Back to tags
Tag

Agent Skills with tag: data-protection

7 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

gdpr-dsgvo-expert

Senior GDPR/DSGVO expert and internal/external auditor for data protection compliance. Provides EU GDPR and German DSGVO expertise, privacy impact assessments, data protection auditing, and compliance verification. Use for GDPR compliance assessments, privacy audits, data protection planning, and regulatory compliance verification.

GDPRDSGVOdata-protectioncompliance
ovachiever
ovachiever
81

data-anonymizer

Detect and mask PII (names, emails, phones, SSN, addresses) in text and CSV files. Multiple masking strategies with reversible tokenization option.

data-protectionPII-maskingtokenizationcsv
dkyazzentwatwa
dkyazzentwatwa
3

security

Database security, access control, and data protection

database-securityaccess-controldata-protectionencryption
pluginagentmarketplace
pluginagentmarketplace
1

gdpr-auditor

This skill should be used when analyzing codebases, applications, databases, or systems for GDPR (General Data Protection Regulation) compliance. Use this skill when users need to audit data protection practices, identify potential compliance issues, assess data handling procedures, review privacy policies, or ensure adherence to EU data protection requirements.

GDPRcomplianceauditprivacy
diegocconsolini
diegocconsolini
3

phi_detection

>

nlpdata-protectionHIPAA-compliancephi-detection
GOATnote-Inc
GOATnote-Inc
31

security-threat-model

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".

threat-modelingattack-surface-mappingrisk-assessmentcompliance-audit
lyndonkl
lyndonkl
82

security

Security best practices for secure coding, authentication, authorization, and data protection. Use when developing features that handle sensitive data, user authentication, or require security review.

best-practicesauthenticationauthorizationsecure-coding
OpenHands
OpenHands
164