All responsible businesses have a moral and legal obligation to implement and maintain data privacy best practices. Pricoris team examines each client’s specific needs and then creates and implements a bespoke envelope of protection, which includes consulting services & training best suited to that organization’s unique requirements. Data protection is rising on the agenda globally with more countries adopting data protection laws and news of a data breach is no longer an ‘Oh my God’ moment. Welcome to the world of Data Protection. The GDPR has transformed how personal data is collected, shared and used globally. To ensure GDPR compliance, organizations will need to make changes to policies, processes, and contracts, as well as in technical and organizational measures. In some instances, those changes could be complex and significant.

GDPR

GDPR

Too many IT systems, applications, processes are designed solely with their core function and strategic objective in mind. The privacy concerns are too often an afterthought, if a consideration at all, despite many privacy regulations, including GDPR, requiring privacy to be an integral part of any service or process or product’s design.

Current State Assessment (CSA) of the Personal Data Protection Program

Pricoris’ Current State Assessment (CSA) provides an in-depth assessment of the capability and maturity of your current Personal Data Protection based on the applicable regulation, industry best practices and standards like BS 10012, ISO 27552, ISO 29000, Privacy controls in NIST SP 800-37 v5. The CSA will provide you with detailed findings, recommendations, and metrics defining the current maturity of your data protection program. At the end of the study, Pricoris provides expert recommendations to heighten the sophistication and maturity of your Personal Data Protection program. The CSA is an excellent first step for new and existing programs to establish a baseline of maturity and capability and to develop a roadmap for future improvement.

Schedule a free Personal Data Protection consultation

Implement Data Protection including GDPR

Regulations and Personal Data Protection frameworks are applied around the world to build data protection programs and meet vendor management requirements. Pricoris’ experts would conduct a data discovery exercise and understand the flow of data – from its creation to destruction, conduct Data Protection Risk Assessment, set up the data protection governance framework, Data Subject Rights procedures. Pricoris’ knowledge of these regulations and frameworks extends further than just understanding of the controls specified in the regulation like pseudonymization, anonymization, encryption, identity & Access management but the understanding, to how to actually implement them in an organization basis the data collected, stored, used, archived, retained and destroyed.

Privacy Engineering

Privacy engineering uses engineering principles and processes to build controls and measures into processes, systems, components, and products that enable the authorized, fair and legitimate processing of personal information. It is the inclusion and implementation of privacy requirements as part of systems engineering. Privacy Management ISO 20889 on Data Deidentification Techniques is

Pricoris’ engineers provide solutions to build your products and services keeping privacy in mind.

Schedule a free Personal Data Protection consultation

Data Protection Impact Assessment Services

Pricoris works with your team to develop an effective Personal Data Protection Impact Assessment program right from its applicability, setting up criteria for impact assessment to conduct of DPIA throughout the personal data lifecycle.

Data Protection Breach Assessment Testing

Our Breach assessments designed specifically to meet regulatory requirements and address the needs of any size organization. To determine the adequacy of your existing data breach controls, both proactive and reactive Pricoris’ experts would deploy the kill chain by Establishing Foothold, Command, and Control, Escalation of  Privileges, Move Laterally, Mission completion in your network by infiltrating your network, escalate privileges and exfiltrate data. Reactive procedures like breach escalation, a notification will also be tested.