Internal training
Assessment of the data processor's compliance with the GDPR regulations
Professionally prepared training on key issues related to conducting processor audits, which will equip participants with the skills to plan and execute the entire audit process.
About the training
An effective training for individuals looking to expand their knowledge in the field of personal data security and processor audits.
The training is conducted in the form of lectures and workshops, ensuring the effective application of new knowledge and skills to practical actions. We focus not only on providing theoretical knowledge but, most importantly, on delivering effective, practical methods and techniques, as well as valuable experiences and best practices. The training is one day long, and participants will receive a certificate of attendance upon completion. During the training, key issues related to conducting processor audits will be discussed. The materials and exercises carried out during the training will prepare participants to plan and execute the entire processor audit process.
Training objective
- The objective of the training is to acquire knowledge and competencies in the substantive and practical preparation of participants for conducting processor audits.
- Discussing the need for control over processors.
- Gaining practical tips on how to audit a processor.
- Identifying and discussing the legal foundations for conducting a processor audit.
- Improving skills in the practical application of processor audit procedures.
- Familiarizing with a wide range of post-audit actions.
- Discussing the data controller’s rights after identifying significant deficiencies during the processor audit.
- Discussing methods for selecting processors.
- Adapting audit checklists to the audited entities.
- The ability to apply measures appropriate to the irregularities revealed during the audit regarding personal data protection.
- Familiarizing with the principles and rules that facilitate cooperation with the audited entity.
Training recipients
The training is aimed at individuals responsible for information security in their organizations, who wish to adapt processes and security measures to the requirements of the GDPR, as well as current and future Data Protection Officers, internal auditors, and anyone interested in the topic of processor audits based on the currently applicable regulations.
Language of the training
The training is conducted in Polish.
It is also possible to organize the training in English.
Training methodology
- Achieving the proper training outcomes is possible thanks to selecting both the right topics and methods tailored to the specific needs of the participants and the issues covered in the training. Below are the methods and techniques we employ:
- LECTURE
We provide knowledge to participants based on dedicated teaching materials, such as multimedia presentations. This is the foundational part of the training, during which we introduce the topic, discuss key concepts, describe roles, processes, procedures, etc. - PRACTICAL EXAMPLES
As practitioners, we base our training program on real-life events presented for a specific problem. We help participants reach conclusions or solutions independently. Our training is highly focused on practice and the development of participants’ skills. - DISCUSSION
Participants express their opinions and share experiences. A well-structured discussion topic, due to the clash of at least two viewpoints, usually triggers strong emotional engagement. The discussion enables the development of a common solution or prepares arguments on a specific topic. - BRAINSTORMING
In a short time, we generate many ideas and solutions for specific problems and situations. We engage participants, stimulate thinking, and foster creativity. - EXERCISES
Practical tasks related to the subject of the training, such as creating a process or conducting a case study. This effectively complements the lecture and practical examples. - TESTS
We verify the participant’s level of knowledge and skills. We identify competency gaps and plan the educational process accordingly to enhance the participant’s skills. Depending on the nature of the training, this can be done using various tools, such as knowledge tests and performance assessments. - SIMULATIONS
They provide an excellent sample of reality in which participants actively engage and experience the consequences of their actions. - SUMMARY
After completing each topic, we summarize the discussed material. This is done by the trainer and allows participants to recall the most important issues related to the topic while providing them with the opportunity to verify their understanding of the material.
Trainer
The training is conducted by one of our trainers:
Weronika Stachowiak
A graduate of Geology at Adam Mickiewicz University in Poznań and Business Management with a specialization in risk analysis in projects at the Poznań School of Banking. In her many years of professional practice, she has provided advisory, analytical, and training services in the field of personal data protection and database management. She has extensive experience working with public municipal and educational institutions, as well as with specialized companies in the financial sector. At PBSG, she serves as a Consultant in the area of personal data protection, information security, and risk management.
Katarzyna Żuk
A graduate of the Faculty of Law at Adam Mickiewicz University in Poznań. She has over 10 years of experience in the commercial sector. She has provided advisory services in the ongoing operations of companies in civil and commercial matters. From a scientific perspective, she is interested in practical logic. She has completed numerous training courses in the creation, application, and theory of law, which she passionately applies in practice. At PBSG, she is responsible for supporting projects related to information security and personal data protection, as well as analyzing related documents.
Dedicated exclusively to your organization – this approach ensures comfort and freedom to thoroughly discuss relevant topics and situations specific to your company. We understand that every business is unique, so to effectively translate the knowledge gained into your organization, we tailor the presented examples to your specific needs and business context.
Training program
Day 1
9:00 - 16:00
- Welcome participants
- GDPR Processor Audit – Introduction and Basic Concepts
- Audit Specification
- Legal Status and Responsibilities of Entities Responsible for Personal Data Security
- Analysis of the Benefits and Challenges of Conducting an Audit
- Methodology and Principles for Conducting an Audit
- Lunch Break
- Who to Audit? Selection of the Processor
- Tips for Auditing the Processor
- Verification of Documentation
- Response to Violations and Irregularities in Personal Data Protection
- Post-Audit Actions in Practice
- Questions and Discussion
Training price
Step 1
REGISTRATION
As the first step, please complete the application form to express your interest in organizing dedicated training at your company.
Step 2
DATE
We will set the date and location of the training — tailored to your availability and individual expectations.
Step 3
PRICE
We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.
Step 4
TRAINING
We will deliver the dedicated training in accordance with the agreed terms.