ISH

GRC

Adaptation to the LGPD for companies of all sizes, in all sectors.

The Privacy Office, ISH's Privacy Program, offers a solution to bring companies into compliance with privacy legislation

The service packages meet all the requirements of a Privacy Management Program (PGP) and form one of the most complete solutions on the market.

The contracting process is modularized, making the offer more dynamic for all types of organizations. Thus, whatever the scenario, the company can start adapting in a solid way, prioritizing the initiatives that mitigate business risks. All with ISH's cybersecurity DNA.

How does the ISH Privacy Office work?

The ISH Privacy Office implements, operates and monitors the day-to-day activities of the organization's privacy management system in compliance with the General Data Protection Law (LGPD), from implementation to the maturity of the program.
01
Data mapping, discovery and classification
Locate and categorize information from structured and unstructured data in the cloud, on-premises and legacy systems. Map internal data movements and transfers to third parties. Generate reports to monitor data flow.
02
Automation and Risk Management
Use ISH Privacy Office automation for identity proofing, redress, deletion and other situations in the data processing process. Use the pre-designed LGPD standards with automatic risk recognition and guidelines and manage risks centrally.
03
Database and Privacy Policies
Have a database with information on user consent on all websites, applications and forms that collect data. Forward this information to automation tools and other systems. Draw up privacy policies in a specific space that is easily accessible to your channel and keep them constantly updated.
04
Incident management
Track, manage and report incidents centrally. Automate the calculation and handling of incidents.
05
Implementation and Monitoring of the LGPD Program
Monitor the implementation and maturity of your LGPD program in accordance with the legislation and other privacy and security guidelines. Create reports on the program's development for the company's strategic management team.

CONTACT

CONTACT ISH

Our cyber security incident detection and response service is completely modular. The offer will be designed according to best practices, strategic planning and available budget.






    Como você conheceu a ISH?


    By entering my data, I agree to the Privacy Policy.

    We promise not to use your contact information to send any kind of SPAM.