Alternatives to KPMD Subject Access Requests System

Compare KPMD Subject Access Requests System alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KPMD Subject Access Requests System in 2026. Compare features, ratings, user reviews, pricing, and more from KPMD Subject Access Requests System competitors and alternatives in order to make an informed decision for your business.

  • 1
    Admin By Request Endpoint Privilege Management
    Admin By Request’s Endpoint Privilege Management gives organisations full control over local admin rights, application elevation, and endpoint privilege access across Windows, macOS, and Linux, without the complexity of traditional PAM solutions. For mid-market organisations, EPM acts as a complete, easy-to-deploy solution for managing endpoint access and privilege. It removes standing admin rights, enables just-in-time elevation, supports approval workflows, and provides full audit trails to strengthen security and meet compliance requirements. For enterprise organisations, EPM fits alongside existing security and identity stacks as a focused control layer that closes endpoint gaps traditional PAM solutions often leave behind, improving control without increasing support costs or requiring a full PAM overhaul.
    Compare vs. KPMD Subject Access Requests System View Software
    Visit Website
  • 2
    Captain Compliance

    Captain Compliance

    Captain Compliance

    Captain Compliance is an all-in-one privacy management platform designed to simplify compliance with global data protection laws and new AI regulatory requirements. Our leading Consent Management Platform (CMP) allows businesses to effortlessly manage user consent and create customizable cookie banners. Our advanced Cookie Scanner automatically identifies and categorizes cookies on your website, ensuring ongoing compliance with a dynamic cookie policy. Our DSAR Portal streamlines data subject requests, while our AI Compliance tool monitors and adapts your practices based on evolving regulations and we even offer a virtual DPO and CPO if you need data privacy guidance. Additionally, our Hosted Privacy Policy generator automatically updates your privacy notices in real-time, keeping your policies aligned with the latest legal requirements. Captain Compliance provides the tools you need to protect user data and maintain regulatory compliance with ease at an affordable fee.
    Leader badge
    Partner badge
    Compare vs. KPMD Subject Access Requests System View Software
    Visit Website
  • 3
    PrivIQ

    PrivIQ

    Compliance Technology Solutions

    PrivIQ is a complete data governance and privacy platform. We cover 8 data protection regulations representing 23% of the global economy PrivIQ is compliance software hosted in the cloud, that helps you to meet all the data protection regulations. Because we broke down the data protection regulations in 7 steps, you are able to manage your compliance journey, monitor the status and edit reports. From naming a DPO to managing subject access request and data breaches, PrivIQ is the all in one software you need to have to demonstrate compliance.
  • 4
    consentmanager

    consentmanager

    consentmanager AB

    Customers using the consentmanager cookie solution typically achieve higher acceptance rates and lower bounce rates. Only with a high cookie acceptance rate can you exploit the full potential of your website (e.g. sell the most advertising). And only with a low bounce rate can you get the most out of your visitors. consentmanager is the solution that gives you a complete overview of what is happening on your website and how your visitors react and interact with the consent layer. Our GDPR-compliant cookie solution allows you to test multiple consent layer designs simultaneously, and automatically optimise to the design that shows the best results with our machine learning and A/B testing feature. Available in over 30 languages covering different global privacy regulations, consentmanager is the tool to manage cookies and consent for organisations of all sizes and in all regions of the world.
  • 5
    Nalytics

    Nalytics

    Nalanda Technology

    Since GDPR came into effect, any individual can request access to the personal data a company or organization stores on them. To meet GDPR compliance, these requests, Subject Access Requests (SARs), require to be completed within one month. Nalytics Subject Access Request software (SARs) significantly improves your process around responding on time to a subject access request making it easier, faster, and more cost-effective. Our solution allows you to quickly and easily search across your structured and unstructured documents, files, and emails to find the ‘subject’s’ data, and automatically redact any third-party PII (Personally Identifiable Information) which should not be disclosed. This not only includes Microsoft files, such as Word or Excel, but also emails and their attachments, text files, PDFs, and so on. Images and scanned documents can also be redacted. Nalytics SARs significantly reduces the time spent searching for personal data.
  • 6
    SAP Personal Data Manager
    SAP Personal Data Manager is a re-use service on SAP Business Technology Platform that supports the DPP information framework. It allows you to identify data subjects and inform them about which of their personal data is stored and used by an application and process requests from the data subject. Identify data subjects and inform them of which of their personal data is stored and used by applications. The application is accessible to a customer service representative who, on behalf of the data subject, can provide the information to the data subjects. Provides the capability to trigger a request to edit or correct personal data as well as the capability to delete personal data in an application. Manage data subject personal data through the Manage Personal Data Application. The application is accessible to a Customer Service Representative (CSR) who can manage an end user's personal data on their behalf and cater to any requests the data subjects would have.
  • 7
    Col8 Data Transparency
    Ensure your organization can comply with subject access requests effectively with our embeddable request form and management tool. Every Data Transparency account comes complete with its own unique instance of our dedicated request form. Remove the burden of subject access requests from your staff members, and protect them from the risk of liability due to requests being misdirected, mishandled, or lost. Submissions returned through your data transparency request form have collected the requestor's details, and the details of their request, cutting out unnecessary back-and-forth communication, allowing your team to use their time most effectively. All the information needed to action a request is collected up front, saving you time and potential exposure. Request further information and send results from within the app. Built from the ground up to adhere to current laws and regulations, with tight record keeping or actions taken by your team.
  • 8
    Ethyca

    Ethyca

    Ethyca

    Let Ethyca do the legwork for all CCPA & GDPR tasks. Save your team hours of effort with an instant, birds-eye view of the business’s data supply chain. Ethyca makes Subject Access, Edit, & Erasure Requests light work or if your team prefers, no work at all. Automate the return of all user data categorized by processing activities upon request. Automate the ability for Subjects to select and rectify their data records with Ethyca’s ability to retrieve individual attributes. Automate CCPA compliance by letting Ethyca process all “do not sell my data” Requests. You could run around the office every day trying to update your users’ consent preferences. Or you could just use Ethyca. Ethyca links cookie consent to processing activities for each user’s personal data record. Ethyca comes with a custom-branded, easy-to-use interface to let your users manage their consent.
  • 9
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 10
    Pico Privacy

    Pico Privacy

    Pico Privacy

    Pico Privacy offers Pico Collect, a solution designed to automate the capture of consumer privacy requests, minimizing errors and freeing up teams to focus on strategic initiatives. By forwarding privacy-related emails to Pico Collect, the system automatically scans incoming messages to identify privacy requests, extracts relevant data such as request types and personal information involved, and organizes all extracted requests into a centralized system for efficient tracking and management. Users receive standardized reports that provide a comprehensive overview of all privacy-related requests received during the week, categorized by request type, such as data access, deletion, or correction requests. This streamlined process aims to enhance productivity and ensure compliance with data subject access request requirements.
  • 11
    Siemly

    Siemly

    Siemly Global

    Siemly automates and simplifies internal and external processes saving you time and money. Siemly can track all customer "opt-ins" and requests and apply automated workflows to respond and track customer interactions. Siemly makes it easy to respond to data subject access requests (DSARs). Ensure compliance with regulations and demonstrate to auditors, regulators, and your customers, a strong commitment to data privacy and compliance with the Siemly platform.
  • 12
    Transcend

    Transcend

    Transcend

    Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights—like deleting your data—very hard for companies. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors. Transcend also provides their end-users with a control panel, or “Privacy Center”, hosted at privacy.<company>.com where users can manage their privacy preferences, export their data, or delete it. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
  • 13
    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    The diagnostic allows you to assess your GDPR compliance level. It will help you identify areas for improvement, build an action plan, and prioritize the steps required to move smoothly through the compliance process. Work collaboratively and speed up processing mapping using built-in templates. Select standard processing activities or add new ones, complete the information required and validate to finalize processing mapping. Whether you’re contacting data subjects or processing their requests via secure authentication, it’s easy to manage and archive data subject requests from your employees, customers or service providers directly, all on a single platform. Discover the highly intuitive, simple and secure user interface. Automate your processes, map your processing activities and generate your record in a few clicks, easily manage and archive employee, customer and service provider DSRs. Use built-in templates to create standard contracts, clauses, emails et legal notices.
  • 14
    PrivacyPioneer

    PrivacyPioneer

    PrivacyPioneer

    Cover cap found from the data to delete the data life cycle of personal information protection systems, integrated automation, intelligence, visualization processing power, on the basis of the legal compliance, high efficiency and low cost to help business customers manage personal information, data Value innovation. Automatic personal data discovery, support structured and unstructured data, compatible with various mainstream databases. Construct a visual data map to visually display data attribution, relationship, processing history, etc. Manage the rights requests of data subjects and realize the automatic matching and response of personal information. Manage personal data processing behaviors and permissions, and ensure compliance with all access, processing behaviors, and access permissions. Intelligent privacy impact assessment and data protection impact assessment, combined with periodic automatic internal audits, minimize compliance risks.
  • 15
    Privacy Insights

    Privacy Insights

    Privacy Insights

    A complete and simple AVG Register from €99 per month. Complete and simple GDPR Register for registering processing operations, agreements, DPIAs, data breaches and requests from data subjects. With a good AVG Register you show that you are 'in control'. Since the introduction of the General Data Protection Regulation (GDPR), having a register has been mandatory and it is clear that the processing register is the core of any privacy control framework. Privacy Insights has very complete and the simplest software for this. Privacy Insights' vision is that the time invested in maintaining records should yield more than just complying with the accountability obligations under the GDPR. Making smart use of the entered data saves a lot of time when performing other data protection tasks. Privacy Insights offers the possibility to register all processing operations, data leaks and requests from data subjects.
  • 16
    SAR Portal

    SAR Portal

    SAR Portal

    SAR Portal is an AI-driven GDPR compliance platform that helps businesses respond to data subject access requests and other GDPR rights (access, erasure, rectification, restriction, portability, and objection) through structured workflows and automated tools designed to ensure all deadlines and regulatory requirements are met. It provides a secure, branded public intake portal with OTP identity verification for request submission, centralizes case management with automatic 30-day deadline tracking and reminders, and uses AI to detect and redact personal data across multiple file types, including PDF, Word, Excel, and images, reducing manual effort and compliance risk. It generates complete audit trails and exportable evidence packs that document every action taken, giving teams regulator-ready records of their DSAR handling.
  • 17
    Systnaps

    Systnaps

    Systnaps

    The regulatory context of data security is constantly evolving, it is essential to implement a flexible and responsive solution within its IS to meet the complex requirements related to regulations and laws. Classify and categorize regulatory data. Inventory your data and manage retention periods. Respond quickly to requests from your data subjects. Manage hold times and business requirements for all of your master processes through a single application. Management of rules related to retention periods. Regulatory compliance of an Information System (retention period). Classify and calculate the level of data vulnerability. Model your service-oriented objects in order to inventory your IS assets.
  • 18
    Concord Consent & Compliance
    Build trust and loyalty with your users, reduce opt-outs and drop-offs, and ensure compliance with the latest data privacy regulations. Our client library and powerful APIs make it dead simple to automatically capture any type of consent event, from cookie consent to terms of service to others (newsletter sign-ups, SMS opt-ins, etc.). Build trust with your users by allowing them to quickly see their communication preferences and data privacy options with our single line of code data privacy widgets. Quickly handle data privacy requests from users that are required by certain data privacy regulations like CCPA and GDPR (including data subject access requests or DSARs). Integrate with the existing technology investments that you have made for marketing, personalization, etc. by feeding consent and compliance data to those systems or by pushing user data into Concord. View and manage your verified data privacy requests as they are processed, moving them from acceptance to completion.
  • 19
    Salesforce Privacy Center
    Salesforce Privacy Center is a robust data privacy management solution designed to help businesses comply with privacy laws like the GDPR. It allows users to easily de-identify and delete sensitive data, streamline data subject access requests (DSARs), and simplify customer consent management. The platform features tools like the Preference Manager to manage consent and configure no-code templates for customer communication preferences. By ensuring proper data handling and compliance with privacy regulations, Privacy Center helps businesses mitigate risks while preparing data for applications like Agentforce and Customer 360.
  • 20
    Clym

    Clym

    Clym

    Clym is an all-in-one digital compliance solution that brings privacy, accessibility, and transparency tools together in one place. It covers consent and cookie management, data subject requests, HIPAA consent tracking, accessibility widgets, legal document generation, whistleblowing, content takedown, and age gating. ReadyCompliance® comes pre-configured for 150+ global regulations and automatically adjusts based on your company profile and user location. RealtimeCompliance™ dynamically detects and manages third-party cookies and services as regulations evolve. Geofencing delivers region-specific, location-based compliance interactions to users based on their location. Clym replaces the cost and complexity of managing multiple compliance vendors with one scalable platform built for businesses of all sizes.
  • 21
    CYTRIO

    CYTRIO

    CYTRIO

    Automatically discover PI data across cloud and on-premises data stores and correlate with customer identity. Orchestrate data subject access requests (DSAR) and build customer trust. Enable customers to exercise data privacy rights with a secure, customizable privacy portal. Easily answer the critical who, what, why, and where questions about your PI data. Automated workflows for data, security, and privacy teams. Meet auditor obligations with detailed DSAR lifecycle history. Customizable and brandable privacy center. Secure communication and data download. Get up and running in minutes, no professional services required. Ideal for resource-constrained organizations. Data discovery, classification and ID correlation.
  • 22
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
  • 23
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
  • 24
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 25
    Col8

    Col8

    Col8

    Store all of your organisation's video content, from an unlimited number of sources, on our secure cloud-based system. Bring data sources together with with video to produce an interactive interface tailored for fast retrieval of evidence. With low bandwidth streaming across an number of devices, data can be accessed easily, even by mobile devices in the field. Every Data Transparency account comes complete with its own unique instance of our dedicated request form Remove the burden of Subject Access Requests from your staff members, and protect them from the risk of liability due to requests being misdirected, mishandled, or lost. Submissions returned through your Data Transparency request form have collected the requestor's details, and the details of their request, cutting out unnecessary back-and-forth communication, allowing your team to use their time most effectively.
  • 26
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 27
    ConsentGrid

    ConsentGrid

    ConsentGrid

    Define policies for different data processing and exchange scenarios to classify, mask, filter, or pseudonymize data. Manage privacy settings to honor consumer preferences and data processing/exchange agreements. Integrate granular consent decisions to data flow. Use ConsentGrid™ consumer-facing privacy dashboard to collect user consent and preferences for data processing and sharing. Accept and securely respond to data subject requests (DSRs). Use consent decision service to make contextual consent decisions. Filter, pseudonymize, and track data as it moves between systems for machine learning and ETL pipelines. Apply privacy filters to data shared with third parties. Eliminate ad-hoc privacy controls. Data stays in the network. Process data inside your infrastructure. Organization deploys ConsentGrid schema processor to apply privacy controls. Personal data stays in organization network.
  • 28
    Privacy Control Center

    Privacy Control Center

    Privacy Control Center

    Through tailor made modules and workflows, Privacy Control Center bolsters all aspects of protecting and working with personal data. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. Extensive, but accessible register for recording processing activities, data subjects' requests and data leaks. The audit and control module has been developed to safeguard your privacy policy in the short and long term. All privacy measures translated into a plan of action and planning. All internal and external documents collected in one place. The knowledge base is supplied with a set of basic documents, which you can expand with internal knowledge and processing agreements. The Privacy Control Center has been developed as a maintenance solution for processing data, through administration, in a structured manner.
  • 29
    Phaselaw

    Phaselaw

    Phaselaw

    Phaselaw is an AI-driven document review and redaction platform designed to help teams clean, review, and redact large collections of documents quickly and accurately, particularly for Data Subject Access Requests (DSARs) and other privacy or legal workflows. It streamlines traditionally manual tasks by letting users upload any file type (including emails, chats, documents, and images), automatically deduplicating, handling attachments, performing OCR on images, and converting to PDFs when needed. It offers fast relevance review with search capabilities that let teams mark documents in or out of scope while capturing decision reasoning for audit trails, and its redaction engine lets you redact once and apply that redaction across all documents. Phaselaw’s AI models can identify over 50 categories of personal data and can be customized to specific needs.
  • 30
    Control.My.ID

    Control.My.ID

    Control.My.ID

    Control.My.ID for Consumers works by collecting information from numerous online sources to provide you a comprehensive view of your privacy and data security. You can monitor and review this data then decide what you want to do about it! Control.My.ID for Enterprises ensures your company is meeting all privacy regulations and keeps an auditable trail for you. Manage all your Data Subject Requests in one place, ensure they are being handled, and become more efficient and ensure regulatory compliance. It’s not easy managing your enterprise. Each state is enacting their own laws and all have different laws and regulations around consumer PII. Each region has their own rules about how you treat your customer’s data such as the CCPA/CPRA in California or the ADD Act at the US federal level or the GDPR in the European Union. Control.My.ID can also help with privacy by design decisions and privacy impact assessments.
  • 31
    Informatica Data Privacy Management
    Discover your data, assess risk, and monitor suspicious access to automate protection, transparency and response, all in one solution. Prioritize data privacy and protection investments, policies, processes, and programs. Analyze value across fields, applying metadata from targeted database sources to enable risk visibility. Build a subject registry and automate identity mapping to report on data subjects (DSARs). Provide detailed summaries with APIs to third-party solutions, applying controls for objects and more. Discover where sensitive data resides, and where it’s moved to other data stores and cloud apps. Remediate by risk priority; simulate risks to assess impact for guided decisions and apply controls. Use a rich array of dashboard drill-downs to get broad visibility into data risks and control gaps. Integrated data subject reports, automated risk remediation, and visualizations and alerts.
  • 32
    Teleskope

    Teleskope

    Teleskope

    Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS).
  • 33
    Privacy Nexus

    Privacy Nexus

    Privacy Nexus

    Create and maintain your record of data processing activities with ease and in accordance with article 30 of the GDPR. Use the dashboard to track your progress, identify risks and determine priorities. The dashboard is the perfect starting point for all privacy professionals. Perform data protection impact assessments to identify privacy risks and to take appropriate measures to minimize them. Handle your incidents and data breaches with a clear workflow that guides you through the process from beginning to end. ‍Send out questionnaires to your vendors to periodically assess their compliance with your data processing agreements. ‍Create a clear overview of all the data subject requests your organization has received and monitor their progress. ‍Use the privacy, information security and data management scans to establish how your organization is doing in these areas and receive recommendations for improvement.
  • 34
    Infreemation

    Infreemation

    Digital Interactive

    Infreemation is an easy-to-use FOI, EIR and SAR software management system built specifically to for the task. Its simple design means it will reduce the amount of time needed to handle FOI requests and ensure you never miss the 20-day deadline. Infreemation is a cloud based application, meaning there is no hardware or software to install. You can access Infreemation through any Internet browser via a secure login. Infreemation provides an advanced FOI request management system, at a lower cost than developing in-house. The functionality and flexibility Infreemation offers also makes it much more effective than using tools such as Microsoft Excel and Access. Intelligent rules match similar requests allowing you to respond with previously researched information. Never miss another 20 day deadline, Infreemation will alert you to expiring FOI requests so you have plenty of time to respond. Infreemation is ready GDPR compliant.
  • 35
    Seers AI
    Seers AI is a cutting-edge Consent Management Platform (CMP) designed to simplify and automate comprehensive GDPR and CCPA compliance for businesses. Our AI-powered CMP intelligently scans your website for cookies and trackers, automatically categorizing them and generating compliant cookie banners that respect user consent choices. It provides a robust, user-friendly interface for managing all aspects of user consent, from initial opt-in to data subject requests, ensuring legal adherence to global privacy laws. Seers.ai helps you build profound user trust, enhance data security, and crucially, avoid significant regulatory fines by ensuring full legal adherence. Additionally, Seers.ai provides essential GDPR staff training to equip your team with necessary compliance knowledge. Beyond compliance, Seers.ai offers a rewarding referral program: earn 15% commission for every successful client signup, and your referred clients receive a generous 15% discount on their plan.
  • 36
    Microsoft Customer Lockbox
    Most operations, support, and troubleshooting performed by Microsoft personnel and sub-processors do not require access to customer data. In those rare circumstances where such access is required, Customer Lockbox for Microsoft Azure provides an interface for customers to review and approve or reject customer data access requests. It is used in cases where a Microsoft engineer needs to access customer data, whether in response to a customer-initiated support ticket or a problem identified by Microsoft. Customer Lockbox logs are stored in activity logs. In the Azure portal, select Activity Logs to view auditing information related to Customer Lockbox requests. You can filter for specific actions. We've introduced a new baseline control (3.13) in Azure Security Benchmark that covers Customer Lockbox applicability. Customers can now leverage the benchmark to review Customer Lockbox applicability for a service.
  • 37
    ICONI Platform

    ICONI Platform

    ICONI Software

    If you are a non-profit, charity or public sector organisation who assist individuals into employment, better health, wellbeing or improved skills then our software will help you, help them. Our professional team has the right mix of expertise in terms of subject matter, programme knowledge, experience and systems technology. We will configure our platform to meet your exact needs. Our professional team has the right mix of expertise in terms of subject matter, programme knowledge, experience and systems technology. We will configure our platform to meet your exact needs. The ICONI platform is highly configurable and can meet the operation and reporting needs of any support programme. Our Multi-Programme design enables organisations to manage multiple programmes from the same solution.
  • 38
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 39
    Enzuzo

    Enzuzo

    Enzuzo

    Build customizable cookie banners, record user consent, inform visitors of their privacy rights, and manage data deletion requests with a simple, low-code solution. Affordable privacy compliance solutions, even for businesses with dozens of domains and advanced needs. Sub-1-hour response time for all support tickets with privacy engineers on hand to manage technical questions. Enzuzo’s core legal policies update automatically in parallel with new regulatory guidelines, saving you from compliance headaches. Enzuzo’s data privacy platform streamlines your most challenging requirements. Minimize regulatory risks, avoid fines, and free your team from non-revenue tasks. Built-in data privacy compliance dashboards for risk assessment, data access requests, and consent management. The in-house team of privacy engineers and compliance experts as your privacy co-pilots. Data mapping and data governance workflows.
  • 40
    Privacy Tools

    Privacy Tools

    Privacy Tools

    Stay compliant with the most advanced privacy management solution. Manage cookies and make your portal compliant. Create and manage your website policies. Register and manage universal consent. Comply with the rights of data subjects. Let the user exercise their preferences. Generate monitoring reports on your projects. React quickly and provide the necessary notifications. Discover, analyze, and correct data at scale. Define and implement the controls, actions, and strategies of your ESG program. Allows you to register, manage, and renew the consent of data subjects, integrating them with the tools used by the organization. A module for capturing and managing consents, which works universally. Our solution allows simple integration with your website and systems for managing consents, such as terms of use, marketing, cookies, applications, authorizations, and others. Identify which users consented or revoked their consent, presenting an audit of these events.
  • 41
    Simple Opt Out Compliance

    Simple Opt Out Compliance

    SimpleOptOutCompliance.com

    SimpleOptOutCompliance is 100% focused on helping firms manage the DSAR process. We developed a set of cost effective tools to help firms stay compliant with GDPR, CCPA and other privacy laws with zero hassle, and zero intrusion in to your firm's IT. Setting up a monitoring task in our web application has been designed to be simple and fast. Each task will automatically respond to data removal requests. Customers can create multiple tasks monitoring the same inbound address to help manage requests from different sources. Each task will save the identity of people requesting data opt-out / deletion in a secure, encrypted database. The tasks will respond to, and manage verifiable consumer deletion requests. Using our RESTful API endpoint allows firms to check their current customer records against the opted out list and send a confirmation of deletion email to the opted out customer.
  • 42
    C-Desk

    C-Desk

    C-Desk

    This is a comprehensive tool for the organization to manage all service requests, not only to the IT department. Features like linking the service request help inter-department communication on a particular service request. The customer care module takes care of all service requests/complaints coming from the customer. Asset management covers the complete lifecycle of the assets, not only IT assets, but any kind of assets in the organization. Projects and tasks cover task management of each individual employee and also takes care of managing projects. Forms help the organization on conducting surveys or polls within the organization so that right decision. Active directory authentication helps to integrate users of the domain to the application. You need not log in to be notified about every update within the organisation. The Notification is displayed on your screen about every important thing.
  • 43
    Rundeck

    Rundeck

    Rundeck

    Rundeck is runbook automation. Give anyone self-service access to the operations capabilities that previously only your subject matter experts could perform. Popular use cases include incident management, business continuity, service requests, or just spreading the operational load amongst your colleagues. Rundeck Community supports runbook automation for small teams. Register to download free of charge and keep in touch with the latest Community updates. With runbook automation, engineers can standardize operating procedures, define automated jobs incorporating other existing automation, and safely delegate these processes as APIs and self-service requests to other stakeholders. Now end users and team members can perform tasks that previously only subject matter experts could perform. Popular runbook automation use cases include incident management, service requests, business continuity, or just spreading the operational load amongst your colleagues.
  • 44
    OMNIPRIVACY

    OMNIPRIVACY

    OMNIPRIVACY

    AVG/GDPR is not a tick in the box. It is there to stay and needs to be embedded in the way organizations are organized and working. OMNIPRIVACY, a 360°AVG/GDPR management tool, has been designed by OMNINET Software Solutions with the aim of insuring 100% control and oversight of AVG/GDPR Readiness by continuously monitoring 7 processes: the processing register, contract management, data leaks, privacy requests, document management, risk management and dashboards. Read on and discover how OMNIPRIVACY can contribute to this within your organization. Manage and document all processing activities related to personal data. Manage all types of privacy requests from one central point (right to be forgotten, right of access, etc.). Easily gain insight into previously made agreements or agreements yet to be made which relate to data processors or data controllers. Manage identified risks and define procedures and measures.
  • 45
    RIVN

    RIVN

    RIVN

    Privacy Manager provides your customers with an easily accessible page to manage all of their privacy preferences. Customers are pleasantly surprised when they see they can manage their consent and email preferences in one place. This shows your customers you care about their privacy. Few SasS based companies even offer the ability to delete consumer records on demand. Not only does RIVN Delete deliver the deletion request, but it also provides verification of the deletion process. This unique capability of RIVN Delete is a big motivator for companies to select RIVN Delete for consumer deletion requests. RIVN Scan is a cutting-edge technology that will prove identified vulnerabilities on your website or internal systems. RIVN Scan saves your data teams hundreds of man-hours. RIVN provides the most advanced, accurate, and vulnerability scanning technology available. We lead in providing the highest web vulnerability detection rate.
  • 46
    Orbit Eval

    Orbit Eval

    Turning Point HR Solutions Ltd

    Orbit Eval is part of the Orbit Software Suite and is analytical job evaluation software. Job evaluation is a consistent & systematic process for defining the relative size or ranking of jobs within an organisation, by applying a consistent set of criteria to job roles. Analytical schemes offer a higher degree of rigour and objectivity. They enable a systematic approach to be applied providing a rationale as to why jobs are ranked differently. Application of the same method throughout the evaluation ensures consistency while minimising subjectivity and gender bias Orbit Eval is easy to use, very transparent and ensures consistency. The tool has been designed to be ‘owned’ by the organisation & requires minimal amounts of training. . It is hosted in the cloud with access permission levels. You can also input your current paper based scheme into the web-based data storage facility in Orbit Eval© to accommodate various systems including: NJC, GLPC & others.
  • 47
    RealDPG

    RealDPG

    RealCGR

    RealDPG enables users to manage and document any type of data breach that occurs. The built-in Data Breach Management Module allows logging and documenting facts, evidence, and analytics. This “data breach register” builds a solid events-base that is useful to many stakeholders such as the legal department and Data Protection Officer. By using this module, accountability towards the supervising authority and other stakeholders can be ensured. RealDPG allows you to react to, and handle Data Subject rights requests in an organized manner. Document everything you need, from the original request and the assessment of it, to the answer provided to the data subject. The assessment, documentation, and communications can be stored within this module to ensure accountability towards supervising authorities and other stakeholders.
  • 48
    Mail Merge Toolkit
    Mail Merge Toolkit is a powerful add-in for Microsoft Office extending the mail merging capabilities in Microsoft Outlook, Microsoft Word and Microsoft Publisher. This app allows you to realize really personalized mass mailing easily and efficiently by providing a set of requested and unique features. As soon as you need to personalize part of message subject or the whole subject line, you need Mail Merge Toolkit. Insert data fields into the message subject, so that not only the contents of a message but also its subject is personalized. As soon as Mail Merge Toolkit is installed, you can attach files to the message. Perform the mail merge the same way as you do it usually and click the “Mail Merge Toolkit” option on the last step of the “Step by step wizard” in Microsoft Word to specify the necessary attachments.
  • 49
    Deskero

    Deskero

    Deskero

    Through Deskero even the smallest team can quickly manage several different channels at the same time: from social networks to email. You can easily convert any request you get by email into a ticket, by importing subject, text and attachments. And you can automate the process in a snap, by using Deskero’s smart filtering options that automatically transform each imported email into a ticket with specific properties, and they assign it to the right agent through automated assignment rules. Deskero will help you keep your customer care efficient so that your agents stay productive and your clients become even happier! Collect feedback and requests directly from your own web page, WordPress or Magento site: you can quickly configure our widget and integrate it into your existing website, to provide an absolutely seamless customer care experience.
  • 50
    RequestRocket

    RequestRocket

    RequestRocket

    RequestRocket's is a hyper scalable universal API authentication and authorization service. RequestRocket empowers organisations to centralise the management of access to third party systems, while offering the ability to down-scope permissions with fine grained access controls for any platform API. Our API's enable on demand configuration of authentication proxies across 6 continents allowing for low latency and high availability security improvements that comply with data sovereignty requirements.