Data privacy management

One thing is for sure: Data protection should neither be difficult to understand nor difficult to implement. We will provide you with a variety of tools to help you put effective security mechanisms in place for the protection of sensitive information and the handling personal data. That way, the implementation of GDPR is not a scientific endeavour, but your competitive advantage!

Trust for a good reason

Do not entrust us with your data protection solely because our team consists of business information specialists, IT security officers, data protection experts, lawyers and Udis & TÜV-certified external data protection officers.

Rather, because we approach data protection as a holistic process from the very first step, which must involve and encompass all internal company departments. How do we know that? Easy: Based on our 20+ years of experience in the development of data protection systems – across the most complex IT environments in companies of all industries and sizes.

Security in every phase

A good plan makes everything a lot easier. Which is why we always start by drawing up an individual audit programme for the course of two years. In this regard, we work together to define the major aspects of your data protection. Our experts then carry out a basic audit. In doing so, they check the actual level of your data protection, the so-called data protection maturity level of your company.

The audit report resulting thereof informs you in detail and transparently about the measures we recommend.

However, the next and most important step is to implement these measures. The aim here is to put in place a data protection service management (DSM) and a management system for information security (ISMS). Of course, our experts are happy to assist you with this task.

Here are your options

We offer you solutions. The one thing we can't do for you is decide which one to choose. An audit allows both of us to see the status quo of your company more clearly. We then proceed with the GDPR check in ten defined steps. Here, we offer to appoint an external data protection officer, create processing lists and order processing contracts. These services are rounded off by specific technical and organizational measures (German: Technisch-organisatorische Maßnahmen, abbreviated as TOM) based on ISO27001 and the IT basic protection manual of the Federal Office for Information Security (German: Bundesamt für Sicherheit in der Informationstechnik, abbreviated as BSI).


Our experts determine the data protection level of your organization – with tried and tested modules, checklists and audit programs.

Data Protection Officer

We support your internal data protection officer or provide a qualified external data protection officer from our team.

IT Security Officer

Our specialists advise the company management on questions about IT security and assist you in the implementation of these tasks.

kameon PLC

Our software solution equips you with an effective tool for the practice-oriented implementation of data protection requirements.

Do you want to stay informed about current data protection matters?

For whom we work

Find out more here.

Let's talk, we are happy to answer your questions

Head of Privacy & IT-Security

Markus Vatter