0
0
No-Codeknowledge~10 mins

Privacy rules and data access in No-Code - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Privacy rules and data access
User Requests Data Access
Check Privacy Rules
Allow Access
Provide Data
This flow shows how a data access request is checked against privacy rules to decide if access is allowed or denied.
Execution Sample
No-Code
User requests data
System checks privacy rules
If allowed, data is provided
If denied, error shown
This simple process checks if a user can access data based on privacy rules and responds accordingly.
Analysis Table
StepActionPrivacy Rule CheckResultSystem Response
1User requests access to dataN/AN/AProceed to check rules
2System checks if user has permissionUser has permission?YesAllow access
3System provides requested dataN/AN/AData shown to user
4User requests access to restricted dataUser has permission?NoDeny access
5System denies accessN/AN/AShow error message
💡 Access is allowed only if privacy rules confirm permission; otherwise, access is denied.
State Tracker
VariableStartAfter Step 2After Step 4Final
User PermissionUnknownYes or NoNoDetermines access
Access GrantedFalseTrue if permission YesFalse if permission NoTrue or False
System ResponseNoneData provided if TrueError message if FalseFinal output to user
Key Insights - 2 Insights
Why does the system deny access even if the user requests data?
Because the privacy rules check (Step 2 and 4) shows the user does not have permission, so access is denied as shown in the execution_table rows 4 and 5.
What happens if the user has permission according to privacy rules?
The system allows access and provides the data, as seen in execution_table rows 2 and 3.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution table, what is the system response at Step 3?
AShow error message
BDeny access
CData shown to user
DCheck privacy rules
💡 Hint
Refer to the 'System Response' column at Step 3 in the execution_table.
At which step does the system decide to deny access?
AStep 2
BStep 4
CStep 3
DStep 1
💡 Hint
Look at the 'Result' and 'System Response' columns in the execution_table for Step 4.
If the user permission variable changes to 'Yes' after Step 2, what will be the final system response?
AProvide data
BDeny access
CShow error message
DRequest more info
💡 Hint
Check variable_tracker for 'User Permission' and 'System Response' after Step 2.
Concept Snapshot
Privacy rules control who can access data.
When a user requests data, the system checks these rules.
If allowed, data is provided; if not, access is denied.
This protects sensitive information from unauthorized users.
Full Transcript
When a user asks to see data, the system first checks privacy rules to see if the user has permission. If the user is allowed, the system shows the data. If not, it denies access and shows an error message. This process ensures data is only shared with authorized people.