{"id":72,"date":"2022-05-18T11:48:44","date_gmt":"2022-05-18T11:48:44","guid":{"rendered":"https:\/\/privacybased.com\/?page_id=72"},"modified":"2022-06-02T09:10:58","modified_gmt":"2022-06-02T09:10:58","slug":"privacy-based-homepage","status":"publish","type":"page","link":"https:\/\/privacybased.com\/","title":{"rendered":"Privacy Based homepage"},"content":{"rendered":"<h1 style=\"text-align: center;\"><strong>Informationsecurity and Privacymanagement<\/strong><\/h1>\n<h2 style=\"text-align: center;\">Made easy &nbsp;for you<\/h2>\n<h1 style=\"text-align: center;\">What we do<\/h1>\n<h1 style=\"\">Information security<\/h1>\n<p>Technical measures can be defined as the measures and controls afforded to systems and any technological aspect of an organisation, such as devices, networks and hardware. Protecting such aspects is crucial for the security of personal data and is the best line of defence against data breaches.<\/p>\n<p>Organisational measures may consist of internal policies, organisational methods or standards, and controls and audits, that controllers and processors can apply to ensure the security of personal data.<\/p>\n<p>We help your organization implement technical and organizational measurements, either in ISO27001, NEN7510 or BIO (Baseline informatiebeveiliging Overheid).&nbsp;<\/p>\n<h1 style=\"\">Privacy management<\/h1>\n<p>Gartner tells us that Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulations, and track incidents that lead to unauthorized disclosures of personal data (investigation, remediation, reporting).<\/p>\n<p>As we see privacy management as an integral part of information security we can help organizations in their effort to design their security and privacy policies &amp; controls into one complete Information Security Management System. Either you choose for Atlassian, ServiceNow, OneTrust or you can choose our Privacy Control Center as your GRC toolbox, we can help you with that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Informationsecurity and Privacymanagement Made easy &nbsp;for you What we do Information security Technical measures can be defined as the measures and controls afforded to systems and any technological aspect of an organisation, such as devices, networks and hardware. Protecting such aspects is crucial for the security of personal data and is the best line of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":1,"tcb_editor_enabled":1,"tve_landing_page":"tcb2-blank-page-kwik","_tve_header":"66","_tve_footer":"68"},"class_list":["post-72","page","type-page","status-publish","hentry","post-wrapper","thrv_wrapper"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy Based homepage - Privacy based processing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/privacybased.com\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Based homepage - Privacy based processing\" \/>\n<meta property=\"og:description\" content=\"Informationsecurity and Privacymanagement Made easy &nbsp;for you What we do Information security Technical measures can be defined as the measures and controls afforded to systems and any technological aspect of an organisation, such as devices, networks and hardware. Protecting such aspects is crucial for the security of personal data and is the best line of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/privacybased.com\/\" \/>\n<meta property=\"og:site_name\" content=\"Privacy based processing\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-02T09:10:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/privacybased.com\\\/\",\"url\":\"https:\\\/\\\/privacybased.com\\\/\",\"name\":\"Privacy Based homepage - Privacy based processing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/privacybased.com\\\/#website\"},\"datePublished\":\"2022-05-18T11:48:44+00:00\",\"dateModified\":\"2022-06-02T09:10:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/privacybased.com\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/privacybased.com\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/privacybased.com\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/privacybased.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Based homepage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/privacybased.com\\\/#website\",\"url\":\"https:\\\/\\\/privacybased.com\\\/\",\"name\":\"Privacy based processing\",\"description\":\"Informationsecurity and privacy, the easy way\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/privacybased.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Based homepage - Privacy based processing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/privacybased.com\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Based homepage - Privacy based processing","og_description":"Informationsecurity and Privacymanagement Made easy &nbsp;for you What we do Information security Technical measures can be defined as the measures and controls afforded to systems and any technological aspect of an organisation, such as devices, networks and hardware. Protecting such aspects is crucial for the security of personal data and is the best line of [&hellip;]","og_url":"https:\/\/privacybased.com\/","og_site_name":"Privacy based processing","article_modified_time":"2022-06-02T09:10:58+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/privacybased.com\/","url":"https:\/\/privacybased.com\/","name":"Privacy Based homepage - Privacy based processing","isPartOf":{"@id":"https:\/\/privacybased.com\/#website"},"datePublished":"2022-05-18T11:48:44+00:00","dateModified":"2022-06-02T09:10:58+00:00","breadcrumb":{"@id":"https:\/\/privacybased.com\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/privacybased.com\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/privacybased.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/privacybased.com\/"},{"@type":"ListItem","position":2,"name":"Privacy Based homepage"}]},{"@type":"WebSite","@id":"https:\/\/privacybased.com\/#website","url":"https:\/\/privacybased.com\/","name":"Privacy based processing","description":"Informationsecurity and privacy, the easy way","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/privacybased.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/pages\/72","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacybased.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=72"}],"version-history":[{"count":8,"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/pages\/72\/revisions"}],"predecessor-version":[{"id":85,"href":"https:\/\/privacybased.com\/index.php?rest_route=\/wp\/v2\/pages\/72\/revisions\/85"}],"wp:attachment":[{"href":"https:\/\/privacybased.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}