Information security

Information security is a solution for securing information systems, information and access to data. The information security management system is evolving with respect to the culture, processes, technologies and requirements of your company / organization. ISO / IEC 27000 standards are a recognized standard in this area to help ensure that your information security policy is appropriate. In the field of information security, a systemic approach is applied, which consists in setting work standards in the field of information security management and in eliminating internal and external risks when working with data.

With this service, you get an information security system that meets the standards of the ISO / IEC 27000 series and protects your business from loss and theft by ensuring the protection of all data, whether yours or the data of your customers.

Services in the field of information security, which include 4 areas:

On demand
The price depends on the scope of the work performed.

Analysis of information security status

The goal of information security is to protect the integrity of all data from accidental or intentional actions by employees or external parties. A modern approach to information security is based on mapping the relevant information processes (transfer, storage, use, disposal), taking into account the human factor and related business risks. 

Risk analysis

Proper risk assessment, measurement and monitoring can be difficult. Information security risk analysis consists of identifying these risks, quantifying them, monitoring them over time to detect changes, analyzing these data to identify security vulnerabilities, and drawing conclusions that allow informed decisions to be made. There are many frameworks that can help companies perform information security risk analysis.

Security is a process and a way. Information security risk analysis is part of this journey. It helps the organization identify the various control mechanisms it could put in place to suppress or mitigate specific risks. These controls may include administrative, technical, operational and physical security measures.

Development of information security documentation

As hackers track vulnerabilities and new viruses and malicious code exploit them, there is a growing need to develop a comprehensive data security policy. The essence of data security policy is to clearly articulate the problems. The company's information security policy is an official set of documents that define the rules and guidelines that employees follow when protecting data and ensuring information security. Information security policy is a standards-based handbook with procedures for protecting the confidentiality, integrity and availability of electronic information and communication systems. These measures need to be translated into practice, whether in the area of ​​object security, personnel security and implementation of IT solutions.

Assistance in the implementation of security and IT solutions

Implementing IT solutions is a process that usually involves installing and configuring hardware and software for a specific application. Implementation can be technically demanding and can take several months. It's not as easy as buying a laptop and then connecting it to the operator's network. Designing network segmentation that meets the needs of individual businesses requires skill. Therefore, it is important to choose a partner with specialized professionals who have many years of experience with enterprise applications, hardware, software and security issues.

Our goal is to benefit the client

Choosing the right and reliable advisor is always a great help in improving yourself. Above all, consulting in the field of law is extremely broad-spectrum and affects almost all areas of the life of entrepreneurs and individuals, therefore the choice of a legal advisor is extremely important. In the law office Hronček & Partners, s. r. o. we pay attention to professionalism and high quality legal services with an individual approach. Our main goal is to provide legal services of the highest quality and to bring innovative and professional solutions for the client so that we become their trusted partner.

More services in the field of data protection and security

GDPR security documentation

€500.00
The price is stated without VAT and may be increased depending on the scope of the work performed and the scope of personal data processing.

Preparation of a new, tailor-made, basic Controller's Security Documentation, updated according to the current legislation, available decision-making and interpretation practice of the authority (internal regulations intended for the protection of personal data)

GDPR Data Protection Officer

On demand
The price is stated without VAT and may be increased depending on the scope of the work performed and the scope of personal data processing.

With our own professional team and we will provide you with all-inclusive service of a data protection officer who is fully qualified to perform such role under the conditions laid down in Article 37 of GDPR. Under the Regulation, controllers are required to mandate a data protection officer. However, controllers who do not meet such conditions may decide to designate a data protection officer.

Data protection impact assessment

On demand

Processing of data protection impact assessment (DPIA) documentation pursuant to Art. 35 of the GDPR regulation, which is special documentation that the operator is obliged to process only if the legal prerequisites are met (e.g. large-scale processing of special categories of personal data, systematic monitoring of public spaces on a large scale, processing of biometric data and others).

GAP analysis – GDPR

€1,800.00
The price is stated without VAT and may be increased depending on the scope of the work performed and the scope of personal data processing.

Analysis of the processes in the processing of personal data at the customer processing personal data (mapping of purposes, processing of personal data, legal bases, security management, information security, physical security and object security, intermediary contracts, business conditions, regime measures, personnel and administrative security), which will be carried out on the basis of a personal consultation. The analysis shall include proposals for the security of personal data and proposals for the necessary measures to be taken and implemented by the Customer to bring the processing of personal data in line with the GDPR and the law. 

Legal setting of cookies on websites

€200.00
The price is shown without VAT.

Setting up a cookies on websites in accordance with the amendment to the Electronic Communications Act and the GDPR regulation. We still encounter incorrect technical settings, settings of banners and information bars or information obligations. 

Training in the field of personal data protection

On demand
The total price depends on the number of people, the number of trainings and the number of areas/agendas in which your employees need to be trained.

The training is focused on the legitimacy of personal data processing as well as the security of personal data. If interested, we can provide training aimed directly at the given professional group.

Expert advice in the processing of specific processing activities of personal data

On demand
The price depends on the scope of personal data processed in your company and the content and specifications of the project.

The topic of personal data protection does not only concern the GDPR regulation and the Personal Data Protection Act. When setting up individual processes and processing activities, it is also necessary to follow national legislation regulating the specific areas of activity of individual operators (e.g. crowdfunding, provision of installments and loans, etc.).

Cybersecurity

On demand

Under the Act no. 69/2018 Coll. on Cybersecurity and on Amendments to Certain Acts, an operator of essential services is required to introduce security measures, and is also obliged to verify the effectiveness of the security measures and compliance with the requirements established by this Act. An operator of an essential service is anyone who meets at least one sector-specific criterion and one impact criterion.

Industrial Security and Classified Information

On demand
The price depends on the degree of secrecy and the type of access to classified information.

The subject of the service is the processing of documents pursuant to Act No. 215/2004 Coll. and the relevant decrees of the NSA (National Security Authority), the purpose of which is to ensure the processing of documentation that must be submitted to the National Security Authority in order to obtain an industrial security certificate for the classification level Restricted or Confidential (familiarisation with classified information, hereinafter referred to as the “CI”, storage of the CI in a protected area or together with the documentation for a technical means and the CI processing through a technical means).

We also carry out the security settings of the technical means (e.g. PC) according to the recommendations of the NSU -specified for your company, we will set up your technical means for the needs of certification.


Let's discuss your project together.

Name *
Required
Surname *
Required
E-mail *
Required. Write the e-mail address in correct form.
Telephone number *
Required
Message *
Required