We assist companies in becoming compliant with national and international data protection laws such as POPI, GDPR and the US Privacy Shield.
We follow a meticulous process of first determining which, if any, data protection legislation, regulations or statutes are applicable to your organisation. We reach our conclusion by drafting an inventory of your corporate information assets. once this inventory concludes that your organisation is indeed subject to a specific or several legislation, regulations or statutes, we then proceed to perform a legal assessment and gap analysis for you. During this process, we will identify the threat agent, threat motivation, vulnerabilities to be exploited, likelihood of an attack, as well as the potential impact a successful attack may have on your organisation.
The Compliance & Toolkits Process involves:
We will assist you in reviewing, drafting and implementing all IT-related policies relevant to your company. All policies are written in plain, simple to understand language with as little as possible legal jargon used.
We specialise in:
Although all the policies are written in plain language it does take into account who the target audience is for whom the policy is written. All policies are written in the format of a similar template which makes it much easier for employees to initially understand and get to grips with it. All the policies furthermore contain the following unique elements:
The action Human Rights are entitled to take in case a specific policy is not adhered to is set out clarity in each respective policy
Review, redaft and amend (where necessary):
We provide legal opinions relating to IT legislation, policy and legislative developments in any of the following focus areas:
Our staff members are all industry-wide professional speakers having spoken at hundreds of international and national conferences, seminars, lectures and workshops. Our speakers are used to presenting in front of small groups of people as well as many as 900 delegates with ease.
We have found that the most popular requests for speaking engagements are in the following areas:
Drafting and Reviewing IT-related legal documents such as:
Organisations face the constant threat of cyber-attack. Creating an effective cyber risk strategy to mitigate the risk of cybercrime is the only way to ensure your survival, but cyber security management can be complex and costly. With so many standards, best practices and technical controls to choose from, how do you get started on your plan?
We assist organisations in: