Data Protection Impact Assessment pursuant to GPDR EU 2016/679
We offer the Data Protection Impact Assessment pursuant to the General data protection regulation - GDPR 2016/679 of the European Parliament and Council.
What does GDPR data protection impact assessment mean and what does it involve?
Data protection impact assessment is a process intended to describe the processing, assess its necessity and adequacy as well as to help managing the risks to the rights and freedoms of the natural persons resulting from the personal data processing by assessing such risks and determining the measures to deal with them.
The data protection impact assessment is a significant tool ensuring that the relevant entities took over their responsibility, since they are helping the controllers not only to comply with the requirements of the General Data Protection Regulation) but also to prove that they have adopted adequate measures to ensure compliance with the Regulation.
In other words, the data protection impact assessment shall mean the process of building and demonstrating compliance.
The process for building compliance is implemented through a security project program.
This means an implementation of the personal data protection management system. The security project (program) determines the adequate safety measures, technical, organisational and personal, to be introduced to achieve compliance.
When isn’t a DPIA required?
Where a processing is “likely to result in a high risk”.
When the processing is not "likely to result in a high risk", or has already been authorized, or has a legal basis.
For those existing processing operations created after May 2018 or that change significantly.
The data protection impact assessment involves mainly
a) a systematic description of the envisaged processing operations and the purposes of the personal data processing, including, where applicable, the legitimate interest pursued by the controller,
b) an assessment of the necessity and proportionality of the processing operations in relation to the purposes,
c) an assessment of the risks to the rights and freedoms of data subject and
d) the measures envisaged to address the risks, including safeguards, security measures and mechanisms to ensure the protection of personal data and to demonstrate compliance with this Act taking into account the rights and legitimate interests of data subjects and other persons concerned.
Our company has been actively working in the field of information technologies
Our experiences, knowledge and active activity in the field of information technologies enable us to process the security analysis and IT system project in a competent way.
Compliance of the outputs with the intra-company guidelines and processes
Examination of the existing documentation (English) and adaptation of our outputs to the existing guidelines and organisation processes already implemented.
Stability of the company
Continuity of our activity: our company has been working in the field for more than 14 years.
Person responsible for qualified consulting
Ing. Daniel Bednárik, education: Faculty of Applied Informatics, Tomas Bata University in Zlín, field of study: Engineering Informatics, Security Technologies.
Internationally accepted and accredited CISM certificate of the ISACA organisation
CISM (Certified Information Security Manager) certificate is intended for experienced information security managers and has been designed to provide an assurance to the executive management that its holders have the required knowledge and skills to perform efficient security management.
The list of the Isaca Slovakia certificate holders (www link).
Certificate of internationally accredited training IRCA, ISO 27001
Ing. Daniel Bednárik passed an internationally accredited training for external auditors/lead auditors for ISO 27001. The accreditation is covered by IRCA (International Register of Certified Auditors). IRCA Certificate No.: 27416.
Qualified independent auditor of the Regulatory Authority for Electronic Communications and Postal Services
Our company is included in the list of qualified independent auditors for the security audit performance in a company providing public electronic communication services.
The list is published on the Regulatory Authority’s website (www link).
Liability insurance for damage caused when providing the services in the field of information technology security in the extent as follows: EUR 100,000, (Colonnade Insurance S.A.).