We have collected the most frequently asked questions regarding PrivacyPerfect.
Our privacy solution enables your organisation to enter and assess relevant privacy records, including processing activities, assessments, data breaches, and data subject requests, and ensures the proper handling of personal data in your organisation.
At the moment, we offer discounts to public organisations. We are also happy to provide a discount in terms of advance payment or in case of a subscription of more than one year.
Please get in touch for further information.
Each new user in PrivacyPerfect receives an account activation e-mail. By clicking the Get Started button, you go to a web page on which you are asked to provide your first name, your last name and a password.
Enter the password twice. A password strength indicator provides information on how safe the password is. Once you have entered and confirmed this information, you can log into the system by providing your user name (equal to your e-mail address) and the password you have chosen.
You can login through the URL of your particular PrivacyPerfect tenant: https://prefix.privacyperfect.
On the login page, please click the I forgot my password button and enter your user email address. You will receive an email with instructions on how to reset your password.
Add all the processors and subprocessors in the Processor field. Use drag and drop to move the subprocessor of choice to the right under the main processor.
You probably assigned the record a status as Provisional or Requested. This means a privacy officer has to approve or reject it. Once that is done, you can edit it again.
You may check the following steps:
In case you require assistance please do reach out at firstname.lastname@example.org.
PrivacyPerfect is based on ‘building blocks’ such as personal data items and data sources. These are shared across your tenant in order to keep data aligned. The same is not valid for privacy records; these are only shared following specific rules depending on organisation hierarchy and user roles.