Ready for GDPR?
Protect your business and your customers
We will help you achieve
GDPR compliance

Be GDPR compliant
You receive the benefit of our legal and technological expertise to make sure your business GDPR compliant.

Keep your data is safe and secure
Your data and your customer’s data is your most valuable asset and we ensure it is protected at all times.

Have complete peace of mind
You have peace of mind as we ensure that your business is GDPR compliant both now and in the future.
Features
- Legal Compliance
- GDPR Impact Analysis
- Regular GDPR Reviews
- Monitoring
- Access Control
- Data Protection Officer
We will…
- conduct a due diligence into the legal aspects of your business
- focus on how compliant your contracts are will GDPR
- closely examine your employment contracts, purchase contracts and sale contracts for GDPR compliance
- ensure that you comply with consent obligations and that your data is processed in accordance with GDPR
- recommend improvements to ensure that you are covered legally and within GDPR going forward
We will…
- identify all PII (Personal Identify Information) in your databases, apps, integrations, backups, and we will produce a PII Catalogue so that your organization can plan a data protection more accurately.
- analyze how your orgranisation deals with access logs and other personal information and propose GDPR relevant improvement
- review all digital access control of your employees and contractors, and propose practical enhancement to improve your organization’s GDPR compliance
We will…
- Provide ongoing GDPR compliance support
- Conduct regular audits to make sure you remain compliant as your business grows, new technologies are introduced, and legal requirements change
- Provide your business with concise compliance documentation so you’re always aware of your GDPR status
We will…
- Provide a tactical overview of all operations within your organization with fully integrated logging and forensics service
- Provide activity and access log analysis and early detection of data privacy and cybersecurity incidents.
- Review and investigate incidents recursively with data retention policies starting at one year.
- Continuously monitor your infrasturucture logs to provide situational awareness of security (is it secure?), data privacy (are there any breaches?), availability (is it up and running?) and IT operations (what are typical IT issues?) perspective
- Alert you in the event of any availability, IT operations, or security incident. We also provide 1st line support by coordinating incident response to ensure smooth recovery
- Utilize machine learning to constantly analyze your logs, allowing us to react to any emerging incidents before they escalate into major problems
We will…
- Ensure that only authorized employees or contractors have access to production servers / services
- Provide technology that allows centralized access controls to servers over SSH and other protocols
- Implement a simple-to-use tool that manages access of all employees and contractors to internal and external resources
- Integrate federated directory services for streamlined access control if necessary
We will…
- be your primary contact for customer enquiries regarding private data
- be your point of contact to authorities in case of need
- co-ordinate your incident response and recovery
“Don’t wait any longer”
Who are we?
The Offers
Package A | Package B | Package C | |
---|---|---|---|
Legal | |||
Legal risk assessment | Essential | Essential plus | Full service |
Legal contract template package | ![]() | ![]() | Fully customised |
Litigation services | On request | On request | On request |
Web Policy update / notification | ![]() | ![]() | ![]() |
GDPR Impact Analysis | |||
Process risk assessment | Common risks | Customised risk assessment | Customised risk assessment |
Process analysis | Best industry practice overview | Best industry practice overview | Best industry practice overview |
PII clasification | Template + DIY | Workshop + DIY | ![]() |
Vendor check for GDPR compliance | - | Limited | ![]() |
Office physical security | Template + DIY | ![]() | ![]() |
Data retention review | Workshop + DIY | Template + DIY | ![]() |
Access management review | Template + DIY | Workshop + DIY | ![]() |
Monitoring | |||
Log management | ![]() | ![]() | ![]() |
Incident response | - | 8/5 | 24/7 |
Continuous monitoring for data leakages | - | - | ![]() |
Access control | |||
Access control review | - | ![]() | ![]() |
Access control management | - | - | ![]() |
Deidentification of personal data | - | ![]() | ![]() |
Regular GDPR reviews | |||
Semaphore-type compliance status report | - | Every 3 months | Every month |
Data protection officer as a service | - | ![]() | ![]() |
Continuous GDPR compliance check | - | ![]() | ![]() |
Extra cheese | |||
Certification | - | ![]() | ![]() |
Package A | Package B | Package C |
Package A
Package B
Package C
Legal
Legal risk assessment
Essential
Legal contract template package

Litigation services
On request
Web Policy update / notification

GDPR Impact Analysis
Process risk assessment
Common risks
Process analysis
Best industry practice overview
PII clasification
Template + DIY
Vendor check for GDPR compliance
-
Office physical security
Template + DIY
Data retention review
Workshop + DIY
Access management review
Template + DIY
Monitoring
Log management

Incident response
-
Continuous monitoring for data leakages
-
Access control
Access control review
-
Access control management
-
Deidentification of personal data
-
Regular GDPR reviews
Semaphore-type compliance status report
-
Data protection officer as a service
-
Continuous GDPR compliance check
-
Extra cheese
Certification
-
Legal
Legal risk assessment
Essential plus
Legal contract template package

Litigation services
On request
Web Policy update / notification

GDPR Impact Analysis
Process risk assessment
Customised risk assessment
Process analysis
Best industry practice overview
PII clasification
Workshop + DIY
Vendor check for GDPR compliance
Limited
Office physical security

Data retention review
Template + DIY
Access management review
Workshop + DIY
Monitoring
Log management

Incident response
8/5
Continuous monitoring for data leakages
-
Access control
Access control review

Access control management
-
Deidentification of personal data

Regular GDPR reviews
Semaphore-type compliance status report
Every 3 months
Data protection officer as a service

Continuous GDPR compliance check

Extra cheese
Certification

Legal
Legal risk assessment
Full service
Legal contract template package
Fully customised
Litigation services
On request
Web Policy update / notification

GDPR Impact Analysis
Process risk assessment
Customised risk assessment
Process analysis
Best industry practice overview
PII clasification

Vendor check for GDPR compliance

Office physical security

Data retention review

Access management review

Monitoring
Log management

Incident response
24/7
Continuous monitoring for data leakages

Access control
Access control review

Access control management

Deidentification of personal data

Regular GDPR reviews
Semaphore-type compliance status report
Every month
Data protection officer as a service

Continuous GDPR compliance check

Extra cheese
Certification

Contact us
For more information on GDPR compliance, please contact us