contact@proteuscyber.com +44 (0)208 123 7708
Proteus-Cyber Nextgen Data Privacy

Proteus-Cyber
Data Privacy Software

  • Home
  • Solutions
      Proteus®NextGen Enterprise™
    • NextGen Privacy
      Data privacy management

      Key Capabilities

      • Automated survey templates
        Product versions

        Automated survey templates

        Accelerate your privacy program using our automated Pre-filled out surveys that cover PIA/TIA & DPIA.

        Key features

        • Configurable PIA & DPIA templates
        • Automatic risk assessment
        • Identify non-compliances and gaps
        • Comprehensive Data mapping
        • Establish the legal basis for collection
        • How and why data is collected and used
        • Store categories of data
        • Know who has access to any data
        • Unlimited number of assessments
        • Annual attestation with pre-populated surveys

         

        Learn more »

        Automated survey templates
      • PIA/DPIA & TIA assessment
        Product versions

        PIA/DPIA & TIA assessment

        Know what data your processes use, store or share

        Key features

        • Privacy Impact Assessment
        • Data Privacy Impact Assessment
        • Two types of automatic risk assessment
        • Manage non-compliances and gaps
        • Link to data source
        • Understand what data is collected and why
        • Visualise how data is linked, stored or shared
        • Maintain controller & processor records
        • See 3rd parties' use the data
        • Produce RoPA (records of processing activity) reports

         

        Learn more »

        PIA/DPIA & TIA assessment
      • Comprehensive Data mapping
        Product versions

        Comprehensive Data mapping

        Understanding where your data is, what processes use it, who you share it with, where you back it up and what security measures you apply is fundamental to a good secure data privacy program.

        Key features

        • Process data mapping
        • Application data mapping
        • Asset data mapping
        • Data register
        • Data security
        • Data disposal

         

        Learn more »

        Comprehensive Data mapping
      • Automated risk assessment
        Product versions

        Automated risk assessment

        Understand your data privacy risk by legislation and manage your non-compliances and gaps

        Key features

        • Pre-filled risk templates
        • Fully configurable risk calculations
        • Privacy legislation risk
        • Traditional risk assessment

         

        Learn more »

        Automated risk assessment
      • Vendor risk management
        Product versions

        Vendor risk management

        Track what data you share with third parties, the legal basis for sharing that data and what contracts you have in place to manage them.

        Key features

        • Pre-filled risk templates
        • Fully configurable vendor surveys
        • Configurable risk calculations
        • Vendor contract management
        • Track vendor shared data

         

        Learn more »

        Vendor risk management
      • Consent management
        Product versions

        Consent management

        Manage your consent and privacy policy.

        Key features

        • Record the consent required by process
        • Website privacy policy
        • Cookie consent tracking
        • Marketing consent
        • Special category consent
        • Third party consent

         

        Learn more »

        Consent management
      • Privacy-by-design
        Product versions

        Privacy-by-design

        Self-service assessment of processes for data privacy prior to implementation.

        Key features

        • Configurable Privacy-by-design intranet website
        • Data mapping
        • How, why, where data is collected & stored
        • Legal basis for data collection

         

        Learn more »

        Privacy-by-design
      • Predefined privacy policy document templates
        Product versions

        Predefined privacy policy document templates

        NextGen contains a full set of pre-defined policy document templates covering a range of data privacy topics, saving you time and effort.

        Key features

        • Pre-defined privacy templates
        • Customisable

         

        Learn more »

        Predefined privacy policy document templates
      • Breach notification
        Product versions

        Breach notification

        Create a breach notification record in the format required by your regulatory authority

        Key features

        • Supports many regulatory authorities
        • Local output formats ICO, CNIL, CCPA...
        • Breach notification notices
        • 72 hour countdown timer
        • Breach workflow management
        • Breach notification website template

         

        Learn more »

        Breach notification
      • Automated control selection
        Product versions

        Automated control selection

        Algorithms select the correct controls based on a set of criteria that can be configured by the customer

        Key features

        • Rules based control selection
        • Automatic application of controls
        • Supports any privacy legislation
        • Data driven control selections

         

        Learn more »

        Automated control selection
      • Continuous control testing
        Product versions

        Continuous control testing

        Link your existing security tech to your privacy program and continuously test that your controls are in place and working.

        Key features

        • Pro-active data protection
        • Alerts for non-compliances
        • Integrates with your existing security tech
        • Real added value from your privacy program

         

        Learn more »

        Continuous control testing
      • Security training
        Product versions

        Security training

        Integrated security awareness training capability. Report on awareness deployment.

        Key features

        • Develop your own security courses
        • Report on staff training
        • Identify gaps and non-compliances

         

        Learn more »

        Security training
      • Cookie scanning | Cookie consent
        Product versions

        Cookie scanning | Cookie consent

        Scan you website cookies, manage your consent and develop your privacy policy.

        Key features

        • Cookie scanning
        • Consent
        • Privacy policy

         

        Learn more »

        Cookie scanning | Cookie consent
      • Multilingual
        Product versions

        Multilingual

        We support over 100 languages as standard

        Key features

        • 100+ supported languages
        • Non Latin based languages supported
        • Right-to-left text supported

         

        Learn more »

        Multilingual
    • NextGen Data Discovery
      AI data analysis and classification

      Key Capabilities

      • AI data discovery
        Product versions

        AI data discovery

        Discover your data from multiple sources and identify sensitive or regulated information, including confidential or proprietary data as well as protected data such as personally identifiable information (PII) or electronic protected health information (ePHI)

        Key features

        • Automatically find and classify your data
        • Finds personally identifiable information (PII)
        • Finds electronic protected health information (ePHI)
        • Automatically risk assesses data use

         

        Learn more »

        AI data discovery
      • Data Analysis
        Product versions

        Data Analysis

        Automatically classify your data by identifying the types of data within the discovered data sources using a predefined set of patterns, keywords or rules and assigning classification labels to that data.

        Key features

        • Data profiling from information sources like databases or files
        • Collecting data statistics
        • Extensive summaries about discovered data
        • Flexible visualisation of data types

         

        Learn more »

        Data Analysis
      • Data Visualisation
        Product versions

        Data Visualisation

        Visual Data Discovery uses visualisations and visual exploration of data to improve your understanding. Process large complex raw data sets into groups, types and relationships, making order out of chaos.

        Key features

        • Process large complex raw data
        • Groups data, types and relationships
        • Flexible visualisation using Pie, Charts etc.

         

        Learn more »

        Data Visualisation
      • Data Linking
        Product versions

        Data Linking

        Identify which processes use what data in a visual way

        Key features

        • Links to data source
        • Process data mapping
        • Asset data mapping

         

        Learn more »

        Data Linking
    • NextGen Vendor Management
      3rd party risk management

      Key Capabilities

      • Automated pre-filled surveys
        Product versions

        Automated pre-filled surveys

        Accelerate your privacy program using our automated surveys that cover PIA & DPIA.

        Key features

        • PIA & DPIA templates for your vendors
        • Data privacy good practice templates
        • Automated surveys

         

        Learn more »

        Automated pre-filled surveys
      • Transfer impact assessment
        Product versions

        Transfer impact assessment

        Identify which processes are performed by your 3rd party processors and how they manage your data securely

        Key features

        • Vendor risk assessment survey
        • Automatic vendor risk assessment
        • Store their certifications
        • Manage non-compliances and gaps

         

        Learn more »

        Transfer impact assessment
      • Automated vendor risk
        Product versions

        Automated vendor risk

        Assessment of the regimes in certain jurisdictions can evidence undertaking of due diligence on a jurisdiction.

        Key features

        • Pre-filled risk templates
        • Fully configurable vendor surveys
        • Configurable risk calculations
        • Vendor contract management
        • Track vendor shared data

         

        Learn more »

        Automated vendor risk
      • Automatic Schrems II contracts
        Product versions

        Automatic Schrems II contracts

        Proteus NextGen is enterprise software that already audits third parties for everything required by the new TIAs, thereby providing the case-by-case assessment required by the Schrems II ruling.

        Key features

        • Import your third-party vendor list.
        • Issue the preconfigured surveys which incorporate a full TIA.
        • Automatically risk assessed to enable easy prioritization of activity.
        • Contracts incorporate the latest SCCs as soon as the EU Commission issues them.
        • Automated sign off completes the process.
        • Easy ongoing review for subsequent years.

         

        Learn more »

        Automatic Schrems II contracts
      • Predefined vendor document templates
        Product versions

        Predefined vendor document templates

        Use our predefined data privacy templates to accelerate establishment of best practice

        Key features

        • Predefined data privacy templates
        • What policies and procedures do your vendors have?

         

        Learn more »

        Predefined vendor document templates
      • Transfer Impact Assessment Data Mapping
        Product versions

        Transfer Impact Assessment Data Mapping

        Understanding what data your vendor has, where the data is held, what processes use it, who they share it with, where they back it up and what security measures they apply is fundamental to a good secure data privacy program.

        Key features

        • Process data mapping
        • Application data mapping
        • Asset data mapping
        • Data register
        • Data security
        • Data disposal

         

        Learn more »

        Transfer Impact Assessment Data Mapping
      • Contract management
        Product versions

        Contract management

        What contracts do you have to manage the legal basis on which you share data with any 3rd party? NextGen includes contract management to manage this process, with workflow to review them regularly.

        Key features

        • Full workflow for vendor management
        • Automated renewal reminders
        • Vendor due diligence

         

        Learn more »

        Contract management
      • Legal basis for sharing data
        Product versions

        Legal basis for sharing data

        Capture the consent and legal basis for sharing data with 3rd party processors

        Key features

        • Key performance indicators
        • Automated renewal reminders
        • Workflow for management

         

        Learn more »

        Legal basis for sharing data
    • NextGen Consent
      Cookie scanning and website privacy notice

      Key Capabilities

      • Cookie scanning
        Product versions

        Cookie scanning

        Scan your websites for cookies

        Key features

        • Automatically identify your website cookies
        • Categorise your cookies
        • Gain consent

         

        Learn more »

        Cookie scanning
      • Website consent
        Product versions

        Website consent

        Build a consent engine that will run on your websites

        Key features

        • Easy to use ready-made interface
        • Automatically creates scripts
        • Stores customer consent preferences

         

        Learn more »

        Website consent
      • Privacy policies
        Product versions

        Privacy policies

        Automatically builds your privacy policy

        Key features

        • Easy to use ready-made interface
        • Automatically creates scripts
        • Easy to deploy on your website

         

        Learn more »

        Privacy policies
    • NextGen DSAR
      Subject / consumer request management

      Key Capabilities

      • Off the shelf web interface
        Product versions

        Off the shelf web interface

        Ready-made web interface for consumer/subject data requests

        Key features

        • Ready-made, configurable web interface
        • Easy same day implementation
        • Supports many different standards
        • Full workflow for DSARs
        • CCPA, GDPR, RGPD, LGPD, PDPA etc.

         

        Learn more »

        Off the shelf web interface
      • Supports any privacy legislation
        Product versions

        Supports any privacy legislation

        Ready-made interface supports any privacy legislation

        Key features

        • California Consumer Privacy Act (CCPA)
        • General Data Protection Regulation (GDPR)
        • Bundesdatenschutzgesetz (BDSG)
        • Règlement Général sur la Protection Des données (RGPD)
        • Lei Geral de Proteção de Dados (LGPD)
        • Personal Data Protection Act (PDPA)

         

        Learn more »

        Supports any privacy legislation
      • Pre-defined GDPR & CCPA templates
        Product versions

        Pre-defined GDPR & CCPA templates

        Ready-made templates for GDPR and CCPA

        Key features

        • Ready-made web interface
        • Same day implementation
        • Full workflow for DSARs

         

        Learn more »

        Pre-defined GDPR & CCPA templates
      • DSAR workflow management
        Product versions

        DSAR workflow management

        Workflows for customer requests, finding data, correcting/deleting data and responding to the consumer

        Key features

        • One interface can manage many standards
        • Countdown timers for critical functions
        • State by state workflow

         

        Learn more »

        DSAR workflow management
      • Consumer messaging interface
        Product versions

        Consumer messaging interface

        Secure interface for communicating with consumers or data subjects

        Key features

        • Two factor authentication
        • No data ever sent over insecure interfaces
        • Identity management validation

         

        Learn more »

        Consumer messaging interface
      • Automated consumer data collection
        Product versions

        Automated consumer data collection

        Using our APIs you can automate the collection of the consumers data

        Key features

        • Sophisticated APIs
        • Automatic triggering of APIs on request
        • Can collect data from numerous sources

         

        Learn more »

        Automated consumer data collection
    • NextGen Privacy Automation
      Automatic control selection

      Key Capabilities

      • Automatic control selection
        Product versions

        Automatic control selection

        Speed up and improve the accuracy of your data privacy program by automatically selecting controls based on what you do with your data

        Key features

        • AI rules engine
        • Customer configurable rules
        • Automatic control selection
        • Works across international standards

         

        Learn more »

        Automatic control selection
      • Encode your legal position
        Product versions

        Encode your legal position

        Use your in-house general counsel to encode the rules for control selection

        Key features

        • Engage the legal team
        • Encode their knowledge
        • Automate their knowledge operationally

         

        Learn more »

        Encode your legal position
    • NextGen Proactive Protection
      Continuous testing of controls

      Key Capabilities

      • Test each and every control
        Product versions

        Test each and every control

        Use your existing security technology to test each and every control that you implement from Proteus

        Key features

        • Link controls to existing security tech
        • Periodically test controls
        • Alert on control failure

         

        Learn more »

        Test each and every control
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
        Product versions

        Privacy regulation research

        Research data regulation from around the world with keyword searches included

        Key features

        • View regulations as they were intended
        • Cross referenced by keyword
        • Free to use

         

        Learn more »

        Privacy regulation research
      • Regulation comparison tool
        Product versions

        Regulation comparison tool

        Search across multiple data privacy regulations with keyword searches

        Key features

        • Select multiple international regulations
        • Search by keyword
        • Cross referenced by privacy topics
        • Free to use

         

        Learn more »

        Regulation comparison tool
      • Latest privacy news tracking
        Product versions

        Latest privacy news tracking

        Track the latest news, breaches and fines

        Key features

        • Tracks the latest breaches and fines
        • View by industry
        • View by breach method
        • View by privacy topic
        • Links to original articles
        • Free to use

         

        Learn more »

        Latest privacy news tracking
      • Latest Threat Intelligence
        Product versions

        Latest Threat Intelligence

        Track the Common Vulnerability Exposures (CVEs)

        Key features

        • Tracks the latest vulnerabilities
        • View by company
        • View by breach method
        • Links to NVD
        • Free to use

         

        Learn more »

        Latest Threat Intelligence
      • Breach modelling and ROI calculator
        Product versions

        Breach modelling and ROI calculator

        Model what a breach would look like for you in your industry and use this to calculate your return on investment

        Key features

        • Model your breach
        • Assess the severity
        • Compare by industry
        • Breakdown costs
        • Export to your business plan
        • Free to use

         

        Learn more »

        Breach modelling and ROI calculator
    • Proteus®NextGen Express™
    • Proteus®GDPReady™
      Simple dedicated GDPR solution

      Key Capabilities

      • Simple GDPR surveys
        Product versions

        Simple GDPR surveys

        Accelerate your privacy program using dedicated company-wide GDPR surveys

        Key features

        • Configurable PIA & DPIA templates
        • Automatic risk assessment
        • Identify non-compliances and gaps
        • Comprehensive Data mapping
        • Establish the legal basis for collection
        • How and why data is collected and used
        • Store categories of data
        • Know who has access to any data
        • Unlimited number of assessments
        • Annual attestation with pre-populated surveys

         

        Learn more »

        Simple GDPR surveys
      • Off the shelf DSAR web interface
        Product versions

        Off the shelf DSAR web interface

        Ready-made web interface for Subject Access requests (SARs)

        Key features

        • Ready-made, configurable web interface
        • Easy same day implementation
        • Supports many different standards
        • Full workflow for consumer requests

         

        Learn more »

        Off the shelf DSAR web interface
      • Pre-defined GDPR templates
        Product versions

        Pre-defined GDPR templates

        Ready-made templates for GDPR

        Key features

        • Ready-made web interface
        • Same day implementation
        • Full workflow for consumer requests

         

        Learn more »

        Pre-defined GDPR templates
      • DSAR workflow management
        Product versions

        DSAR workflow management

        Workflows for customer request, finding data, correcting/deleting data and responding to the data subject

        Key features

        • One inteface can manage many standards
        • Countdown timers for critical functions
        • State by state workflow

         

        Learn more »

        DSAR workflow management
      • Data subject messaging interface
        Product versions

        Data subject messaging interface

        Secure interface for communicating with consumers or data subjects

        Key features

        • Two factor authentication
        • No data ever sent over insecure interfaces
        • Identity management validation

         

        Learn more »

        Data subject messaging interface
      • Automated data subject info retrieval
        Product versions

        Automated data subject info retrieval

        Using our APIs you can automate the collection of the data subject's data

        Key features

        • Sophisticated APIs
        • Automatic triggering of APIs on request
        • Can collect data from numerous sources

         

        Learn more »

        Automated data subject info retrieval
    • Proteus®CCPAready™
      Simple dedicated CCPA solution

      Key Capabilities

      • Simple CCPA surveys
        Product versions

        Simple CCPA surveys

        Accelerate your privacy program using dedicated company-wide CCPA surveys

        Key features

        • Configurable PIA & DPIA templates
        • Automatic risk assessment
        • Identify non-compliances and gaps
        • Comprehensive Data mapping
        • Establish the legal basis for collection
        • How and why data is collected and used
        • Store categories of data
        • Know who has access to any data
        • Unlimited number of assessments
        • Annual attestation with pre-populated surveys

         

        Learn more »

        Simple CCPA surveys
      • Off the shelf consumer requests
        Product versions

        Off the shelf consumer requests

        Ready-made web interface for consumer requests

        Key features

        • Ready-made, configurable web interface
        • Easy same day implementation
        • Supports many different standards
        • Full workflow for consumer requests

         

        Learn more »

        Off the shelf consumer requests
      • Pre-defined CCPA templates
        Product versions

        Pre-defined CCPA templates

        Ready-made templates for CCPA

        Key features

        • Ready-made web interface
        • Same day implementation
        • Full workflow for consumer requests

         

        Learn more »

        Pre-defined CCPA templates
      • Consumer request workflow management
        Product versions

        Consumer request workflow management

        Workflows for customer request, finding data, correcting/deleting data and responding to the consumer

        Key features

        • One interface can manage many standards
        • Countdown timers for critical functions
        • State by state workflow

         

        Learn more »

        Consumer request workflow management
      • Consumer messaging interface
        Product versions

        Consumer messaging interface

        Secure interface for communicating with consumers or data subjects

        Key features

        • Two factor authentication
        • No data ever sent over insecure interfaces
        • Identity management validation

         

        Learn more »

        Consumer messaging interface
      • Automated consumer data retrieval
        Product versions

        Automated consumer data retrieval

        Using our APIs you can automate the collection of the consumer's data

        Key features

        • Sophisticated APIs
        • Automatic triggering of APIs on request
        • Can collect data from numerous sources

         

        Learn more »

        Automated consumer data retrieval
    • Proteus®NextGen Schrems II™
    • Proteus®Schrems II™
      Schrems ii decision | Schrems ii implications | Standard Contractual Clauses

      Key Capabilities

      • Automatic Schrems II contracts
        Product versions

        Automatic Schrems II contracts

        Proteus NextGen is enterprise software that already audits third parties for everything required by the new TIAs, thereby providing the case-by-case assessment required by the Schrems II ruling.

        Key features

        • Import your third-party vendor list.
        • Issue the preconfigured surveys which incorporate a full TIA.
        • Automatically risk assessed to enable easy prioritization of activity.
        • Contracts incorporate the latest SCCs as soon as the EU Commission issues them.
        • Automated sign off completes the process.
        • Easy ongoing review for subsequent years.

         

        Learn more »

        Automatic Schrems II contracts
  • Solutions
  • Free Resources
      Proteus®NextGen Data Privacy™
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
        Product versions

        Privacy regulation research

        Research data regulation from around the world with keyword searches included

        Key features

        • View regulations as they were intended
        • Cross referenced by keyword
        • Free to use

         

        Learn more »

        Privacy regulation research
      • Regulation comparison tool
        Product versions

        Regulation comparison tool

        Search across multiple data privacy regulations with keyword searches

        Key features

        • Select multiple international regulations
        • Search by keyword
        • Cross referenced by privacy topics
        • Free to use

         

        Learn more »

        Regulation comparison tool
      • Latest privacy news tracking
        Product versions

        Latest privacy news tracking

        Track the latest news, breaches and fines

        Key features

        • Tracks the latest breaches and fines
        • View by industry
        • View by breach method
        • View by privacy topic
        • Links to original articles
        • Free to use

         

        Learn more »

        Latest privacy news tracking
      • Latest Threat Intelligence
        Product versions

        Latest Threat Intelligence

        Track the Common Vulnerability Exposures (CVEs)

        Key features

        • Tracks the latest vulnerabilities
        • View by company
        • View by breach method
        • Links to NVD
        • Free to use

         

        Learn more »

        Latest Threat Intelligence
      • Breach modelling and ROI calculator
        Product versions

        Breach modelling and ROI calculator

        Model what a breach would look like for you in your industry and use this to calculate your return on investment

        Key features

        • Model your breach
        • Assess the severity
        • Compare by industry
        • Breakdown costs
        • Export to your business plan
        • Free to use

         

        Learn more »

        Breach modelling and ROI calculator
    • Articles
      Current and historical articles

      Key Capabilities

      • Defusing the GDPR time bomb
        Product versions

        Defusing the GDPR time bomb

        An article published four months before new data protection rules kick in, John Clelland and Chris Greenslade, founding partners of Proteus-Cyber, explain how to stay cool, calm and compliant, some of these points still apply.
        Defusing the GDPR time bomb
      • GDPR - And they’re off...
        Product versions

        GDPR - And they’re off...

        Chris Greenslade and John Clelland, Proteus-Cyber Ltd

        GDPR is now in full force. So is the hype over, or is the story only just beginning? After literally hundreds of conversations with companies at differing stages of readiness for GDPR, we have seen a pattern emerge which reflects a three-phased approach for readiness over the next months and years. These observations come from all sectors - public, private and not-for-profit - and span most of the EU member states.

        GDPR - And they’re off...
      • Proteus-Cyber Ltd- GDPR/LGDP Management Software
        Product versions

        Proteus-Cyber Ltd- GDPR/LGDP Management Software

        Proteus-Cyber Ltd- GDPR/LGDP Management Software

         

        Learn more »

      • Proteus-Cyber Ltd- PIA/TIA Assessment
        Product versions

        Proteus-Cyber Ltd- PIA/TIA Assessment

        Proteus-Cyber Ltd- PIA/TIA Assessment

         

        Learn more »

      • Six practical steps to Schrems II compliance
        Product versions

        Six practical steps to Schrems II compliance

        Six practical steps to Schrems II compliance

         

        Learn more »

      • Proteus-Cyber Ltd- Threat Intelligence Tools for Data Privacy Protection
        Product versions

        Proteus-Cyber Ltd- Threat Intelligence Tools for Data Privacy Protection

        Proteus-Cyber Ltd- Threat Intelligence Tools for Data Privacy Protection

         

        Learn more »

      • Proteus-Cyber Ltd- Privacy Impact Assessment GDPR
        Product versions

        Proteus-Cyber Ltd- Privacy Impact Assessment GDPR

        Proteus-Cyber Ltd- Privacy Impact Assessment GDPR, LGPD & CPRA

         

        Learn more »

      • Proteus-Cyber Ltd- Threat Intelligence Tools - Update
        Product versions

        Proteus-Cyber Ltd- Threat Intelligence Tools - Update

        Be prepared with our threat intelligence tools

         

        Learn more »

      • Canada’s Proposed New Consumer Privacy Protection Act: The Good, the Bad, the Missed Opportunities
        Product versions

        Canada’s Proposed New Consumer Privacy Protection Act: The Good, the Bad, the Missed Opportunities

        Canada’s Proposed New Consumer Privacy Protection Act: The Good, the Bad, the Missed Opportunities

         

        Learn more »

      • Proteus-Cyber Ltd - Third Party Risk Management
        Product versions

        Proteus-Cyber Ltd - Third Party Risk Management

        When it comes to assessing risks and threats towards your business, something people often overlook is third parties. Sharing information can be incredibly risky, so it’s important to have steps in place to safely and securely manage any potential threats.

         

        Learn more »

      • Did you know that Action Fraud data reveals UK consumers lost over £197m to investment fraud in 2018 alone, so se careful if you are considering an investment in the future
        Product versions

        Did you know that Action Fraud data reveals UK consumers lost over £197m to investment fraud in 2018 alone, so se careful if you are considering an investment in the future

        Did you know that Action Fraud data reveals UK consumers lost over £197m to investment fraud in 2018 alone, so se careful if you are considering an investment in the future

         

        Learn more »

    • Privacy standards
      Data privacy regulations

      Key Capabilities

      • EU GDPR
        Product versions

        EU GDPR

        The General Data Protection Regulation (EU) 2016/679 (GDPR) is a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.

         

        Learn more »

      • US CCPA
        Product versions

        US CCPA

        The California Consumer Privacy Act (CCPA), enacted in 2018, creates new consumer rights relating to the access to, deletion of, and sharing of personal information that is collected by businesses. It also requires the Attorney General to solicit broad public participation and adopt regulations to further the CCPA's purposes. The proposed regulations would establish procedures to facilitate consumers' new rights under the CCPA and provide guidance to businesses for how to comply. The Attorney General cannot bring an enforcement action under the CCPA until July 1, 2020.

         

        Learn more »

      • Brazil LGPD
        Product versions

        Brazil LGPD

        The Lei Geral de Proteção de Dados (LGPD) regulation comes into effect on the 15th August 2020 and sets out exactly how organizations and individuals are permitted to collect and use personal data in Brazil. Companies have until this date to make sure they are compliant.

         

        Learn more »

      • Australian Privacy Act
        Product versions

        Australian Privacy Act

        The Privacy Act 1988 is an Australian law dealing with privacy. Section 14 of the Act stipulates a number of privacy rights known as the Information Privacy Principles (IPPs). These principles apply to Australian Government and Australian Capital Territory agencies or private sector organizations contracted to these governments, as well as to organizations and small businesses who provide a health service.

         

        Learn more »

      • Germany BDSG
        Product versions

        Germany BDSG

        The German Bundesdatenschutzgesetz (BDSG) is a federal data protection act, that together with the data protection acts of the German federal states and other area-specific regulations, governs the exposure of personal data, which are manually processed or stored in IT systems.

         

        Learn more »

      • Canada Pipeda
        Product versions

        Canada Pipeda

        The Personal Information Protection and Electronic Documents Act (PIPEDA) (the Act, French: Loi sur la protection des renseignements personnels et les documents électroniques) is a Canadian law relating to data privacy.[2] It governs how private sector organizations collect, use and disclose personal information in the course of commercial business. In addition, the Act contains various provisions to facilitate the use of electronic documents. PIPEDA became law on 13 April 2000 to promote consumer trust in electronic commerce. The act was also intended to reassure the European Union that the Canadian privacy law was adequate to protect the personal information of European citizens.

         

        Learn more »

      • Thailand PDPA
        Product versions

        Thailand PDPA

        On 28 February, the National Legislative Assembly approved the Personal Data Protection Act ("PDPA"). The Act is aimed at regulating the lawful collection, use, or disclosure of personal data that can directly or indirectly identify a natural person – but does not apply to the data of a deceased person.

         

        Learn more »

      • Singapore PDPA
        Product versions

        Singapore PDPA

        Singapore Personal Data Protection Act 2012 (PDPA) is a law that governs the collection, use and disclosure of personal data by all private organisations. The Act has come into full effect on 2nd July 2014. Organisations which fail to comply with PDPA may be fined up to $1 million and suffer reputation damage.

         

        Learn more »

      • Swiss FADP
        Product versions

        Swiss FADP

        In Switzerland, the Federal Act on Data Protection (FADP) protects the privacy and the fundamental rights of natural and legal persons when their data is processed. It sets out the requirements for permissible data processing in accordance with the rule of law and therefore protects against possible abuses.

         

        Learn more »

      • New York SHIELD
        Product versions

        New York SHIELD

        On July 25, 2019, New York Governor Andrew Cuomo signed into law the Stop Hacks and Improve Electronic Data Security Act ("SHIELD Act") amending New York's data breach notification law. This adds to the growing list of states enacting privacy and data security laws. The SHIELD Act introduces significant changes, including. Broadening the Definition of "Private Information. Expanding the Definition of "Breach. Expanding the Territorial Scope. Imposing Data Security Requirements. The breach notification amendments take effect on October 23, 2019, while the data security requirements take effect on March 21, 2020.

         

        Learn more »

      • New York NYDFS
        Product versions

        New York NYDFS

        The New York State Department of Financial Services (DFS or NYSDFS) is the department of the New York state government responsible for regulating financial services and products, including those subject to the New York insurance, banking and financial services laws.

         

        Learn more »

      • Andorra Adequacy
        Product versions

        Andorra Adequacy

         

        Learn more »

      • Argentina Adequacy
        Product versions

        Argentina Adequacy

        Commission Decision /n of 30 June 2003 /n pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data in Argentina /n (Text with EEA relevance) /n (2003/490/EC) /n THE COMMISSION OF THE EUROPEAN COMMUNITIES, /n Having regard to the Treaty establishing the European Community, /n Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data(1), and in particular Article 25(6) thereof, /n Whereas: /n

         

        Learn more »

      • Canada Adequacy
        Product versions

        Canada Adequacy

         

        Learn more »

      • Faeroese Adequacy
        Product versions

        Faeroese Adequacy

        COMMISSION DECISION of 5 March 2010 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection provided by the Faeroese Act on processing of personal data (notified under document C(2010) 1130) (Text with EEA relevance) (2010/146/EU) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1), and in particular Article 25(6) thereof, After consulting the Working Party on Protection of Individuals with regard to the processing of personal data (2), Whereas:

         

        Learn more »

      • Guernsey Adequacy
        Product versions

        Guernsey Adequacy

        Commission Decision of 21 November 2003 on the adequate protection of personal data in Guernsey (notified under document number C(2003) 4309) (Text with EEA relevance) (2003/821/EC) THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty establishing the European Community, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data(1), and in particular Article 25(6) thereof, After consulting the Working Party on Protection of Individuals with regard to the processing of personal data(2), Whereas:

         

        Learn more »

      • Isle of Man Adequacy
        Product versions

        Isle of Man Adequacy

        COMMISSION DECISION of 28 April 2004 on the adequate protection of personal data in the Isle of Man (notified under document number C(2004) 1556) (Text with EEA relevance) (2004/411/EC) THE COMMISSION OF THE EUROPEAN COMMUNITIES, having regard to the Treaty establishing the European Community, having regard to Directive 9 5/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1), and in particular Article 25(6) thereof, After consulting the Working Party on the Protection of Individuals with regard to the processing of Personal Data (2), whereas:

         

        Learn more »

      • Israel Adequacy
        Product versions

        Israel Adequacy

        COMMISSION DECISION of 31 January 2011 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data by the State of Israel with regard to automated processing of personal data (notified under document C(2011) 332) (Text with EEA relevance) (2011/61/EU) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, (1) and in particular Article 25(6) thereof, After consulting the European Data Protection Supervisor, Whereas:

         

        Learn more »

      • Japan Adequacy
        Product versions

        Japan Adequacy

        COMMISSION IMPLEMENTING DECISION (EU) 2019/419 of 23 January 2019 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate protection of personal data by Japan under the Act on the Protection of Personal Information (notified under document C(2019) 304) (Text with EEA relevance) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (1) (‘GDPR’), and in particular Article 45(3) thereof, After consulting the European Data Protection Supervisor,

         

        Learn more »

      • Jersey Adequacy
        Product versions

        Jersey Adequacy

        COMMISSION DECISION of 8 May 2008 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data in Jersey (notified under document number C(2008) 1746) (Text with EEA relevance) (2008/393/EC) THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty establishing the European Community, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1), and in particular Article 25(6) thereof, After consulting the Working Party on Protection of Individuals with regard to the processing of personal data (2)

         

        Learn more »

      • New Zealand Adequacy
        Product versions

        New Zealand Adequacy

        COMMISSION IMPLEMENTING DECISION of 19 December 2012 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data by New Zealand (notified under document C(2012) 9557) (Text with EEA relevance) (2013/65/EU) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1), and in particular Article 25(6) thereof, After consulting the European Data Protection Supervisor

         

        Learn more »

      • Switzerland Adequacy
        Product versions

        Switzerland Adequacy

        Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data provided in Switzerland (notified under document number C(2000) 2304) (Text with EEA relevance) (2000/518/EC) THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty establishing the European Community, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data(1), and in particular Article 25(6) thereof,

         

        Learn more »

      • Uruguay Adequacy
        Product versions

        Uruguay Adequacy

        COMMISSION IMPLEMENTING DECISION of 21 August 2012 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data by the Eastern Republic of Uruguay with regard to automated processing of personal data (notified under document C(2012) 5704) (Text with EEA relevance) (2012/484/EU) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1), and in particular Article 25(6) thereof, After consulting the European Data Protection Supervisor (2),

         

        Learn more »

      • CPRA
        Product versions

        CPRA

        The California Privacy Rights Act of 2020 reflects the purpose and intent of the people of the State of California to further protect consumers' rights, including the constitutional right of privacy.

         

        Learn more »

  • Privacy News
  • Company
    • About Us
    • FAQ
    • Contact Us
  • Contact Us
Privacy regulation research
  • Regulation comparison tool
  • Privacy news
  • Threat Intelligence
  • Breach/ROI calculator
 
  • Keyword search
  • Show
  • Clear filters
  • Argentina Adequacy X
  • Health X

Commission DecisionArgentina Adequacy Decision

ArticlesDecision Articles

Article 1 - Argentina level of protectionArticle 2 - Meeting the requirements of Article 25(1)Article 3 - Data flows to a recipient in ArgentinaArticle 4 - Compliance monitoringArticle 5 - Commission monitoringArticle 6 - Decision dateReferences - Additional reading
  • Home
  • Argentina Adequacy
  • Tags
  • Health
Commission Decision
(13) Data protection provisions are also contained in a number of legal instruments regulating different sectors, such as credit card transactions, statistics, banking or health.

© 2021 Proteus-Cyber Ltd. 10,000 mailboxes hit in phishing attacks on FedEx and DHL Express Disclaimer

Ask a privacy expert?

If you have questions regarding privacy legislation, our team will endeavour to provide you with an answer in a few days. Please complete this form and include the 'name' of the legislation your query is about with details concerning the query.

Click image to refresh and enter in lower case

Proteus-Cyber