Continuous monitoring of network traffic, intrusion detection, and security event analysis.

Data Details
Data Subjects
EmployeesNetwork Users
Data Volume
Continuous data streams
Data Categories
Network Traffic DataIP AddressesProtocol InformationSecurity Events
Processing Type
Analysis
Automated Decision-Making
Yes
Legal Basis
Legal Basis
Legal Obligation
Consent Mechanism
Employee IT Policy acknowledgement
Purpose
Detecting and preventing cybersecurity threats, protecting organizational systems and data.
Legal Basis Detail
NCA ECC Cybersecurity Framework mandatory controls, NCA OT Cybersecurity Controls.
Recipients & Transfers
Internal Recipients
IT SecurityCISOIncident Response Team
External Recipients
Managed Security Service Provider (SA)
Retention & Security
Retention Period
12 months for standard logs, 5 years for security incidents
Retention Justification
Security Measures
✓ SOC/SIEM Integration✓ Intrusion Detection System✓ Automated Threat Response✓ Encrypted Log Storage
PDPL Compliance Assessment
Update →
D1 Data Subject Rights & Consent
80%
Compliant

All requirements for Data Subject Rights & Consent are met. Documentation is complete and up to date.

D2 Processing Principles & Lawful Basis
88%
Compliant

All requirements for Processing Principles & Lawful Basis are met. Documentation is complete and up to date.

D3 Data Protection & Security
96%
Compliant

All requirements for Data Protection & Security are met. Documentation is complete and up to date.

D4 Organizational Requirements & Governance
90%
Compliant

All requirements for Organizational Requirements & Governance are met. Documentation is complete and up to date.

D5 Cross-Border Data Transfer
98%
Compliant

All requirements for Cross-Border Data Transfer are met. Documentation is complete and up to date.

D6 Compliance & Accountability
88%
Compliant

All requirements for Compliance & Accountability are met. Documentation is complete and up to date.

Edit Activity Add Risk