preeco | data protection
GDPR-compliant data protection management for professional documentation and process control. Manage processing activities, data subject requests, data breaches and TOMs centrally. Multi-tenant and audit-proof.
Trusted by these companies – and many more
Processing Activities and Systems
Create and manage your record of processing activities in accordance with Art. 30 GDPR. All systems, information obligations and processing activities documented centrally.
Processing Activities
Complete documentation in accordance with Art. 30 GDPR. Structured form with legal bases, data categories, recipient details and deletion periods.
Processing Activities on Behalf
Recording and documentation of processing activities carried out on behalf of third parties. Separate overview for clear separation.
Data Processing Systems
Central management of all deployed systems with provider details, data categories and TOM links. Display of assigned processing activities.
Information Obligations
Documentation of information obligations under Art. 13 and 14 GDPR. Automatic revisioning and display of relationships to other documents.
Security Measures and Policies
Manage policies and technical as well as organizational measures centrally. Link TOMs directly with processing activities and contracts.
Policies
Central storage and management of all relevant policies. Linking with other documents and complete activity log for full traceability.
Technical and Organizational Measures
Documentation and versioning of TOMs with automatic revisioning. Linking with processing activities and contracts – always audit-ready.
Contract Management
Manage data processing agreements, consent declarations and joint controller agreements – structured and legally compliant.
Data Processing Agreements
Central management of all DPAs in accordance with Art. 28 GDPR. Templates with all legally required information. Status tracking, deadline management and automatic revisioning.
Consent Declarations
Creation and documentation of consent declarations. Revision-proof storage of all versions with complete activity log.
Joint Controllership
Documentation of joint controller agreements under Art. 26 GDPR. Linking with affected processing activities.
Training and Qualification
Plan, conduct and document data protection training for your employees. Training participation is automatically tracked and documented.
Training
Creation and management of data protection training courses. Revision-proof documentation of training content, results and participation.
Training Participation
Recording and documentation of all training participation. Overview of the training status of all employees at a glance.
Training Templates
Pre-built training templates as a starting point. Customizable to your organization-specific requirements and ready to use immediately.
Data Protection Deletion Concept
Create and manage deletion concepts for all processing activities. Define deletion periods and document compliance in a revision-proof manner.
Deletion Concepts
Structured creation and management of deletion concepts. Linking with processing activities and data processing systems. Automatic revisioning and complete documentation of all changes.
Subject Requests and Incidents
Process data subject requests on time and document data breaches in a structured manner. Deadlines are automatically monitored.
Data Subject Requests
Efficient processing of access requests, deletion requests and other data subject rights under Art. 15–22 GDPR. Respond via email directly from the system.
Data Breaches
Structured documentation of data breaches including notification obligations under Art. 33 GDPR, measures and graphical risk mapping.
Audits and Audit Catalogs
Plan, conduct and document data protection audits in a structured manner. Use pre-built catalogs or create your own questionnaires.
Audit Catalogs
Pre-built and individually customizable questionnaires as a basis for your audits. Structured, reusable and deployable across tenants.
Audits
Structured execution and revision-proof documentation of data protection audits. Results are traceable at all times and exportable.
Risk Analysis and Impact Assessments
Assess risks systematically and conduct data protection impact assessments in accordance with Art. 35 GDPR in a guided and structured manner.
Data Protection Impact Assessments
Structured execution of DPIAs under Art. 35 GDPR. Guided process covering all legal requirements. Automatic revisioning of all approved documents.
Risk Analyses
Structured documentation of risks with graphical risk mapping. Recording of risk mitigation measures with responsible persons and deadlines.
Privacy Policies
Create and maintain privacy policies and notices for your websites. The integrated editor and over 1,200 text modules significantly accelerate the creation process.
Privacy Policies
Integrated editor with automatically numbered sections. Publication via direct link to the current revision or embedding in the website.
AI Regulation
Review the use of AI systems for compliance with the EU AI Act. Document technical and organizational measures for AI applications.
AI Compliance Reviews
Systematic review of deployed AI systems against the requirements of the EU AI Act. Structured form with all relevant checkpoints.
AI Technical and Organizational Measures
Documentation of TOMs specifically for AI applications. Linking with affected systems and processing activities. Automatic revisioning.
Reporting and Activities
Create comprehensive status reports and keep track of all activities. Complete documentation of all changes for maximum transparency.
Activities
Automatic log of all document changes. Full traceability with timestamp, user and action performed – for audits and compliance evidence.
Reports
Status reports with details on all documents and automatically generated table of contents. Process files for individual processing activities can be created.
Collaboration and Task Management
Manage tasks, checklists, files and messages centrally in one place. All participants keep an overview – thanks to the dashboard and follow-ups.
Tasks
Create and assign tasks directly within documents. The dashboard shows all open tasks at a glance. Email notifications ensure timely action.
Checklists
Multiple-choice checklists for quality assurance. Use template checklists or create your own. Results exportable as PDF or DOCX.
File Storage
Central upload and structured storage of documents. Tags and nestable folders simplify organization. Files optionally shareable via public URL.
Messages
Internal communication directly in the system. Attach files, email notifications for new messages. Complete tracking of all communication.
Surveys
Create your own surveys with various question types. Evaluation and download as PDF or DOCX. Usable independently or linked to documents.
Follow-ups
Scheduled reminders for all due tasks. Observers are automatically notified. No deadline is missed.
More Highlights
In addition to the core features, preeco | data protection offers a range of additional features that noticeably simplify your daily data protection work – from automated text support and embeddable forms to direct publication of legally relevant content.
Text Modules
Over 1,200 relevant, legally reviewed text modules included. Create, maintain and share your own modules for all organizations or selectively.
Form Widgets
Configurable web forms for website or intranet – for data subject requests, data breach reports and more. Easy to embed via HTML snippet, entries are captured directly in the system.
Publication Features
Publish information obligations and privacy policies directly from the system – via direct link to the current revision or embedded on the website. Always up to date, always revision-proof.
Success Story
fischerwerke relies on preeco | data protection
Choose Your Hosting Option
Flexible, secure and tailored to your needs — choose the right hosting solution.
Cloud Hosting
Standard multi-tenant solution with fast setup. Ideal for getting started right away.
Learn morePrivate Cloud
Dedicated instance with custom domain and SSO integration. For companies with advanced requirements.
Learn moreOn-Premises
Installation in the customer's own data center. Maximum control and data sovereignty.
Learn moreCloud and Private Cloud options are hosted in ISO 27001-certified data centers in Germany.
Data Protection Glossary
Key data protection and GDPR terms — explained clearly.
The obligation of the controller to not only comply with all GDPR principles, but to be able to actively demonstrate that compliance — Art. 5(2) GDPR.
A report submitted without disclosing the reporter's identity, so that neither the reporting channel nor the affected organisation can identify the
A systematic, independent examination to determine whether processes and measures comply with defined requirements.
A comprehensive information security framework developed by Germany's Federal Office for Information Security (BSI) for systematic IT protection.
A management process that ensures an organization can continue delivering critical services during and after disruptive incidents.
The total amount of greenhouse gas emissions caused directly and indirectly, often broken down into Scope 1, 2, and 3.
A 12-step information security model designed as an accessible entry point for smaller organizations, particularly municipalities and SMEs.
A systematic approach to ensuring that an organisation adheres to legal, regulatory, and internal requirements.
A freely given, specific, informed, and unambiguous indication of a data subject's wishes, as required by Art. 7 GDPR.
The EU directive 2022/2464 that introduces expanded sustainability reporting requirements for companies above certain thresholds.
A breach of security leading to the accidental or unlawful destruction, loss, alteration, or unauthorised disclosure of personal data, reportable to
A systematic plan for the timely deletion of personal data once the purpose for which it was collected has ceased to apply, as required by Art. 17
A contractual arrangement required by Art. 28 GDPR whenever a service provider processes personal data on behalf of a controller.
The totality of measures taken to comply with data protection legal requirements, in particular the GDPR.
A structured risk analysis required by Art. 35 GDPR before processing activities that are likely to result in a high risk to the rights of data
The person designated under Art. 37 GDPR to oversee data protection compliance within an organisation.
The rights of natural persons to access, rectify, erase, restrict, port, and object to the processing of their personal data under Art. 15–21 GDPR.
EU Regulation 2022/2554 establishing ICT risk management, incident reporting, and resilience testing requirements for the financial sector.
The analysis of both how sustainability topics affect the company and how the company's activities affect the environment and society.
The framework for evaluating companies based on environmental, social, and governance criteria.
The standards developed by EFRAG that CSRD-obligated companies must use to prepare their sustainability reports.
The EU classification system for defining environmentally sustainable economic activities.
Directive (EU) 2019/1937 on the protection of persons who report breaches of Union law, which all EU member states were required to transpose by 17
The German law on human rights and environmental due diligence obligations in global supply chains.
The integrated approach to managing corporate governance, risk management, and compliance adherence.
The world's most widely used sustainability reporting framework, developed by the Global Reporting Initiative.
The designated function that organisations with 50 or more employees must establish under the HinSchG to receive and handle reports of wrongdoing.
A systematic framework of policies, processes, and controls for managing an organization's information security risks.
The international standard specifying requirements for establishing, implementing, maintaining, and continually improving an ISMS.
Exists when two or more controllers jointly determine the purposes and means of processing personal data, as defined in Art. 26 GDPR.
The ability of software to manage multiple legally separate organisations (tenants) within a single system with strict data separation.
EU Directive 2022/2555 strengthening cybersecurity requirements for essential and important entities across the European Union.
The process of determining whether an organization qualifies as an essential or important entity under the NIS 2 Directive.
The obligation of affected entities to report significant security incidents to the competent authority within 24 hours of detection.
An external, impartial trusted intermediary – often a lawyer – who serves as a confidential point of contact for whistleblowers and is bound by strict
Any information relating to an identified or identifiable natural person, as defined in Art. 4(1) GDPR.
The legal prohibition on taking adverse measures – such as dismissal or demotion – against whistleblowers as a consequence of their report.
The mandatory register of all processing activities that every controller must maintain under Art. 30 GDPR.
The systematic process of identifying, analyzing, and evaluating risks to an organization's information security.
A cloud-based delivery model in which software is accessed and used over the internet as a service.
The classification of greenhouse gas emissions into direct (Scope 1), energy-related indirect (Scope 2), and other indirect (Scope 3).
An event that compromises or threatens the confidentiality, integrity, or availability of information or information systems.
A mandatory ISO 27001 document that lists all Annex A controls, states which are applicable, and explains why others are excluded.
The mandatory feedback that organisations must provide to a whistleblower within three months of acknowledging their report, informing them of any
Security safeguards that controllers and processors must implement under Art. 32 GDPR to ensure a level of protection appropriate to the risk.
The transfer of personal data to countries outside the EEA, which requires specific safeguards under Art. 44–49 GDPR.
The German automotive industry's information security assessment catalogue, audited through the TISAX scheme managed by the ENX Association.
The German law protecting whistleblowers, transposing EU Whistleblower Directive 2019/1937 into national law.
A technical system enabling the secure and, where applicable, anonymous submission of reports about legal violations.
The act of reporting misconduct, legal violations, or unethical behaviour within an organisation to a responsible authority.
FAQ
Frequently Asked Questions
You will receive your login credentials by email after registration. Go to the login page and enter your email address and password. If you have any issues, contact our support at support@preeco.de or +49 731 280 651 0.
Navigate to the "Processing Activities" module and click "New Processing Activity". The wizard guides you step by step through all required fields. Text modules and templates significantly simplify documentation. A detailed guide can be found in our user manual.
Yes, preeco | data protection is multi-tenant capable. As an external data protection officer, you can manage multiple tenants centrally in one system. Each tenant has its own settings and documents. Switching between tenants is done with a single click. More information can be found in the user manual in the "Tenant Management" section.
Data subject requests can be recorded and processed via the "Data Subject Requests" module. The system automatically monitors statutory deadlines and reminds you in time. The processing workflow is fully documented. Response templates speed up the handling process.
The "Online Training" module enables the delivery of online training courses directly in preeco | data protection. Training courses consist of learning units (image or video content) and exam questions (multiple-choice, single-choice) with a freely adjustable minimum score for certification. You can use existing templates or create your own training courses.
Included training templates cover GDPR training for companies and public administration, AI competency training, and IT security awareness for employees, among others. Participants can be added manually or imported via XLSX. After passing the exam, they receive a certificate of participation as PDF. You can view the training progress of all participants at any time in the tabular overview.