This guide describes Transcend's data model. The Anatomy of Personal Data focuses on the way data is physically stored in your organization, which is relevant to our Data Privacy Infrastructure.
The fields below describe the concepts relevant to retrieving personal data across your data systems. These concepts are reflected in the Infrastructure > Integrations and Data Inventory sections of your Admin Dashboard.
Your business has a set of
data silos. These are places in your organization where personal data is stored. A silo can be a database, SaaS tool, or any arbitrary data-storage location.
Check out the section "Connecting Integrations" to learn more:
integration contains a set of
datapoints, which are labeled fields of data. (e.g. an integration with HR data may contain the datapoints: Resume, GPA, Education).
In the context of...
- A third party SaaS tool: one
datapointis usually the response of one API endpoint.
- A database: one
datapointis usually one column or the result of a table join
- Filing cabinet: one
datapointis one file (or zip of files) that is expected to be uploaded
datapoint is categorized according to a
data collection. When a report is generated about a data subject, the
files are displayed according to these data collections, not by
integration. Datapoints do not have types - they can be any arbitrary data, called a
When responding to a data subject request, a
file is uploaded for each
file can be an actual file or any other type of data, like a number or boolean value. In other words, a
file is an instance of a
datapoint. These are encrypted, but you can decrypt the file contents for your inspection if you have the appropriate permissions.
integration will have multiple entries for one person (for example, somebody has multiple accounts). So, a
integration has the concept of a
profile. When there are multiple profiles found for a person in a given integration, multiple profiles may be uploaded to Transcend during a data subject request. Each profile contains a collection of
files, and is uniquely keyed by a
profile_id (such as a username).
In the context of...
- A database: you may have a "users" table, keyed with a
profile_idsuch as "username" or "email" or some other unique key.
- A SaaS tool: (for example) collects shopper data on a model called "customers" that has a Shopify-specific unique shopper "id".
How do you look up a data subject? The primary keys to find a data subject are called
identifiers. These are values that can be used to deterministically look up data for a specific person. These identifiers must be a 1:1 mapping of identifier value to Data Subject. For example, you should not have a "userId" that maps to two different Data Subjects. In the future, we plan to support non-deterministic keys to someone's identity (i.e. a person's name is not always a direct lookup).
Some integrations will require different information to look up a data subject. For example, Shopify can lookup a data subject by their "email", but Shopify cannot lookup someone by your organization's native "userId". Transcend can the provided identifiers to get a complete identity picture. This makes it possible for any
integration to find a Data Subject with the primary keys it needs.
Some identifiers we currently support are:
Transcend can find a specific data subject by their email address. This is a commonly used identity key (
identifier) in SaaS tools. Transcend has the ability to verify email ownership by sending that email a verification link. The data subject will need to click on that link to verify they own the inbox and want their request to be processed.
If you use any of Google's products to process personal data (i.e., Google Analytics), they require a concept of a which you can define native to your own organization. In the case of Google Analytics, you can erase a Data Subject's data by their
For all other custom identity keys that your organization uses, our
custom identifier type is a catch-all which allows you to define any
identifier. Some classic examples of these are
Every time we verify an email, we will create a JWT that you can verify against when we notify your servers. This is our way of attesting that we verified a Data Subject to have access to an email inbox.
When you submit identifiers using the or during , we recommend that you also sign these identifiers so that you can be certain that your integrations only trust identifiers that your internal authentication service has verified. In fact, if you only use identifiers that your systems have signed, you don't have to trust Transcend at all.
The core identifier is a unique user ID derived from authentication. This may be an email or any arbitrary user ID of the data subject. It must be:
- Verifiable - It can be verified through an identity verification (authentication) flow.
- Unique - It relates to only one data subject.
- Immutable - It is unchanging and always relates to only one data subject. For example, if a username can be changed in your platform, it may be an unsafe operation to search for data by username. An unchanging user ID is a better option.