We have prepared these resources to help you better understand our value proposition and our privacy, compliance and cybersecurity services.

Our service dossiers

More information about our services can be found on this website.

Compare us

No, we are not the same as the rest and yes, we can prove it. Take a look at the tables and enjoy the difference.

Global privacy

Know the law, country by country. We offer you a summary map of data protection in the world.

Do you need an EIPD or DPO?

We help you to find out by filling out a single questionnaire

Frequently Asked Questions

Find answers to the most common questions from our community.

Social networks

You can find us and follow us on the following RSS.

Comparative table

Legal controls on a Compliance Web site.

ControlsLEX4 WebCookiefirstCookiebotOneTrust
1- Information in native language. The user must be able to choose his or her language.
2- Laws adjusted to the user’s residence (Country and State)
3- Child protection. Dynamic access age protecting minors.
4- Information and consent stored in Blockchain.
5- Tracking blocking and marketing cookies excluded by default.
6- The user can obtain consent of his rights based on ISO 29184.
7- Information in a natural, transparent and comprehensible language.
8- The CCPA or the prohibition of sale or transfer of data excluded by default.
9- Blocking Javascript Trackers.

Do you have any doubts?
Compare us with the competition













PDF Download

To learn more about the solutions we offer, you can download these PDFS to read on your PC.

Interactive map

Learn about privacy laws around the world. We simplify knowledge.

Frequently Asked Questions

What is cybersecurity? How important is it?

Cybersecurity is a preventive defense strategy that uses techniques and tools to avoid, prevent and protect against digital cyberattacks such as ransomware, phishing or hacks. A cybersecure website will save you from unpleasant surprises.

What is a cybersecurity audit? How is it done?

A cybersecurity audit (web pages) is the use of IT tools, some of them from OSINT sources, to assess risks, determining compliance and non-compliance with the rules that standardize security. we perform pentesting, malicious traffic analysis, identification of backdoors and malicious code. The objective is to determine whether the website and its accesses are secure.

What is lexprogram? What are your values?

We are a firm of lawyers and programmers whose mission is to enforce the law, ensure privacy and cybersecurity for users and give back the power of data. Technological disruption and excellence to provide the best service are in our DNA.

Can I work in cybersecurity?

If you are a cybersecurity expert and you are looking for a job, contact us to see the needs and offers we have in that field.

What is GDPR Cookie compliance?

E-privacy obliges to inform and obtain the prior, transparent, unique, and explicit consent of users to use cookies and trackers that process personal data (such as IP addresses, identifiers, search history, etc.), etc.

What should the cookie notice look like?

The cookie notice should be tailored to each visiting user and be clear and concise, being as easy to accept as to reject. Our product LEX 4Web covers you in this regard.

What is data privacy?

Data privacy refers to all that private data of an individual, which is personal and intimate. On the Internet, the user’s privacy is violated and data is used unlawfully and passed on without the owner’s permission.

How to protect data privacy?

There are many ways to protect user data privacy. With our Consent Widget, the user is always in control of what happens to the private data he or she has voluntarily decided to disclose.

Social networks