Processor contracts with named clauses.
A controller must use processors that provide sufficient guarantees. The data processing agreement covers subject matter, duration, nature, purpose, data types and the controller's instructions.
Due diligence, contract clauses, ongoing monitoring and exit planning for the vendors that touch your data, your ICT or your operating model. GDPR Art. 28, NIS2 supply-chain, DORA Art. 28 to 30, LkSG.
One business day reply. Clear next steps and indicative pricing.
A controller must use processors that provide sufficient guarantees. The data processing agreement covers subject matter, duration, nature, purpose, data types and the controller's instructions.
Financial entities must register every ICT third-party arrangement, identify the ones supporting critical functions and assess concentration risk.
Essential and important entities must address supply-chain risks, including the security of supplier relationships and the protection of information shared with them.
Ongoing programme support: register maintenance, intake reviews, monitoring, board reporting.
Fixed-scope build for a new programme: register, tiering, DPAs, contract templates, monitoring playbook.
Independent audit of a specific vendor or vendor portfolio against contract, regulation and security baseline.
Vendor risk works when the intake, the register and the monitoring are one connected process. We define ownership, design the workflow, write the contract pack and run the monthly status. The register matches what the regulator asks for, and the contract pack matches what the legal team can sign.
Supervisors flag concentration on a handful of hyperscalers and core providers. Exit strategies and substitutability come into review.
Essential and important entities must address supplier risk in the risk-management measures. Audits now include supplier evidence.
LkSG already in force in Germany, CSDDD phased application from 2027 across the EU.
Yes if you are a financial entity under DORA scope. That covers banks, payment institutions, e-money institutions, investment firms, asset managers, insurers and crypto-asset service providers. The register applies to every ICT third-party arrangement, not only the critical ones.
Yes for second-line support. We run intake, register maintenance, monitoring and board reporting under a monthly retainer. The first-line accountability stays with the business owner of each vendor.
We build the transfer-impact assessment library, apply the 2021 SCCs, add supplementary measures where needed and track non-EU vendors in the register. Reattestation is annual or sooner if the destination country position changes.
We build the risk-analysis methodology, the supplier code, the preventive and remedial measures, and the annual report. CSDDD readiness is part of the same workstream where the entity is in scope.
Yes. A targeted vendor audit on a single critical provider takes 4 to 6 weeks. Output: a report, a finding list, a remediation tracker and a board-ready summary.
We negotiate. The most common cause is overreach on rights that the vendor cannot fulfil. We align the DPA to the realistic operating model and document the residual risk in the register.
Columns, criticality rubric, exit-strategy fields and supervisory reporting mapping.
Controller, processor and sub-processor templates with annex starter and SCC bridge.
70-question intake form, scoring rubric and reviewer notes for security and privacy.
GDPR programme, DPIA library and supervisory authority liaison.
Open practice →IKT risk framework, ISMS and supervisory readiness for financial entities.
Open practice →Compliance officer support, regulator filings and SREP preparation for financial firms.
Open practice →Send the brief. We respond with a scoped agenda for the first call.