{"id":14517,"date":"2020-07-26T20:23:56","date_gmt":"2020-07-26T17:23:56","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=14517"},"modified":"2020-08-12T08:06:39","modified_gmt":"2020-08-12T05:06:39","slug":"hopex-privacy-management","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/hopex-privacy-management\/","title":{"rendered":"HOPEX Privacy Management"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1595629074396{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/07\/hopex-1.jpg?id=13648) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">HOPEX Privacy Management<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">Achieve and demonstrate Data Protection Compliance <\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;]<div class=\"mkdf-section-title-holder\">\n\t<h2 class=\"mkdf-section-title mkdf-section-title-small\" style=\"color: #43648d;text-transform: capitalize\">\n\t\tHOPEX Privacy Management\t<\/h2>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14858&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Data Protection <\/span>Summary<\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>EU GDPR has increased data protection for individuals and given regulatory authorities greater powers to take action against businesses that breach the new laws.<\/li>\n<li>Following the European example, all countries around the globe (e.g. California with CCPA, South America, Asia) are updating their privacy regulations.<\/li>\n<li>Among the points in common between these legislations there are:\n<ul>\n<li><strong>powerful rights<\/strong> to data subjetct,<\/li>\n<li><strong>large sanctions<\/strong> in case of non compliance.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Software + Experience =<\/span> Solution<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;14864&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Founded in 1991<\/li>\n<li>Software Solutions<\/li>\n<li>Global Services<\/li>\n<li>Help Drive Digital Transformation<\/li>\n<li>Present in 40 Countries<\/li>\n<li>9 Subsidiaries\u00a0 &amp; 100 partners worldwide<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14865&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;14863&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Founded in 1997<\/li>\n<li>Consulting Services and Data Protection Experts<\/li>\n<li>Drive Business Corporate Governance<\/li>\n<li>Quality Certified ISO 9001: 2008<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14859&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management <\/span>Benefits<\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Manage compliance efforts from a collaborative workspace and centralized repository<\/li>\n<li>Inform and accelerate remediation activities with up-to -date regulatory details and legal templates<\/li>\n<li>Documents and demonstrate compliance with a full range of reports designed for the Supervisory Authority<\/li>\n<li>Maintain control over protection with Data Protection Impact Assessments<\/li>\n<li>Influence data protection by design efforts and know when to assess new and evolving processing activities<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Main Features<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14521&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Assign Responsibilities<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;14860&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management <\/span>Benefits<\/h4>\n<p>[\/vc_column_text][vc_column_text]HOPEX Privacy Management gives you the tools necessary to manage your stakeholders:<\/p>\n<ul>\n<li>Create and manage your own Privacy team using 7 different roles<\/li>\n<li>Document your company organizational model<\/li>\n<li>Scale your team to your organization&#8217;s legal structure, departments<\/li>\n<li>Delegate Processing Activities to the relevant deputy DPOs<\/li>\n<li>Identify the different data protection roles such as Data Controllers, Processors and National Representatives<\/li>\n<li>For each Processing Activity, assign the right Activity Owner and Application Owner who are expected to describe processing activities and their relevant Applications.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Assign Responsibilities <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Chief Privacy Officers can build their organization with Legal Entities, Sites &amp; Departments. [\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Legal Entities are located on specific Sites<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;14861&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Departments are part of a Legal Entitiy<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;14862&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Assign Responsibilities <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>The Chief Privacy Officer can detail the organigram of the organization, to build a complex hierarchy, with several nested levels of legal entities amd departments<\/li>\n<li>The organization will be able to create its own roles and functions to describe the different responsibilities<\/li>\n<li>Based on the organigram, the user can define the visibility rights of the different roles with the desired level of granularity, e.g. a member of the data protection team may have access only to the processings of a specific legal entity or department\/sub-department<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14866&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Assign Responsibilities <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Chief Privacy Officers can assign a DPO to a Legal Entity and a deputy DPO for each Department.<\/li>\n<li>A department can also have an IT correspondent for privacy related requests.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14535&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Record of Processing Activities<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;14921&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]HOPEX Privacy Management enables DPOs ana Data Controllers to quickly build and maintain an accurate record of processing activities:<\/p>\n<ul>\n<li>Create processing activities<\/li>\n<li>Identify already existing processes &amp; applications handling personal data categories and convert them into processing activities*<\/li>\n<li>Add Data Protection relevant information to your processing activity (purpose, legitimacy, assignments&#8230;)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can manually create Processing Activities and specify which Department they are performed by.<\/p>\n<p>New Processing Activities will be assigned to the relevant DPO and DPO deputy as specified in Assign Responsibilities.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14533&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can export the record of processing, choosing what legal entity they are interested in and if the record applies to the data controller or the data processor.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14532&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can identify already existing processes* handling personal data categories and convert them into processing activities with a single drag and drop action.<\/p>\n<p>Diagrams describing processes can be consulted prior to converting process into processing activity.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14531&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can identify already existing applications* handling personal data categories and convert them into processing activities with a single drag and drop action.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14529&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>DPOs can follow the validation of newly created activities, through pre-defined workflows<\/li>\n<li>Automatically notify activity owners to get them to complete the description of a processing activity<\/li>\n<li>Validate the provided information and carry out a pre-evaluation and DPIA<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;14870&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>DPOs can specify the level of responsibility of the Legal Entity (Data Controller, Processor or Joint Controller) regarding the processing activity.<\/li>\n<li>The processing activity owner can inform the legal basis for the processing.<\/li>\n<li>Data\u00a0Controllers\u00a0can\u00a0also\u00a0rate the Legal Basis Compliance\u00a0level.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14528&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><strong>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Data Controllers are able to specify which security measures are put in place to ensure processing activities are carried out safely.<\/li>\n<li>Data Controllers can also rate Compliance of Data Transfers &amp; Security Measures at this stage.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14907&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Data Controllers are able to specify which Data Subject Rights apply to their processing activities, along with the type of notice and consent requirement.<\/li>\n<li>Data Controllers can also rate the Data Subject Rights &amp; Notice Management Compliance Level.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14922&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Processing Activities <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Data Controllers are able to rate the degree of minimization of specific data handled by processing activities.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14874&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Manage Processing Activities<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14908&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]Data Controllers can further describe processing activities with:<\/p>\n<ul>\n<li>coverage by national representatives<\/li>\n<li>third parties performing the processing and set contractual agreements with them<\/li>\n<li>comparison of countries (where the processing takes place vs where the data was collected) and implementation of the necessary measures (data protection, DPIA, risk evaluation).<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>National Representatives <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>DPOs can specify National Representatives for each Legal Entity. Countries covered by National Representatives are defined.<\/li>\n<li>A National Representative coverage is then given to the Processing Activities performed by the Legal Entity (Null, Partial, Full).<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14539&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Third-Parties Management <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]DPOs can not only create but also manage Third Parties.<\/p>\n<ul>\n<li>Third Party Sites, along with Transfer Safeguards, can be defined.<\/li>\n<li>DPOs can be assigned to Third Parties<\/li>\n<li>National Representatives can also be assigned<\/li>\n<li>Contractual Agreements can be uploaded<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;14876&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14877&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Third-Parties Management <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>DPOs and Data Controllers can, for Processing Activities, specify which Third Party is taking in the form of a sub-processing.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]A Third Parties Report provides an overview of the Processing Activities that Third Parties are participating, along with the Risks they present and their Compliance Level.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;14878&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Data Transfer Management <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs and Data Controllers can capture Data Transfers performed by a processing activity. These data transfers can then be represented on a Data Transfer Map.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14546&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Manage Data Breaches<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14910&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]Record all potential data breaches allowing internal staff to report incidents through an ad hoc web form. Data Controllers can:<\/p>\n<ul>\n<li>Collect all the information required by the regulation and build a detailed record of data breaches<\/li>\n<li>Assess the seriousness of every breach and take action within 72 hours:\n<ul>\n<li>implementing remediation measures<\/li>\n<li>identifying impacted people and potentially notifying supervisory authorities and data subjects.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Data Breaches Management <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Stakeholders can report Data Breaches, without needing to log into HOPEX Privacy Management.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>DPOs can then assess Data Breaches and keep track of notifications sent to Data Subject and supervisory authorities.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;14881&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Manage Data Subject Requests<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14911&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]HOPEX Privacy Management helps Data Controllers with Data Subject Requests management. Within a dedicated section, Controllers can:<\/p>\n<ul>\n<li>Collect request<\/li>\n<li>Categorize them by type and monitor their status<\/li>\n<li>Assign every request to impacted legal entities, departments and processing activities<\/li>\n<li>Receive reminders when deadline approaches<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>Data Subject Requests Management <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Controllers can keep a log of all Data Subject Requests and monitor their progress.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14544&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Pre-assessment of Processing Activities<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14912&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]HOPEX Privacy Management enables DPOs to:<\/p>\n<ul>\n<li>Assess risk ad compliance level of every processing activity<\/li>\n<li>Review and Comment on latest DPIA in progress<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Pre-Assessment <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>DPOs are able to assess overall level of risk and compliance of processing activities. Reminders of <strong>previous compliance ratings<\/strong> given by the Data Controller responsible for the processing activity are provided at this stage.<\/li>\n<li>This is where the DPO determines if a DPIA is required or not.<\/li>\n<li>Pre-assessments can be recorded for future analysis of the evolution of the processing activity\u2019s compliance and risk levels.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14548&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Advise on DPIA <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can review and add comments to DPIAs. They can also finalize or discard each DPIA.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14550&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Data Protection Impact Assessments<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14914&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]HOPEX Privacy Management enables Data Controllers to carry out a Data Protection Impact Assessment:<\/p>\n<ul>\n<li>Identify processing activities requiring a DPIA<\/li>\n<li>Launch a DPIA, identify data protection risks and provide recommendations<\/li>\n<li>Produce detailed reports to prove accountability to the supervisory authority<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]DPOs also get the opportunity to:<\/p>\n<ul>\n<li>Review the Risks identified during DPIAs<\/li>\n<li>Validate Recommendations<\/li>\n<li>Receive Notifications of DPIA awaiting validation (available in Update 4)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;14915&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Controllers can identify at a glance the processing activities requiring a DPIA.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14559&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Data Controllers can start a new DPIA or clone a previous one.<\/li>\n<li>Previous DPIAs can also a consulted.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Data Controllers are reminded of the pre-assessment measures given to the processing activity by the DPO.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;14887&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; content_preset=&#8221;_preset_3&#8243;][vc_column_text]Data Controllers can create Data Protection risks represented by the processing activity. There are 5 types of Data Protection Risks:<\/p>\n<ul>\n<li>Illegitimate Access<\/li>\n<li>Data Loss<\/li>\n<li>Data Corruption<\/li>\n<li>Daa Unavailability<\/li>\n<li>Unlawful Processing<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Each Risk is assessed in terms of Impact and Likelihood.<\/li>\n<li>Once Risks are assessed, Data Controllers can issue Recommendations with the aim to reduce the level of a specific data protection Risk.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;14888&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Controllers can attach external files as evidence supporting their DPIA.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14557&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Controllers then get to pass a final judgement on the Processing Activity by setting a Final Compliance Level, a Final Risk Level and pronounce him\/herself on the Subsequent Actions to be taken.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14555&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Controllers can generate a DPIA document containing the regulatory texts, background information on the Processing Activity and results of the DPIA. This document can then be modified if necessary before it is submitted to the authority.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14553&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs can review the Risks identified during DPIAs.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14554&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Company Policies can also be attached to a DPIA for future reference. Enterprise Architects can use both Recommendations and policy documents to transform the assessed processing activity.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14552&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>DPIA <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>DPOs can review Recommendations made to mitigate a particular Data Protection Risk identified during the DPIA.<\/li>\n<li>Recommendations are validated alongside their DPIA.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14551&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Inform &amp; Advise Data Controller<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; content_preset=&#8221;_preset_3&#8243;][vc_single_image image=&#8221;14890&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]DPOs can use HOPEX Privacy Management to support Data Controllers in an overseeing capacity with the following reports:<\/p>\n<ul>\n<li>Data Risk Reports<\/li>\n<li>Data Protection Risk<\/li>\n<li>Consistency Reports<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Inform &amp; advise <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Risk Reports provide an overview of levels of Risk and Compliance of each processing activity, organized by Data Category or by Data Subject Categories[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14563&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Inform &amp; advise <span style=\"color: #808080;\">Features <\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Data Protection Risk Report provides an overview of the evolution of a Processing Activity\u2019s Data Protection risk rating throughout its many DPIAs.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14562&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Carry Out Audit<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; content_preset=&#8221;_preset_3&#8243;][vc_single_image image=&#8221;14917&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]DPOs can use HOPEX Privacy Management to audit progress of Compliance efforts as well as potential gaps with the following reports:<\/p>\n<ul>\n<li>Processing Activity Status<\/li>\n<li>Record of Notices<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Monitor Compliance <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]DPOs have the opportunity to create their own reports in one click to respond to their monitoring needs.<\/p>\n<p>The bubble chart below shows a distribution of processing activities by level of compliance and risk rating whilst the bubble size is based on the time elapsed since last assessment. The heatmap presents a distribution by risk rating and compliance level.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14565&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Monitor Compliance <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]The pie chart below allows DPOs to monitor the number of processing activities already assessed against those yet to be assessed.<\/p>\n<p>DPOs can have a closer look at the processing activities by clicking on the corresponding section of the pie chart. The list of relevant processing activities is displayed.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14566&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Monitor Compliance <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Processing Activity Owner can capture the notice requirements for a specific Processing Activity.<\/li>\n<li>The notice actually sent to the concerned Data Subject can be attached to the processing activity for future reference.<\/li>\n<li>Processing Activities without notices can be monitored with the relevant reports.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14564&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">HOPEX Privacy Management<\/span> \u2013 Liaise with Regulatory Authority<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; content_preset=&#8221;_preset_3&#8243;][vc_single_image image=&#8221;14918&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]DPOs get to generate and provide the following reports to the authority:<\/p>\n<ul>\n<li>Record of processing activities<\/li>\n<li>DPIA documents<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Liaise with Regulatory Authority <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; content_preset=&#8221;_preset_3&#8243;][vc_column_text]DPOs can generate a Record of Processing report in MS Word format form a list of processing activities.<\/p>\n<p>The reports contain information from HOPEX Privacy Management and is enriched with content based on the GDPR regulation. Information is organized according to the regulation by section &amp; allows DPOs to modify the report according to their stakeholders&#8217; expectations.[\/vc_column_text][vc_empty_space height=&#8221;15px&#8221;][vc_single_image image=&#8221;14893&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14892&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;70px&#8221;][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Liaise with Regulatory Authority <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]Organizations and their DPOs can now export the record of processing directly in the format suggested by the French authority (CNIL).[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14569&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text]<\/p>\n<h4>Liaise with Regulatory Authority <span style=\"color: #808080;\">Features<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; content_preset=&#8221;_preset_3&#8243;][vc_column_text]DPOs can generate a DPIA documents in MS Word format for a given DPIA.<\/p>\n<p>The document contains information from HOPEX Privacy Management and is enriched with content based on the GDPR regulation. Information is pre-organized and DPOs can add further information before it is submitted to the supervisory authority.[\/vc_column_text][vc_empty_space height=&#8221;15px&#8221;][vc_single_image image=&#8221;14895&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14894&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Business Transformation &amp;<span style=\"color: #808080;\"> Data Protection<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Worldwide data protection legislations stipulate that Data Controllers should implement appropriate technical and organizational measures to ensure that processing is compliant and follows the principle of data protection by design and by default.<\/li>\n<li><strong>Compliance to data protection legislations involves changes to how Organizations conduct their business.<\/strong><\/li>\n<li>Decisions regarding such changes cannot be taken nor implemented without clear visibility of said organizations.<\/li>\n<li>By describing how an organization conducts its business, Enterprise Architecture not only helps identify processing activities but also enables privacy teams to drive business transformation.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Compliance &amp; <span style=\"color: #808080;\">Business Transformation<\/span><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14575&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>HOPEX EA +\u00a0 HOPEX Privacy Management<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14574&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #808080;\">Reusing<\/span> Business Process &amp; Applications<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14576&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Re-use IT Applications<\/h4>\n<p>[\/vc_column_text][vc_column_text]Users can now document what IT applications are used within a\u00a0 processing activity, directly linking existing ITPM\/ITA applications and access to all their properties[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14572&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner content_preset=&#8221;_preset_3&#8243;][vc_column_text]<\/p>\n<h4>Re-use Org-Units<\/h4>\n<p>[\/vc_column_text][vc_column_text]The user can now reuse existing EA org-units and convert them into: Legal Entities, Departments and Third Parties. The conversion creates a link between the two objects allowing continuous synchronization.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14573&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1474589458588{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_empty_space height=&#8221;50px&#8221;][vc_column_text]<\/p>\n<h6><span style=\"color: #294b8b; font-weight: 500;\">Enterprise Architecture<\/span><\/h6>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.proya.com.tr\/hopex-it-architecture\/\" title=\"\"  data-id=\"mpc_button-2769dd0a1d71872\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">IT Architecture<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/hopex-information-architecture\/\" title=\"\"  data-id=\"mpc_button-169dd0a1d71a4a\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">Information Architecture<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><div data-id=\"mpc_button-1969dd0a1d71b48\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-chevron-right\"><\/i><span class=\"mpc-button__title mpc-transition\">BPM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1595629074396{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/07\/hopex-1.jpg?id=13648) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] HOPEX Privacy Management [\/vc_column_text][vc_column_text] Achieve and demonstrate Data Protection Compliance [\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476279052293{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;14858&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] Data Protection Summary<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/14517"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=14517"}],"version-history":[{"count":0,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/14517\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=14517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=14517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=14517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}