+44 (0)161 929 8355
Specialist consultancy for professional practices to help manage data privacy, information governance and information security to ensure that data is secure and that people, processes and technology are fully compliant with Data Protection Act, GDPR and other legal requirements.
Services include managed data protection and compliance management software to provide confidence in your operating systems and independent assurance.
DataWise Software Application
A cybersecurity dashboard designed and built to manage Data Protection in a single dashboard. Mobile-friendly, simple to use and practical with a comprehensive register of all your data assets, data processes and risks.
DataWise provides practical features and templates for data protection compliance, allowing your practice to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR).
Key Features
Asset Register: A comprehensive register of all of your IT and data assets, data processes and flows, giving you a 360º view of your data processing activities including owner, location, security, controls, etc.
Activity Reports: DataWise enables activity reports to be generated to provide managers with a summary of all of the user activity on the system with ease.
Training & Awareness: A comprehensive log of all formal training and user awareness sessions you run, including dates, attendees and the material covered.
Risk Register: Details identified risks and their respective date, owner and risk rating, and provides a framework for Privacy Impact Assessments allowing you to demonstrate a risk-based approach to compliance.
FOI & SAR: A user-friendly workflow engine ensures comprehensive recording and a timely response for all FOI and Subject Access requests.
Incident Log: A log of security incidents and near misses, how they occurred, how they were dealt with, who was involved and so much more.
Task Reminders & Workflow: DataWise automatically reminds users to carry out tasks assigned to them. It also tracks what is done by who and crucially, when.
Pre-Built Templates: Purpose-built templates include data sharing agreement, privacy impact assessment, due diligence questionnaire, and about 30 different policy documents.
Agreement Repository: A register of all of the agreements you have – who they are with, start/end dates, principal terms.
Resources Library: A library of resources – model contracts and policies, training materials, and much more.
Document control: A drop box of all your company policies, handbooks, procedures etc. when they were last reviewed and by whom, whether they are confidential or public.
Audit Schedule: A schedule of internal audits – audit scope, who audited, audit outcome, corrective/preventive actions, task management engine and workflow.
To share this page
Services
The Support Desk service is based in Leeds and is staffed by a team of qualified and experienced data protection law and GDPR consultants, specialists and practitioners.
We help with all nature of data protection queries, and provide consultation with the following:
We also undertake:
GDPR Support Desk Service Delivery
The Leeds-based team offers email and telephone support. They will give you an estimated response time frame for your data protection support query via an email notification with a case number.
You have access to a bank of GDPR and UK data protection regulations knowledge and resources to help you with any questions you may have regarding data protection.
Framework
You will receive informative and simple to understand advice from data protection and GDPR consultants able to provide training resources, templates and checklists to help you with your basic GDPR rules and regulations compliance journey.
That includes the Information Governance Framework (IGF) – a full index of data protection policy/procedure templates and registers to record processing activities.
GDPR Support Packages
These data protection and GDPR Support packages can be provided as an addition to other services or can be bought stand-alone.
To comply with the data protection law it is essential to periodically check and evidence your compliance.
How does this work?
An experienced data protection practitioner will request a handful of key documents in advance of a full site audit to help them prepare to complete your data protection compliance audit. They will attend your premises for at least two days and, through interviews, observation and review of your records and documentation to determine the data protection and GDPR compliance of your data handling operations.
The assessor of your data protection compliance will prepare a compliance report rating your work-practices against all aspects of the relevant data protection law, advising non-compliances and offering advice and recommendations for improvements.
Why Choose Us?
This will be a specialists in Data Protection and Information Security with a track record of providing invaluable expert advice, guidance and action - respected and established leaders in their field of expertise.
The data protection compliance team have decades of practical experience and a thorough understanding of what compliance looks like. As practice spans data protection and information rights law as well as cyber security, they are qualified to advise on a broad range of matters.
Handling a subject access request is resource intensive. Contact us to discuss how we can resolve your SAR headaches!
Why do you need this support?
Subject Access Requests (SARs) are a cornerstone of Data Protection Law and as soon as you receive one, the clock starts ticking as you have only one month to respond. Handling SARs is resource-intensive, and it requires specialist training and software. Outsourcing the application of redaction and exemptions makes commercial sense.
The SAR Process
The process for handling a subject access request is straightforward enough. The time-consuming element is reviewing all of the information found through your information search. It is not uncommon for this to comprise thousands of emails, voice recordings, CCTV footage, images, logos, and other documents in a variety of formats.
Your legal duty is to review all this information and remove (redact) all references to other people. You might also want to withhold some information through the application of one of the many exemptions to disclosure. This process can take a very long time.
The Service
Applying SARs redactions is boring work. It needs high levels of concentration and focus and no interruptions. Redaction fatigue sets in after only a few hours. It is the kind of work best done by people with an eye for detail and a passion for redaction who do this work by choice day-in and day-out. That’s where this helps you.
The SAR task force uses tried and trusted work methods to accurately, quickly and methodically work through redacting your information. There are SAR subject matter experts working within a team of data protection experts. They know what they are looking for and assuredly apply any necessary-redactions and exemptions within the framework of UK law.
The audit trail and quality assurance procedures give you peace of mind that the work we do for you will stand up to scrutiny.
Why Use this Service?
These teams of specialists in Data Protection and Information Security have decades of practical experience and a proven track record of identifying and mitigating risk so you can be sure you are in the safest hands.
The Outsourced Data Protection Officer (DPO) service is designed to satisfy an organisation’s legal responsibility to designate a DPO, whether that be mandatory or voluntary.
If you are lawfully required to appoint a DPO, or choose to appoint one voluntarily – consider an outsourced Data Protection Officer arrangement.
The Outsourced DPO's Role
Under business as usual (BAU) the Outsourced DPO undertakes or commissions the following tasks:
The DPO will also maintain or check the maintenance of:
Providing the outsourced DPO can undertake the function of a Data Protection Officer as envisaged by the law, they will work with you to design an appropriate service that meets your operational needs, your budget, and ensures you remain within the law with regard to the role and responsibilities of the DPO.
Accountability
The account support team in Leeds will send to you, at the end of every month, a statement of the time expended on the provision of the outsourced DPO service making for transparency and accountability.
Free up your time without losing control of your data protection compliance!
Each engagement varies from client to client depending on many factors. Managed Data Protection contracts can be short or long and our role can be light touch or very hands-on. Each contract is, therefore, flexible and tailored to address your specific data protection management requirements.
Service Options include:
Complimentary DataWise Subscription
To support all managed data protection service contracts, you have access to a DataWise Subscription.
DataWise provides complete transparency of all managed service activity via a single management dashboard, so you will have complete visibility of all our daily, weekly and yearly actions on demand.
Because you can’t solve a problem you don’t know you have!
Why Complete a GDPR Gap Analysis?
The purpose is to identify areas of non-compliance in relation to privacy and information rights law including the General Data Protection Regulation [GDPR], Data Protection Act(2018) [DPA], Privacy and Electronic Communications Regulations (2003) [PECR], Freedom of Information Act [FoIA], and the Environmental Information Regulations (2004) [EIR].
How it Works?
A specialist consultant will review documentation off-site to gain an understanding of the data processing activities and to prepare for the on-site assessment.
The on-site element of the gap analysis typically takes one day as our consultants are experienced in getting under the skin of operations and assessing compliance. They do this through conducting interviews, workshops and observation.
During this review they will also determine the extent to which the documentation meets the requirements of the legislation. This initial work is built on through a visit to your site(s) to test the extent to which your policies, processes and procedures are implemented and working effectively.
Who should you involve?
Time on site is usually spent with those responsible for information governance, IT, HR, and marketing. A facility tour is essential and we like to engage with operational teams to test their understanding of the organisation’s policies and procedures.
Report & Action Plan
Within a few weeks of the site visit you will receive a comprehensive report of our findings. The report contains a section on each of your obligations; an overview of the obligation and our findings backed up by evidence collected during the assessment. We will highlight non-compliance, provide advice about how to bring the area into compliance and make recommendations as to how these areas can be improved based on our extensive experience.
If required we will create an action plan setting out our recommendations into a prioritised time-table.
What Clients Say
"... a great tool for giving us a sense-check on where our GDPR compliance program was up to. It enabled us to take stock of progress, and re-base our action plan. It tested areas we thought were compliant and provided some excellent advise to help us move forward efficiently and quickly.”
It is a legal requirement to carry out a Data Protection Impact Assessment (DPIA) in a variety of circumstances.
The DPIA Procedure
Undertaking a data protection impact assessment requires objectivity and a detachment from the data processing, and it often requires a dogmatic persistence to get to the bottom of things both with colleagues and external suppliers or partners.
Why Outsource?
Outsourcing DPIAs makes sense for most companies. Engaging experienced data privacy professionals to ask the tough questions and objectively review and present the risks can mean your internal resources are used elsewhere.
Specialist data protection & privacy consultants are experienced in reviewing data processing operations. They know the questions to ask and they know when they are not getting the answers they need to identify the risks.
DPIA risk assessment experts will engage with your staff, suppliers and customer groups holding meetings, conference calls and reviewing technical documentation to ensure a thorough understanding is held of all aspects of the project, its proposed data processing activities, and compliance risks.
We call this a “deep dive” as the analysis is usually narrow in focus and deep in penetration.
Deep Dive consultancy services are designed to deal with specific projects and/or to do a deep investigation of a particular Data Protection issue. This will allow you to develop a greater understanding of the issues and risks in a specific issue and to develop appropriate mitigation using expert resources.
Why do a Deep Dive?
Often information risk exists in areas where a pactice has insufficient knowledge or control over the information processes and:
Typical Deep Dive Scenarios
A good example of a deep dive audit project is when instructed to examine, map, and ensure the data privacy compliance of a consent/opt-in process for electronic marketing.
This will usually involve looking at several websites, spreadsheets, databases, and paper forms and engaging with email broadcasting, web hosting, mailing house, telesales and other companies with who you share your data. The ultimate aim is to ensure you are able to deliver your communications program, reviewing contractual arrangements or putting new agreements in place with those third parties, documenting processes, data flows, a privacy impact assessment etc. and even carrying out site inspections if required.
Other examples include:
Report
You receive a professional report with findings and recommendations for the specific data protection compliance issues. The report will include a detailed analysis of the data flow, highlighting areas of concern along with remedial recommendations where necessary.
The supply chain review service identifies data protection and information security compliance risks and gaps within your organisation’s supply chain of data processing and sharing arrangements.
Your Obligations
As soon as you transfer personal data to a third party, you take on a compliance and information security risk that you need to ensure is adequately managed.
Supplier Assurance
It is vital your practice take steps to comply with GDPR as the GDPR legislation has led to increased penalties and the prospect of compensation for personal data breaches. These risks have naturally led to increased litigation in data supply chains where the blame for personal data breaches and security failings is pinned on the weakest link. You should undertake a supply chain review to ensure this is not your organisation.
You need to ensure that the processors you appoint and their sub-processors that you approve are reliable and safe to be trusted with your data. This supply chain review service can provide that assurance when getting it wrong can be costly.
Ongoing "on tap" to help you maintain and improve your data protection compliance.
A privacy officer is a vital appointment in any organisation these days although it is often sensible and cost-effective to consider an outsourcing arrangement.
The Service
The job of the privacy officer ultimately is to ensure that your business operations are carried out in accordance with data protection legislation. They are tasked with building resilience into your operations and building a privacy-aware culture.
Your outsourced privacy officer does this by ensuring you have implemented reliable policies and work practices that everyone is made aware of through training and awareness. They become the point of contact internally for data protection and privacy questions ensuring an accurate and consistent approach is taken.
They will help with the appointment of data processors and the initiation of data-sharing arrangements. They will ensure that you have evidence of handling personal data in accordance with the data protection principles and will advise on security incidents/personal data breaches and requests from data subjects to exercise their various rights such as the right to be forgotten.
Your outsourced privacy officer is backed-up by a team of consultants and support desk, so have ready access to all the resources you will need.
For more information on any these options, email us here >>
DataWise Software Application
A cybersecurity dashboard designed and built to manage Data Protection in a single dashboard. Mobile-friendly, simple to use and practical with a comprehensive register of all your data assets, data processes and risks.
DataWise provides practical features and templates for data protection compliance, allowing your practice to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR).
Key Features
Asset Register: A comprehensive register of all of your IT and data assets, data processes and flows, giving you a 360º view of your data processing activities including owner, location, security, controls, etc.
Activity Reports: DataWise enables activity reports to be generated to provide managers with a summary of all of the user activity on the system with ease.
Training & Awareness: A comprehensive log of all formal training and user awareness sessions you run, including dates, attendees and the material covered.
Risk Register: Details identified risks and their respective date, owner and risk rating, and provides a framework for Privacy Impact Assessments allowing you to demonstrate a risk-based approach to compliance.
FOI & SAR: A user-friendly workflow engine ensures comprehensive recording and a timely response for all FOI and Subject Access requests.
Incident Log: A log of security incidents and near misses, how they occurred, how they were dealt with, who was involved and so much more.
Task Reminders & Workflow: DataWise automatically reminds users to carry out tasks assigned to them. It also tracks what is done by who and crucially, when.
Pre-Built Templates: Purpose-built templates include data sharing agreement, privacy impact assessment, due diligence questionnaire, and about 30 different policy documents.
Agreement Repository: A register of all of the agreements you have – who they are with, start/end dates, principal terms.
Resources Library: A library of resources – model contracts and policies, training materials, and much more.
Document control: A drop box of all your company policies, handbooks, procedures etc. when they were last reviewed and by whom, whether they are confidential or public.
Audit Schedule: A schedule of internal audits – audit scope, who audited, audit outcome, corrective/preventive actions, task management engine and workflow.
Thank you for visiting our website and for your enquiry. We will be in touch with you shortly.
Carton & Co
www.cartonconsultants.com
Mob: 07779 653105
solutions@cartonconsultants.com
Carton & Co - Consultants & Business Partners
☎ +44 (0)161 919 8355
solutions@cartonconsultants.com
VAT No: 414152045