Assessment of the data processor's compliance with the GDPR regulations

Professionally prepared training on key issues related to conducting processor audits, which will equip participants with the skills to plan and execute the entire audit process.

About the training

An effective training for individuals looking to expand their knowledge in the field of personal data security and processor audits.

The training is conducted in the form of lectures and workshops, ensuring the effective application of new knowledge and skills to practical actions. We focus not only on providing theoretical knowledge but, most importantly, on delivering effective, practical methods and techniques, as well as valuable experiences and best practices. The training is one day long, and participants will receive a certificate of attendance upon completion. During the training, key issues related to conducting processor audits will be discussed. The materials and exercises carried out during the training will prepare participants to plan and execute the entire processor audit process.

Training program

Day 1
9:00 - 16:00

  • Welcome participants
  • GDPR Processor Audit – Introduction and Basic Concepts
  • Audit Specification
  • Legal Status and Responsibilities of Entities Responsible for Personal Data Security
  • Analysis of the Benefits and Challenges of Conducting an Audit
  • Methodology and Principles for Conducting an Audit
  • Lunch Break
  • Who to Audit? Selection of the Processor
  • Tips for Auditing the Processor
  • Verification of Documentation
  • Response to Violations and Irregularities in Personal Data Protection
  • Post-Audit Actions in Practice
  • Questions and Discussion

Training price

Price per participant: 1200.00 PLN net

Registration for On-Site Training

Fill out this form if you want to participate in an Open On-Site Training. If you’re interested in online participation, register here: Online Training Registration Form.

We can also organize a closed training tailored to your specific request: send an inquiry and receive a quote.

Submitting the registration means acceptance of the terms and conditions of participation.

Training program

Day 1
9:00 - 16:00

  • Welcome to participants
  • GDPR Processor Audit – Introduction and Basic Concepts
  • Audit Specification
  • Legal Status and Responsibilities of Entities Responsible for Personal Data Security
  • Analysis of the Benefits and Challenges of Conducting an Audit
  • Methodology and Principles for Conducting an Audit
  • Lunch Break
  • Who to Audit? Selection of the Processor
  • Tips for Auditing the Processor
  • Verification of Documentation
  • Response to Violations and Irregularities in Personal Data Protection
  • Post-Audit Actions in Practice
  • Questions and Discussion

Training price

Price per participant: 700.00 PLN net

Registration for Online Training

Fill out this form if you want to participate in an online training. If you’re interested in on-site training, register here: Offline Training Registration Form.

We also offer closed training tailored to your specific needs: send an inquiry and receive a quote.

Submitting the registration means acceptance of the terms and conditions of participation.

Dedicated exclusively to your organization – this approach guarantees comfort and flexibility to thoroughly discuss specific issues and situations within your organization. We understand that every business is different, so to effectively translate the acquired knowledge into your organizational context, we tailor the examples presented to your specific needs and business situation.

Training program

Day 1
9:00 - 16:00

  • Welcome to the participants
  • GDPR Processor Audit – Introduction and Basic Concepts
  • Audit Specification
  • Legal status and tasks of entities responsible for personal data security
  • Analysis of benefits and difficulties of conducting the audit
  • Method and rules for conducting the audit
  • Lunch break
  • Who should be audited? Selecting the processor
  • Tips for auditing the processor
  • Documentation verification
  • Response to breaches and irregularities in personal data protection
  • Post-audit activities in practice
  • Questions and discussion

How does it work?

Step 1

APPLICATION

In the first step, fill out the registration form to let us know about your interest in organizing a dedicated training for your company.

Step 2

DATE

We will set the date and location of the training – we will adapt to your availability and individual expectations.

Step 3

PRICE

We will present the terms and conditions for organizing the training based on the agreed parameters and the number of participants.

Step 4

TRAINING

We will deliver the customized training according to the agreed terms.

Please ask for a quote for an internal training session.