Welcome to EBC's "Data Protection Controls"

Data Protection Controls takes the burden out of managing data protection for small, medium, large and multinational organisations.

Key features

  1. Reduce operating costs and data protection risks
  2. Easy to use in-house or as an outsourced managed service
  3. Tag assets by data protection law e.g. GDPR, PIPEDA, CCPA, LGPD, etc.
  4. Data protection activity evidence in case of an inspection or audit
  5. Central management of your data protection controls and information
  6. Share information about data protection across your organisation
  7. Assign owners and track data protection information maintenance
  8. Reporting dashboard to create and view status and performance reports

Take the burden out of data protection management

Data Protection Controls (DPC) is a multi-tasking privacy management system that either you can use in your organisation as software as a service (click here to log in) or you can easily contract as an outsourced service.

Whichever version you choose, your personal data privacy management will be centrally and transparently controlled and managed regardless of your company's size. We are a fountain of practical and pragmatic knowledge and experience.

What is data protection?

  1. Managing data protection requires constant work to monitor status, manage events, maintain records and create reports.
  2. It protects the rights and freedoms of individuals.
  3. It protects the individual's personal data from misuse and abuse.
  4. There are many different data protection laws.
  5. Data protection is global.

Data Protection Controls

  1. Multi-regulation ready: GDPR, CCPA, LGPD, PIPEDA, etc.
  2. Saves time and effort.
  3. Central management of your data protection.
  4. Records the required evidence and reports on status and activity.
  5. Creates a single version of the truth data set.
  6. Shareable with those who need to use it.

Data Protection Controls Security Features

  1. DPMSaaS is hosted in France by OVHCloud - certifications (ISO 27001, SOC 1 Type II, SOC 2 Type II)
  2. DPMSaaS uses TLS encryption for data transmission
  3. DPMSaaS uses two-factor log in authentication
  4. DPMSaaS makes use of database level and field level encryption for data at rest
  5. DPMSaaS incorporates strict session hi-jack controls
  6. DPMSaaS incorporates methods and measures against SQL injection
  7. DPMSaaS does not use marketing or tracking cookies
  8. DPMSaaS uses Detectify to perform weekly security tests including OWASP Top 10, CORS, Amazon S3 Bucket and DNS misconfigurations
  9. Each DPMSaaS has its own dedicated field level encryption keys
  10. Each DPMSaaS uses different database level encryption keys
  11. Each DPMSaaS account has its own dedicated database