Technology abstract and tablet in the hands of businessmen. Technology concepts

What is GDPR?

The General Data Protection Regulation (GDPR) or the General Data Protection Regulation is a new set of rules governing the confidentiality and security of personal data set by the European Commission.

The new Unique Data Protection Act implies major changes in all privacy laws across Europe and will replace the old Data Protection Directive.

WHO IS MUST COMPLY TO THIS?

GDPR applies to all public institutions and companies in the European Union that collect and process personal data. Failure to implement this regulation by May 25, 2018 can produce dramatic effects, namely fines of up to 20 million Euros or 4% of GLOBAL turnover for companies or fines of up to 200,000 lei for public institutions.

WHAT SOLUTIONS EXIST?

  • GDPR training course
  • Data Protection Officer (DPO) Outsourcing
  • Definition of GDPR implementation procedures at the organization level
  • Security Audit

GDPR training course

The course is a training, refresher, accountability and analysis program for certifying affected personnel as a Data Protection Officer (DPO). The course will provide information on the approach, alignment and implementation of the GDPR Regulation. Practical activities included in the course are likely to directly support the later work of the institution in accordance with GDPR provisions.

Data Protection Officer (DPO) Outsourcing

The DPO as an outsourced service is a practical and cost-effective solution for organizations lacking the necessary expertise and knowledge in data protection to fulfill their obligations under the General Data Protection Regulation GDPR).

Definition of GDPR implementation procedures at the organization level

An audit will be conducted to identify how personal data is retrieved and processed. A full assessment of compliance with GDPR requirements will be performed. A specialist team will move to your headquarters and design a plan of solutions, procedures, and compliance processes. The next step will be to implement the entire system and test it to ensure that everything is in line with GDPR requirements.

Security Audit

In order to ensure a continuous and efficient work in the company, a fair evaluation of IT systems is needed. The IT Security Audit is designed to determine all the vulnerabilities of the IT system. The result of this action is to objectively assess the needs of the company’s IT system as well as to suggest a viable solution to eliminate its vulnerabilities.