/
Data encryption diagram

Data encryption diagram

The table below provides a structured overview of various data types, offering examples, sensitivity levels, encryption strategies, and additional comments to guide the appropriate handling and protection of each type of information.

Data Type

Examples

Sensitivity

Encryption strategy

Comments

Data Type

Examples

Sensitivity

Encryption strategy

Comments

User

Full name, E-mail, Login ID

High

Can be encrypted with CMEK

 

Floorplan drawing

SVG files

Medium

Can be encrypted with CMEK

 

Locations

Location hierarchy, names of: rooms/floors/buildings, room capacities

Medium

Can be encrypted with CMEK

 

 

Data export

Names of locations, zones & departments

Medium

Can be encrypted with CMEK

 

Reservation data

Meeting subject, start/stop time, organiser, linked room

High

Can be encrypted with CMEK

 

Back-ups

Daily snapshots of all above objects

High

Can be encrypted with CMEK

 

Picture Cache

Location pictures and user avatars

Medium

Disable cache

The application’s cache can be disabled. Will impact the system’s performance significantly

Configuration

Regional settings, colouring thresholds, sensor device configuration

Low

GCP default encryption

 

Sensor data

Aggregated timeslots, raw sensor data

Low

GCP default encryption

 

 

In-memory cache

Temporary in-memory cache of session tokens, and FMIS objects

Low

GCP default encryption

 

 

Related content