Skip to content
Trigonum Logo
  • companyCompany
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups – Branches
    • Icon Ideas exchangeConsulting Approach
    • Icon StärkeOur Competences
    • Ziel erreichtReference Projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Automobil TISAXVDA Information Security
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • Icon ISMS safeISMS Critical Infrastructures
    • Cloud securetySafely in the Cloud
  • law, GDPR, DSGVOData Privacy
    • ChecklistExternal Data Privacy Check
    • Notes Requirements ManagementData Privacy Documentation
    • Icon privacy policyData Privacy Concept
    • GDPR, DSGVOGDPR
    • Dokumentation VerarbeitungData Processing Register
    • Icon IT ConsultantTOM Check
    • data protectionExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • FormContract Processing
    • Icon PINCombined Security
  • Ihre Spezialisten für InformationssicherheitProject Management
    • Requirements Management
    • Icon MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • recordsMethods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • NotebookISMS Portal
      • recordsDocument Management
      • magnifier, flawAudit Management
      • Asset Register
      • Processing DescriptionRecords of processing activities
      • FunktionSharePoint Workflows
      • Icon AchtungRisk Management
      • Icon privacy policyPrivacy Impact Assessment
      • Supplier Management
      • Contract management
      • Measure Management
      • DashboardReporting / KPIs / Dashboards
      • Process Management
      • Project planProject Management
    • FunctionQM Portal
    • ChecklistRevision Tool
    • Dokumentation VerarbeitungRecords of processing activities
    • ICON ToolsEmergency and fault management
  • schoolTraining
    • instructionClassroom Training
    • Icon eLearningelearning Portal
  • Deutsch
  • companyEnterprise
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups & Branches
    • Consulting approach
    • Icon strongOur competences
    • achieveReference projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Icon AutoVDA Information Security Assessment
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • ISMS critical infrastructures
    • Cloud securetySafely in the Cloud
  • DSGVO & BDSG neuData Privacy
    • ChecklistExternal Data Privacy Check
    • letterData Privacy Documentation
    • data protectionData Privacy Concept
    • European Union flagGDPR
    • Processing DescriptionData Processing Register
    • ConstulantTOM Check
    • Icon DS ExperteExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • data protectionContract Processing
    • Icon PINCombined Security
  • planProject Management
    • DashboardRequirements Management & IT Governance
    • Project Management Training MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • Icon DocumentationProject Management Methods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • ISMS Portal
    • Icon TeamsQM Portal
    • ChecklistThe revision tool
    • ICON toolsEmergency and fault management
    • Icon DocumentationDocument Management
    • magnifier, flawAudit Management
    • Asset Register
    • Processing DescriptionRecords of processing activities
    • Icon privacy policyPrivacy Impact Assessment
    • Contract management
    • Measure Management
  • schoolTraining
    • Icon SchulungClassroom Training
    • graduateelearning Portal
  • Deutsch
  • Digitalisierung
  • SharePoint Workflows
  • Collaboration (Teams)
  • Prozessmanagement
External Data Privacy Checkschmidtkev2020-01-30T10:23:59+01:00
data protection

External data privacy check

External IT Consultant

External data privacy check for your company

Our external data privacy check serves to assess the data privacy level in your company in order to make potential weak points and risks transparent. In this way, you receive a neutral as-is assessment of the data privacy status in your company.

Depending on the test result, you will receive recommendations for action to eliminate the risk or recommendations for measures to be taken by you to ensure effective data privacy.

Project plan

Our Approach

Trigonum Consulting uses best practice checklists to determine the status of the current data protection level. The status analysis of external data protection by Trigonum Consulting takes place in the following 4 steps:

  • Determination of the existing corporate structure
  • Analysis of documents relevant to data protection
  • Identification of vulnerabilities and security holes
  • Preparation of a results report on the state of data privacy including identification of weaknesses, risk assessment and catalogue of measures

More details:

KickOff-Termin

Workshop

At the beginning the preliminary talk takes place.

At this meeting it will be determined which procedures are used to use personal data. The initial coordination meeting with the client serves to jointly coordinate the goals and contents and to define the focal points in order to be able to respond optimally to your needs.

Planung durch eDSB

Preparation for Status Analysis

An inspection plan is created to prepare the status analysis. In addition to the questions to be checked, this plan also contains the definition of the contact persons.

The documents relevant for data privacy are compiled. This includes data privacy concepts, guidelines, processing descriptions.

The analysis of the documents serves as an important information basis for the work appointments for status analysis.

Prüfung durch eDSB

Status Analysis

During the on-site visits, we examine the processing relevant to data privacy together with the responsible contact persons and check the data privacy measures taken up to that point. This takes place in the form of personal discussions.

With the tool-supported analysis of the implemented measures, the current implementation status with regard to the legal requirements is systematically determined. The current situation is compared with the company objectives and the requirements of the BDSG (neu). The current implementation status is then assessed and the need for action to achieve the defined goals and legal requirements is derived.

Results

On the basis of the results of the workshops, a Report is prepared and recommendations for improvement measures are called up. The results report provides a transparent status regarding weak points and risks for the different fields of investigation. It consists of a combination of traffic light reports and annotated module and measure overviews. This gives you a transparent status about the current data protection level and the need for action or recommendations for measures.

data protection

External data privacy check

External IT Consultant

External data privacy check for your company

Our external data privacy check serves to assess the data privacy level in your company in order to make potential weak points and risks transparent. In this way, you receive a neutral as-is assessment of the data privacy status in your company.

Depending on the test result, you will receive recommendations for action to eliminate the risk or recommendations for measures to be taken by you to ensure effective data privacy.

Project plan

Our Approach

Trigonum Consulting uses best practice checklists to determine the status of the current data protection level. The status analysis of external data protection by Trigonum Consulting takes place in the following 4 steps:

  • Determination of the existing corporate structure
  • Analysis of documents relevant to data protection
  • Identification of vulnerabilities and security holes
  • Preparation of a results report on the state of data privacy including identification of weaknesses, risk assessment and catalogue of measures

More details:

KickOff-Termin

Workshop

At the beginning the preliminary talk takes place.

At this meeting it will be determined which procedures are used to use personal data. The initial coordination meeting with the client serves to jointly coordinate the goals and contents and to define the focal points in order to be able to respond optimally to your needs.

Planung durch eDSB

Preparation for Status Analysis

An inspection plan is created to prepare the status analysis. In addition to the questions to be checked, this plan also contains the definition of the contact persons.

The documents relevant for data privacy are compiled. This includes data privacy concepts, guidelines, processing descriptions.

The analysis of the documents serves as an important information basis for the work appointments for status analysis.

Prüfung durch eDSB

Status Analysis

During the on-site visits, we examine the processing relevant to data privacy together with the responsible contact persons and check the data privacy measures taken up to that point. This takes place in the form of personal discussions.

With the tool-supported analysis of the implemented measures, the current implementation status with regard to the legal requirements is systematically determined. The current situation is compared with the company objectives and the requirements of the BDSG (neu). The current implementation status is then assessed and the need for action to achieve the defined goals and legal requirements is derived.

Results

On the basis of the results of the workshops, a Report is prepared and recommendations for improvement measures are called up. The results report provides a transparent status regarding weak points and risks for the different fields of investigation. It consists of a combination of traffic light reports and annotated module and measure overviews. This gives you a transparent status about the current data protection level and the need for action or recommendations for measures.

Puzzle

Related Services

Data privacy officer

Your resources are limited? On request, we will provide you with an external data privacy officer from Hamburg to fulfil your legal obligations. Our external data privacy officer will support you in the data privacy concerns of your company. Our practical competence reduces costs and necessary measures can be implemented quickly.

Read more
Documentation

Data privacy documentation

The data privacy documentation provides the framework for the concepts and processes to be implemented. It is divided into three levels: “guidelines”, “concepts” and “implementation documents”. Thus the legal documentation requirements can be covered. In addition, employees find orientation here with regard to data privacy requirements and regulations in their company.

Read more
law, GDPR, DSGVO

GDPR

The Basic Data Privacy Regulation (GDPR) protects the fundamental rights and freedoms of natural persons and in particular their right to the protection of personal data. Our consultants will work with you to determine your status and support you in developing the necessary concepts for setting up a suitable data privacy management system for your company to implement the requirements of the GDPR.

Read more
Imprint  |  Privacy Policy | Downloads
Copyright by Trigonum GmbH | All Rights Reserved
  •  

Go to Top