Welcome to KPMG Web Application Suite for Privacy, a smart and proficient platform for performing data and privacy compliance assessments.
Introducing KPMG Privacy Compliance Suite
KPMG Web Application Suite for Privacy has the following modules:
How can we help?
KPMG Web Application Suite for Privacy is the privacy assessment tool, built by KPMG in India to make privacy assessments efficient.
- The web-based interface enables access through a URL, eliminating the need for software download.
- The tool assigns roles with specific privileges, ensuring only relevant data is visible to each role, improving security control.
- The tool has an easy-to-use UI/UX and follows a top-down approach to create a relationship between every functionality.
- The tool provides templates to eliminate the tedious task of creating multiple excel sheets, reducing effort and providing efficient templates for different organisations.

KPMG in India’s privacy experience in privacy compliance
Key potential benefits of using KPMG Web Application Suite for Privacy:
The principles behind our tool
Security Features

- System functionalities are configured with role-based access.
- Roles can be configured to modify the underlying functionalities, by the Admin.

Application access is protected with multiple secured layers.
- Application configured with SSL certificate.
- Application Gateway validate all requests and allow valid ones only.
- Users access the application via secured layer.
- Implemented 2 factor authentication for validating the user.

- Audit logs for all transactions such as assessments and issues.
- Audit logs can be retrieved based on search criteria.

Data on Transit - All data will be encrypted and transfered over HTTPS protocol.
Data at Rest - Sensitive data including passwords are encrypted and stored in database.

- Server/Infrastructure hardening is being done as per Microsoft best practices.
- Vulnerability assessment and penetration testing is performed for all releases and annually.

- System doesn't request/capture any PII data.
- Azure backup & recovery services are enabled.
Solution Uniqueness
- Strategic
- Tactical