Data protection and information security audit


We carry out the audits for compliance of personal data processing with the provisions of the general data protection regulation (GDPR).

What is the goal of an audit?

Intention of an audit is to verify compliance and non-compliance and identify potential threats to the organisation. This will allow an organisation to take actions to improve both compliance and internal awarenss of the staff of existing issues.

Follow-up steps after the personal data protection auditing.

Subsequent steps after the auditing shall include predominantly the implementation of the changes in the personal data protection system. The clients may perform this task independently or may commission the implementation supervision to us (running another auditing after the implementation) or delegate the tasks related to the implementation including the elaboration of the relevant documentation, testing of various amendments implemented and others.

On some occasions, in the course of the auditing or once the personal data protection system has been implemented we advise our clients to perform the auditing of the source code with regards to the software developed within the organisation or running the penetration testing. Such commissions intend to verify the quality and safety level for IT solutions and infrastructure.

Contact us and get a free quote.



GDPR compliance audit
GDPR compliance audit
We'll perform an audit for to define level of compliance with General Data Protection Regulation (GDPR) and related data protection provisions, including but not limited to monitoring, employment and personal data transfer to third-parties.
Software Development Life-Cycle audit
Software Development Life-Cycle audit
We perform Software Development Life-Cycle audits to estimate maturity level of your development cycle.
Application security audits (penetration tests)
Application security audits (penetration tests)
We perform web application penetration tests and source code audits to discover existing security threats in tested applications and related IT infrastructure.
ISO 27001 Internal Audit
ISO 27001 Internal Audit
ISO 22301 Internal Audit
ISO 22301 Internal Audit
Identity verification process audit
Identity verification process audit
Privacy maturity audit
Privacy maturity audit
Security maturity audit
Security maturity audit