

Data Protection, Privacy & Information Governance
Lawful processing and defensible records across the data lifecycle
Scope
01
Records of Processing & Lawful Basis
We catalogue all processing activities, map purposes and lawful bases, and document data flows, recipients, and cross-border transfers to create a defensible register.
03
Consent, Transparency & Individual Rights
We design consent models, notices, and request handling so data subjects can exercise access, rectification, erasure, restriction, portability, and objection without friction.
05
Incident Response & Breach Notification
We establish severity tiers, timelines, communication templates, and an evidence pack so you can notify authorities and affected parties on time with the right facts.
02
Vendor, Cloud & Cross-Border Controls
We assess processors and sub-processors, put in place DPAs/SCCs (or equivalent safeguards), and define ongoing assurance over security, resilience, and location of data.
04
Access Control & Segregation of Duties
We implement least-privilege access, joiner-mover-leaver routines, and oversight for privileged accounts; backed by logs that prove reviews occurred.
06
Training, Attestations & Culture
We deliver role-based training, periodic attestations, and spot checks so responsibilities stick—and produce MI that boards can rely on.



