Incident Management: Did the incident occur during service delivery?

Without effective incident management, an incident can disrupt business operations, information security, it systems, employees, customers, or other vital business functions, the critical incident method of performance appraisal involved identifying and describing specific events (or incidents) where the employee did something really well or something that needs improvement. Equally important, Read more…

Data Privacy Risk: Is a blanket notification and consent required for your organization to transfer data and use the third-party system?

You explore the nature of data, personal data, data ownership, consent and purpose of use, trustworthiness of data as well as of algorithms and of those using the data, and matters of privacy and confidentiality, your organization shall use contractual or other means to provide a comparable level of protection Read more…

Cyber Security Audit: Does your organization already have a relevant and effective cybersecurity strategy in place?

The imposition of new obligations on organizations about cyberthreats against their organizations and control. As well as notifications to the relevant authorities, aim to make private entities accountable and aware by promoting the spread of a culture of cyber-security, capable of developing virtuous synergies with the functions of public authorities. Read more…