Services · Full catalogue

Six pillars. Every deliverable documented.

The full services catalogue — organised the way regulators evaluate a privacy program. Every sub-service maps to a specific control and a defensible deliverable.

01

Privacy Readiness & Compliance Assessment

Independent diagnosis of where your program stands today against the regulations that actually apply to you — and what it takes, in sequence, to close the gap.

Privacy maturity assessment & gap analysis

We evaluate your current privacy practices against DPDPA, UAE PDPL, Saudi PDPL and other relevant laws to identify gaps and deliver a prioritised remediation roadmap.

Multi-jurisdiction compliance audits

Independent audits assessing compliance across multiple jurisdictions — GDPR, DPDPA and key GCC data protection laws — with consolidated finding registers.

Regulatory readiness reviews

Pre-inspection reviews to ensure your organisation is fully prepared for regulatory scrutiny or certification under applicable laws.

Third-party vendor privacy assessments

Evaluation of vendor privacy practices and contracts to mitigate third-party risk and ensure compliance with your obligations.

Cross-border data transfer compliance review

Assessment of international data transfer mechanisms to confirm lawful transfers under DPDPA, GCC laws and other applicable frameworks.

Typical deliverables

Maturity scorecard · Finding register · Prioritised remediation roadmap · Regulator-ready audit pack · Vendor risk register.

02

Data Discovery & Privacy Mapping

You cannot defend what you cannot see. We inventory every personal data flow across systems, departments, vendors and forgotten archives — and turn it into a living Record of Processing.

Personal data inventory & classification

Systematic identification and classification of all personal data held across your organisation, by sensitivity, purpose and lawful basis.

Data flow mapping across systems and departments

Detailed mapping of personal data flows within and across systems, departments and third parties — with visual flow diagrams ready for board reporting.

Record of Processing Activities (RoPA) development

Creation and maintenance of comprehensive Records of Processing Activities as required by applicable regulations — built for ongoing maintenance, not one-time delivery.

Legacy system data discovery

Targeted discovery of personal data in legacy systems and archived environments — the exposures most organisations only find during a breach.

Shadow IT data discovery

Identification of personal data stored in unauthorised or shadow-IT tools and applications — including off-platform spreadsheets, personal drives and unmanaged SaaS.

Data retention & disposal mapping

Mapping retention periods and secure disposal processes to meet legal and regulatory requirements — with an enforceable retention schedule per data category.

03

Privacy Impact & Risk Assessments

DPIAs, PIAs and Transfer Impact Assessments built to the standard your regulator expects — not the cut-down templates floating around the internet.

Data Protection Impact Assessments (DPIA)

Mandatory risk assessments for high-risk processing activities under GCC laws and best practice for DPDPA — with mitigation plans you can actually execute.

Privacy Impact Assessments (PIA)

Broad evaluations of privacy risks introduced by new projects, systems or processes — embedded into your project gate so they happen before exposure, not after.

Transfer Impact Assessments (TIA)

In-depth reviews of safeguards for cross-border data transfers — Standard Contractual Clauses, supplementary measures and adequacy analysis to ensure ongoing compliance.

Vendor & third-party risk assessments

Targeted privacy risk evaluations of vendors and partners handling personal data — with re-assessment cadence baked into the vendor lifecycle.

04

Privacy Program Design & Implementation

End-to-end program build — governance framework, operating model, policies, procedures and training. The kind of program that lasts past the consultant's last invoice.

End-to-end privacy program development

Design and roll-out of a complete, tailored privacy program aligned with your business model, regulatory exposure and growth roadmap.

Privacy governance framework design

Establishment of governance structures, roles and accountability mechanisms for sustained compliance — with named owners at every layer.

Privacy policies & procedures development

Drafting of clear, compliant policies and operational procedures tailored to your operations — not generic templates with your logo on top.

Privacy operating model & org structure

Design of roles, responsibilities and workflows to embed privacy across the organisation — including the RACI for every privacy decision your business makes.

Privacy training & awareness programs

Customised training sessions and awareness initiatives to build a privacy-conscious culture — calibrated to role and risk exposure.

Typical engagement

12 — 24 weeks · Senior privacy lead · Steering committee cadence · Executive readout at every phase gate · Documented handover.

05

Privacy Operations & Controls

The day-to-day machinery — privacy notices, consent, DSR handling, breach response, Privacy by Design and cookie compliance — wired into your tooling and run to a documented SLA.

Privacy notice design & implementation

Creation and deployment of clear, compliant privacy notices for customers and employees — multi-jurisdictional, multi-language, version-controlled.

Consent management framework & solutions

Robust systems and processes for obtaining, recording and managing consent — including platform deployment and consent receipt architecture.

Data Subject Rights (DSR) management

Efficient processes and tools to handle access, rectification, erasure and other rights requests — with regulatory-clock SLA tracking and auditable response logs.

Breach detection, response & notification

Comprehensive incident response plans — detection, containment, regulatory notification within statutory timelines, and post-incident defensibility documentation.

Privacy by Design & by Default

Integration of privacy principles into product development and system design from the outset — including PbD review gates in your SDLC.

Cookie & tracking technology compliance

Implementation of compliant cookie banners, preference centres and tracking-technology management — across the full digital estate.

06

Regulatory Advisory & Ongoing Support

A standing relationship — regulatory horizon-scanning, compliance monitoring and DPO-as-a-Service for organisations that need senior privacy oversight without a full-time hire.

Regulatory change monitoring & impact assessment

Proactive tracking of legal changes and guidance on their impact on your operations — including a quarterly regulatory horizon report tailored to your jurisdictions.

Compliance monitoring & reporting

Ongoing monitoring, health checks and reporting to maintain sustained compliance — with executive-grade dashboards and board-ready risk summaries.

Data Protection Officer as a Service (DPOaaS)

Fractional or fully outsourced DPO support — expert guidance, internal oversight and regulatory liaison, delivered through a named senior practitioner.

DPOaaS specifics

Named senior DPO · Defined response SLA · Regulator liaison authority · Quarterly board reporting · Annual program review · 12-month minimum term.

Not sure which pillar you need first?

A short call usually settles it. We'll listen, ask the right questions, and tell you honestly where the work should start — even if that work is not with us.

Schedule a readiness call