Skip to main content
Version: 1.2.3

Tasks

The Unicis Platform includes tasks that handle user and project-related activities and store document evidence or registers. These tasks can handle more than one register, control, or assessment at once. For example, you may need to collaborate with a non-EU service provider, requiring a Register of Records and a Transfer Impact Assessment for GDPR compliance. Also, security reviews can be added to the reviews and monitoring of service providers. This makes keeping records easier by putting all the evidence and documents in one place, so it's easier to check them.

Here are some ways to manage tasks:

Tabs

Overview

Task details typically include:

  • Title: Concise name or identifier of the task.
  • Status: Current stage of completion (e.g., To Do, In Progress, in Review, Feedback, Done).
  • Due Date: Deadline or target date for completion.
  • Description: Additional information or instructions regarding the task.

Status

  • To Do: Task identified but not started.
  • In Progress: Task actively being worked on.
  • In Review: Task completed and under evaluation.
  • Feedback: Task reviewed, awaiting input.
  • Done: Task completed successfully.

Processing Actitivities

You can register and see all the steps in the Register of Proceccing Activities.

  1. Description and Stkaeholders
  2. Purpose and Categories
  3. Recipients
  4. Tansfer
  5. Security Measures/Technical and Organisational Measures (TOM)s

Tramsfer Impact Assessment

The Transfer Impact Assessment tab is where you can register for an assessment or see the assessment assigned to the tasks. Five automated steps are used to determine if the transfer of data is in compliance with a data protection law. The five steps are:

  1. Describe the intended transfer scenario
  2. Determine the scenarios or problematic lawful access that are relevant
  3. Determine factors that indicate risk of problematic lawful acess 
  4. Determine probability of a problematic lawful access
  5. Conclusion/Results

Cybersecurity Controls

In the Cybersecurity Controls tab, you can assign requirements and controls measures that need to be met for this task. You can choose from the dropdown menus based on your subscription plan and framework. Add multiple controls are allowed per task and to  remove them.

Attachments

Type: PDF, xlsx, odf, CVS, JSON, Markdown, txt, Zip, rar and 7z.

Size: 10 MB.

info

If there is a problem with the attachment, you will receive messages like these:

  • Failed to save file as attachment.
  • Not supported type of file.

Comments

Depending on their responsibilities and privileges, each user can post comments, modify and remove them.

info

The Audit role can only download and view task information, and it can comment and contribute to task discussion. It does not have the right to edit or change the information. 

tip

Utilizing the Unicis Platform for task management streamlines communication among cybersecurity, legal and compliance, risk, and audit teams, fostering agile collaboration and improving compliance and risk management efforts. The Platform helps teams work together in real-time and reach their goals by collecting evidence and information in one place.

Audit logs

Records the following events for the RPA, TIA and CSC audit logs:

  • User name
  • Action
  • Date
  • Previous value
  • Next value
tip

The audit logs are provided per application and module, which enhances proof and compliance and streamlines the process of audits.