Font size
A-
A
A+
Site color
R
A
A
A
Side panel
English (en)
Français (fr)
Nederlands (nl)
You are currently using guest access (
Log in
)
Skip to main content
Co-Dex.eu training
Home
Courses
Miscellaneous
Manual
General
Concepts
Browse by alphabet
Concepts
Printer-friendly version
Search
Search
Search full text
Browse the glossary using this index
Special
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
|
ALL
No entries found in this section
Previous activity
◄ Announcements
Jump to...
Jump to...
Announcements
I want to take a lightning start
Policy
What are your organization's processing of personal data?
Select audits
Online presence
Creating the selection
Manage an account
New supplier
Assigning a service or change
Removing a supplier
Add a user
Roles managing users
Changing a user's privileges
What do roles mean?
How do you change rolls?
Email disclaimer
Cookie policy
Privacy policy
Coordinated vulnerability disclosure policy
Default language
Communication Language
Regionalization
Risk policy
Privacy beleid
Data classification policy
Communication policy
Acceptable use policy users
Other policy documents
Add a processing
Change processing
Description and owner
Under processing
Data subjects
Retention
Personal data processed
Possible impact on data subjects
Further processing
Collection of personal data
Internal user
external users
Processing Register
Privacy policy on website
Cookie policy gebruiken
Identify cookies
Services through the website
Protection Website
Cybersecurity website
Register processing
Camera assessment
Camera inventory
Access Requests by subject
Rules of thumb
Processing register
Responsibilities
Cyber resilience
Basic cybersecurity
Network design
VLAN (Virtual LAN)
Firewall
Proxy
Activeer 2-factor authenticatie Office365
Exchange Online organization add signature
Add notification e-mail outside the organization
Create catch-all address
Threats
Overview of the methodology
Data Processing Context (DPC)
Contextual factors to be considered in DPC scoring
Definition of severity level
DPC Simple data, example 1: List of names and telephone numbers
DPC Simple data, example 2: A professional CV database
DPC Simple data, example 3: List of names and postal addresses
DPC Behavioral data, example 1: Telephone history (metadata)
DPC Behavioral data, example 2: Data in a fidelity card
DPC Behavioral data, example 3: Data from a social network
DPC Financial data, example 1: Bank statements
DPC Financial data, example 2: Income declaration
DPC Financial data, example 3: Credit card information
DPC Sensitive data, example 1: Data on blood analysis
DPC Sensitive data, example 2: Political affiliation
DPC Sensitive data, example 3: Data on sexual life
DPC Credentials, examples
Ease of identification (EI)
Ease of identification (EI) scoring
EI: Full name (first name, surname)
EI: ID card/passport/social security number
EI: Telephone number/Home address
EI: Email address
EI: Picture
EI: Coding/Aliases/Initials
Circumstances of the breach (CB)
CB: Loss of confidentiality
CB: Loss of integrity
CB: Loss of availability
Flags
FL: Malicious intent
Your organisation
Publications specifically for your organization
What do you need?
How does your supplier offer himself online?
Contractual evaluation
I don't have a CO-dex.eu account yet
I see no companies?
Specific templates
Single-Sign-On Does Not Work
User does not see the correct tabs such as suppliers.
Next activity
I want to take a lightning start ►
Home
Calendar
Course sections
General
I start with co-dex.eu
Manage suppliers
Manage users
Roles Management
Publications
Geographic information of the company
Information security policy
Processing register
You're the webmaster
You are the camera administrator
You're the computer, server administrator ...
You are a network administrator
You e-mail administrator
Threat based reasoning
Incident management
Hierarchical structure
I want to evaluate a supplier
I am a new user
Specific templates
Troubleshooting