Affordable data governance in a single cybersecurity dashboard!
Our cybersecurity dashboard, DataWise, has been designed and built to manage Data Protection in a single dashboard. It provides practical features and templates for data protection compliance, allowing organisations to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR).
We have been busy behind the scenes developing an updated release of DataWise 2.0. The new update is mobile-friendly, simple to use and practical. The cybersecurity dashboard now features a comprehensive register of all your data assets, data processes and risks. Sign up for our newsletter to receive information on the release date!
A comprehensive register of all of your IT and data assets, data processes and flows, giving you a 360º view of your data processing activities including owner, location, security, controls, etc.
DataWise enables activity reports to be generated to provide managers with a summary of all of the user activity on the system with ease.
A comprehensive log of all formal training and user awareness sessions you run, including dates, attendees and the material covered.
Details identified risks and their respective date, owner and risk rating, and provides a framework for Privacy Impact Assessments allowing you to demonstrate a risk-based approach to compliance.
A user- friendly workflow engine ensures comprehensive recording and a timely response for all FOI and Subject Access requests.
A log of security incidents and near misses, how they occurred, how they were dealt with, who was involved and so much more.
Task Reminders & Workflow
DataWise automatically reminds users to carry out tasks assigned to them. It also tracks what is done by who and crucially when.
Purpose-built templates include data sharing agreement, privacy impact assessment, due diligence questionnaire, and about 30 different policy documents.
A register of all of the agreements you have – who they are with, start/end dates, principal terms.
A library of resources – model contracts and policies, training materials, and much more.
A drop box of all your company policies, handbooks, procedures etc. when they were last reviewed and by whom, whether they are confidential or public.
A schedule of internal audits – audit scope, who audited, audit outcome, corrective/preventive actions, task management engine and workflow.
Send us a Message
Information Governance: Achieving and Maintaining Accountability
Click the player below and listen to this weeks episode of Data Protection Made Easy where we discuss Information Governance in Local Authorities. During this... Read More
Information Sharing – Advice for Practitioners Providing Safeguarding (Part 2)
Last week’s episode of ‘Data Protection Made Easy’ was one of our busiest yet, we hosted back to back webinars on Information Sharing with over... Read More
Information Sharing – Advice for Practitioners Providing Safeguarding Services
Data Protection People work with several schools, colleges, universities and multi-academy trusts and the common questions asked are about Data Sharing, Safeguarding and Data Protection,... Read More
GDPR Radio – News & Views
This weeks episode of GDPR Radio was an extra special one as Phil and Dave were in the same office at the same time which... Read More
PCI DSS – Everything you need to know
Click the player below to listen to our latest episode of Data Protection Made Easy. During this session, our brilliant hosts Oliver Rear, Philip Brining... Read More
GDPR Radio – News & Views
Click the player below to listen to our latest recording of GDPR Radio, where our top consultants Oliver Rear, Philip Brining and David Holmes join... Read More