Privacy

Staying abreast of global, federal and state privacy legislation while you are trying to run a business is challenging. Understanding both the privacy regulations and the technical side of cybersecurity, we help you build the culture and implement policies and processes needed to protect your client’s information and gain their trust. Helping clients understand their data’s value and properly manage its lifecycle is our mission. Working together we can evaluate your data and implement appropriate management strategies adding value for both your clients and your business. 

 

Service Offerings

InforationPrivaacyIcon.JPG

Data Privacy Officer

Independent Officer overseeing your organization's data protection and lifecycle strategies and managing their implementation to ensure compliance with industry and regulatory requirements. This service is provide as a fractional service on a retainer basis.

 
DPIA2.JPG

Data Protection Impact assessment (DPIA)

Identify and minimize risk of data processing for new and existing products and processes while ensuring and demonstrating compliance with regulatory requirements.

 
DataAwarenessTraining2.JPG

data protection awareness training

Tailored data protection awareness training for your business. Review concepts of data privacy vs. data security. Create awareness of the data lifecycle, sensitive information and employee responsibilities related to company policies including acceptable use, data breach response, clean desk, password and email.

 
DataLifeCycle.JPG

Data inventory, mapping and lifecycle

Understanding and documenting what data you have, where the data is stored and how and when the data is accessed, shared, reviewed, updated and deleted are essential information management components. Knowing and detailing the lifecycle of your data is fundamental to maintaining and securing it.

 
Policy.JPG

Notice and policy review, draft and implementation

Review or draft policies considering legal, regulatory and business requirements as well as System Security Plan. Identify gaps in policies with process owners and implement necessary changes. Ex. Privacy Policy, Cookie Notice, Data Breach Policy, Vendor Management Policy, Consent Acquisition and Information Security Policy.

 

Privacy Blog Posts