Stage 2 – Describe the Information Flow Here you should focus on the processes to be directly impacted by the proposed changes. The flow needs to be documented in sufficient detail to ensure a good understanding of how it is intended to collect, store, use and delete the personal data. This means describing which human and technical resources are involved in the processing.
We use a visual modelling method which helps capture and communicate quickly:
- which process operators perform what activities,
- which applications/ document management systems/ portals & data
stores are used, - the media/ format the data is in, in transit and at rest throughout the data life-cycle from collection to deletion.
After the model is verified with the new process owner, the analyst can begin to identify the risks the data may be exposed to at each stage in the process.
Contact us to receive an example of the unique user friendly mapping method we use.





