Privacy by design calls for the inclusion of data protection from the onset when designing workflows and systems, rather than an addition. Adherence to data minimization and data access represent cornerstones of this design.
No Legalese & Data Consent
The request for consent must be in an intelligible and easily accessible form. Citizens must explicitly "opt in" before the controller can process sensitive personally identifiable data.
Data breaches that are likely to result in a risk for the rights and freedoms of individuals must be communicated within 72 hours.
Right to Access
Right to obtain confirmation as to whether or not personal data is being processed, where and for what purpose. If requested, an electronic copy of the information must be made available free of charge.
Right to be Forgotten
The right to erase personally identifiable data, cease further dissemination of the data and withdraw consent.
The right for a data subject to receive their personally identifiable data in a commonly used machine-readable format and have the right to re-transmit to another controller.
With DeliverySlip you will be creating a Secure Community of collaborators both inside and outside of your organization.
Enhance trust in your brand and distinguish yourself as an organization that can protect sensitive customer information. Unlimited external users are supported and are always free of charge. With your Secure Community, you can stop worrying about phishing, malware, and spam.
If you use email - you should be using DeliverySlip
Control what happens to messages and attachments before and after you send them. Set deadlines and automatic reminders. This capability embodies privacy by design and seamlessly supports the other key requirements of GDPR.
Tracking & Notifications
Monitor message and attachment activity in real time. Stop wondering what is happening with your communication. Now you can confirm and verify compliance.
Enable the data consent requirement with secure electronic signatures. Each consent will receive a unique record identifier, can be verified for authenticity and is both legally binding and non-repudiable.
Protect the data you request from your customers with Secure Forms. Convert any paper or electronic form into a secure form.
Power the breach notification workflow with Secure Campaigns. You'll get real-time campaign reporting ensuring that clients are not only receiving the breach notification but that there is actually some interaction with your message.
Works in your email
Do you use O365, Outlook or Google in your office? Send messages, files, forms or documents for approval from your current inbox. No need to change your tools.
Click here to download a copy of Gartner's "How to Enhance the Security of Office 365".