GDPR Compliance Services

The General Data Protection Regulation (GDPR) requires businesses to protect personal data and privacy of individuals located in the EU and to provide them with the means to exercise their rights to manage that data. Although effective since 2016, May 2018 marks the end of the post-adoption grace period and non-compliance to the new regulations can be costly.

CTG’s GDPR Compliance Services are designed to address both short and long term client needs. Our services are highly configurable and reflect the 13-step approach defined and promoted by the Belgian Supervisory Authority.

Services 

Assessment and Roadmap

Assessment and Roadmap: A Privacy Compliance services seeks to answer questions concerning the state of your organization’s GDPR compliance and results in a remediation roadmap.

Help Desk

Implementation: Utilizing the 13-step GDPR implementation approach recommended by the Belgian Supervisory Authority, our flexible service can be delivered as an end-to-end 13-step solution, or if your GDPR remediation work is underway, as a customized solution that only addresses the steps required to address your organization's gap areas. 

Assessment and Roadmap

Privacy Automation and Technology: CTG offers state-of-the-art data security technology, such as encryption and privacy office automation to optimize your organization's privacy processes.

 

Help Desk

Data Protection Officer (DPO): Many organizations are struggling to find a qualified DPO. Whether fully outsourced, or interim, CTG offers DPOs to get your compliance on track and who assume responsibility for all DPO responsibilities.

 

Data Protection Consultants 

Our Data Protection Consultants play a pivotal role in assessing, implementing, remediating, and then maintaining GDPR compliance in your organization. We invest heavily in the rigorous training, skill and competence development of every Data Protection Consultant - that results in expertise across many different business domains, including:

  • Proficiency in privacy law, combined with deep information technology, information security, and data privacy expertise
  • Achievement of critical certifications, such as CIPP/E, CIPM, CISM, ISO 27001 Lead Implementer, ISO 22301 Lead Implementer, and more