Skip to content
Trigonum Logo
  • companyCompany
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups – Branches
    • Icon Ideas exchangeConsulting Approach
    • Icon StärkeOur Competences
    • Ziel erreichtReference Projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Automobil TISAXVDA Information Security
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • Icon ISMS safeISMS Critical Infrastructures
    • Cloud securetySafely in the Cloud
  • law, GDPR, DSGVOData Privacy
    • ChecklistExternal Data Privacy Check
    • Notes Requirements ManagementData Privacy Documentation
    • Icon privacy policyData Privacy Concept
    • GDPR, DSGVOGDPR
    • Dokumentation VerarbeitungData Processing Register
    • Icon IT ConsultantTOM Check
    • data protectionExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • FormContract Processing
    • Icon PINCombined Security
  • Ihre Spezialisten für InformationssicherheitProject Management
    • Requirements Management
    • Icon MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • recordsMethods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • NotebookISMS Portal
      • recordsDocument Management
      • magnifier, flawAudit Management
      • Asset Register
      • Processing DescriptionRecords of processing activities
      • FunktionSharePoint Workflows
      • Icon AchtungRisk Management
      • Icon privacy policyPrivacy Impact Assessment
      • Supplier Management
      • Contract management
      • Measure Management
      • DashboardReporting / KPIs / Dashboards
      • Process Management
      • Project planProject Management
    • FunctionQM Portal
    • ChecklistRevision Tool
    • Dokumentation VerarbeitungRecords of processing activities
    • ICON ToolsEmergency and fault management
  • schoolTraining
    • instructionClassroom Training
    • Icon eLearningelearning Portal
  • Deutsch
  • companyEnterprise
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups & Branches
    • Consulting approach
    • Icon strongOur competences
    • achieveReference projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Icon AutoVDA Information Security Assessment
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • ISMS critical infrastructures
    • Cloud securetySafely in the Cloud
  • DSGVO & BDSG neuData Privacy
    • ChecklistExternal Data Privacy Check
    • letterData Privacy Documentation
    • data protectionData Privacy Concept
    • European Union flagGDPR
    • Processing DescriptionData Processing Register
    • ConstulantTOM Check
    • Icon DS ExperteExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • data protectionContract Processing
    • Icon PINCombined Security
  • planProject Management
    • DashboardRequirements Management & IT Governance
    • Project Management Training MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • Icon DocumentationProject Management Methods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • ISMS Portal
    • Icon TeamsQM Portal
    • ChecklistThe revision tool
    • ICON toolsEmergency and fault management
    • Icon DocumentationDocument Management
    • magnifier, flawAudit Management
    • Asset Register
    • Processing DescriptionRecords of processing activities
    • Icon privacy policyPrivacy Impact Assessment
    • Contract management
    • Measure Management
  • schoolTraining
    • Icon SchulungClassroom Training
    • graduateelearning Portal
  • Deutsch
  • Digitalisierung
  • SharePoint Workflows
  • Collaboration (Teams)
  • Prozessmanagement
Data Privacyadmin2020-01-21T15:08:56+01:00
Icon Team

Our data privacy team

Team foto

Data privacy - secure and efficient!

Our highly qualified data privacy experts from Hamburg can advise you on all aspects of data privacy. Your personal data privacy officer will uncover further optimisation potential within the framework of data privacy consulting.  Our practical expertise reduces costs and enables us to implement the necessary measures quickly.

The entry into force of the DSGVO in May 2018 places high demands on companies. Existing data privacy processes and regulations must be rethought and, if necessary, adapted.

Transparency is half the privacy

In order to implement the new requirements efficiently, a data privacy management system should be introduced. We have developed a process model with which companies can implement the new requirements in a targeted manner. Our consultants will work with you to determine your status and support you in developing the necessary concepts for setting up a suitable data protection management system for your company to implement the requirements of the DSGVO.

Icon Team

Our data privacy team

Team foto

Data privacy - secure and efficient!

Our highly qualified data privacy experts from Hamburg can advise you on all aspects of data privacy. Your personal data privacy officer will uncover further optimisation potential within the framework of data privacy consulting.  Our practical expertise reduces costs and enables us to implement the necessary measures quickly.

The entry into force of the DSGVO in May 2018 places high demands on companies. Existing data privacy processes and regulations must be rethought and, if necessary, adapted.

Transparency is half the privacy

In order to implement the new requirements efficiently, a data privacy management system should be introduced. We have developed a process model with which companies can implement the new requirements in a targeted manner. Our consultants will work with you to determine your status and support you in developing the necessary concepts for setting up a suitable data protection management system for your company to implement the requirements of the DSGVO.

Our data privacy solutions

Datenschutz Dokumentation

Data privacy documentation

The data privacy documentation provides the framework for the concepts and processes to be implemented. It is divided into three levels: “guidelines”, “concepts” and “implementation documents”. Thus the legal documentation requirements can be covered. In addition, employees find orientation here with regard to data privacy requirements and regulations in their company.

Read More

Employee sensitisation

An important component of data privacy is employee awareness. In companies, 2/3 of all security-relevant incidents – mostly unknowingly – are caused by the company’s own employees (from the management to the system administrators and IT specialists to the users).

Read More

TOM Check

Companies that collect, process or use personal data are obliged to take the technical and organisational measures (TOM) necessary to comply with the provisions of the DSGVO. Measures from the following areas are to be taken, provided that their expenditure is proportionate to the intended protective purpose.

Read More

Customised data privacy concept

In order to implement the new requirements efficiently, a data protection management system should be introduced. We have developed a process model with which companies can implement the new requirements in a targeted manner. Our consultants will work with you to determine your status and support you in developing the necessary concepts for setting up a suitable data privacy management system for your company to implement the requirements of the GDPR.

Read More

Contract processing

Today, external service providers are increasingly used for the performance of tasks. In many cases, this means data transfer to third parties and represents a particular challenge from the point of view of data privacy. In order to find a pragmatic solution, the legislator has defined contract processing (AV), whereby the external service provider can be handled like an internal department of the company.

Read More

Combined security

The information security requirements of customers, legislators, banks and insurance companies are constantly increasing. More and more customers demand concrete proof from their suppliers that an efficient information security management system has been established. In addition, companies are obliged to ensure the proper processing of personal data. Both sectors should not be considered in isolation, but together in order to achieve maximum synergies.

Read More

External data privacy check

With the help of the data privacy check, our external data privacy officer will give you an overview of whether your company complies with the legal provisions on data protection and if there is a need for action. We will provide you with a practical guide for the further implementation of data privacy tasks.

Read More

Data privacy and processing register

The answer to questions such as “In which processing are personal data processed?” or “Who has access to the data processed within the processing?” is often not easy for those responsible – there is a lack of transparency about this.

Read More

External data privacy officier

Your resources are limited? On request, we will provide you with an external data privacy officer from Hamburg to fulfil your legal obligations. Our external data privacy officer will support you in the data privacy concerns of your company. Our practical competence reduces costs and necessary measures can be implemented quickly.

Read More
Imprint  |  Privacy Policy | Downloads
Copyright by Trigonum GmbH | All Rights Reserved
  •  

Go to Top