This website uses cookies. View our cookie policy
United Kingdom
Select regional store:

Data protection/EU GDPR compliance

The EU General Data Protection Regulation (GDPR) will supersede the Data Protection Act 1998 (DPA) on 25 May 2018. It introduces a number of key changes for all organisations that process personal information, including new rules on international data transfers, documenting data processing activities, performing data protection impact assessments and appointing data protection officers.

Non-compliant organisations face considerably greater penalties under the Regulation than under current data protection laws – up to 4% of annual global turnover or €20 million. In addition, data subjects will have the right to seek judicial remedies against data controllers and processors, as well as the right to obtain compensation for damages occurring as a result of GDPR breaches.

If you’re undertaking a GDPR compliance project, IT Governance can provide everything you need.


For general information about the GDPR, visit our dedicated GDPR page >>

Products and services

The GDPR states that data controllers must implement "appropriate technical and organisational measures to ensure and to be able to demonstrate that the processing is performed in accordance with this Regulation".

These measures must include the implementation of appropriate data protection policies, and controllers may use adherence to approved codes of conduct or management system certifications "as an element by which to demonstrate compliance with [their] obligations".

An ISO 27001–compliant ISMS (information security management system) should be the starting point for all organisations seeking to demonstrate that they have implemented these measures. We’ve been helping organisations implement ISO 27001 for over a decade, and have led more than 400 certifications to date. What’s more, we offer a 100% guarantee of successful certification.

Here are a few ways we can help meet your GDPR compliance needs:

  • Training

    Delivered by experienced data protection consultants, our GDPR training sessions are built on the foundations of our extensive practical experience advising on compliance with data privacy laws and related information security standards such as ISO 27001.

    Choose from:

    • Certified EU GDPR Foundation
      This one–day course provides a comprehensive introduction to the EU GDPR, and a practical understanding of the implications and legal requirements for UK and EU organisations of any size. Delegates who pass the included exam gain the EU GDPR F qualification from IBITGQ. Click here for more information about EU GDPR Foundation training >>

    • Certified EU GDPR Practitioner
      This four–day advanced-level course aims to help delegates fulfil the role of data protection officer (DPO) under the GDPR, and covers the Regulation in depth, including implementation requirements, the necessary policies and processes, and important elements of effective data security management. Delegates who pass the included exam gain the EU GDPR P qualification from IBITGQ. Click here for more information about EU GDPR Practitioner training >>

    All of our training courses are available in classroom and Live Online formats.

  • Software

    Simplify GDPR compliance with software that streamlines processes, saves time, and reduces costs.

    Choose from:

    • vsRisk™
      Organisations that want to demonstrating compliance by following ISO 27001’s risk-based approach to information security management will save hours of work with vsRisk™, the industry–leading ISO 27001-compliant risk assessment tool.

      Click here for more information vsRisk >>

    • Data Flow Mapping Tool
      To comply with the GDPR, organisations must understand the personal data they process. To do so, it’s necessary to create a data flow map. The Data Flow Mapping Tool simplifies the process of creating data flow maps, making them easy to review, revise, and update as your organisation evolves.

      Click here for more information about the Data Flow Mapping Tool >>

  • Penetration testing

    Regular penetration testing is the most effective way of demonstrating that exploitable vulnerabilities in your company’s Internet–facing applications and infrastructure have been identified, and allows you to apply appropriate mitigation.

    Click here for more information about penetration testing >>

Speak to an expert

Contact us today for advice and guidance on our products and services.