logo

Database

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Requirements
  5. /

  6. Privacy

Privacy

189. Specify the purpose of data collection315. Provide processed data information310. Request user consent316. Allow rectification requests311. Demonstrate user consent317. Allow erasure requests312. Allow user consent revocation318. Notify third parties of changes313. Inform inability to identify users343. Respect the Do Not Track header314. Provide processing confirmation360. Remove unnecessary sensitive information