The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years.
This policy directive was adopted in May 2016 because most Europeans say they want the same data protection rights across the EU and regardless of where their data is processed. It aims to make Europe fit for the digital age. The Enforcement date: 25 May 2018, at which time those organizations in non-compliance may face heavy fines.
If you didn't start yet, then this GDPR preparation plan is a must have, in order to start implementing the necessary measures. We are here to help you become compliant. The GDPR comes with a set of Rules and Regulations for the protection of personal data inside and outside the European Union (EU) and affects all companies that save personal data from European citizens.
We provide example GDPR document templates, such as: GDPR Data Audit Template, International Transfers Personal Data Process, Documentation Controller Spreadsheet, ,Privacy policy, GDPR Data Protection Policy, Appointment GDPR Data Officer Letter, Data Protection Officer Job Description, Data Subject Access Request Procedure, etc and also a complete set of GDPR templates in order to help you to comply with the GDPR regulations from the EU. These GDPR document templates are provided in Microsoft Office formats, and easy to customize to your organization’s specific needs.
How to write a Data Privacy Policy according to the GDPR directive? Download this GDPR Data Protection Policy now!
View templateWhat is a standard Photo Consent Form? Are you looking for a professional Photo Contest Model Release Form? Download this consent form now.
View templateWhat is a CyberSecurity Analyst? Are you looking for a CyberSecurity Analyst Job Description? What are the important details in a CyberSecurity Analyst Job Desc
View templateHow to create a Statement Of Applicability according CyberSecurity standards? Download this Statement Of Applicability if you are working on IEC, NIST, ISO27001:2013 or other IT and CyberSecurit
View templateHow do you write a confidential statement? Download this Employee Confidentiality Statement if you are working on NIST, Cyber Essentials (UK), ISO/IEC 27001:201
View templateHow to define an Acceptable Use IT CyberSecurity Standard? Download this Acceptable Use IT Security Standard template if you are working on IEC, NIST, ISO27001:
View templateHow to create a Secure Algorithm List for IT organization? Download this Secure Algorithm List if you are working on IEC, NIST, ISO27001:2013 cybersecurity.
View templateHow to create a Third-Party Risk Management Standard for your IT organization? Download this Third-Party Risk Management if you are working on IEC, NIST, ISO270
View templateHow to create a Human Resources IT Cybersecurity Standard for your company? Download this HR IT Security Standard model if you are working on IEC, NIST, ISO2700
View templateHow to create an Information Security Risk and Compliance Management Standard? Download this IT Information Security Risk & Compliance Management Standard now.
View templateLeadership is a potent combination of strategy and character. But if you must be without one, be without the strategy. | Norman Schwarzkopf