Transcend allows you to programmatically access, erase, and opt users out of communication in the Braze platform in accordance with data privacy regulations like GDPR and CCPA.
To get started, make sure you're logged in to Transcend. If not, log in to Transcend here (https://app.transcend.io/login). To configure the Braze integration, you'll want to:
Use the table here to figure out what subdomain you should plug in based on your dashboard URL.
To create a new REST API Key, visit the Developer Console on your Braze Dashboard.
3. Success! Once connected, navigate to the Privacy Center tab. You'll need to map the data in Braze to your Data Practices. To do this, create a new Category as well as a new Data Collection with the appropriate naming convention (e.g. "Mailing Lists or User Profile"). When you're done, hit publish.
4. Navigate back to your Data Inventory and click into the Braze data silo. Expand "Manage Datapoints" and select the Collection Label (Category) you created in the previous step from the dropdown. You can also choose which data actions (e.g. access or erasure) are enabled for which datapoints.
5. Next, while still in the Braze data silo, expand "Manage Identifiers". Check the respective boxes for which identifiers you'd like enabled. As an example, if you'd like Transcend to search users by email address, you'd check the box to enable the Email Address identifier. Note: if identifiers are not enabled correctly, we may not be able to process requests for certain users.
6. Done!
We recommend testing requests before you start processing requests from end-users. To do this:
Submit your contact details to request a full list of systems that Transcend integrates with, grouped by supported functionality. We’ll be able to reach out with more detail if you include both your top system names and privacy operation needs.
Easily manage privacy operations for all of your systems, from major 3rd party SaaS tools and data stores—all set up in a few clicks. Transcend integrations focus on multipurpose functionality, with support for multiple privacy operations including identity mapping, DSRs, data discovery, and/or preference updates.
With Transcend Custom Functions, your engineering teams can write custom code to handle homegrown systems and unique use cases to easily leverage Transcend’s privacy automation, without the need to set up additional servers.
Read docsOur industry-leading infrastructure was designed with zero-trust principles, such as isolated execution with private subnets for the highest levels of integration credential management, meaning access to your systems are more secure with Transcend than alternative offerings.
Learn moreRyan O'Leary
Research Director for IDC's Security and Trust Program
Trusted by Fortune 100 companies and category-leading brands alike, streamline your compliance strategy with Transcend.
Book a demoUnlike many competitors, Transcend understands the importance that regulators put on processing consent, and managing consent eliminates a chunk of risk. Automating and removing manual processes from consent management is a feather in Transcend’s cap.
Transcend has saved us from countless hours of manual datapoint labeling, missing systems in privacy requests, and downstream gaps in consent preference management. Privacy is no longer a cost center – with Transcend, we are driving value to the business.
Transcend continues to be on the forefront of compliance for emerging items such as AI and US laws. This allows us to meet our compliance requirements globally.