Audits and information security
The ‘starting point’, the ‘opening balance’, ‘establishment of actual state’... Auditors’ check-lists may have different names, but their meaning is the same: to verify the current situation, run a risk assessment and make recommendations. A test report can be more than just a collection of static expressions, but can therefore to a wide spectrum of activities, initiated based on its conclusions.
We prepare documentation that includes information security policy. We monitor the media and prepare press releases in accordance with press law. We run projects in line with the requirements for the protection of personal data. We train data administrators, and all of our employees can also serve as Data Protection Officers.
We consult with a renowned legal firm on all legal aspects.
Integration services, Project management.