You are here
Design and Implement a Data Protection Management System
Our proven, structured methodology to the GDPR is four fold
The biggest challenge to achieving GDPR compliance resides in your ability to coordinate various activities. This requires a broad spectrum of different skill sets, each evolving at a different pace. Integrated into proper governance of data privacy, our GDPR compliance methodology will enhance your organization and enable it to demonstrate accountability and transparency.
The legal dimension covers all legal obligations such as notification to data subject, setting up the legal ground for processing and the data processing register, as well as such contractual changes as required with suppliers, customers and partners.
Data governance covers all aspects related to data architecture, flows and governance, including the breach management process.
Information security covers all activities pertaining to the proper management and governance of information security risks as well as awareness programmes.
The Technology part is dedicated to helping IT teams identify and implement appropriate security and privacy measures so as to support the overall compliance programme. This domain is closely tied to the privacy by design concept.
What are the benefits of such an implementation method?
- Ensure that you cover all aspects of the GDPR within your organization, including IT, Legal and Business
- Enable a clear identification of all stakeholders, and the effort required by all parties
- Facilitate the definition of roles and responsibilities during and after implementation
- Entail adapted awareness for the implementation team
- Provide a tailored and independent roadmap, and clear cost control
- Prioritize activities and quick wins
- Provide easy metrics
A methodology empowered with governance and project management skills
We are convinced that a proper implementation of such a project cannot be successful without proper project management and governance with our customers. Our team accordingly includes project managers with appropriate skills and competences (Prince2 and Agile mainly) who can proceed with our clients’ governance and project management processes and tools, or use the Approach project management tools and processes.
Based on your compliance journey, Approach can support your organization from assessment to daily operations.
"Approach helped us to define a very clear and structures roadmap for implementing our GDPR compliance programme. Approach came up with a pragmatic and straightforward methodology covering the full spectrum of the GDPR, complete with a properly controlled budget and timeline". Michel Ziegelshiffer, Risk and Compliance Director Volkswagen D'Ieteren Finance
“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.” Koen Reyniers, COO BENELUX EDENRED
Publications & events
Namur Expo (1 day )
Approach at ICT Infrastructure Namur
Meet us during ICT Infrastructure Exhibition on May 31st.
Published on 06 March 2018
Why compliance monitoring is critical for your business?
With regulatory requirements continuously increasing, compliance and risk management should be a business process for all organisations.
Published on 28 September 2017
Europe actively looking at Data Protection
Read the interview of Laurent Deheyer and Michaël Raison in the Info Enterprendre magazine
Brussels Expo (2 days)
Approach at Infosecurity
Meet our experts to discuss about your cyber-security challenges and attend our session "the advent of mobile digital identity" at...
Published on 14 December 2017
Our approach and services to GDPR - brochure
Make sure you comply with the new GDPR by using our proven methodology! Download our brochure to learn more.
Published on 14 December 2017
Approach service offering and mission - brochure
We enable our customers to succeed by delivering state‑of‑the‑art solutions to cyber‑security challenges.