Data Type | Examples | Sensitivity | Encryption strategy | Comments |
---|---|---|---|---|
User | Full name, E-mail, Login ID | High | Can be encrypted with CMEK | |
Floorplan drawing | SVG files | Medium | Can be encrypted with CMEK | |
Locations | Location hierarchy, names of: rooms/floors/buildings, room capacities | Medium | Can be encrypted with CMEK | |
Data export | Names of locations, zones & departments | Medium | Can be encrypted with CMEK | |
Reservation data | Meeting subject, start/stop time, organiser, linked room | High | Can be encrypted with CMEK | |
Back-ups | Daily snapshots of all above objects | High | Can be encrypted with CMEK | |
Picture Cache | Location pictures and user avatars | Medium | Disable cache | The application’s cache can be disabled. Will impact the system’s performance significantly |
Configuration | Regional settings, colouring thresholds, sensor device configuration | Low | GCP default encryption | |
Sensor data | Aggregated timeslots, raw sensor data | Low | GCP default encryption | |
In-memory cache | Temporary in-memory cache of session tokens, and FMIS objects | Low | GCP default encryption |
Content Comparison
General
Content
Integrations