the module will be an additional charge on your subscription.

Risk assessments
Create and manage risks for the data subject and your organisation. Track and document your risk mitigation.

Incident manager (data breaches)
Log all data breaches you experience so you're able to identify patterns across incidents.

Customers
With the Customers module you can map out those of your customers with which you have data processing agreements (and you're the data processor).

From here you can also keep track of any exceptional conditions beyond the terms in your standard data processing agreement.

DPIA
Document your DPIA's and make them into living documentation. Connect it with all other relevant information in Wired Relations.

TIA
Document your TIA's and make them into living documentation.Connect it with all other relevant information in Wired Relations.

Request log
Keep a log of every request you receive from data subjects such that it serves as documentation.

Security incidents
Keep a log of security incidents you experience, and see patterns across so you're able to implement appropriate security measures.

Governance
Manage any standard you follow such as NIS2, CIS18, ISAE 3000, ISO 27001/2 or 27701.

Track you progress in the implementation, and build out reporting relevant parties.