General Data Protection Regulation


General Data Protection Regulation

General Data Protection Regulation (GDPR) requires organizations handling personal data of European Union citizens to ensure that this data is secure. GDPR requires organizations to regularly evaluate the process of personal data collection; effectiveness of security practices and to provide document evidence of compliance.

SQ1Shield will help you detect threats; incidents and personal breaches; monitor data security and documentation with evidence for compliance. It will help perform risk assessment on the networks that are handling personal data while performing data protection impact assessment to respond to the risks swiftly.

Be Secure. Be Compliant.

Customized assessments of IT Landscape (on-premise network & cloud), to identify security controls that are necessary to meet GDPR Compliance

Identify assets that handle personal data and perform data flow analysis

SQ1Shield identifies data breaches and help you report the breaches

Locate gaps that exist between your current security posture and the requirements

SQ1Shield helps you confront your GDPR compliance gaps so that risks can be prioritized and addressed

SQ1Shield built-in GDPR reports help you report easily on privacy and security controls

Customize the reports to meet your business requirements and stay Compliant

SQ1Shield & GDPR – Fulfil Compliance requirement with SQ1Shield

Article & Article Title Management Activities SQ1Shield Coverage

24. Responsibility of the Controller

Demonstrate Continuous Compliance and/or accountability

Monitor for indicators of malware-based compromise, such as communication to a known Command & Control (C&C) Server.

Monitors successful and failed logon attempts to external applications through Azure Active Directory

Monitors user and administrator activities, including access and modification of files and content, in cloud applications

25 Data Protection by design and by default

Integrate Privacy by Design into system

File Integrity Monitoring can detect modification attempts to applications or online storage containing personal data.

28 Processor

Maintain data privacy requirements for third parties (e.g., clients, vendors, processors, affiliates)

Vendor Data Privacy assessment – Perform vendor data privacy impact assessment and monitor the risks in vendors that have access personal data.

Perform vulnerability assessment on Vendor Network and remediate.

32 Security of Processing

Integrate data privacy into an information security policy

Perform risk assessment and monitor the risk of systems that have access to personal data

33 Notification of a personal data breach to the supervisory authority

Maintain a log to track data privacy incidents/breaches

Automated Incident Response – Correlates events to detect threats.

Security orchestration and automated response capabilities enable rapid response to incidents.

Automated ticket generation and integration with other tools ensures guided threat response.

34 Communication of a personal data breach to the data subject

Maintain a data privacy incident/breach response plan

SQ1Shield enables monitoring and review of alarms, events, and reports

Built-in notification capabilities enable analysts to be alerted to alarms through email, and SMS

35 Data protection impact assessment

Conduct PIAs/DPIAs for new programs, systems, processes

Data Privacy Impact Assessment – Perform data privacy impact assessment and monitor the risks in networks that have access personal data.

Contact Us
Invalid email address
Please Wait....


Contact Us