Services

The services you need before, during and after a privacy incident involving personal information.

The Digital Circle facilitates your organization's compliance to Bill 25 and the implementation of a comprehensive strategy to minimize your data protection risks

Prevention and compliance

Before

Privacy incident prevention training

Assessment & Diagnosis | Lunch & Learn | Training Workshops

Strategic communication and crisis management

Development of a contingency communication plan | Preparation of spokespersons

Personal data management

Complete mapping of digital information assets | Discovery and mapping of sensitive and personal data | Pre-backup mapping

Information Technology

Assist in the implementation of IT security tools and practices | Provide full IT outsourcing services

Cyber investigations and penetration tests

Intrusion tests | Strategic / tactical monitoring of hackers' tools and objectives | Meetings with white hats

Legal Services and Bill 25 Compliance

General compliance audit | Validation of your security protocols | Review of your contracts (HR, suppliers, cyber insurance, etc.) | Basic training (privacy rights, cyber security, privacy officer, etc.)

Reacting to an incident

During

Fraud prevention and cybersecurity training

Communicate in a simple way what is happening to the teams

Reputation management and crisis communication

Media crisis management (press relations) | Communication with employees and partners | Advice to management

Personal data management

Targeted mapping to identify the personal data affected during a security event

Information Technology

Assist in blocking and terminating a cybersecurity incident

Legal Services and Bill 25 Compliance

Response to privacy incidents (data theft or compromise, cyber breach, etc.) with legal counsel to support the crisis team

Restarting on the right foot

After

Fraud prevention and cyber security training

Post-mortem & Diagnostic | Lunch & Learn | Training Workshops

Reputation management and crisis communication

Integrated communication strategy to restore trust in the organization

Personal data management

Mapping of updated data for a remediation plan or compliance initiative

Information Technology

Assist in the recovery of activities and the restoration of data | Assist in the post mortem in order to put in place mitigation tools or procedures

Cyber investigations and penetration tests

Investigating employees or individuals suspected of attacks | Tracing the path of a cryptocurrency payment

Legal Services and Bill 25 Compliance

Review of the response plan, protection mechanisms and governance rules in place to ensure a better resilience of the company in case of an incident involving the compromise of personal information

Legal services and
compliance with Act 64

Reputation management and crisis communication

Information Technology

Cyberinvestigations and penetration tests

Personal data management

Fraud prevention and
cybersecurity training