Data Access Management > Data access policies > Data access policy selection
  

Data access policy selection

Before creating data access policies on the Data Access Management page, select which type of policy best fits each of your use cases.
You can create the following types of policies:

Example scenarios

The following are examples that illustrate which type of data access policy to use in different business scenarios.
The Operations team at your financial organization needs write access to any customer data in accordance with financial regulations. Your organization's anti-money laundering (AML) department needs read access to customer data to ensure that no customers are laundering money through your organization. All of your customer data is stored in a Snowflake source system. Data access control policies would best serve this use case because you can write policies that Data Access Management would push directly into your Snowflake instance. For tables containing customer data, the data access policies can grant write access to the Operations team while granting read access to the AML department.
You have customers in Western Europe and the Middle East. Your organization stores customer data in data centers in Dublin, Ireland and Riyadh, Saudi Arabia. Data filter policies would best serve this use case because you can write policies that ensure that European customer data is only accessed and processed within the European Union and Saudi Arabian customer data is only accessed and processed within Saudi Arabia. This prevents your organization from running afoul of data sovereignty regulations included in the GDPR and the PDPL.
The compliance department at your healthcare organization wants to perform analytics on patient data to determine what percentage of patients are overdue for more than one preventative health screening. The patient data includes patient ID numbers, contact information, and medical history. Data de-identification policies would best serve this use case because you can write policies that replace patient ID numbers with tokens, redact all contact information, and leave medical history untouched. Using the tokenized patient ID numbers, your compliance department can determine how many preventative health screenings each patient is overdue for without being able to identify any individual patient. This prevents your organization from running afoul of data privacy regulations such as HIPAA.