Affordable data governance in a single cybersecurity dashboard!
Our cybersecurity dashboard, DataWise, has been designed and built to manage Data Protection in a single dashboard. It provides practical features and templates for data protection compliance, allowing organisations to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR).
We have been busy behind the scenes developing an updated release of DataWise 2.0. The new update is mobile-friendly, simple to use and practical. The cybersecurity dashboard now features a comprehensive register of all your data assets, data processes and risks. Sign up for our newsletter to receive information on the release date!
A comprehensive register of all of your IT and data assets, data processes and flows, giving you a 360º view of your data processing activities including owner, location, security, controls, etc.
DataWise enables activity reports to be generated to provide managers with a summary of all of the user activity on the system with ease.
A comprehensive log of all formal training and user awareness sessions you run, including dates, attendees and the material covered.
Details identified risks and their respective date, owner and risk rating, and provides a framework for Privacy Impact Assessments allowing you to demonstrate a risk-based approach to compliance.
A user- friendly workflow engine ensures comprehensive recording and a timely response for all FOI and Subject Access requests.
A log of security incidents and near misses, how they occurred, how they were dealt with, who was involved and so much more.
Task Reminders & Workflow
DataWise automatically reminds users to carry out tasks assigned to them. It also tracks what is done by who and crucially when.
Purpose-built templates include data sharing agreement, privacy impact assessment, due diligence questionnaire, and about 30 different policy documents.
A register of all of the agreements you have – who they are with, start/end dates, principal terms.
A library of resources – model contracts and policies, training materials, and much more.
A drop box of all your company policies, handbooks, procedures etc. when they were last reviewed and by whom, whether they are confidential or public.
A schedule of internal audits – audit scope, who audited, audit outcome, corrective/preventive actions, task management engine and workflow.
Send us a Message
GDPR Radio – News & Views
This weeks episode of GDPR Radio was an extra special one as Phil and Dave were in the same office at the same time which... Read More
PCI DSS – Everything you need to know
Click the player below to listen to our latest episode of Data Protection Made Easy. During this session, our brilliant hosts Oliver Rear, Philip Brining... Read More
GDPR Radio – News & Views
Click the player below to listen to our latest recording of GDPR Radio, where our top consultants Oliver Rear, Philip Brining and David Holmes join... Read More
Training & Awareness
Our consultants provide training services and help raise awareness for cyber security regularly, over time they have found that there are many different ways to... Read More
Re-Engaging With Lapsed Donors
Very excited to announce Data Protection People first-ever event for the Charity sector We have been speaking to people within the sector to try and understand the... Read More
Information Governance: Achieving and Maintaining Accountability within Local Authorities
Join us on the 15th of October for a discussion on Information Governance in Local Authorities. During this session, our hosts Phil Brining, Oliver Rear... Read More