Alternatives to KPMD Subject Access Requests System

Compare KPMD Subject Access Requests System alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KPMD Subject Access Requests System in 2024. Compare features, ratings, user reviews, pricing, and more from KPMD Subject Access Requests System competitors and alternatives in order to make an informed decision for your business.

  • 1
    consentmanager

    consentmanager

    consentmanager AB

    Customers using the consentmanager cookie solution typically achieve higher acceptance rates and lower bounce rates. Only with a high cookie acceptance rate can you exploit the full potential of your website (e.g. sell the most advertising). And only with a low bounce rate can you get the most out of your visitors. consentmanager is the solution that gives you a complete overview of what is happening on your website and how your visitors react and interact with the consent layer. Our GDPR-compliant cookie solution allows you to test multiple consent layer designs simultaneously, and automatically optimise to the design that shows the best results with our machine learning and A/B testing feature. Available in over 30 languages covering different global privacy regulations, consentmanager is the tool to manage cookies and consent for organisations of all sizes and in all regions of the world.
    Compare vs. KPMD Subject Access Requests System View Software
    Visit Website
  • 2
    PrivIQ

    PrivIQ

    Compliance Technology Solutions

    PrivIQ is a complete data governance and privacy platform. We cover 8 data protection regulations representing 23% of the global economy PrivIQ is compliance software hosted in the cloud, that helps you to meet all the data protection regulations. Because we broke down the data protection regulations in 7 steps, you are able to manage your compliance journey, monitor the status and edit reports. From naming a DPO to managing subject access request and data breaches, PrivIQ is the all in one software you need to have to demonstrate compliance.
  • 3
    Nalytics

    Nalytics

    Nalanda Technology

    Since GDPR came into effect, any individual can request access to the personal data a company or organization stores on them. To meet GDPR compliance, these requests, Subject Access Requests (SARs), require to be completed within one month. Nalytics Subject Access Request software (SARs) significantly improves your process around responding on time to a subject access request making it easier, faster, and more cost-effective. Our solution allows you to quickly and easily search across your structured and unstructured documents, files, and emails to find the ‘subject’s’ data, and automatically redact any third-party PII (Personally Identifiable Information) which should not be disclosed. This not only includes Microsoft files, such as Word or Excel, but also emails and their attachments, text files, PDFs, and so on. Images and scanned documents can also be redacted. Nalytics SARs significantly reduces the time spent searching for personal data.
  • 4
    PrivacyPioneer

    PrivacyPioneer

    PrivacyPioneer

    Cover cap found from the data to delete the data life cycle of personal information protection systems, integrated automation, intelligence, visualization processing power, on the basis of the legal compliance, high efficiency and low cost to help business customers manage personal information, data Value innovation. Automatic personal data discovery, support structured and unstructured data, compatible with various mainstream databases. Construct a visual data map to visually display data attribution, relationship, processing history, etc. Manage the rights requests of data subjects and realize the automatic matching and response of personal information. Manage personal data processing behaviors and permissions, and ensure compliance with all access, processing behaviors, and access permissions. Intelligent privacy impact assessment and data protection impact assessment, combined with periodic automatic internal audits, minimize compliance risks.
  • 5
    SAP Personal Data Manager
    SAP Personal Data Manager is a re-use service on SAP Business Technology Platform that supports the DPP information framework. It allows you to identify data subjects and inform them about which of their personal data is stored and used by an application and process requests from the data subject. Identify data subjects and inform them of which of their personal data is stored and used by applications. The application is accessible to a customer service representative who, on behalf of the data subject, can provide the information to the data subjects. Provides the capability to trigger a request to edit or correct personal data as well as the capability to delete personal data in an application. Manage data subject personal data through the Manage Personal Data Application. The application is accessible to a Customer Service Representative (CSR) who can manage an end user's personal data on their behalf and cater to any requests the data subjects would have.
  • 6
    Col8 Data Transparency
    Ensure your organization can comply with subject access requests effectively with our embeddable request form and management tool. Every Data Transparency account comes complete with its own unique instance of our dedicated request form. Remove the burden of subject access requests from your staff members, and protect them from the risk of liability due to requests being misdirected, mishandled, or lost. Submissions returned through your data transparency request form have collected the requestor's details, and the details of their request, cutting out unnecessary back-and-forth communication, allowing your team to use their time most effectively. All the information needed to action a request is collected up front, saving you time and potential exposure. Request further information and send results from within the app. Built from the ground up to adhere to current laws and regulations, with tight record keeping or actions taken by your team.
  • 7
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 8
    Ethyca

    Ethyca

    Ethyca

    Let Ethyca do the legwork for all CCPA & GDPR tasks. Save your team hours of effort with an instant, birds-eye view of the business’s data supply chain. Ethyca makes Subject Access, Edit, & Erasure Requests light work or if your team prefers, no work at all. Automate the return of all user data categorized by processing activities upon request. Automate the ability for Subjects to select and rectify their data records with Ethyca’s ability to retrieve individual attributes. Automate CCPA compliance by letting Ethyca process all “do not sell my data” Requests. You could run around the office every day trying to update your users’ consent preferences. Or you could just use Ethyca. Ethyca links cookie consent to processing activities for each user’s personal data record. Ethyca comes with a custom-branded, easy-to-use interface to let your users manage their consent.
  • 9
    Systnaps

    Systnaps

    Systnaps

    The regulatory context of data security is constantly evolving, it is essential to implement a flexible and responsive solution within its IS to meet the complex requirements related to regulations and laws. Classify and categorize regulatory data. Inventory your data and manage retention periods. Respond quickly to requests from your data subjects. Manage hold times and business requirements for all of your master processes through a single application. Management of rules related to retention periods. Regulatory compliance of an Information System (retention period). Classify and calculate the level of data vulnerability. Model your service-oriented objects in order to inventory your IS assets.
  • 10
    Secuvy AI

    Secuvy AI

    Secuvy AI

    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 11
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
  • 12
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 13
    Infreemation

    Infreemation

    Digital Interactive

    Infreemation is an easy-to-use FOI, EIR and SAR software management system built specifically to for the task. Its simple design means it will reduce the amount of time needed to handle FOI requests and ensure you never miss the 20-day deadline. Infreemation is a cloud based application, meaning there is no hardware or software to install. You can access Infreemation through any Internet browser via a secure login. Infreemation provides an advanced FOI request management system, at a lower cost than developing in-house. The functionality and flexibility Infreemation offers also makes it much more effective than using tools such as Microsoft Excel and Access. Intelligent rules match similar requests allowing you to respond with previously researched information. Never miss another 20 day deadline, Infreemation will alert you to expiring FOI requests so you have plenty of time to respond. Infreemation is ready GDPR compliant.
  • 14
    Control.My.ID

    Control.My.ID

    Control.My.ID

    Control.My.ID for Consumers works by collecting information from numerous online sources to provide you a comprehensive view of your privacy and data security. You can monitor and review this data then decide what you want to do about it! Control.My.ID for Enterprises ensures your company is meeting all privacy regulations and keeps an auditable trail for you. Manage all your Data Subject Requests in one place, ensure they are being handled, and become more efficient and ensure regulatory compliance. It’s not easy managing your enterprise. Each state is enacting their own laws and all have different laws and regulations around consumer PII. Each region has their own rules about how you treat your customer’s data such as the CCPA/CPRA in California or the ADD Act at the US federal level or the GDPR in the European Union. Control.My.ID can also help with privacy by design decisions and privacy impact assessments.
  • 15
    Microsoft Customer Lockbox
    Most operations, support, and troubleshooting performed by Microsoft personnel and sub-processors do not require access to customer data. In those rare circumstances where such access is required, Customer Lockbox for Microsoft Azure provides an interface for customers to review and approve or reject customer data access requests. It is used in cases where a Microsoft engineer needs to access customer data, whether in response to a customer-initiated support ticket or a problem identified by Microsoft. Customer Lockbox logs are stored in activity logs. In the Azure portal, select Activity Logs to view auditing information related to Customer Lockbox requests. You can filter for specific actions. We've introduced a new baseline control (3.13) in Azure Security Benchmark that covers Customer Lockbox applicability. Customers can now leverage the benchmark to review Customer Lockbox applicability for a service.
  • 16
    Clym

    Clym

    Clym

    Clym is an affordable compliance platform that is easy to understand, looks good and protects your business immediately. Manage cookie consent, data subject requests and do not sell my private information requests for global compliance regulations such as GDPR, CCPA and LGPD. One platform for global privacy needs. Clym is the data privacy platform that helps organizations meet their data protection obligations. Cookies, consent, requests, policies and more are all managed in a secure and adaptive application. Clym helps you collect, control and manage the data that is relevant for your company in a transparent way. The platform covers 6 main areas of compliance, namely: data consent management, cookie consent management, company & DPO data management, terms, policies, agreements & procedures, data subjects’ requests, localization and consent receipts. Through all its functionalities, Clym provides a head start in data privacy compliance.
  • 17
    Siemly

    Siemly

    Siemly Global

    Siemly automates and simplifies internal and external processes saving you time and money. Siemly can track all customer "opt-ins" and requests and apply automated workflows to respond and track customer interactions. Siemly makes it easy to respond to data subject access requests (DSARs). Ensure compliance with regulations and demonstrate to auditors, regulators, and your customers, a strong commitment to data privacy and compliance with the Siemly platform.
  • 18
    Privacy360
    Discover, measure and mitigate data privacy risk to quickly get in compliance with the growing number of privacy regulations, from GDPR to CCPA and beyond, in a single, end-to-end, enterprise-grade platform. Comply with GDPR, CCPA, LGPD, PDPA and the hundreds of evolving global privacy laws. Automate the capture and fulfillment of consumer and data subject access rights (DSAR) requests. Leverage intelligent risk mitigation to uncover and remediate risks faster and more comprehensively. Embed branded request forms on your website, or inside of your product. Leverage intelligent templates and manage request dates and extensions per regulation (GDPR, CCPA & beyond). Quickly track down data through connectors and quickly collaborate with data process owners to resolve. Monitor the entire process with a dashboard, revealing patterns or requests and ways to optimize the process. Quickly benefit from a comprehensive view of all your privacy data, locations, and all your processing activities.
  • 19
    Informatica Data Privacy Management
    Discover your data, assess risk, and monitor suspicious access to automate protection, transparency and response, all in one solution. Prioritize data privacy and protection investments, policies, processes, and programs. Analyze value across fields, applying metadata from targeted database sources to enable risk visibility. Build a subject registry and automate identity mapping to report on data subjects (DSARs). Provide detailed summaries with APIs to third-party solutions, applying controls for objects and more. Discover where sensitive data resides, and where it’s moved to other data stores and cloud apps. Remediate by risk priority; simulate risks to assess impact for guided decisions and apply controls. Use a rich array of dashboard drill-downs to get broad visibility into data risks and control gaps. Integrated data subject reports, automated risk remediation, and visualizations and alerts.
  • 20
    CYTRIO

    CYTRIO

    CYTRIO

    Automatically discover PI data across cloud and on-premises data stores and correlate with customer identity. Orchestrate data subject access requests (DSAR) and build customer trust. Enable customers to exercise data privacy rights with a secure, customizable privacy portal. Easily answer the critical who, what, why, and where questions about your PI data. Automated workflows for data, security, and privacy teams. Meet auditor obligations with detailed DSAR lifecycle history. Customizable and brandable privacy center. Secure communication and data download. Get up and running in minutes, no professional services required. Ideal for resource-constrained organizations. Data discovery, classification and ID correlation.
  • 21
    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    The diagnostic allows you to assess your GDPR compliance level. It will help you identify areas for improvement, build an action plan, and prioritize the steps required to move smoothly through the compliance process. Work collaboratively and speed up processing mapping using built-in templates. Select standard processing activities or add new ones, complete the information required and validate to finalize processing mapping. Whether you’re contacting data subjects or processing their requests via secure authentication, it’s easy to manage and archive data subject requests from your employees, customers or service providers directly, all on a single platform. Discover the highly intuitive, simple and secure user interface. Automate your processes, map your processing activities and generate your record in a few clicks, easily manage and archive employee, customer and service provider DSRs. Use built-in templates to create standard contracts, clauses, emails et legal notices.
  • 22
    Concord Consent & Compliance
    Build trust and loyalty with your users, reduce opt-outs and drop-offs, and ensure compliance with the latest data privacy regulations. Our client library and powerful APIs make it dead simple to automatically capture any type of consent event, from cookie consent to terms of service to others (newsletter sign-ups, SMS opt-ins, etc.). Build trust with your users by allowing them to quickly see their communication preferences and data privacy options with our single line of code data privacy widgets. Quickly handle data privacy requests from users that are required by certain data privacy regulations like CCPA and GDPR (including data subject access requests or DSARs). Integrate with the existing technology investments that you have made for marketing, personalization, etc. by feeding consent and compliance data to those systems or by pushing user data into Concord. View and manage your verified data privacy requests as they are processed, moving them from acceptance to completion.
  • 23
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
  • 24
    Privacy Control Center

    Privacy Control Center

    Privacy Control Center

    Through tailor made modules and workflows, Privacy Control Center bolsters all aspects of protecting and working with personal data. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. Extensive, but accessible register for recording processing activities, data subjects' requests and data leaks. The audit and control module has been developed to safeguard your privacy policy in the short and long term. All privacy measures translated into a plan of action and planning. All internal and external documents collected in one place. The knowledge base is supplied with a set of basic documents, which you can expand with internal knowledge and processing agreements. The Privacy Control Center has been developed as a maintenance solution for processing data, through administration, in a structured manner.
  • 25
    ConsentGrid

    ConsentGrid

    ConsentGrid

    Define policies for different data processing and exchange scenarios to classify, mask, filter, or pseudonymize data. Manage privacy settings to honor consumer preferences and data processing/exchange agreements. Integrate granular consent decisions to data flow. Use ConsentGrid™ consumer-facing privacy dashboard to collect user consent and preferences for data processing and sharing. Accept and securely respond to data subject requests (DSRs). Use consent decision service to make contextual consent decisions. Filter, pseudonymize, and track data as it moves between systems for machine learning and ETL pipelines. Apply privacy filters to data shared with third parties. Eliminate ad-hoc privacy controls. Data stays in the network. Process data inside your infrastructure. Organization deploys ConsentGrid schema processor to apply privacy controls. Personal data stays in organization network.
  • 26
    Privacy Nexus

    Privacy Nexus

    Privacy Nexus

    Create and maintain your record of data processing activities with ease and in accordance with article 30 of the GDPR. Use the dashboard to track your progress, identify risks and determine priorities. The dashboard is the perfect starting point for all privacy professionals. Perform data protection impact assessments to identify privacy risks and to take appropriate measures to minimize them. Handle your incidents and data breaches with a clear workflow that guides you through the process from beginning to end. ‍Send out questionnaires to your vendors to periodically assess their compliance with your data processing agreements. ‍Create a clear overview of all the data subject requests your organization has received and monitor their progress. ‍Use the privacy, information security and data management scans to establish how your organization is doing in these areas and receive recommendations for improvement.
  • 27
    4Comply

    4Comply

    4Thought Marketing

    4Comply offers secure, centralized storage for all consent and rights request activities. All data within the vault is encrypted while at rest. The Legal Activities Vault provides an immutable history of activities to demonstrate compliance in the event of a lawsuit or complaint. Complete set of pre-integrated rights management forms and processes you can use immediately without additional coding. Configure 4Comply to automatically send email notices for fulfilling rights requests, including identity validation, data readiness, and confirmation. Digital citizens can easily view and change inaccurate information they have a right to access. 4Comply offers developers the flexibility to implement and use the features you need.
  • 28
    Raptor Compliance

    Raptor Compliance

    Raptor Compliance

    Evaluate your high-risk data processing. Risks must be controlled and monitored. For this purpose it is necessary to define responsibilities. Data protection impact assessment documentation is an important tool for authorities and other stakeholders to demonstrate the lawfulness of processing operations that present risks. What is the risk in a procedure, what are the risks to the rights and freedoms of natural persons? These must be determined. How high is the risk? What effects and probabilities are associated with a risk? These factors determine to a large extent whether processing can take place. The DPMS creates a web form for you to integrate into your digital channels. In this way, inquiries are immediately recorded in case management. Case Management provides you with an overview of current cases and their processing. Of course, each case processing is logged in order to fulfill the legal obligations to provide evidence.
  • 29
    Auditrunner

    Auditrunner

    Auditrunner

    The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000+ business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.
  • 30
    Responsum

    Responsum

    Responsum

    Simplify and automate your Privacy compliance challenges with an all-in-one Privacy Management software. Minimize risks for your organization and turn Privacy into a competitive advantage. Privacy management is an essential, everyday duty of privacy teams. However, privacy professionals are often under tremendous pressure to ensure compliance in their organization, while often their teams are understaffed or do not have the right tools to support their work. Get the support you need through RESPONSUM’s Privacy modules. From keeping records of your processing activities to performing TIA or LIA, and executing DPIAs, you can gather all the information you need in one place and access it at any time you need it. No matter the sector your business is operating in, you need to adopt a security strategy to be aware of the operations that need a specific level of security. With the Security module, you can define and manage security controls, manage external vendors and stakeholders.
  • 31
    Pontus Vision

    Pontus Vision

    Pontus Vision

    We extract personal data through hundreds of integrations into database, CRM, ERP and proprietary systems. Including unstructured data such as emails, PDFs, Word and spreadsheets. We map data by tracking all Extract step locations, identifying customer data with as little information as possible, supporting billions of records. Consolidation of all data, resulting in a graphic or textual view of the risks of all the organization's databases, using a score based on 12 steps, following the main points of the LGPD. Our solution does not rely on any specific technology from the cloud provider. The solution can be deployed at on-premises data centers, or at any cloud provider. Pontus Vision LGPD's architecture has minimal manual steps to allow large amounts of data to be processed. The solution supports flow of billions of records. Pontus Vision LGPD was designed and built as a modular solution that is capable of taking data from hundreds of different formats.
  • 32
    ComplyCloud

    ComplyCloud

    ComplyCloud

    GDPR is difficult but there is no reason it has to be incomprehensible too. This is why ComplyCloud holds all the features you need to maintain and document GDPR compliance. Nothing less. Make article 30 records with ease by checking off predefined suggestions or inserting information. Maintain the overview of the data processors on the records where you can categorize them and access all agreements. Map IT systems and connect processing activities with the applied IT systems. Create coherence of data in the records by using tags so the coherence can be seen across the organization and IT systems. GDPR compliance requires documentation of “responsibility”. With our software, all relevant documents from A-Z can be made directly in the software. Our software even updates the content of the documents automatically if anything new happens regarding guidance or best practice. The software itself knows what to ask so you only have to answer specific factual matters.
  • 33
    Privacy Insights

    Privacy Insights

    Privacy Insights

    A complete and simple AVG Register from €99 per month. Complete and simple GDPR Register for registering processing operations, agreements, DPIAs, data breaches and requests from data subjects. With a good AVG Register you show that you are 'in control'. Since the introduction of the General Data Protection Regulation (GDPR), having a register has been mandatory and it is clear that the processing register is the core of any privacy control framework. Privacy Insights has very complete and the simplest software for this. Privacy Insights' vision is that the time invested in maintaining records should yield more than just complying with the accountability obligations under the GDPR. Making smart use of the entered data saves a lot of time when performing other data protection tasks. Privacy Insights offers the possibility to register all processing operations, data leaks and requests from data subjects.
  • 34
    Transcend

    Transcend

    Transcend

    Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights—like deleting your data—very hard for companies. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors. Transcend also provides their end-users with a control panel, or “Privacy Center”, hosted at privacy.<company>.com where users can manage their privacy preferences, export their data, or delete it. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
  • 35
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 36
    Simple Opt Out Compliance

    Simple Opt Out Compliance

    SimpleOptOutCompliance.com

    SimpleOptOutCompliance is 100% focused on helping firms manage the DSAR process. We developed a set of cost effective tools to help firms stay compliant with GDPR, CCPA and other privacy laws with zero hassle, and zero intrusion in to your firm's IT. Setting up a monitoring task in our web application has been designed to be simple and fast. Each task will automatically respond to data removal requests. Customers can create multiple tasks monitoring the same inbound address to help manage requests from different sources. Each task will save the identity of people requesting data opt-out / deletion in a secure, encrypted database. The tasks will respond to, and manage verifiable consumer deletion requests. Using our RESTful API endpoint allows firms to check their current customer records against the opted out list and send a confirmation of deletion email to the opted out customer.
  • 37
    OMNIPRIVACY

    OMNIPRIVACY

    OMNIPRIVACY

    AVG/GDPR is not a tick in the box. It is there to stay and needs to be embedded in the way organizations are organized and working. OMNIPRIVACY, a 360°AVG/GDPR management tool, has been designed by OMNINET Software Solutions with the aim of insuring 100% control and oversight of AVG/GDPR Readiness by continuously monitoring 7 processes: the processing register, contract management, data leaks, privacy requests, document management, risk management and dashboards. Read on and discover how OMNIPRIVACY can contribute to this within your organization. Manage and document all processing activities related to personal data. Manage all types of privacy requests from one central point (right to be forgotten, right of access, etc.). Easily gain insight into previously made agreements or agreements yet to be made which relate to data processors or data controllers. Manage identified risks and define procedures and measures.
  • 38
    RIVN

    RIVN

    RIVN

    Privacy Manager provides your customers with an easily accessible page to manage all of their privacy preferences. Customers are pleasantly surprised when they see they can manage their consent and email preferences in one place. This shows your customers you care about their privacy. Few SasS based companies even offer the ability to delete consumer records on demand. Not only does RIVN Delete deliver the deletion request, but it also provides verification of the deletion process. This unique capability of RIVN Delete is a big motivator for companies to select RIVN Delete for consumer deletion requests. RIVN Scan is a cutting-edge technology that will prove identified vulnerabilities on your website or internal systems. RIVN Scan saves your data teams hundreds of man-hours. RIVN provides the most advanced, accurate, and vulnerability scanning technology available. We lead in providing the highest web vulnerability detection rate.
  • 39
    DataWise

    DataWise

    Data Protection People

    Our cybersecurity dashboard, DataWise, has been designed and built to manage Data Protection in a single dashboard. It provides practical features and templates for data protection compliance, allowing organisations to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR). We have been busy behind the scenes developing an updated release of DataWise 2.0. The new update is mobile-friendly, simple to use and practical. The cybersecurity dashboard now features a comprehensive register of all your data assets, data processes and risks. Sign up for our newsletter to receive information on the release date!
  • 40
    SAP Privacy Governance
    Simplify how you manage and comply with data protection and privacy regulations around the world. Evaluate organizational maturity and establish a security and privacy governance model in accordance with requirements and best practices. Embed data-driven assessments within business processes to meet organizational privacy requirements. Facilitate self-service requests and automate the review and response process to enable better privacy management practices. Identify security and privacy risks and create a remediation plan to meet objectives and comply with regulatory requirements. Deploy and manage maturity assessments with flexible and configurable templates. Follow the setup instructions so you can start running your SAP software quickly and confidently. Find out how you can seamlessly integrate SAP Privacy Governance with your existing IT landscape.
  • 41
    CCPA Toll Free (866-I-OPT-OUT)

    CCPA Toll Free (866-I-OPT-OUT)

    Privacy Toll Free, LLC

    CCPA Toll Free is a SaaS solution helping small, mid-size and enterprise clients comply with the CCPA requirements. CCPATollFree.com makes the privacy hotline at 866-I-OPT-OUT (or a dedicated number) available to businesses that need to comply with the CCPA. It also provides an interactive webform with "Do Not Sell My Personal Information" functionality. It is a self-service platform that businesses can launch with in less than 15 minutes. For a low annual service fee, it allows businesses to accept consumer privacy requests (DSARS) via a webform and toll-free number to stay compliant with the law.
  • 42
    Truyo

    Truyo

    Truyo

    From consent to privacy rights automation, Truyo provides you with the tools and platform to create better privacy experiences for consumers, employees, service providers, and privacy teams. Provide a best-in-class privacy rights management solution to consumers, privacy teams, and service providers. Automate your consumers' requests for access, deletion, correction, and Do Not Sell. The Truyo solution scales to meet your needs. Whether you need something simple or full automation, Truyo has you covered. Provide transparency and build trust with your users by giving them the tools to manage consent. By simply installing some JavaScript code to your website you’ll be set up to intelligently block third-party cookies and display consent prompts to become compliant with current and emerging data privacy laws while putting the user in control. Users will have access to a customized page to manage their data preferences which can be passed across all brands.
  • 43
    trust-hub

    trust-hub

    trust-hub

    trust-hub is an innovative, hosted platform that enables organizations to capitalize on shifts in the data protection and privacy landscape. The unique framework offers secure storage, processing and rights management for personal data on a case-by-case basis and is designed to support data protection and privacy regulations, including GDPR. Create secure and universally accessible personal data sets in accordance with GDPR. Encrypt and pseudonymize each customer and employee data item uniquely. Store personal data in one of the world’s most secure data storage facilities. Rapidly retrieve personal data as and when required. Increase productivity and efficiency across your organization. Enable accredited individuals and teams to access and share data easily and securely. Provide your Data Protection Officer (DPO) with the tools required to operate effectively. Exploit digital and commercial innovations by facilitating the safe flow of consent-driven customer data.
  • 44
    PrivacyEngine

    PrivacyEngine

    PrivacyEngine

    The easy-to-use data privacy and GDPR software for all your organization’s Data Privacy compliance needs. We’ve put all our data protection experience and expertise into one software-as-a-service platform, to save you time and money when implementing and managing your data privacy compliance program. Organizations using PrivacyEngine can save between €10,000 and €50,000 annually by eliminating legal fees, in addition to slashing the amount of time spent performing essential data privacy-related processes. Whether your organization needs to manage programs for GDPR, CCPA or any other of the emerging data privacy regulations around the world PrivacyEngine has you covered. PrivacyEngine is a complete data privacy software as a service platform incorporating data privacy management & advisory, data privacy training, and vendor assessment. PrivacyEngine takes care of all your privacy management regulatory needs, including managing individuals’ rights, reporting data breaches and incidents.
  • 45
    Data Privacy Manager

    Data Privacy Manager

    Data Privacy Manager

    Our team of talented and skilled developers started working on Data Privacy Manager with a vision of creating a well-rounded data privacy platform that will be used by our clients to provide them with a single and unique 360 degrees view of their customers’ personal data lifecycle. Data Privacy Manager is a mature platform and is used in many different vertical markets, helping its users, both data controllers and data processors, to regain control over personal data they’ve been entrusted with. In addition to the traditional full-time Data Protection Officer (DPO) scenario, this product is also designed specifically to support the shared-DPO model, where different firms can buy the service of a single DPO, typically from legal or consulting firms. But the real value of this offering is the opportunity to manage security controls for data retention schedule and deletion of data.
  • 46
    Ohalo

    Ohalo

    Ohalo

    Ohalo's Data X-Ray platform automates data governance tasks like: - Data Discovery & Classification - Data Mapping & Cataloguing - Redacting Files containing sensitive personal information - File Analysis & Data Extraction ⚡️ML-Driven Data Governance | 100,000 words/second | 300+ built-in Integrations | Integration with any DLP/SIEM | 360-degree Unstructured Data Visibility | Agentless | Supports 100s of formats | Find PII, payment card information (PCI), and protected health information (ePHI). | Custom connectors for individual data sources (bespoke/legacy) ⚡️ Designed for enterprises, Data X-Ray is provided as a self-managed or fully-managed service. Our customers rely on Data X-Ray for file activity monitoring, security enhancement, and privacy compliance. ⚡️ Deploy Data X-Ray in hours in cloud and on-premise environments ⚡️ Find sensitive data in minutes ⚡️ Easily classify files and records from multiple file repositories and locations
  • 47
    GDPR Plus

    GDPR Plus

    GDPR Plus

    Say goodbye to manual tracking, enable sharing, and secure storing of data. Mighty Trust’s Data Protection Software solutions centralize your accountability requirements for data protection, security, and compliance laws in different jurisdictions. We streamline, centralize, and control everything from consent management to data sharing, allowing your business to operate as a privacy-forward organization. GDPR Plus Software is our data protection & management software containing our proprietary process for GDPR. The product is offered in the cloud, on premises or can be accessed as part of our managed service solution. Our Activity monitoring functionality helps organizations determine who has access to personal data and when it is being accessed or processed. These solutions come with the following features to help manage activity.
  • 48
    SkyPoint Cloud

    SkyPoint Cloud

    SkyPoint Cloud

    SkyPoint Cloud is an AI-driven customer data platform that brings connectivity to all of your insights and experiences. Your teams are well-equipped with real-time data that’s compliant, accurate, and connected. Manually completing one DSR typically costs $1,700 and that’s just the tip of the iceberg. SkyPoint’s customer data platform provides instant ROI and aligns with your needs to maximize efficiency. SkyPoint’s Common Data Model (CDM) consolidates data from any source to standardize definitions and insights and accelerate informed decisions across your organization. Unified profiles and real-time insights for personalized customer experiences. Comprehensive records and advanced analytics for high-value care. Secure PII and synchronized preferences for trusted brand interactions.
  • 49
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 50
    Text IQ

    Text IQ

    Text IQ

    We’re excited to announce that Text IQ has been acquired by Relativity, a global legal and compliance technology company. We’re thrilled to continue our mission to build the best AI for the world’s most complex and sensitive information—now on the leading platform for organizing data, discovering the truth, and acting on unstructured data. Listen to our customers share their eye-opening results applying AI to unstructured information. We’re automating some of the most time consuming and expensive aspects of your business. It’s innovation that makes a positive difference to your bottom line. We equip our customers with technology that makes a difference. See how they're getting outsized results from automating document review and discovering hidden insights.