Information security, CBsoft, s.r.o.
  • Home
  • GDPR EU
    • Data Protection Impact Assessment pursuant to GPDR EU 2016/679
    • Security program how to to achieve the compliance with General data protection regulation - GDPR 2016/679 EU.
    • External data protection officer ( DPO ) for GPDR
  • Security program
    • Information security management system (ISMS) programs according to ISO/IEC 27001
    • Security project for integrity and security of the public electronic networks and services developed in accordance with measure no. O-30/2012 of the Regulatory Authority for Electronic Communications and Postal Service of the Slovak Republic
  • Security audit
    • Preparation for the ISMS external audit according to ISO 27001
    • Security and integrity audit of the public electronic networks and services according to measure O-30/2012 of the Regulatory Authority of the Slovak Republic
  • ISMS management
    • Information security external manager
    • Implementation of information security management system (ISMS) projects according to ISO 27001
    • Preparation for the ISMS audit according to ISO 27001
  • References
  • Contact

Data Protection Impact Assessment pursuant to GPDR EU 2016/679

Details

We offer the Data Protection Impact Assessment pursuant to the General data protection regulation - GDPR 2016/679 of the European Parliament and Council.

What does GDPR data protection impact assessment mean and what does it involve?

Data protection impact assessment is a process intended to describe the processing, assess its necessity and adequacy as well as to help managing the risks to the rights and freedoms of the natural persons resulting from the personal data processing by assessing such risks and determining the measures to deal with them.


The data protection impact assessment is a significant tool ensuring that the relevant entities took over their responsibility, since they are helping the controllers not only to comply with the requirements of the General Data Protection Regulation) but also to prove that they have adopted adequate measures to ensure compliance with the Regulation.
In other words, the data protection impact assessment shall mean the process of building and demonstrating compliance.

The process for building compliance is implemented through a security project program.

This means an implementation of the personal data protection management system. The security project (program) determines the adequate safety measures, technical, organisational and personal, to be introduced to achieve compliance.

When isn’t a DPIA required?
Where a processing is “likely to result in a high risk”.
When the processing is not "likely to result in a high risk", or has already been authorized, or has a legal basis.
For those existing processing operations created after May 2018 or that change significantly.

The data protection impact assessment involves mainly

a) a systematic description of the envisaged processing operations and the purposes of the personal data processing, including, where applicable, the legitimate interest pursued by the controller,
b) an assessment of the necessity and proportionality of the processing operations in relation to the purposes,
c) an assessment of the risks to the rights and freedoms of data subject and
d) the measures envisaged to address the risks, including safeguards, security measures and mechanisms to ensure the protection of personal data and to demonstrate compliance with this Act taking into account the rights and legitimate interests of data subjects and other persons concerned.

Send a request for quotation

Why us?

Our company has been actively working in the field of information technologies

Our experiences, knowledge and active activity in the field of information technologies enable us to process the security analysis and IT system project in a competent way.

Compliance of the outputs with the intra-company guidelines and processes

Examination of the existing documentation (English) and adaptation of our outputs to the existing guidelines and organisation processes already implemented.

Stability of the company

Continuity of our activity: our company has been working in the field for more than 14 years.

Person responsible for qualified consulting

Ing. Daniel Bednárik, education: Faculty of Applied Informatics, Tomas Bata University in Zlín, field of study: Engineering Informatics, Security Technologies.

Internationally accepted and accredited CISM certificate of the ISACA organisation

CISM (Certified Information Security Manager) certificate is intended for experienced information security managers and has been designed to provide an assurance to the executive management that its holders have the required knowledge and skills to perform efficient security management.

The list of the Isaca Slovakia certificate holders (www link).

Certificate of internationally accredited training IRCA, ISO 27001

Ing. Daniel Bednárik passed an internationally accredited training for external auditors/lead auditors for ISO 27001. The accreditation is covered by IRCA (International Register of Certified Auditors). IRCA Certificate No.: 27416.

Qualified independent auditor of the Regulatory Authority for Electronic Communications and Postal Services

Our company is included in the list of qualified independent auditors for the security audit performance in a company providing public electronic communication services. 

The list is published on the Regulatory Authority’s website (www link).

Liability Insurance

Liability insurance for damage caused when providing the services in the field of information technology security in the extent as follows: EUR 100,000, (Colonnade Insurance S.A.).

Send a request for quotation

CBsoft, s.r.o®. - consultancy in the field of information security.