Account
Basket
IE
SELECT A STORE:
EUROPE
Belgium
Denmark
Deutschland
España
Finland
France
Ireland
Italia
Luxembourg
Netherlands
Sweden
WORLDWIDE
Asia Pacific
United Kingdom
USA
€ EUR
Please enter more than 3 characters
+353 (0) 1 695 0411
Shop
Shop By Category
Books
Standards
Training courses
E-learning and staff awareness
Exam vouchers
Toolkits
Tools
Software
Penetration testing
Consultancy
Shop by Product
Business continuity (BCM)
CGEIT, CISA, CISM, CISSP and CRISC
COBIT®
CyberComply
Cyber Essentials
Cyber resilience
Cyber security
DORA
Europrivacy
GDPR / Data Protection
Information security
ISO 9001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 27701
ISO 31000
ISO 38500
ISO 50001
IT governance
ITIL
Management system standards
NIS Directive
PCI DSS
Penetration testing
Risk management
Vulnerability Scanning
Information
Resources
Blog
Free green papers
Free webinars
Case studies
Press releases
All resources
Information pages
Business Continuity
CGEIT, CISA, CISM, CISSP and CRISC
COBIT®
Cyber Essentials
Cyber Resilience
Cyber Security
DORA
Europrivacy
GDPR / Data Protection
Information Security
ISO 9001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 27701
ISO 38500
ISO 50001
IT Audit
IT Governance
ITIL®
IT Management Frameworks
IT Service Management
IT Standards
NIS Directive
PCI DSS
Penetration Testing
Project Management
Vulnerability scanning
Training
Shop by subject
BCM & ISO 22301
CGEIT, CISA, CISM, CISSP, CISMP and CRISC
Cyber Security
DORA
GDPR
ISO 27001
ITIL
Microsoft
PCI DSS
Risk Management
Training information pages
BCM & ISO 22301
CGEIT, CISA, CISM, CISSP and CRISC
Cyber Security
GDPR / Data Protection
Ethical Hacking
CISSP and CCSP
ISACA courses
ISO 27001
ITIL
Microsoft
PCI DSS
Training solutions
Training Overview
Classroom Training
Live Online Training
Self-paced Online Training
In-House Training
Elearning Training
Training FAQs
Apply for a corporate account
Speak to a training expert
Staff Awareness
Shop by product
Complete Staff Awareness E-Learning
Cyber Security for Remote Workers
DORA
GDPR
GDPR: Email Misuse
Cyber security
Information security and ISO 27001
PCI DSS
Phishing
Ransomware Staff Awareness
Social media
eLearning Get A Little Help
Shop all e-learning
Staff awareness information pages
Data Protection Staff Awareness
In-house training
Security awareness programme
Staff awareness training
Staff awareness e-learning courses
Multi-course training suites
Training aids
SCORM Packages
Staff Awareness Course Fulfilment
Useful links
GRC eLearning platform
E-learning FAQs
Speak to an e-learning expert
Request a customised e-learning quote
Speak to an in-house training expert
Apply for a corporate account
Tools & software
Shop toolkits
Cyber Essentials
DORA
GDPR / Data Protection
ISO 50001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 9001
ITIL
Management System Standards
PCI DSS
Shop all toolkits
Shop Software
Cyber Risk Management Software
Privacy Management Software
Software Bundles
Shop all software
Shop templates and tools
GDPR
ISO 27001
Shop all templates
Shop all tools
Tools & software information pages
CyberComply portal
Documentation toolkits
Tools & software solutions
Why choose IT Governance
Toolkit FAQs
Consultancy
Shop Consultancy
Business continuity management
Cyber essentials
Cyber security
DORA
Europrivacy
GDPR / Data Protection
ISO 27001
Penetration testing
PCI DSS
Shop all consultancy
Consultancy information pages
Cyber essentials
Cyber incident response management
Cyber security
GDPR / Data Protection
ISO 20000
ISO 22301 / Business continuity management
ISO 27001
ISO 27701
ISO 50001
IT governance
ISO 9001
ITSM & ITIL®
PCI DSS
SOC audits
Supply chain audit
SWIFT CSCF
Useful links
Consultancy services overview
Consultancy case studies
Apply for a corporate account
Speak to a consultancy expert
Security testing
Shop Security testing
Certified ethical hacker (CEH)
Cyber essentials
Europrivacy
Vulnerability Scanning
Security testing information pages
Cyber security testing
Ethical hacking
PCI DSS services
PCI DSS testing
Penetration testing services
Penetration testing & compliance
Security testing overview
Security testing training
Vulnerability scanning
Useful links
Speak to a security testing expert
Speak to a penetration testing expert
Speak to a PCI DSS expert
Apply for a corporate account
Secure your business from cyber threats this winter. Test your vulnerabilities now. Find out more.
Data Privacy
EU General Data Protection Regulation (GDPR)
Articles of the GDPR
Articles of the GDPR
Further information
Europrivacy
6 years of the GDPR
GDPR compliance checklist
GDPR training courses
GDPR penalties
The DPO (data protection officer) role
GDPR data protection impact assessment (DPIA)
GDPR data flow mapping
GDPR and data protection consultancy
GDPR compliance tools
GDPR and information security
The GDPR and privacy compliance frameworks
Articles of the GDPR
Speak to a GDPR expert
Clients we represent
Chapter I – General provisions
Article 1 –
Subject-matter and objectives
Article 2 –
Material scope
Article 3 –
Territorial scope
Article 4 –
Definitions
Chapter II – Principles
Article 5 –
Principles relating to processing of personal data
Article 6 –
Lawfulness of processing
Article 7 –
Conditions for consent
Article 8 –
Conditions applicable to child’s consent in relation to information society services
Article 9 –
Processing of special categories of personal data
Article 10 –
Processing of personal data relating to criminal convictions and offences
Article 11 –
Processing which does not require identification
Chapter III – Rights of the data subject
Section 1 - Transparency and modalities
Article 12 –
Transparent information, communication and modalities for the exercise of the rights of the data subject
Section 2 - Information and access to personal data
Article 13 –
Information to be provided where personal data are collected from the data subject
Article 14 –
Information to be provided where personal data have not been obtained from the data subject
Article 15 –
Right of access by the data subject
Section 3 - Rectification and erasure
Article 16 –
Right to rectification
Article 17 –
Right to erasure (‘right to be forgotten’)
Article 18 –
Right to restriction of processing
Article 19 –
Notification obligation regarding rectification or erasure of personal data or restriction of processing
Article 20 –
Right to data portability
Section 4 - Right to object and automated individual decision-making
Article 21 –
Right to object
Article 22 –
Automated individual decision-making, including profiling
Section 5 - Restrictions
Article 23 –
Restrictions
Chapter IV – Controller and processor
Section 1 - General obligations
Article 24 –
Responsibility of the controller
Article 25 –
Data protection by design and by default
Article 26 –
Joint controllers
Article 27 –
Representatives of controllers or processors not established in the Union
Article 28 –
Processor
Article 29 –
Processing under the authority of the controller or processor
Article 30 –
Records of processing activities
Article 31 –
Cooperation with the supervisory authority
Section 2 - Security of personal data
Article 32 –
Security of processing
Article 33 –
Notification of a personal data breach to the supervisory authority
Article 34 –
Communication of a personal data breach to the data subject
Section 3 - Data protection impact assessment and prior consultation
Article 35 –
Data protection impact assessment
Article 36 –
Prior consultation
Section 4 - Data protection officer
Article 37 –
Designation of the data protection officer
Article 38 –
Position of the data protection officer
Article 39 –
Tasks of the data protection officer
Section 5 - Codes of conduct and certification
Article 40 –
Codes of conduct
Article 41 –
Monitoring of approved codes of conduct
Article 42 –
Certification
Article 43 –
Certification bodies
Chapter V – Transfers of personal data to third countries or international organisations
Article 44 –
General principle for transfers
Article 45 –
Transfers on the basis of an adequacy decision
Article 46 –
Transfers subject to appropriate safeguards
Article 47 –
Binding corporate rules
Article 48 –
Transfers or disclosures not authorised by Union law
Article 49 –
Derogations for specific situations
Article 50 –
International cooperation for the protection of personal data
Chapter VI – Independent supervisory authorities
Section 1 - Independent status
Article 51 –
Supervisory authority
Article 52 –
Independence
Article 53 –
General conditions for the members of the supervisory authority
Article 54 –
Rules on the establishment of the supervisory authority
Section 2 - Competence, tasks and powers
Article 55 –
Competence
Article 56 –
Competence of the lead supervisory authority
Article 57 –
Tasks
Article 58 –
Powers
Article 59 –
Activity reports
Chapter VII – Cooperation and consistency
Section 1 – Cooperation
Article 60 –
Cooperation between the lead supervisory authority and the other supervisory authorities concerned
Article 61 –
Mutual assistance
Article 62 –
Joint operations of supervisory authorities
Section 2 - Consistency
Article 63 –
Consistency mechanism
Article 64 –
Opinion of the Board
Article 65 –
Dispute resolution by the Board
Article 66 –
Urgency procedure
Article 67 –
Exchange of information
Section 3 - European data protection board
Article 68 –
European Data Protection Board
Article 69 –
Independence
Article 70 –
Tasks of the Board
Article 71 –
Reports
Article 72 –
Procedure
Article 73 –
Chair
Article 74 –
Tasks of the Chair
Article 75 –
Secretariat
Article 76 –
Confidentiality
Chapter VIII – Remedies, liability and penalties
Article 77 –
Right to lodge a complaint with a supervisory authority
Article 78 –
Right to an effective judicial remedy against a supervisory authority
Article 79 –
Right to an effective judicial remedy against a controller or processor
Article 80 –
Representation of data subjects
Article 81 –
Suspension of proceedings
Article 82 –
Right to compensation and liability
Article 83 –
General conditions for imposing administrative fines
Article 84 –
Penalties
Chapter IX – Provisions relating to specific processing situations
Article 85 –
Processing and freedom of expression and information
Article 86 –
Processing and public access to official documents
Article 87 –
Processing of the national identification number
Article 88 –
Processing in the context of employment
Article 89 –
Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes
Article 90 –
Obligations of secrecy
Article 91 –
Existing data protection rules of churches and religious associations
Chapter X – Delegated acts and implementing acts
Article 92 -
Exercise of the delegation
Article 93 -
Committee procedure
Chapter XI – Final provisions
Article 94 –
Repeal of Directive 95/46/EC
Article 95 –
Relationship with Directive 2002/58/EC
Article 96 –
Relationship with previously concluded Agreements
Article 97 –
Commission reports
Article 98 –
Review of other Union legal acts on data protection
Article 99 –
Entry into force and application
top
Protect your
business
this winter