Features of PrivyA Software Program for Privacy Officers

  • Set a rentention schedule for Personal Information records; per database; and run a report highlighting the individual Personal Information Records that are due for disposition
  • Capture Personal Information Bank information:
    • Project Name
    • Where is/are the consent records?
    • Purpose for the use of personal information
    • Maximum retention period
    • Retention Schedule and scheduled reviews notes
    • What personal information do we collect?
    • How do we collect it?
    • Where do we keep it?
    • How is it secured?
    • Who has access to or uses it?
    • To who is it disclosed?
  • Connect from the installation of Privy on the Privacy Officer's computer, to the organization's Personal Information Database. Database types include, but not limited to: SQL Server, MySQL, Oracle, MS Access, Sybase, DB2, PostgreSQL
  • Privy has forms that capture data pertaining to Personal Information Requests and Personal Information Corrections
  • Privy details ALL actions executed in a log file. (E.g. reports run, when requests are entered, when actions are taken to respond to a request.) This log file is written by the Privy application in a special proprietary format that ensures that only the actual actions taken in Privy are recorded; and that the log file cannot be faked or actions backdated. This thereby ensures that the integrity of the log file cannot be questioned in a court of law.