Our consulting covers the implementation of all data protection requirements and comprehensive advice on data protection – in line with your corporate strategy. You can always expect the best from us: our expertise is based on years of consulting practice, taking into account the latest developments and challenges that data protection entails. Together with you, we determine what is relevant for your company in particular and how to successfully implement the next steps. All the solutions we develop for you are easy to implement in your day-to-day business and can be integrated into your existing processes.

Data protection officer

Our external data protection officer (DPO) service can help you with all data protection issues, as well as in maintaining and implementing data protection compliance – always with your business objectives in mind. National companies and multinationals alike have relied on our expertise for many years.

Further Information

According to Art. 27 GDPR, companies based outside the EU but operating in Europe must have a designated EU Representative, or EC Rep. Let us act as your company’s EU representative and be your primary point of contact with supervisory authorities and data subjects in the European Union.

Further Information

Data privacy consulting

Do you hope to manage your employee relations with digital processes and solutions in the future? Or do you have questions about particularly sensitive data such as your employees’ sick notes, medical certificates, payroll accounting or performance evaluations? We will help you with all kinds of issues involving employee data protection and your modern HR processes.

Further Information

A form of data protection risk analysis, threat modelling is an indispensable tool for companies to identify and reduce data protection risks at an early stage. By identifying, assessing and mitigating risks, companies can ensure not only their own protection, but also that of their customers and staff, which is particularly important in times of increasing cyber threats.

Further Information

The GDPR provides numerous instruments for measuring and managing compliance with data protection law, and any company may be obliged to carry out a data protection impact assessment (DPIA).

Further Information

It is not only since the introduction of the GDPR that companies have been obliged to erase personal data. In view of the threat of high administrative fines, however, the importance of erasure periods with regard to the use of personal data has increased.

Further Information

The record of processing activities (ROPA) is primarily used for documentation purposes and thus to demonstrate compliance to the supervisory authorities. We support you in all areas of the ROPA.

Further Information

Whether a hacker attack or the loss of customer data – data protection incidents can happen quickly. We are available for you around the clock in case of an emergency and will support you at any time with all the necessary steps to be taken and the right way to deal with data breaches.

Further Information

A data protection management system (DPMS) is indispensable for companies to adequately fulfil data protection requirements. We provide you with comprehensive support and advice on meeting legal and organisational requirements as well as all implementation processes.

Further Information

Audits and actual state analysis

Every controller and every processor is obliged to guarantee a level of protection appropriate to risk by means of technical and organisational measures (TOM).

Further Information

IT Security and certification

We support you in setting up, analyzing and optimizing your IT-systems. Weaknesses and vulnerabilities in IT systems are often the root cause for data theft, espionage and system failures. Inadequate IT security may result in considerable costs for your company.

Further Information

Certificates serve as a seal of quality to potential customers. They facilitate access to tender procedures and build trust. Certificates also demonstrate that your company meets accepted quality standards. The most respected method of certification in IT security is the ISO Standard 27001.

Further Information

We will contact you!

In our privacy policy you will find more information on how we handle your personal data and what your rights are.