[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"dtpr-en":3},[4,10,15,20,25,30,35,40,45,50,56,60,66,71,76,81,86,91,96,102,107,112,117,122,127,132,137,142,147,152,157,162,167,172,177,182,187,192,197,202,207,212,218,223,228,233,238,243,248,253,258,263,268,273,278,283,288,293,298,303,308,314,319,324,329,335,341,346,351,355,359,363,366,370,374,378,382,386,390,394,399,404,409,414,419,424,429,434,439,444,449,454,459,464,469,474,479,484,489,494,499,504,509,514,519,524,529,534,539,544,549,554,559,564,569,574,579,584,589,593,598,603,608,613,618,620,625,630,635,640,645,650,655,660,665,670],{"id":5,"icon":6,"category":7,"description":8,"title":9},"access__available_for_resale","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_for_resale.svg","access","The data collected may be resold to other 3rd parties","Available for resale",{"id":11,"icon":12,"category":7,"description":13,"title":14},"access__available_to_3rd_parties","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_to_3rd_parties.svg","Data is available to 3rd parties not involved in the data activity. This does not always mean that data is being resold.","Available to 3rd parties",{"id":16,"icon":17,"category":7,"description":18,"title":19},"access__available_to_download","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_to_download.svg","Data that can be accessed and downloaded online, either for free or for a fee","Available to download",{"id":21,"icon":22,"category":7,"description":23,"title":24},"access__available_to_me","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_to_me.svg","Available to me but not to other individuals. For example, as an individual you have access to all your electronic toll records for your car, but other individuals do not have access to that.","Available to me",{"id":26,"icon":27,"category":7,"description":28,"title":29},"access__available_to_the_accountable_organization","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_to_the_accountable_organization.svg","Data is available to the accountable organization","Available to the accountable organization",{"id":31,"icon":32,"category":7,"description":33,"title":34},"access__available_to_vendor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Favailable_to_vendor.svg","Data is available to the data collection or technology provider","Available to vendor",{"id":36,"icon":37,"category":7,"description":38,"title":39},"access__not_available_to_me","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fnot_available_to_me.svg","Not available to me or other individuals. As an individual, there isn't a way for you to access this data.","Not available to me",{"id":41,"icon":42,"category":7,"description":43,"title":44},"access__not_available_to_the_accountable_organization","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fnot_available_to_the_accountable_organization.svg","Data is not available to the accountable organization","Not available to the accountable organization",{"id":46,"icon":47,"category":7,"description":48,"title":49},"access__not_available_to_vendor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fnot_available_to_vendor.svg","Data is not available to the data collection or technology provider.","Not available to vendor",{"id":51,"icon":52,"category":53,"description":54,"title":55},"accountable__institution","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Finstitution.svg","accountable","The entity that is responsible and accountable for this data collection activity","Institution",{"id":57,"icon":58,"category":53,"description":54,"title":59},"accountable__organization","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Forganization.svg","Organization",{"id":61,"icon":62,"category":63,"description":64,"title":65},"data__binary","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fbinary.svg","data","Compressed data into a binary format.","Binary",{"id":67,"icon":68,"category":63,"description":69,"title":70},"data__boolean","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fboolean.svg","Data that has one of two data values, for example true and false.","Boolean",{"id":72,"icon":73,"category":63,"description":74,"title":75},"data__personal","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fpersonal.svg","Information about identifiable individuals.","Personal  ",{"id":77,"icon":78,"category":63,"description":79,"title":80},"data__pixel_based_image","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fpixel_based_image.svg","A digital image is composed of a grid of individual pixels.","Pixel-based Image",{"id":82,"icon":83,"category":63,"description":84,"title":85},"data__spatial","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fspatial.svg","Data that represents a location, such as an address, a place name or geographic coordinates; or a structure, such as a floorplan.","Spatial",{"id":87,"icon":88,"category":63,"description":89,"title":90},"data__tabular","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ftabular.svg","Data that is stored in a table, where values are stored in rows and columns.","Tabular",{"id":92,"icon":93,"category":63,"description":94,"title":95},"data__values_time","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fvalues_time.svg","Measurements that are collected at regular intervals over a period of time.","Values \u002F Time",{"id":97,"icon":98,"category":99,"description":100,"title":101},"process__aggregated","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Faggregated.svg","process","Data that has been grouped or summarized from individual measurements, for example to count up totals or to calculate an average.","Aggregated",{"id":103,"icon":104,"category":99,"description":105,"title":106},"process__ai_system","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fai_system.svg","Data that is processed by automated, algorithmic or artificial intelligence systems to derive a new result or data point.","AI System",{"id":108,"icon":109,"category":99,"description":110,"title":111},"process__bitmap_manipulation","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fbitmap_manipulation.svg","Bitmap manipulation is the process of altering pixels in a raster-based image, such as retouching a digital photograph.","Bitmap manipulation",{"id":113,"icon":114,"category":99,"description":115,"title":116},"process__code_signing","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcode_signing.svg","Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. The process employs the use of a cryptographic hash to validate authenticity and integrity.","Code signing",{"id":118,"icon":119,"category":99,"description":120,"title":121},"process__computer_vision","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcomputer_vision.svg","Computer vision refers to computer science methodologies that enable computers to derive data from digital images or video.","Computer vision",{"id":123,"icon":124,"category":99,"description":125,"title":126},"process__cryptonets","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcryptonets.svg","Cryptonets are neural networks that can be applied to encrypted data. Due to this capability it is not required to decrypt the data during processing and because of this it is not necessary to even provide the application host with the keys to decrypt the data. Cryptonets are an implementation of Homomorphic Encryption.","Cryptonets",{"id":128,"icon":129,"category":99,"description":130,"title":131},"process__de_identified","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fde_identified.svg","Data that is processed to remove identifying values, usually to protect privacy. De-identification can happen at any point in a data collection process, for example before it is stored in a database, or before it is published. Here we define it to mean after the data has already left a hardware device, or after it has been stored in a database.","De-identified",{"id":133,"icon":134,"category":99,"description":135,"title":136},"process__differential_privacy","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fdifferential_privacy.svg","Differential privacy is a system for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals in the dataset.","Differential privacy",{"id":138,"icon":139,"category":99,"description":140,"title":141},"process__encrypted","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fencrypted.svg","Data has been encoded so that only authorized parties can access it, which can reduce risk related to handling private or sensitive information.","Encrypted",{"id":143,"icon":144,"category":99,"description":145,"title":146},"process__encrypted_at_rest","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fencrypted_at_rest.svg","Encryption at Rest is the encryption of data when it is persisted to a storage medium like a drive or database. It protects the data against unauthorized access of the database itself.","Encrypted at Rest",{"id":148,"icon":149,"category":99,"description":150,"title":151},"process__federated_learning","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ffederated_learning.svg","Federated Learning involves both Edge Computing and a Cloud based process which allows machine learning to take place on a large body of decentralized de-identified data.","Federated learning",{"id":153,"icon":154,"category":99,"description":155,"title":156},"process__hardware_audits","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fhardware_audits.svg","3rd Party auditing specialists periodically examine the hardware & firmware to identify security best practice vulnerabilities and\u002For gaps in disclosure when it comes to the type of data the device is capturing and how it is being processed.","Hardware audits",{"id":158,"icon":159,"category":99,"description":160,"title":161},"process__homomorphic_encryption","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fhomomorphic_encryption.svg","Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.","Homomorphic encryption",{"id":163,"icon":164,"category":99,"description":165,"title":166},"process__immutable_query_ledger","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fimmutable_query_ledger.svg","All interactions with the data throughout its lifecycle, including access and any transformations that are applied are registered in an immutable query ledger creating an auditable chain of accountability mediated by a distributed database.","Immutable Query Ledger",{"id":168,"icon":169,"category":99,"description":170,"title":171},"process__k_anonymity","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fk_anonymity.svg","K-Anonymity is used to ensure anonymity when disclosing otherwise personally identifiable data. Attributes of the data are suppressed or generalized until each row is identical with at least k-1 other rows. At this point the database is said to be k-anonymous.","K-Anonymity",{"id":173,"icon":174,"category":99,"description":175,"title":176},"process__raw_data","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fraw_data.svg","Data that has not been processed or altered from the point of collection - the data is effectively identical to how it was gathered from the original data source.","Raw data",{"id":178,"icon":179,"category":99,"description":180,"title":181},"process__rdua_approved","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Frdua_approved.svg","Data activity has undergone a Responsible Data Use Assessment and determined to provide a net benefit. The RDUA is a process that Sidewalk Labs conducts prior to the start of any data activity.","RDUA Approved",{"id":183,"icon":184,"category":99,"description":185,"title":186},"process__regulated","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fregulated.svg","Depending on the jurisdiction and type of data, data is regulated in various ways","Regulated",{"id":188,"icon":189,"category":99,"description":190,"title":191},"process__reviewed_internally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Freviewed_internally.svg","Many organizations have internal review processes that consider the potential benefits, risks and implications for privacy for new technologies or data collection activities.","Reviewed Internally",{"id":193,"icon":194,"category":99,"description":195,"title":196},"process__secure_multi_party_computing","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsecure_multi_party_computing.svg","Secure multi-party computation is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. It allows participants to generate aggregated insights from data while keeping the individual items of data secret.","Secure Multi-Party Computing",{"id":198,"icon":199,"category":99,"description":200,"title":201},"process__transport_layer_security","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ftransport_layer_security.svg","Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet by encrypting data while it is in.","Transport Layer Security",{"id":203,"icon":204,"category":99,"description":205,"title":206},"process__trusted_execution_environment","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ftrusted_execution_environment.svg","A TEE is an isolated environment created using  special purpose hardware and software to protect the data stored inside. A TEE provides a “trusted environment” inside which a process can run while it is invisible to any other process on the processor, the operating system or any other type of privileged access. ","Trusted Execution Environment ",{"id":208,"icon":209,"category":99,"description":210,"title":211},"process__zero_knowledge_proofs","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fzero_knowledge_proofs.svg","A Zero Knowledge Proof is a method by which one party can prove to another party that they know a value, without conveying any additional information such as the value itself.","Zero Knowledge Proofs",{"id":213,"icon":214,"category":215,"description":216,"title":217},"purpose__accessibility","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Faccessibility.svg","purpose","Ensures that everyone has equal access to a space or a service.","Accessibility",{"id":219,"icon":220,"category":215,"description":221,"title":222},"purpose__agency_interaction","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fagency_interaction.svg","Enables you to control or interact with aspects of a space or a technology.","Agency & Interaction",{"id":224,"icon":225,"category":215,"description":226,"title":227},"purpose__arts_culture","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Farts_culture.svg","Enables artistic and\u002For cultural expression.","Arts & Culture",{"id":229,"icon":230,"category":215,"description":231,"title":232},"purpose__commerce","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcommerce.svg","Enables the buying and selling of goods and services.","Commerce",{"id":234,"icon":235,"category":215,"description":236,"title":237},"purpose__connectivity","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fconnectivity.svg","Enables a user to connect to a network, such as the internet","Connectivity",{"id":239,"icon":240,"category":215,"description":241,"title":242},"purpose__dining","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fdining.svg","For providing food or meal services.","Dining",{"id":244,"icon":245,"category":215,"description":246,"title":247},"purpose__ecology","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fecology.svg","Supports the measurement or monitoring of the natural environment.","Ecology",{"id":249,"icon":250,"category":215,"description":251,"title":252},"purpose__energy_efficiency","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fenergy_efficiency.svg","Reduces energy use and\u002For helps conserve energy.","Energy Efficiency",{"id":254,"icon":255,"category":215,"description":256,"title":257},"purpose__enforcement","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fenforcement.svg","Used for enforcement of rules or regulations.","Enforcement",{"id":259,"icon":260,"category":215,"description":261,"title":262},"purpose__entry","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fentry.svg","Supports authentication or validation in order to access a space or a service.","Entry",{"id":264,"icon":265,"category":215,"description":266,"title":267},"purpose__fire_emergency","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ffire_emergency.svg","Supports services that ensure public safety and health related to emergencies.","Fire & Emergency",{"id":269,"icon":270,"category":215,"description":271,"title":272},"purpose__health","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fhealth.svg","Supports the measurement or monitoring of the aspects of the physical environment that impacts human health, such as radiation or air quality, or in specific contexts such as the workplace.","Health",{"id":274,"icon":275,"category":215,"description":276,"title":277},"purpose__inform","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Finform.svg","Supports the provision of information, for example about a location, a service, or to provide assistance","Inform",{"id":279,"icon":280,"category":215,"description":281,"title":282},"purpose__logistics","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Flogistics.svg","Supports the movements of goods or materials.","Logistics",{"id":284,"icon":285,"category":215,"description":286,"title":287},"purpose__mobility","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fmobility.svg","Supports how people and materials move around.","Mobility",{"id":289,"icon":290,"category":215,"description":291,"title":292},"purpose__planning_decision_making","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fplanning_decision_making.svg","Supports the development of future plans; or to enable or measure the impact of a decision.","Planning & Decision-making",{"id":294,"icon":295,"category":215,"description":296,"title":297},"purpose__research_development","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fresearch_development.svg","Supports exploratory research and testing.","Research & Development",{"id":299,"icon":300,"category":215,"description":301,"title":302},"purpose__safety_security","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsafety_security.svg","Enables a safe and\u002For secure environment, for example for the purposes of fire safety, home security or ensuring safe passage in places such as airports or roads","Safety & Security",{"id":304,"icon":305,"category":215,"description":306,"title":307},"purpose__social","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsocial.svg","For interacting with another person or a group.","Social",{"id":309,"icon":310,"category":311,"description":312,"title":313},"purpose__switch","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fswitch_tech.svg","tech","Supports a mechanical function - such as turning a device on or off, opening or closing, or adjusting brightness and intensity.","Switch",{"id":315,"icon":316,"category":215,"description":317,"title":318},"purpose__waste_management","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwaste_management.svg","Supports the handling and disposal of waste, including as recyclables, compost and hazardous materials.","Waste Management",{"id":320,"icon":321,"category":215,"description":322,"title":323},"purpose__water_efficiency","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwater_efficiency.svg","Reduces water use and\u002For helps conserve water.","Water Efficiency",{"id":325,"icon":326,"category":215,"description":327,"title":328},"purpose__wayfinding_services","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwayfinding_services.svg","Enables navigation of a location and its amenities and services.","Wayfinding & Services",{"id":330,"icon":331,"category":332,"description":333,"title":334},"retention__retained_2_years","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fis_retained.svg","retention","Data is stored for two years, and after this time period is deleted","Retained 2 years",{"id":336,"icon":337,"category":338,"description":339,"title":340},"storage__backed_up_internationally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fbacked_up_internationally.svg","storage","Data is backed up outside the jurisdiction where it was collected.","Backed up internationally",{"id":342,"icon":343,"category":338,"description":344,"title":345},"storage__backed_up_locally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fbacked_up_locally.svg","Data is backed up with the jurisdiction where it was collected.","Backed up locally",{"id":347,"icon":348,"category":338,"description":349,"title":350},"storage__no_data_retained","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fno_data_retained.svg","No data is kept or stored","No data retained",{"id":352,"icon":331,"category":338,"description":353,"title":354},"storage__retained_1_month","Data is stored for 1 month, and after this time period is deleted","Retained 1 month",{"id":356,"icon":331,"category":338,"description":357,"title":358},"storage__retained_1_year","Data is stored for 1 year, and after this time period is deleted","Retained 1 year",{"id":360,"icon":331,"category":338,"description":361,"title":362},"storage__retained_24_hours","Data is stored for 24 hours, and after this time period is deleted","Retained 24 hours",{"id":364,"icon":331,"category":338,"description":365,"title":334},"storage__retained_2_years","D﻿ata is stored for 2 years, and then after that time period is deleted.",{"id":367,"icon":331,"category":338,"description":368,"title":369},"storage__retained_3_months","Data is stored for 3 months, and after this time period is deleted","Retained 3 months",{"id":371,"icon":331,"category":338,"description":372,"title":373},"storage__retained_5_years","Data is stored for 5 years, and after this time period is deleted","Retained 5 years",{"id":375,"icon":331,"category":338,"description":376,"title":377},"storage__retained_6_months","Data is stored for 6 months, and after this time period is deleted","Retained 6 months",{"id":379,"icon":331,"category":338,"description":380,"title":381},"storage__retained_7_years","Data is stored for 7 years, and after this time period is deleted","Retained 7 years",{"id":383,"icon":331,"category":338,"description":384,"title":385},"storage__retained_indefinitely","Data is retained indefinitely","Retained indefinitely",{"id":387,"icon":331,"category":338,"description":388,"title":389},"storage__retained_six_years","Data is stored for 6 years, and after this time period is deleted","Retained 6 Years",{"id":391,"icon":331,"category":338,"description":392,"title":393},"storage__retained_two_weeks","Data is stored for two weeks, and after this time period is deleted","Retained two weeks",{"id":395,"icon":396,"category":338,"description":397,"title":398},"storage__shared_storage_and_governance","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fshared_storage_and_governance.svg","In a shared data store model the data store is shared across multiple parties and because the infrastructure is shared it becomes possible to enforce governance around the retention, access and destruction of the data by policies built into the structure of the data itself.","Shared storage and governance",{"id":400,"icon":401,"category":338,"description":402,"title":403},"storage__stored_locally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fstored_locally.svg","Data is stored in the jurisdiction where it was collected.","Stored locally",{"id":405,"icon":406,"category":338,"description":407,"title":408},"storage__stored_on_3rd_party_cloud","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fstored_on_3rd_party_cloud.svg","Data is stored on behalf of the organization or the data collector in an off-site data centre, such as Amazon Web Services, Google Cloud and Microsoft Azure","Stored on 3rd Party Cloud",{"id":410,"icon":411,"category":338,"description":412,"title":413},"storage__stored_primarily_internationally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fstored_primarily_internationally.svg","Data is stored outside the jurisdiction where it was collected.","Stored primarily internationally",{"id":415,"icon":416,"category":338,"description":417,"title":418},"storage__stored_primarily_locally","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fstored_primarily_locally.svg","Data is stored mainly in the jurisdiction where it was collected.","Stored primarily locally",{"id":420,"icon":421,"category":311,"description":422,"title":423},"tech__air_quality","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fair_quality.svg","Measures various aspects of air quality, such as pollen, particulate matter, ozone, and greenhouse gases.","Air Quality",{"id":425,"icon":426,"category":311,"description":427,"title":428},"tech__assistance_station","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fassistance_station.svg","Provides access to assistive services. Examples include assistive technologies and virtual assistants","Assistance Station",{"id":430,"icon":431,"category":311,"description":432,"title":433},"tech__augmented_reality","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Faugmented_reality.svg","Augmented reality is a technology that combines both physical and digital content to create interactive experiences and content.","Augmented Reality",{"id":435,"icon":436,"category":311,"description":437,"title":438},"tech__biometrics","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fbiometrics.svg","Biometrics are body measurements and calculations related to human characteristics.","Biometrics",{"id":440,"icon":441,"category":311,"description":442,"title":443},"tech__cellular","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcellular.svg","This devices uses a cellular communication network where the last link is wireless, enabling portable transceivers (e.g., mobile phones) to communicate with each other and with fixed transceivers and telephones anywhere in the network.","Cellular",{"id":445,"icon":446,"category":311,"description":447,"title":448},"tech__chatbot","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fchatbot.svg","A chatbot is a computer program designed to simulate human conversation with users.","Chatbot",{"id":450,"icon":451,"category":311,"description":452,"title":453},"tech__contactless_payments","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fcontactless_payments.svg","Contactless payment systems are are credit cards and debit cards, key fobs, smart cards, or other devices, including smartphones and other mobile devices, that use radio-frequency identification (RFID) or near field communication (NFC) for making secure payments.","Contactless Payments",{"id":455,"icon":456,"category":311,"description":457,"title":458},"tech__de_identified_image","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fde_identified_image.svg","Generates still images of a sufficient resolution where individuals can be identified, for example by capturing images of faces or unique numbers such as vehicle license plates. However, images are processed in a way that removes identifying characteristics before it is used or stored (known as *de-identified before first use* or *de-identified on device*), for example by blurring faces using computer vision.","De-identified Image",{"id":460,"icon":461,"category":311,"description":462,"title":463},"tech__de_identified_video","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fde_identified_video.svg","Generates video footage of a sufficient resolution where individuals can be identified, for example by capturing images of faces or unique numbers such as vehicle license plates. However, the video is processed in a way that removes identifying characteristics before it is used or stored (known as *de-identified before first use* or *de-identified on device*), for example by blurring faces using computer vision.","De-identified Video",{"id":465,"icon":466,"category":311,"description":467,"title":468},"tech__de_identified_voice","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fde_identified_voice.svg","Generates audio data that can identify individuals, but the data is processed in a way that removes identifying characteristics before it is used or stored (known as *de-identified before first use* or *de-identified on device*).","De-identified Voice",{"id":470,"icon":471,"category":311,"description":472,"title":473},"tech__dtpr_api","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fdtpr_api.svg","The DTPR API provides machine-readable access to a place-centric registry of systems and sensors that are described using the open-source DTPR taxonomy.","DTPR API",{"id":475,"icon":476,"category":311,"description":477,"title":478},"tech__electric_vehicle_charger","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Felectric_vehicle_charger.svg","An electric vehicle charger (EV charger) supplies power for recharging plug-in electric vehicles.","Electric vehicle charger",{"id":480,"icon":481,"category":311,"description":482,"title":483},"tech__facial_characterization","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Ffacial_characterization.svg","Facial characterization allows a system to make inferences such as gender, facial expression, and age range, but does not identify individuals. The technology does not retain or use any personally identifiable information.","Facial characterization",{"id":485,"icon":486,"category":311,"description":487,"title":488},"tech__gps","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fgps.svg","GPS is one of the global navigation satellite systems that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.","GPS",{"id":490,"icon":491,"category":311,"description":492,"title":493},"tech__hands_free","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fhands_free.svg","Describes a technology where the primary mode of interaction does not require the use of hands, for example, devices that respond to voice commands or gesture based \"touchless\" interfaces.","Hands-free",{"id":495,"icon":496,"category":311,"description":497,"title":498},"tech__identifiable_image","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fidentifiable_image.svg","Generates still images of a sufficient resolution where individuals can be identified, for example by capturing images of faces or unique numbers such as vehicle license plates. Identifying information can be collected either through manual review of images by a person, or through computer vision techniques that derives information in the form of data from images.","Identifiable Image",{"id":500,"icon":501,"category":311,"description":502,"title":503},"tech__identifiable_nfc","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fidentifiable_nfc.svg","A wireless communication protocol for electronic devices that are within a short distance of each other, typically used in ticketing or payment systems. In this case, unique identification is possible, for example if a particular item is closely associated with an individual's personal data.","Identifiable NFC",{"id":505,"icon":506,"category":311,"description":507,"title":508},"tech__identifiable_rfid","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fidentifiable_rfid.svg","Enables the identification of items using electromagnetic fields, commonly used to track inventory in stores. In this case, unique identification is possible, for example if a particular item is closely associated with an individual's personal data.","Identifiable RFID",{"id":510,"icon":511,"category":311,"description":512,"title":513},"tech__identifiable_video","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fidentifiable_video.svg","Generates video footage of a sufficient resolution where individuals can be identified, for example by capturing images of faces or unique numbers such as vehicle license plates. Identifying information can be collected either through manual review by a person, or through computer vision techniques that derives information in the form of data from video or images.","Identifiable Video",{"id":515,"icon":516,"category":311,"description":517,"title":518},"tech__identifiable_wifi_sensor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fidentifiable_wifi_sensor.svg","W﻿iFi sensors measure the strength of the wireless signals from cell phones and other mobile devices.  These measurements can be used to track the positions and movement of these devices in physical space. This may be associated with the hardware addresses of the devices themselves.","Identifiable WiFi Sensor",{"id":520,"icon":521,"category":311,"description":522,"title":523},"tech__image","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fimage.svg","Generates still images.","Image",{"id":525,"icon":526,"category":311,"description":527,"title":528},"tech__image_infrared","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fimage_infrared.svg","Generates still images in the infrared portion of the electromagnetic spectrum.","Image - infrared",{"id":530,"icon":531,"category":311,"description":532,"title":533},"tech__inclinometer","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Finclinometer.svg","Measures the slope, angle or tilt of objects based on gravity.","Inclinometer",{"id":535,"icon":536,"category":311,"description":537,"title":538},"tech__induction_loop","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Finduction_loop.svg","An induction loop uses a moving magnet to generate an electric current in a nearby wire. When a metal object moves close to the wire it changes the current. This makes it useful for detecting vehicles or other metal objects.","Induction Loop",{"id":540,"icon":541,"category":311,"description":542,"title":543},"tech__intercom","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fintercom.svg","An intercom (intercommunication device) is a stand-alone voice communications system for use within a building or small collection of buildings, and is separate from other communications networks (such as the telephone system).","Intercom",{"id":545,"icon":546,"category":311,"description":547,"title":548},"tech__li_dar","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fli_dar.svg","Uses lasers to measure distances to objects, collecting data that can create a 3-D representation of the object.","LiDAR",{"id":550,"icon":551,"category":311,"description":552,"title":553},"tech__location_beacon","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Flocation_beacon.svg","Beacons are Bluetooth low energy (LE) hardware transmitters  that broadcast their identifier to nearby portable electronic devices. The technology enables smartphones, tablets and other devices to perform actions when in close proximity to a beacon.","Location Beacon",{"id":555,"icon":556,"category":311,"description":557,"title":558},"tech__microphone","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fmicrophone.svg","A device that generates audio.","Microphone",{"id":560,"icon":561,"category":311,"description":562,"title":563},"tech__motion_detector","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fmotion_detector.svg","A sensor that detects the movement of nearby objects.","Motion Detector",{"id":565,"icon":566,"category":311,"description":567,"title":568},"tech__nfc","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fnfc.svg","A wireless communication protocol for electronic devices that are within a short distance of each other, typically used in ticketing or payment systems. No identifying data is collected in this case.","NFC",{"id":570,"icon":571,"category":311,"description":572,"title":573},"tech__non_identifiable_video","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fnon_identifiable_video.svg","Generates video footage incapable of identifying individuals due to factors such as low-resolution, so that faces or unique numbers such as vehicle license plates cannot be determined.","Non-identifiable Video",{"id":575,"icon":576,"category":311,"description":577,"title":578},"tech__passive_infrared_sensor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fpassive_infrared_sensor.svg","An electronic sensor that measures infrared (IR) light radiating from objects in its field of view.","Passive Infrared Sensor",{"id":580,"icon":581,"category":311,"description":582,"title":583},"tech__person_detection","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fperson_detection.svg","Person detection refers to when a system can detect the presence of humans in images or videos, and identify where they are located or how many there are in an image, but does not identify individuals. The technology does not retain or use any personally identifiable information.","Person detection",{"id":585,"icon":586,"category":311,"description":587,"title":588},"tech__personal_device","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fpersonal_device.svg","A mobile device that combines cellular and mobile computing functions into one unit, that is intended for use by one person.","Personal Device",{"id":590,"icon":531,"category":311,"description":591,"title":592},"tech__piezoelectric_sensor","Measures changes in pressure, acceleration, temperature, strain, or force by converting them to an electrical charge.","Piezoelectric sensor",{"id":594,"icon":595,"category":311,"description":596,"title":597},"tech__radar","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fradar.svg","Uses radio waves to detect objects, or measure how they are moving through a space, such as vehicles.","Radar",{"id":599,"icon":600,"category":311,"description":601,"title":602},"tech__rfid","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Frfid.svg","Enables the identification of items using electromagnetic fields, commonly used to track inventory in stores, but not for identifying individual items.","RFID",{"id":604,"icon":605,"category":311,"description":606,"title":607},"tech__soil_moisture_sensor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsoil_moisture_sensor.svg","Soil moisture sensors measures the water content in soil.","Soil Moisture Sensor",{"id":609,"icon":610,"category":311,"description":611,"title":612},"tech__sound_level_meter","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsound_level_meter.svg","Takes acoustic measurements, most typically for measuring noise pollution.","Sound Level Meter",{"id":614,"icon":615,"category":311,"description":616,"title":617},"tech__system_screen","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fsystem_screen.svg","People can interact with this digital system using the screen that is provided as part of device installation.","System Screen",{"id":619,"icon":310,"category":311,"description":312,"title":313},"tech__technology_switch",{"id":621,"icon":622,"category":311,"description":623,"title":624},"tech__thermometer","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fthermometer.svg","Measures the temperature of or changes of temperature in the physical environment, and quantifies those attributes according to a standardized scale such as Celsius or Fahrenheit.","Thermometer",{"id":626,"icon":627,"category":311,"description":628,"title":629},"tech__ultrasonic_level_sensor","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fultrasonic_level_sensor.svg","Uses ultrasonic waves to measure distances to objects. The sensor emits an ultrasonic wave and receives the wave reflected back from the object. The distance is calculated using the time between emission and reception.","Ultrasonic Sensor",{"id":631,"icon":632,"category":311,"description":633,"title":634},"tech__unmanned_aircraft_system","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Funmanned_aircraft_system.svg","An unmanned aircraft system (UAS) consists of an unmanned aircraft and the equipment necessary for the safe and effective operation of that aircraft. An unmanned aerial vehicle (UAV) is one component of this system.","Unmanned Aircraft System",{"id":636,"icon":637,"category":311,"description":638,"title":639},"tech__video_camera","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fvideo_camera.svg","Generates video footage.","Video camera",{"id":641,"icon":642,"category":311,"description":643,"title":644},"tech__video_camera_infrared","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fvideo_camera_infrared.svg","Generates video footage in the infrared portion of the electromagnetic spectrum.","Video camera - infrared",{"id":646,"icon":647,"category":311,"description":648,"title":649},"tech__voice","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fvoice.svg","Audio data is collected that does or can identify individuals, either through manual review or by technologies that can determine either what is being said, or who is saying it.","Voice",{"id":651,"icon":652,"category":311,"description":653,"title":654},"tech__water_quality","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwater_quality.svg","Measures various aspects of water quality, such as the amount of dissolved oxygen in water, pH, nitrates and dissolved oxygen.","Water Quality",{"id":656,"icon":657,"category":311,"description":658,"title":659},"tech__weather_station","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fweather_station.svg","A set of instruments for measuring atmospheric conditions such as temperature, precipitation, wind speed and direction, and barometric pressure.","Weather Station",{"id":661,"icon":662,"category":311,"description":663,"title":664},"tech__weighing_scale","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fweighing_scale.svg","A weighing scale is a device to measure weight or mass. No identifying data is collected in this case.","Weighing Scale",{"id":666,"icon":667,"category":311,"description":668,"title":669},"tech__wireless_access_point","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwireless_access_point.svg","Provides wireless access to a wired computer network, or to the internet.","Wireless Access Point",{"id":671,"icon":672,"category":311,"description":673,"title":674},"tech__wireless_charging_roadway","https:\u002F\u002Fdtpr.io\u002Fdtpr-icons\u002Fwireless_charging_roadway.svg","Copper coil segments buried under the road are activated to charge an electric vehicle battery using magnetic induction, which means that electric vehicles equipped with a special receiver can be charged while it is driving along or is parked over the road.","Wireless Charging Roadway"]