[email protected] +44 (0)208 123 7708
Proteus-Cyber Nextgen Data Privacy

Proteus-Cyber
Data Privacy Software

  • Home
  • Solutions
      Proteus®NextGen Enterprise™
    • NextGen Privacy
      Data privacy management

      Key Capabilities

      • Automated survey templates
      • PIA/DPIA & TIA assessment
      • Comprehensive Data mapping
      • Automated risk assessment
      • Vendor risk management
      • Consent management
      • Privacy by design
      • Predefined privacy policy document templates
      • Breach notification
      • Automated control selection
      • Continuous control testing
      • Security training
      • Cookie scanning | Cookie consent
      • Multilingual
    • NextGen Data Discovery
      AI data analysis and classification

      Key Capabilities

      • AI data discovery
      • Data Analysis
      • Data Visualisation
      • Data Linking
    • NextGen Vendor Management
      3rd party risk management

      Key Capabilities

      • Automated pre-filled surveys
      • Transfer impact assessment
      • Automated vendor risk
      • Automatic Schrems II contracts
      • Predefined vendor document templates
      • Transfer Impact Assessment Data Mapping
      • Contract management
      • Legal basis for sharing data
    • NextGen Consent
      Cookie scanning and website privacy notice

      Key Capabilities

      • Cookie scanning
      • Website consent
      • Privacy policies
    • NextGen DSAR
      Subject / consumer request management

      Key Capabilities

      • Off the shelf web interface
      • Supports any privacy legislation
      • Pre-defined GDPR & CCPA templates
      • NextGen DSAR workflow management
      • NextGen consumer messaging interface
      • Automated consumer data collection
    • NextGen Privacy Automation
      Automatic control selection

      Key Capabilities

      • Automatic control selection
      • Encode your legal position
    • NextGen Proactive Protection
      Continuous testing of controls

      Key Capabilities

      • Test each and every control
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
      • Regulation comparison tool
      • Latest privacy news tracking
      • Latest Threat Intelligence
      • Breach modelling and ROI calculator
    • Proteus®NextGen Express™
    • Proteus®GDPReady™
      Simple dedicated GDPR solution

      Key Capabilities

      • Simple GDPR surveys
      • Off the shelf DSAR web interface
      • Pre-defined GDPR templates
      • GDPReady DSAR workflow management
      • Data subject messaging interface
      • Automated data subject info retrieval
    • Proteus®CCPAready™
      Simple dedicated CCPA solution

      Key Capabilities

      • Simple CCPA surveys
      • Off the shelf consumer requests
      • Pre-defined CCPA templates
      • Consumer request workflow management
      • CCPAReady consumer messaging interface
      • Automated consumer data retrieval
    • Proteus®NextGen Schrems II™
    • Proteus®Schrems II™
      Schrems ii decision | Schrems ii implications | Standard Contractual Clauses

      Key Capabilities

      • Automatic Schrems II contracts
  • Solutions
  • Free Resources
      Proteus®NextGen Data Privacy™
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
      • Regulation comparison tool
      • Latest privacy news tracking
      • Latest Threat Intelligence
      • Breach modelling and ROI calculator
    • Articles
      Current and historical articles

      Key Capabilities

      • Defusing the GDPR time bomb
      • GDPR - And they’re off...
      • GFT and Proteus-Cyber partner to deliver world class data protection management
      • The Cost of a Data Breach by Alex Igel Proteus Cyber.
      • Why Data Privacy & Cyber Security Are Business Issues Of The Highest Priority by Alex Igel Metrics Management
      • Proteus-Cyber Ltd- GDPR/LGDP Management Software
      • Proteus-Cyber Ltd- PIA/TIA Assessment
      • Six practical steps to Schrems II compliance
      • Proteus-Cyber Ltd- Threat Intelligence Tools for Data Privacy Protection
      • Proteus-Cyber Ltd- Privacy Impact Assessment GDPR
      • Proteus-Cyber Ltd- Threat Intelligence Tools - Update
    • Privacy standards
      Data privacy regulations

      Key Capabilities

      • EU GDPR
      • US CCPA
      • Brazil LGPD
      • Australian Privacy Act
      • Germany BDSG
      • Canada Pipeda
      • Thailand PDPA
      • Singapore PDPA
      • Swiss FADP
      • New York SHIELD
      • New York NYDFS
      • Andorra Adequacy
      • Argentina Adequacy
      • Canada Adequacy
      • Faeroese Adequacy
      • Guernsey Adequacy
      • Isle of Man Adequacy
      • Israel Adequacy
      • Japan Adequacy
      • Jersey Adequacy
      • New Zealand Adequacy
      • Switzerland Adequacy
      • Uruguay Adequacy
      • CPRA
      • ADPPA
  • Privacy News
  • Company
    • About Us
    • FAQ
    • Contact Us
  • Contact Us
REQUEST A DEMO

NextGen Data Privacy | Data Privacy Management | Privacy Management Program

Data privacy management

 

Automated survey templates


Accelerate your privacy program using our automated Pre-filled out surveys that cover PIA/TIA & DPIA.

Automated survey templates

Key features

  • Configurable PIA & DPIA templates
  • Automatic risk assessment
  • Identify non-compliances and gaps
  • Comprehensive Data mapping
  • Establish the legal basis for collection
  • How and why data is collected and used
  • Store categories of data
  • Know who has access to any data
  • Unlimited number of assessments
  • Annual attestation with pre-populated surveys
Customise our templates or use them as they are. Issue the right questions to the right people (whether business, legal or technical) using automated workflows. Capture everything you need with tick-box responses. Automatically builds your data register and assesses risk. Extensive, flexible reporting. Pre-populated surveys for subsequent revalidation.
 

PIA/DPIA & TIA assessment


Know what data your processes use, store or share

Easily capture everything you need for PIAs and DPIAs with tick-box response questionnaires, asking only the appropriate questions of the right people. Automatically builds your data register and assesses risk. See what processes are high risk. PIA/DPIA reporting. Task manager for interventions. Pre-populated surveys for subsequent revalidation

Key features

  • Privacy Impact Assessment
  • Data Privacy Impact Assessment
  • Two types of automatic risk assessment
  • Manage non-compliances and gaps
  • Link to data source
  • Understand what data is collected and why
  • Visualise how data is linked, stored or shared
  • Maintain controller & processor records
  • See 3rd parties' use the data
  • Produce RoPA (records of processing activity) reports
PIA/DPIA & TIA assessment
 

Comprehensive Data mapping


Understanding where your data is, what processes use it, who you share it with, where you back it up and what security measures you apply is fundamental to a good secure data privacy program.

Comprehensive Data mapping

Key features

  • Process data mapping
  • Application data mapping
  • Asset data mapping
  • Data register
  • Data security
  • Data disposal
Get this part right and the rest can follow. Get this wrong and you will not trust your information. Capture what data you hold, why you have it and how you use it (each and every process) is the first step. Then understand how you look after it (security, retention, backups etc) and bring this all together into a data register. Now add flexible reporting and visualisation capabilities and you will be in control of your data and will, for example, have the confidence to delete data when you need to.
 

Automated risk assessment


Understand your data privacy risk by legislation and manage your non-compliances and gaps

Every organisation has its own take on risk. Some want automation, some want flexibility. We provide both. With comprehensive, templated, yet configurable, risk assessment reflecting directly privacy regulation and using best risk assessment practice. Easy, flexible and visual. Integrated task management to redress noncompliance.

Key features

  • Pre-filled risk templates
  • Fully configurable risk calculations
  • Privacy legislation risk
  • Traditional risk assessment
Automated risk assessment
 

Vendor risk management


Track what data you share with third parties, the legal basis for sharing that data and what contracts you have in place to manage them.

Vendor risk management

Key features

  • Pre-filled risk templates
  • Fully configurable vendor surveys
  • Configurable risk calculations
  • Vendor contract management
  • Track vendor shared data
Know which of your partners uses your data and on what legal basis you provide access. Manage the contractual relationship. Surveys auto-determine the information required to assure vendor due diligence. Visualise data transfers.
 

Consent management


Manage your consent and privacy policy.

Understand where consent is required and obtain it easily and effectively. Remain compliant with different privacy regulations.

Key features

  • Record the consent required by process
  • Website privacy policy
  • Cookie consent tracking
  • Marketing consent
  • Special category consent
  • Third party consent
Consent management
 

Privacy by design


Self-service assessment of processes for data privacy prior to implementation.

Privacy by design

Key features

  • Configurable Privacy by design intranet website
  • Data mapping
  • How, why, where data is collected & stored
  • Legal basis for data collection
Organisations consider new business opportunities all the time. Easily build in privacy considerations from the outset. Factory-fit is easier than retro-fit. Auto-assess which warrant intervention from the data privacy department to keep your business agile.
 

Predefined privacy policy document templates


NextGen contains a full set of pre-defined policy document templates covering a range of data privacy topics, saving you time and effort.

Build your own or start with one of the many templates we provide. Either way it's configurable so you end up with exactly what you need.

Key features

  • Pre-defined privacy templates
  • Customisable
Predefined privacy policy document templates
 

Breach notification


Create a breach notification record in the format required by your regulatory authority

Breach notification

Key features

  • Supports many regulatory authorities
  • Local output formats ICO, CNIL, CCPA...
  • Breach notification notices
  • 72 hour countdown timer
  • Breach workflow management
  • Breach notification website template
Should it happen you need not panic. Integrated incident response management workflow ensures fast, effective initial action. Our comprehensive data register and visualisation tools let you quickly see what data, systems and processes may be affected. Templated responses for your supervisory authority facilitate the response process and enable you to submit your breach notification in the required format and in time.
 

Automated control selection


Algorithms select the correct controls based on a set of criteria that can be configured by the customer

Organisations operating outside of their home jurisdiction are likely to find that multiple data privacy regulations apply. Our algorithms help make this easier by selecting appropriate measures according to criteria that you can determine.

Key features

  • Rules based control selection
  • Automatic application of controls
  • Supports any privacy legislation
  • Data driven control selections
Automated control selection
 

Continuous control testing


Link your existing security tech to your privacy program and continuously test that your controls are in place and working.

Continuous control testing

Key features

  • Pro-active data protection
  • Alerts for non-compliances
  • Integrates with your existing security tech
  • Real added value from your privacy program
Most breaches arise out of simple errors where policy isn't followed correctly. Mitigate the risk by using our system to monitor the effectiveness of your existing controls continuously. Know that your security procedures and systems are in place and working properly.
 

Security training


Integrated security awareness training capability. Report on awareness deployment.

Easy delivery of you’re your security awareness program through our system. Test understanding. Monitor progress. Report on compliance. Integrates with your ELMS.

Key features

  • Develop your own security courses
  • Report on staff training
  • Identify gaps and non-compliances
Security training
 

Cookie scanning | Cookie consent


Scan you website cookies, manage your consent and develop your privacy policy.

Cookie scanning | Cookie consent

Key features

  • Cookie scanning
  • Consent
  • Privacy policy
Rely on the most used solution for compliant use of cookies and online tracking.
 

Multilingual


We support over 100 languages as standard

Select just one language or as many as you need. Same instance. No extra charge. Let survey users read questions in their language to improve response accuracy.

Key features

  • 100+ supported languages
  • Non Latin based languages supported
  • Right-to-left text supported
Multilingual
Proteus-Cyber Ltd.
20-22 Wenlock Road
London
N1 7GU
United Kingdom
P: +44 (0)208 123 7708
Registered in the UK
and Wales 07239733.
VAT registered
GB 991 1452 13
‘Proteus’ is a registered trademark.
All rights reserved.
Products
  • NextGen Privacy
  • NextGen Data Discovery
  • NextGen Vendor Management
  • NextGen Consent
  • NextGen DSAR
  • NextGen Privacy Automation
  • NextGen Proactive Protection
  • NextGen Privacy Research
Free resources
  • Privacy regulation research
  • Regulation comparison tool
  • Latest privacy news tracking
  • Latest Threat Intelligence
  • Breach modelling and ROI calculator
About us
  • Website terms and disclaimer
  • Privacy and cookies policy
  • Articles
Contact Us

[email protected] or
follow us on social media

© 2023 Proteus-Cyber Ltd.