What does 2023 hold for privacy in the EU?

Whats does 2023 hold for privacy in the EU? featured image

What does 2023 hold for privacy in the EU? Discover an overview of what is expected in EU’s privacy legislation in 2023 and find out what this means for your business. Boost Privacy Management What does 2023 mean for privacy? The year 2023 will bring many changes to privacy in the EU, with several regulations […]

5 Key Steps in effective Risk Management

Blogpost risk management featured image

5 Key Steps in Effective Risk Management Risk management is applied in most departments of an organization. Yet it’s a key part of privacy and compliance teams’ day-to-day job. Discover our Risk Management Module What is Risk management? Risk management is the process of identifying and assessing risks and creating a plan to minimize or […]

A Guide to Data Subject Right Requests (DSRR)

Blogpost DSRR featured image

A Guide to Data Subject Right Requests What are they and how to handle them. Discover our DSRR module What are Data Subject Right Requests? Under the General Data Protection Regulation (GDPR), data subjects receive exercisable rights, giving them control over the processing of their personal data. These rights must be upheld by organizations that […]

How to: International Data Transfers

Blogpost international data transfers featured image

How to: International Data Transfers Discover our TIA module Intro A lot of organizations are struggling with international data transfers. Rules are strict, and companies can’t just transfer personal data from EEA data subjects outside of this region. Look at Google. Even they are in a tight spot with Google Analytics and Google Fonts after […]

How to create lasting Phishing Awareness in any organization

Blogpost SMEs featured image

How to create lasting Phishing Awareness in any organization. Discover the core steps to set up an Awareness program in your organization to strongly diminish the effect of Phishing attacks. Find out how RESPONSUM can help What is Phishing? Criminals use phishing to install malicious software on your computer, to steal your log in credentials […]

RoPA: What is it and how to approach its development

Blogpost RoPA featured image

Records of Processing Activities (RoPA): What is it and how to approach its development? Discover our RoPA module What is a Record of Processing Activities? Article 30 of the General Data Protection Regulation (GDPR) states that controllers and processors are required to maintain Records of Processing Activities (RoPA). This obligation helps your company achieve GDPR […]