Our team helps businesses understand and comply with the European General Data Protection Regulation (GDPR). We can assist your efforts to stay compliant, in regards to your website as well as any other aspect of your business.
- Evaluate your current privacy policy & cookie policy
- Evaluate your current day-to-day processes that might be affected by GDPR
- Provide recommendations for GDPR compliance
- Recommend & implement suitable GDPR solutions
Generally speaking, individuals have increased rights regarding their personal information
since the regulation came into effect on the 25th of May 2018:
Access their information
Individuals have the right access their information at any time and how their data is used by the company. They can also request a copy of all their personal data stored about them.
The Right to be forgotten
Individuals can withdraw their consent and request for any data related to them to be completely removed.
Data portability
Data can be requested to be transferred to another provider. The business has to comply with the request and provide the requested information in an accessible, readable format.
Data processing
Individuals have to be informed before information is gathered about them. They can give their consent in an opt-in process.
Correct Data
Everyone within the European Union has the right to amend or update information that is associated with them.
Restrict use of Data
Data subjects can request their data not be used or processed. A business can continue to keep the data about the individual, however is not allowed to use it.
Stop Data processing
Individuals can withdraw their consent and request their data not to be processed and used in marketing activities. There are no exceptions to this, the request has to be complied to and businesses have to stop using this data as soon as possible after the request has been made.
Data breach Notification
Every business is obligated to inform any data subject if their data is at risk of being compromised, common practice suggests within 72h since a potential breach has been identified.
and listen closely to you before we get started.
Understand business, its environment & competition
Define objectives and outline how to accomplish them
Work on top priority tasks & facilitate quick results
Repeat the process for each iteration and component.