• General Data Protection Regulation (GDPR) compliance assessment

  • Analysis of the safety policy

  • Control over the company in terms of compliance to procedures applicable by law (e.g. related to personal data protection)

  • Post-control reports with recommendations for implementing amendments to procedures

  • Penetration tests over IT systems and physical safety

  • Tests that verify the software’s legality