<p>Harmonized Data Privacy Rules Across the European Union (EU) comes into effect </p>

25 May 2018

Harmonized Data Privacy Rules Across the European Union (EU) comes into effect
<p>EU citizens will experience a dramatic improvement in transparency and empowerment as it pertains to their personally identifiable data. </p>

EU citizens will experience a dramatic improvement in transparency and empowerment as it pertains to their personally identifiable data.
<p>Applies to anyone providing goods or services to EU Citizens. Both controllers and processors are subject to this enhanced privacy regulation. </p>

Applies to anyone providing goods or services to EU Citizens. Both controllers and processors are subject to this enhanced privacy regulation.

Penalties of up to

20 millions

Be collaborative. Be productive. Be secure.

If you use email - you should be using DeliverySlip

Privacy by design calls for the inclusion of data protection from the onset when designing workflows and systems, rather than an addition. Adherence to data minimization and data access represent cornerstones of this design.

Privacy by Design

Privacy by design calls for the inclusion of data protection from the onset when designing workflows and systems, rather than an addition. Adherence to data minimization and data access represent cornerstones of this design.
The request for consent must be in an intelligible and easily accessible form. Citizens must explicitly

No Legalese & Data Consent

The request for consent must be in an intelligible and easily accessible form. Citizens must explicitly "opt in" before the controller can process sensitive personally identifiable data.
Data breaches that are likely to result in a risk for the rights and freedoms of individuals must be communicated within 72 hours.

Breach Notification

Data breaches that are likely to result in a risk for the rights and freedoms of individuals must be communicated within 72 hours.
Right to obtain confirmation as to whether or not personal data is being processed, where and for what purpose. If requested, an electronic copy of the information must be made available free of charge.

Right to Access

Right to obtain confirmation as to whether or not personal data is being processed, where and for what purpose. If requested, an electronic copy of the information must be made available free of charge.
The right to erase personally identifiable data, cease further dissemination of the data and withdraw consent.

Right to be Forgotten

The right to erase personally identifiable data, cease further dissemination of the data and withdraw consent.
The right for a data subject to receive their personally identifiable data in a commonly used machine-readable format and have the right to re-transmit to another controller.

Data Portability

The right for a data subject to receive their personally identifiable data in a commonly used machine-readable format and have the right to re-transmit to another controller.

If you use email - you should be using DeliverySlip

Control what happens to messages and attachments before and after you send them. Set deadlines and automatic reminders. This capability embodies privacy by design and seamlessly supports the other key requirements of GDPR.

Security Policies & Controls

Control what happens to messages and attachments before and after you send them. Set deadlines and automatic reminders. This capability embodies privacy by design and seamlessly supports the other key requirements of GDPR.
Monitor message and attachment activity in real time. Stop wondering what is happening with your communication. Now you can confirm and verify compliance.

Tracking & Notifications

Monitor message and attachment activity in real time. Stop wondering what is happening with your communication. Now you can confirm and verify compliance.
Enable the data consent requirement with secure electronic signatures. Each consent will receive a unique record identifier, can be verified for authenticity and is both legally binding and non-repudiable.

Secure Signatures

Enable the data consent requirement with secure electronic signatures. Each consent will receive a unique record identifier, can be verified for authenticity and is both legally binding and non-repudiable.
Protect the data you request from your customers with Secure Forms. Convert any paper or electronic form into a secure form.

Secure Forms

Protect the data you request from your customers with Secure Forms. Convert any paper or electronic form into a secure form.
Power the breach notification workflow with Secure Campaigns. You'll get real-time campaign reporting ensuring that clients are not only receiving the breach notification but that there is actually some interaction with your message.

Secure Campaigns

Power the breach notification workflow with Secure Campaigns. You'll get real-time campaign reporting ensuring that clients are not only receiving the breach notification but that there is actually some interaction with your message.
Do you use O365, Outlook or Google in your office? Send messages, files, forms or documents for approval from your current inbox. No need to change your tools.

Works in your email

Do you use O365, Outlook or Google in your office? Send messages, files, forms or documents for approval from your current inbox. No need to change your tools.