Privacy
Staying abreast of global, federal and state privacy legislation while you are trying to run a business is challenging. Understanding both the privacy regulations and the technical side of cybersecurity, we help you build the culture and implement policies and processes needed to protect your client’s information and gain their trust. Helping clients understand their data’s value and properly manage its lifecycle is our mission. Working together we can evaluate your data and implement appropriate management strategies adding value for both your clients and your business.
Service Offerings
Data Privacy Officer
Independent Officer overseeing your organization's data protection and lifecycle strategies and managing their implementation to ensure compliance with industry and regulatory requirements. This service is provide as a fractional service on a retainer basis.
Data Protection Impact assessment (DPIA)
Identify and minimize risk of data processing for new and existing products and processes while ensuring and demonstrating compliance with regulatory requirements.
data protection awareness training
Tailored data protection awareness training for your business. Review concepts of data privacy vs. data security. Create awareness of the data lifecycle, sensitive information and employee responsibilities related to company policies including acceptable use, data breach response, clean desk, password and email.
Data inventory, mapping and lifecycle
Understanding and documenting what data you have, where the data is stored and how and when the data is accessed, shared, reviewed, updated and deleted are essential information management components. Knowing and detailing the lifecycle of your data is fundamental to maintaining and securing it.
Notice and policy review, draft and implementation
Review or draft policies considering legal, regulatory and business requirements as well as System Security Plan. Identify gaps in policies with process owners and implement necessary changes. Ex. Privacy Policy, Cookie Notice, Data Breach Policy, Vendor Management Policy, Consent Acquisition and Information Security Policy.
The document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.