+3188 2055 000
		Array
(
    [0] => nl
    [1] => us
)
		
Call us +3188 2055 000
		Array
(
    [0] => nl
    [1] => us
)
		

IT Privacy and Data Protection

Our IT Privacy & Security Scan is an effective way to clearly bring the current level of IT security within your organization into focus. By testing organizational and technical system measures, it will provide insight into the risks and reveal if additional measures are required. The security scan almost always reveals significant data leaks and risks.

The IT Privacy & Security Scan covers the following categories:

  • Organization
    • Security policy
    • Privacy policy
    • Continuity plan
  • Technology
    • Access security
    • Security web applications
    • Processing of personal data
  • Employees
    • Security awareness
  • Legal
    • IT contracts, Service Level Agreements
    • Processors agreements
    • Security incidents and data leak Protocols

Method IT Privacy & Security Scan

By each IT security scan, we start off with an intake assessment, to determine the scope of the scan. Then we carry out interviews with the employees involved, we study the relevant documentation and make observations about the systems. The scan takes an average of two to three days, including reporting. The findings of the IT Privacy & Security Scan are reported in a clear and understandable manner.

IT Audit

Do you want to use the IT Privacy & Security Scan for assurance reporting? Allow us then to perform a formal IT audit. Depending on your exact needs, we can process our findings into formal reporting and IT assurance statements.

IT Privacy and Data Protection

Our IT Privacy & Security Scan is an effective way to clearly bring the current level of IT security within your organization into focus. By testing organizational and technical system measures, it will provide insight into the risks and reveal if additional measures are required. The security scan almost always reveals significant data leaks and risks.

The IT Privacy & Security Scan covers the following categories:

  • Organization
    • Security policy
    • Privacy policy
    • Continuity plan
  • Technology
    • Access security
    • Security web applications
    • Processing of personal data
  • Employees
    • Security awareness
  • Legal
    • IT contracts, Service Level Agreements
    • Processors agreements
    • Security incidents and data leak Protocols

Method IT Privacy & Security Scan

By each IT security scan, we start off with an intake assessment, to determine the scope of the scan. Then we carry out interviews with the employees involved, we study the relevant documentation and make observations about the systems. The scan takes an average of two to three days, including reporting. The findings of the IT Privacy & Security Scan are reported in a clear and understandable manner.

IT Audit

Do you want to use the IT Privacy & Security Scan for assurance reporting? Allow us then to perform a formal IT audit. Depending on your exact needs, we can process our findings into formal reporting and IT assurance statements.

Crowe Peak
Olympisch Stadion 24-28 1076 DE Amsterdam, The Netherlands
+3188 2055 000 info@crowe-peak.nl