You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/solutions/data-privacy-protection-respond-requests.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Respond to privacy incidents and subject requests – Microsoft Priva and Purview"
2
+
title: "Respond to privacy incidents and subject requests – Microsoft Priva and Microsoft Purview"
3
3
ms.author: chvukosw
4
4
author: chvukosw
5
5
f1.keywords:
@@ -27,7 +27,7 @@ Welcome to **Step 4** of managing data privacy and data protection with Microsof
27
27
28
28

29
29
30
-
Features in both Purview and Priva can help you monitor, investigate, and respond to data privacy incidents in your organization as you operationalize related capabilities. Having processes, procedures, and other documentation for each incident may also be important to demonstrate compliance to regulatory bodies. These features include:
30
+
Features in both Micrsoft Purview and Priva can help you monitor, investigate, and respond to data privacy incidents in your organization as you operationalize related capabilities. Having processes, procedures, and other documentation for each incident may also be important to demonstrate compliance to regulatory bodies. These features include:
31
31
32
32
- Auditing and alert policies
33
33
- Subject rights requests, sometimes referred to as data subject requests
@@ -50,7 +50,7 @@ Most data privacy regulations generally require the type of monitoring and respo
50
50
51
51
Your organization may also wish to perform monitoring and response activities for other purposes, such as other compliance needs or for business reasons. Establishing your monitoring and response scheme for data privacy should be done as part of overall monitoring and response planning, implementation, and management.
52
52
53
-
Use the links above to explore how Purview capabilities can help you develop a monitoring and response scheme, and answer questions such as:
53
+
Use the links above to explore how Microsoft Purview capabilities can help you develop a monitoring and response scheme, and answer questions such as:
54
54
55
55
- What sort of day-to-day monitoring and investigative and reporting techniques are available for the different data types and sources?
56
56
- What mechanisms will be needed to handle subject rights requests and any remedial actions, such as anonymization, redaction, and deletion?
0 commit comments