Download a checklist, step-by-step plan, or template for free

Navigating HIPAA – Protecting Health Data in the Data Protection Landscape

In the complex world of healthcare and data protection, the Health Insurance Portability and Accountability Act (HIPAA) provides crucial guidelines for safely handling patient data. Our latest whitepaper, authored by experts Johan Martens, Tarryn Howard, and Deniz Naz Kaya, offers in-depth analyses and practical advice for navigating the challenges and opportunities HIPAA presents.

Road Map Transfer Impact Assessment

When your organization transfers personal data to countries outside the European Economic Area (EEA), it is important to ensure the same level of protection. In some cases, you are required by law to perform a Transfer Impact Assessment (TIA). In this road map we explain to you which steps you have to go through with a TIA.

Checklist data processing agreement

If you as an organization engage a third party for the processing of personal data, such as an accountant, those responsibilities must be laid down in a data processing agreement. But how do you compile such a data processing agreement? What do you have to include? And what else can you think about? We will explain it to you with this document. We give you the tools to make a sound data processing agreement and we ensure your agreements with processors are clearly recorded.

Checklist record of processing activities

Organizations that structurally process personal data are required by the General Data Protection Regulation (GDPR) to keep a record of processing activities. But what is a record of processing activities? And what should it contain according to the General Data Protection Regulation (GDPR)? In this checklist, we list the most important things for you and explain how you implement the legally required components.

Step-by-step plan data breach protocol

A data breach can happen to any organization, the most important thing is how this data breach is handled and what follow-up steps are taken to prevent data breaches in the future. With this step-by-step plan, we help your organization to set up a data breach protocol.

Legitimate interest assessment checklist

As an organization, you must determine which lawful basis you are relying on to ensure that your proposed processing is lawful. This checklist will help you assess whether you can invoke the legitimate interest basis for certain processing activities.

Didn’t find what you were looking for? Ask one of our experts!