We provide comprehensive support in the management of personal data protection and information security.
Our offerings include:
- GDPR Audit and Implementation Projects
We assist clients in complying with the requirements of the General Data Protection Regulation (GDPR) by conducting audits, assessing compliance, and implementing solutions for data protection. - DPO Outsourcing
We offer Data Protection Officer (DPO) outsourcing services, providing professional support in managing personal data protection. - ISO 27001 Audit and Implementation Projects
We help clients achieve and maintain compliance with the ISO 27001 standard for information security management. - NIS-2 Audit and Implementation Projects
We provide support in adapting to the requirements of the Directive of the European Parliament and of the Council (EU) 2022/2555 concerning cybersecurity. - Whistleblower Protection Solutions Outsourcing
We offer outsourcing services in the area of protecting individuals reporting law violations, ensuring effective actions to maintain impartiality and anonymity.
Audits and implementation projects for GDPR
The GDPR (General Data Protection Regulation) audit and implementation service is a comprehensive approach to securing personal data in accordance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) as well as the Act of 10 May 2018 on the protection of personal data (Journal of Laws of 2018, item 1000).
This type of service includes conducting an audit aimed at assessing the state of personal data processing within the organization and identifying areas requiring improvement.
The main stages of the service include:
- Analysis of existing procedures and processes: auditors conduct a detailed analysis of documentation related to the processing of personal data within the organization, including policies, procedures, standards, regulations, consents, information obligations, agreements with data processors, and other relevant documents related to data security and acquisition.
- Assessment of compliance with GDPR requirements: Based on the analysis of documentation and data processing practices, an assessment of the organization’s compliance with GDPR requirements is conducted. In particular, principles such as legality, fairness, and transparency of data processing, purpose limitation, data minimization, accuracy, limitation of data storage, as well as principles of integrity, confidentiality, accountability, and accessibility are checked.
- Identification of areas requiring improvement: Based on the results of the analysis, auditors identify areas where the organization needs improvement to ensure compliance with GDPR requirements. These may include issues related to procedures and documentation, as well as technical infrastructure or staff training.
- Implementation of recommended solutions: After identifying areas requiring improvement, auditors support the organization in implementing recommended solutions, which may include preparing or updating documentation, introducing new procedures, recommendations regarding the adjustment of IT systems, or staff training.
- Monitoring and maintaining compliance: The GDPR audit and implementation service may also include ongoing monitoring of the organization’s activities and support in maintaining compliance with GDPR requirements.
In summary, the GDPR audit and implementation service aims not only to assess the organization’s compliance with GDPR regulations but also to support the implementation of necessary changes and the maintenance of high standards of personal data protection.
Outsourcing of DPO (Data Protection Officer)
The service of “outsourcing IOD (DPO) tasks” is a dedicated solution for organizations in need of support in fulfilling obligations related to the Data Protection Officer (DPO), also known as the Data Protection Officer (DPO) in the context of the General Data Protection Regulation (GDPR) or other relevant data protection regulations.
The main elements of the service include:
- Fulfilling the role of IOD (DPO): Outsourcing IOD (DPO) tasks involve delegating responsibilities associated with the Data Protection Officer function to our specialists, who possess the appropriate qualifications and experience in the field of personal data protection. Our specialists act as IOD (DPO) on behalf of the organization, thus providing professional support in the field of data protection.
- Monitoring compliance with regulations: The IOD (DPO) is responsible for monitoring the organization’s compliance with regulations concerning the protection of personal data, including GDPR regulations. This includes regular compliance assessments, identifying risks associated with data processing, and providing recommendations to ensure full compliance.
- Advisory and support:
- The IOD (DPO) provides the organization with support and advice on issues related to the protection of personal data. This includes providing advice on data protection policies and procedures, analyzing risks associated with data processing, and responding to incidents related to data breaches.
- Training and education:
- The external IOD (DPO) can also provide training and educational materials for the organization’s staff on the principles of data protection and the obligations arising from the GDPR or other relevant regulations.
- Representation before supervisory authorities: If necessary, the IOD (DPO) can represent the organization before supervisory authorities for data protection, providing professional support in the process of audits and inspections.
The “outsourcing IOD (DPO) tasks” service allows organizations to benefit from the expertise of specialists in the field of personal data protection while reducing costs and risks associated with employing an internal Data Protection Officer. As a result, organizations can focus on their core activities, knowing that their obligations related to data protection are fully met by a qualified external team.
Audits and implementation projects for ISO 27001
The ‘ISO 27001 Implementation’ service is a comprehensive approach to implementing the ISO 27001 standard within an organization for effective management of information security. ISO 27001 is an international standard for information security management that provides a framework for identifying, analyzing, and managing risks related to information security.
The main elements of the service include:
- Analysis and assessment: The first step involves conducting a comprehensive analysis of the organization’s needs and assessing its current level of compliance with ISO 27001 requirements. During this analysis, gaps and areas requiring improvement in information security are identified.
- Planning and design: Based on the analysis results, a personalized implementation plan is developed, taking into account the organization’s goals, industry specifics, and ISO 27001 requirements. The project includes defining policies, procedures, security controls, and risk management processes.
- Implementation: The next step is to implement the designed solutions within the organization. This includes training the staff, implementing new procedures, deploying tools for monitoring and controlling security, and adjusting the organizational structure to meet ISO 27001 requirements.
- Audit and certification: After the implementation is completed, an internal audit is conducted to verify the compliance of the information security management system with ISO 27001 requirements. Upon successful completion of the audit, the organization may, although it is not required, apply for ISO 27001 certification.
- Monitoring and improvement: The organization must continuously monitor the effectiveness of its information security management system, identify areas requiring improvement, and take corrective actions.
The ‘ISO 27001 Implementation’ service aims to ensure effective and sustainable management of information security within the organization, contributing to increased trust among customers, business partners, and investors.
Audits and implementation projects for NIS-2
The service of implementing Directive 2022/2555 on cybersecurity (NIS-2) entails a comprehensive process of aligning organizations with the requirements stemming from the Directive of the European Parliament and of the Council (EU) 2022/2555 of December 14, 2022, concerning measures for a high common level of cybersecurity within the territory of the European Union. This directive introduces significant changes in the realm of cybersecurity aimed at enhancing the protection of digital infrastructure and personal data, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148.
The main elements of the “implementation of cybersecurity directives” service include:
- Analysis of directive applicability: The initial step involves analyzing the implementation needs of EU Directive 2022/2555 within a given organization, understanding its key assumptions, objectives, and cybersecurity requirements.
- Assessment of the current state of cybersecurity: Subsequently, an assessment of the organization’s current cybersecurity state is conducted, identifying gaps, risks, and areas requiring improvement in light of the new directive’s requirements.
- Planning and design: Based on the analysis results, a personalized implementation plan is devised, considering the organization’s specifics and directive requirements. The plan encompasses defining policies, procedures, security controls, and preventive actions.
- Implementation of security measures: The subsequent step involves implementing the designed solutions within the organization. This includes, among other things, deploying new technologies, incident management procedures, staff training, and aligning IT systems with the directive’s requirements.
- Audit and monitoring: Following implementation, an audit is conducted to verify the compliance of the cybersecurity system with the directive’s requirements and the effectiveness of the implemented solutions. Subsequently, the organization continues to monitor its digital environment and takes corrective actions as needed.
The “implementation of Directive 2022/2555 on cybersecurity” service aims to ensure that the organization is prepared for changes in cybersecurity regulations and effectively protects its digital assets from threats. This enables the organization to maintain the trust of its customers, business partners, and meet regulatory requirements.
Outsourcing of solutions in the area of (whistleblowers)
The service of “outsourcing solutions for protecting whistleblowers” aims to support organizations in aligning with the requirements set forth in Directive (EU) 2019/1937 of the European Parliament and of the Council of 23 October 2019 on the protection of persons reporting breaches of Union law, as well as the proposed law on whistleblower protection. This service also includes handling matters reported by whistleblowers while maintaining impartiality and anonymity for whistleblowers at every stage of the process.
The main components of the service include:
- Analysis of legal and organizational requirements: The first step involves a thorough analysis of the organization’s needs and a decision regarding the organizational infrastructure, whether it involves appointing the appropriate individual or internal organizational unit or outsourcing the service to our specialists.
- Assessment of current procedures and practices: Subsequently, an assessment of the organization’s existing procedures and practices related to protecting whistleblowers is conducted to identify areas requiring improvement. In cases where existing procedures and practices are lacking, the appropriate documentation infrastructure is prepared, approved by the organization’s management, or subjected to consultations in accordance with legal requirements.
- Designing protective solutions: Data protection specialists and lawyers collaboratively design protective solutions aimed at ensuring effective protection for whistleblowers based on the analysis results.
- Implementation of changes: The next step involves implementing the designed solutions, including updating procedures, training employees, and implementing relevant technologies to support whistleblower protection. Compliance audit: Following the implementation of changes, a compliance audit is conducted to verify whether the organization meets the requirements of the whistleblower protection law.
- Monitoring and improvement: The service includes monitoring the effectiveness of the implemented solutions and continuous improvement of procedures to ensure long-term protection for whistleblowers.
- Outsourcing: The service also encompasses taking over the handling of matters related to reports of breaches of the law and providing the organization with the appropriate IT infrastructure or technologies.
Contact us
Take the first step to achieving GDPR compliance.
Call, come to the office or send a message!•