As an entrepreneur, you probably process privacy-sensitive information.

As an entrepreneur, you probably process privacy-sensitive information. The more data your organisation processes, the bigger the risks. Have you thought about the consequences of a data leak? How do you keep these consequences in check? And are you meeting the requirements in the General Data Protection Regulation (GDPR)?

Privacy laws are changing, fast!

You must protect the data and personal details that you process in your organisation. Not just those of your clients, but also those of your employees and yourself. The regulations for protecting personal data are becoming stricter. Do you know which laws and regulations you must comply with? The upcoming General Data Protection Regulation will bring significant changes to the processing of personal data.

Partner Jan van Ederen

+31 88 676 9794

Contact our specialist

Are you compliant in the event of a cyber attack or data leak?

Imagine you know which laws you must comply with. And how to do this. The chance of a data leak is present. Are you compliant in the case of data loss through a cyber attack, phishing, a stolen company laptop, or another type of (cyber)crime? In the case of an incident, you want to manage the consequences and prevent damage to your organisation and reputation. Our incident response specialists can help you with this. You also want to ensure things are optimally sorted legally. Think for example of your privacy policy, a protocol for data leaks, processor agreements with third parties. Our corporate legal advisors can help you draft such documents.

Grant Thornton can help you with:

  • conducting a GDPR check, so that you know whether you meet the most important requirements of the GDPR;
  • drafting and checking privacy policies, processor agreements, data leak protocols and a processing register;
  • insight into your privacy risks using a (Data) Privacy Impact Assessment;
  • setting up a GDPR implementation plan;
  • incident response and crisis management in the event of a data leak, cyber attack, fraud, hack and more;
  • identifying potential risk areas in your cyber security;
  • looking after your interests in claims brought by you or against you.