What do we offer?
We will provide a ready-to-use tool for assessing processors. You will receive survey templates to send to the processor. Using the automated tool – eRisk, you can send communications from your specified email address. The tool monitors survey results in real time, and you can use the reporting module at any time to access the necessary data.
Leverage our expertise to enhance the standards of personal data security.
How do we work?
1. Processor
You are providing a list of processors so that we can configure the tool for you.
2. Conducting surveys
We will prepare survey templates for you that you can customize and send to the processors.
3. Panel
We will prepare and configure a panel for you, allowing you to send and collect surveys in a simple and transparent way.
4. Training
We will teach you how to use the panel, how to interpret the results, and how to create reports. All of this is to ensure that the tool is 100% user-friendly for you.
Let’s talk about your project! Fill out the form
What else do we offer?
We will help implement personal data security in your organization or its individual components. Check out our offer for other services related to personal data security.
GDPR implementation
Discover the scope of our serviceGDPR audit
Discover the scope of our serviceAudit of data processors
Discover the scope of our serviceRisk analysis in GDPR
Discover the scope of our serviceDPIA in GDPR
Discover the scope of our serviceGDPR documentation
Discover the scope of our serviceOutsourcing DPO
Discover the scope of our servicePrivacy by design and privacy by default
Discover the scope of our serviceInternational data transfers
Discover the scope of our serviceSupport for DPO
Discover the scope of our serviceGDPR training
Discover the scope of our serviceWhy us?
Knowledge and experience
Tailored services
Favorable conditions
We work as equals!
They trusted us
Assessment of the effectiveness of organizational and technical measures at processors from our perspective
What tool is used to assess effectiveness?
We use our proprietary tool – erisk.
What is erisk?
erisk is a risk management tool designed to support excellent identification, monitoring, and reporting of risks.
erisk comprehensively handles and automates the risk management process within organizations. It assists businesses and administrative units of all sizes in effectively and efficiently managing and mitigating risks.
It is also used in other areas as a tool that allows for flexible configuration. It strongly supports the area of personal data security.
Why should processor assessments be conducted?
It is your responsibility to verify the compliance with GDPR regulations of contractors who process personal data on your behalf. Surveys will allow you to continuously monitor adherence to national data protection laws as well as the policies and procedures implemented within the organization regarding personal data protection.
Who is processor?
A processor is a contractor to whom you have entrusted the processing of personal data. The data controller has the right to audit such contractors to verify whether the security measures they have declared are actually being implemented.
Meet erisk
erisk is a unique and innovative service available to every business and public administration unit.
erisk is a service of Integrated Risk Management (ERM) It is the result of over a decade of experience in risk management and the latest technologies in cloud solutions.