GDPR

GDPR

Application for producing GDPR documentation.

We provide comprehensive services in the field of IT security implementation. Only until the end of the first year following the entry into force of Regulation (EU) No 1095/2010. 2016/679 (GDPR), we have helped dozens of small and medium-sized businesses implement the new regulation brought by the digital era. Many of our customers have satisfied themselves with fulfilling new obligations with minimal financial and procedural impact. However, we offer a wide range of security implementation levels not only in the area of privacy, but also in the field of IT Cybersecurity and OT Cybersecurity with the possibility of complete IT management.
Leave your IT security to us.

We Offer

  • audit of privacy and information security status

  • corporate and security culture, physical and object security in terms of GDPR

  • identification of personal data in databases and processes

  • elaboration of security documentation of information systems

  • risk analysis

  • safety management system

  • processing conditions for cross-border transfer of personal data within the EEC, as well as to third countries, preparation of binding internal rules or standard contractual clauses standardˈstandərd Preklady výrazu: standard Prídavné MenoFrekvencia

  • information obligation of the operator, information on the rights of data subjects and other statements to data subjects

  • processing and privacy policies for e-shops and websites

  • contracts for the processing and transfer of personal data, contracts between operators and intermediaries

  • formulating consent to the processing of personal data

  • instructing persons processing personal data

  • assistance in handling complaints and suggestions of data subjects and in breaching data

  • advice on the introduction or change of technical, personnel and organizational measures to ensure the protection of personal data

  • projects implementing technical measures

  • performance of external responsible person (DPO)

  • training and education in the field of personal data protection

  • traffic monitoring (network management)

  • Incident recording and resolution

  • audits and conformity assessment