{"id":25,"date":"2022-11-25T14:26:00","date_gmt":"2022-11-25T13:26:00","guid":{"rendered":"https:\/\/buchholz-software.de\/?page_id=25"},"modified":"2025-12-09T08:03:19","modified_gmt":"2025-12-09T07:03:19","slug":"anyva-grc","status":"publish","type":"page","link":"https:\/\/buchholz-software.de\/en\/anyva-grc\/","title":{"rendered":"Anyva GRC"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"25\" class=\"elementor elementor-25\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cb9dc9a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cb9dc9a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8373996\" data-id=\"8373996\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9384983 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"9384983\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"265\" src=\"https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-1024x339.png\" class=\"attachment-large size-large wp-image-1435\" alt=\"Anyva logo white\" srcset=\"https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-1024x339.png 1024w, https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-300x99.png 300w, https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-768x255.png 768w, https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-18x6.png 18w, https:\/\/buchholz-software.de\/wp-content\/uploads\/2025\/12\/Anyva-weiss-e1765122923886.png 1421w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21dccfd elementor-widget elementor-widget-text-editor\" data-id=\"21dccfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Data protection, information security &amp; risk management<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eb877fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb877fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d10432b\" data-id=\"d10432b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32558f2 elementor-widget elementor-widget-heading\" data-id=\"32558f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fully process-based management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ad5d14a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad5d14a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a72850c\" data-id=\"a72850c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b8754b elementor-widget elementor-widget-text-editor\" data-id=\"8b8754b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ANYVA revolutionises the way data protection management systems (DSMS) are structured. While traditional DSMSs are form-based and maintain isolated processing records (VVT), ANYVA maps data protection completely process-based. This means that processing activities are not recorded manually, but are systematically derived from the actual business processes.<\/p><p>This architecture enables consistent and redundancy-free data management. Technical and organisational measures (TOMs), data categories, legal bases, earmarking and recipients automatically follow the process logic. This eliminates duplicate entries and contradictions in the VVT. More importantly, data protection impact assessments (DPIAs) are based directly on the recorded processes, the associated risks and the current TOM situation - not on subsequently created documents.<\/p><p>This structural innovation ensures that data protection is not perceived as an administrative overhead, but as an integral part of corporate management. Every change in the process is automatically reflected in all relevant data protection documents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d0d2df7\" data-id=\"d0d2df7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1c37eb6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c37eb6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d2eb0a2\" data-id=\"d2eb0a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dddcdfe elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"dddcdfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bahai\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afc62f1 elementor-widget elementor-widget-text-editor\" data-id=\"afc62f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Processes as a basis<\/strong><\/h4><p>Real business processes are the basis for VVT and ISMS. Data only needs to be recorded once<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-07d8d05 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07d8d05\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-83b71b9\" data-id=\"83b71b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ab991c elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4ab991c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bahai\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a4490 elementor-widget elementor-widget-text-editor\" data-id=\"77a4490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Automatic linking<\/strong><\/h4><p>TOMs, data, legal bases follow the process logic<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c65afc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c65afc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e04ed55\" data-id=\"e04ed55\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-604a944 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"604a944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bahai\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-549be2a elementor-widget elementor-widget-text-editor\" data-id=\"549be2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>No redundancies<\/strong><\/h4><p>Unique assignment without duplicate entries, TOMs only exist once, common for all modules<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e117c3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e117c3c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75281ab\" data-id=\"75281ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d32703a elementor-widget elementor-widget-heading\" data-id=\"d32703a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dynamic TOM effectiveness instead of static lists\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79d8dbd elementor-widget elementor-widget-text-editor\" data-id=\"79d8dbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In conventional data protection management systems, technical and organisational measures (TOMs) are kept as static, text-heavy lists. Each processing activity, each document and each DPIA contains a separate TOM list - often inconsistent and outdated. ANYVA breaks with this outdated approach.<\/p><p>In ANYVA, every TOM <b>once in the system<\/b> as a centrally managed element. These TOMs are assigned to different contexts via assignment: Processes, data types, systems, DSFAs. Every change to a TOM - be it an update of the effectiveness, a new version or an addition - automatically affects all associated elements: all processes, all data types, all DSFAs, all risk assessments.<\/p><p>\u00a0<\/p><p>This means that if an encryption method is strengthened, the protective effect is updated immediately in all affected processes. If a new access concept is introduced, it takes effect immediately in all relevant DSFAs. The AI-supported plausibility check continuously monitors whether the TOMs are complete, whether they are appropriate to the risks and whether there are any gaps.<\/p><p>This means that if an encryption method is strengthened, the protective effect is updated immediately in all affected processes. If a new access concept is introduced, it takes effect immediately in all relevant DSFAs. The AI-supported plausibility check continuously monitors whether the TOMs are complete, whether they are appropriate to the risks and whether there are any gaps.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eaebc74 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eaebc74\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58faf62\" data-id=\"58faf62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c83af0 elementor-widget elementor-widget-heading\" data-id=\"0c83af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrated DSFA logic with scenarios and risks\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e5c0bd8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5c0bd8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a5e9d0f\" data-id=\"a5e9d0f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2b503e elementor-widget elementor-widget-heading\" data-id=\"f2b503e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Linking ISMS and DSMS\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bbf4d5 elementor-widget elementor-widget-text-editor\" data-id=\"5bbf4d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This bridge between information security and data protection is a unique selling point. Conventional DSMSs manage DSFA, TOMs and risks as separate silos. ANYVA merges them into a consistent risk model. This means<\/p><ul><li>IT security risks automatically affect data protection risks<\/li><li>TOM changes update both worlds simultaneously<\/li><li>Attack scenarios and vulnerabilities are taken into account in the DPIA<\/li><li>Risk management is holistic, not fragmented<\/li><\/ul><div>\u00a0<\/div><p>The result: more precise risk assessments, shorter response times, fewer blind spots. ANYVA turns data protection and information security into an integrated governance approach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7a640f9\" data-id=\"7a640f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1703645 elementor-widget elementor-widget-heading\" data-id=\"1703645\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automatic risk assessment\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0807fe elementor-widget elementor-widget-text-editor\" data-id=\"e0807fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In many systems, data protection impact assessments (DPIAs) are isolated documents that have to be created and maintained manually. ANYVA fully integrates the DPIA logic into the process and risk model. DSFA risks arise from <b>automatically<\/b> from the concatenation: process \u2192 data \u2192 categories \u2192 requirements \u2192 TOMs.<\/p><p>Changes in the process, in the processed data or in the TOMs automatically affect the DPIA assessment. If a TOM is removed or a new data category is added, the risk is adjusted in real time. Even more unique: Attack scenarios from the integrated ISMS can influence data protection risks. If a technical risk is identified in the ISMS - such as a vulnerability in authentication - this flows directly into the DPIA assessment.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13c1fa6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13c1fa6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d5b881\" data-id=\"7d5b881\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3146025 elementor-widget elementor-widget-heading\" data-id=\"3146025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrated DSFA logic with scenarios and risks\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4a432eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a432eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-narrow\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a7d5430\" data-id=\"a7d5430\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e1a020 elementor-widget elementor-widget-heading\" data-id=\"2e1a020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TOMs in both worlds\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4600a5d elementor-widget elementor-widget-text-editor\" data-id=\"4600a5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technical and organisational measures work simultaneously in data protection (DSMS) and information security (ISMS). An encryption measure protects both personal data and sensitive business information. This dual effect is mapped natively in ANYVA - without duplication or manual synchronisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-65edff2\" data-id=\"65edff2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e8a96a elementor-widget elementor-widget-heading\" data-id=\"4e8a96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Associated risks\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebaa012 elementor-widget elementor-widget-text-editor\" data-id=\"ebaa012\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data protection risks are automatically linked to technical risks. If an IT risk escalates - due to a new vulnerability, for example - this has an immediate impact on the data protection risk assessment. Conversely, data protection requirements flow into the IT risk analysis. The result: a single, consistent risk model instead of three different ones.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8a17df5\" data-id=\"8a17df5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45ae703 elementor-widget elementor-widget-heading\" data-id=\"45ae703\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asset transparency\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3bdd0 elementor-widget elementor-widget-text-editor\" data-id=\"2f3bdd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Assets (systems, applications, infrastructure) are linked to processes, data, TOMs and risks. Changes to an asset - such as a system update or a shutdown - automatically affect all dependent data protection and security elements. There is no such transparency in an isolated DSMS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-609a58f elementor-widget elementor-widget-text-editor\" data-id=\"609a58f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The standardised data model makes ANYVA the central governance platform for data protection <b>and<\/b> Information security. Instead of maintaining parallel systems, data protection officers, IT security managers and risk managers work in the same data model - with consistent information, automatic dependencies and a holistic view.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c71d898 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c71d898\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73a0cb7\" data-id=\"73a0cb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-074bf71 elementor-widget elementor-widget-heading\" data-id=\"074bf71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tamper-proof audit trail and AI support\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-da6fa1a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da6fa1a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a6452bf\" data-id=\"a6452bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b32db3e elementor-widget elementor-widget-heading\" data-id=\"b32db3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Complete audit trail\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18d2553 elementor-widget elementor-widget-text-editor\" data-id=\"18d2553\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data protection is accountability. ANYVA documents <b>every decision<\/b> with complete origin and justification: every legal basis, every purpose, every deletion deadline, every TOM update, every risk change. Changes have a system-wide effect and the history is retained without gaps.<\/p><p>Auditors and supervisory authorities have access to the entire chain of reasoning: Why was this legal basis chosen? Who authorised the DPIA? What TOM changes were made? Many DSMSs only save the current version - ANYVA preserves the complete, tamper-proof version history.<\/p><p>This audit trail is crucial for the obligation to provide evidence in accordance with Art. 5 para. 2 GDPR (accountability). It not only documents <i>what<\/i> was decided, but also <i>Why<\/i>, <i>when<\/i> and <i>by whom<\/i>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a3039a\" data-id=\"5a3039a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57c2b16 elementor-widget elementor-widget-heading\" data-id=\"57c2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI support for data protection\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cacc4bb elementor-widget elementor-widget-text-editor\" data-id=\"cacc4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ANYVA does not use AI for superficial text modules, but for <b>logical data protection models<\/b>. The AI provides support with:<\/p><ul><li><b>TOM proposals:<\/b> The AI suggests suitable technical and organisational measures based on the data risk and protection requirements.<\/li><li><b>DSFA quality assessment:<\/b> The AI assesses the completeness and plausibility of DSFAs and suggests improvements.<\/li><li><b>Rights of data subjects:<\/b> The AI recognises when data subject rights are incompletely recorded or not taken into account.<\/li><\/ul><div>\u00a0<\/div><p>These AI functions go far beyond simple text generation. They analyse the structure, logic and consistency of the data protection model - and turn ANYVA into a <b>intelligent data protection system<\/b>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-244e512 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"244e512\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a146a4d\" data-id=\"a146a4d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e2b809 elementor-widget elementor-widget-text-editor\" data-id=\"9e2b809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Conclusion:<\/b> ANYVA offers functions that no classic DSMS on the market provides in this combination. Process-based architecture, dynamic TOM management, automatic plausibility checks, integrated DPIA logic, standardised data model, automatic processor checks, real-time data flows, tamper-proof audit trail, AI support and a fully integrated governance ecosystem - this is the new generation of data protection governance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Datenschutz, Informationssicherheit &amp; Risikomanagement Vollst\u00e4ndig prozessbasiertes Management ANYVA revolutioniert die Art und Weise, wie Datenschutz-Management-Systeme (DSMS) aufgebaut sind. W\u00e4hrend klassische DSMS formularbasiert arbeiten und isolierte Verarbeitungsverzeichnisse (VVT) f\u00fchren, bildet ANYVA den Datenschutz vollst\u00e4ndig prozessbasiert ab. Das bedeutet: Verarbeitungst\u00e4tigkeiten werden nicht manuell erfasst, sondern systematisch aus den tats\u00e4chlichen Gesch\u00e4ftsprozessen abgeleitet. Diese Architektur erm\u00f6glicht eine konsistente und [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":79,"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":1735,"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/pages\/25\/revisions\/1735"}],"wp:attachment":[{"href":"https:\/\/buchholz-software.de\/en\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}