Search
Close this search box.
AI-based solution designed to automate personal data discovery and classification
Discover personal data across multiple systems in the cloud or on-premise
Harbor cooperation between DPO, Legal Services, IT and Marketing
Turn data subject request into an automated workflow with a clear insight into data every step of the way
Collaborate with stakeholders and manage DPIA and LIA in real-time with Assessment Automation
Guide your partners trough vendor management process workflow
Identifying the risk from the point of view of Data Subject
Quickly respond, mitigate damage and maintain compliance
Consolidate your data and prioritize your relationship with customers
Privacy portal allows customers to communicate their requests and preferences at any time
Introducing end-to end automation of personal data removal

Latest Blog posts

Learn the terms

General Data Protection Regulation

Here you can find the official content of the Regulation (EU) 2016/679 (General Data Protection Regulation) in the current version. All Articles of the GDPR are linked with suitable recitals.

Latest papers

Right to restrict processing

The right to restrict processing allows individuals (data subjects) to ask for the restriction of the processing of their personal data. This right is often exercised as an alternative to the request for data deletion.

Since this right is not absolute, there are only certain situations in which the right to restrict processing applies, if:

• upon individuals’ request the data is confirmed to be inaccurate
• the processing is unlawful but the data subject does not want the data to be erased and requests restriction (which is different from the right to be erased)
• the organization no longer needs data for the original purpose, but the individual wants the data to be preserved for the purposes of a legal claim
• the organization is in the process of verifying data erasure request

From the operational point of view, Recital 67 of the GDPR provides some guidance for organizations explaining that methods which may be used include:

• temporarily moving the selected data to another processing system,
• making the selected personal data unavailable to users,
• temporarily removing published data from a website.

All glossaries
  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
Scroll to Top