Become a LOCS:23 Approved Solution and demonstrate the ability to assist organisations on their journey to LOCS:23 compliance.
​
Clients may wish simply to apply the LOCS:23 standard across their organisation to give themselves peace of mind knowing they comply with UK GDPR or they may wish to achieve official certification through an independent UKAS approved Certification Body.
Approved Solution Requirements
Approved Solutions will have been verified by the LOCS:23 Scheme Owners as demonstrating the following:
1 Must have proven knowledge of LOCS:23 standard.
2 Must assist with meeting one or more of the LOCS:23 standard requirements.
​
​
​
DISCLAIMER
​
We do not claim that these solutions are themselves UK GDPR compliant, nor do we assess that. We do analyse their ability to assist an organisation with meeting one or more of the LOCS:23 standard requirements and are in our view the leaders in their field.
​
​
Approved Solutions
Privacy Management Software
LOCS:23 controls supported
​
LOCS:23:A8 - Transparency & Communication
LOCS:23:A18 - DPIA
LOCS:23:A19 - ROPA
LOCS:23:A21 - Personal Data Breach Management
LOCS:23:A22 - Data Subject Rights Management
LOCS:23:A26 - Supplier Register
​
​
Secure Communications Software
LOCS:23 controls supported
​
LOCS:23:A8 - Transparency & Communication
LOCS:23:A9 – Right to Information
LOCS:23:A10– Right of access
LOCS:23:A17 – Default Privacy
LOCS:23:A21 - Personal Data Breach Management
LOCS:23:A22 - Data Subject Rights Management
LOCS:23:A23– Technical Security Measures
LOCS:23:A24 – Organisational Security Measures
​
​
Solution Crosswalk to LOCS:23 Document
​
Data Protection Training provider
LOCS:23 controls supported
​
LOCS:23:C17 - Data Protection by Design & Default
LOCS:23:C25 - Data Protection Training
​
​
​
Solution Crosswalk to LOCS:23 Document
​
​
'Third-Party Cyber Risk Management Platform
LOCS:23 controls supported
​
LOCS:23:C5 – Data Policy Document
LOCS:23:C6 – BC Policy Document
LOCS:23:C7– R&D Policy Document
LOCS:23:C17 – Default Privacy
LOCS:23:C18 – DPIA
LOCS:23:C20 – Lawful Processing
LOCS:23:C21 – Personal Data Breach Management
LOCS:23:C23 – Technical Security Measures
LOCS:23:C24 – Organisational Security Measures
LOCS:23:C25 – Training
LOCS:23:C26 - Supplier Register
LOCS:23:C27 – Supplier Status
LOCS:23:C28 – Supplier Risk Assessment
LOCS:23:C29 – C-P Relationships
LOCS:23:C30 – C-C Data Sharing
LOCS:23:C31 – Cross Border Data Transfer
LOCS:23:C33 – Internal Audit Process
LOCS:23:C34 – Internal Audit Review
​
​
​
​