This phase involves identification of information sources, and is processing infrastructure that involves personnel, technology, physical infrastructure.
This phase involves performing privacy impact assessment and security risk assessment to determine security and legal loopholes. Identified gaps are provided with detail recommendations.
This phase involves our methodology that involves distribution security responsibility to internal stakeholders, with control policies and transactions that ensures that the PIMS is well embedded in the organisation processes. This also includes nomination of a data protection officer and creating data protection office, for the organisation. In a typical engagement organisation receives 25+ policies and procedures.
This phase involves tracking the client risks, and documentation on a weekly basis till all internal controls are adequately implemented.
This phase involves showcasing client with changes in a given period by providing change specific score of compliance between 0 -100% compliance.
This phase involves verifying the governance system created for the organisation is well in place and ready to declare as PIMS compliant.