Archives: Resource Centers
Cloud based services add to the complexities of managing traditional security & compliance risks. Identifying and addressing risks associated with moving your data, applications and services are not the only thing that an organization has to consider. An organization also needs to think about and plan for vendor related risks, legal, regulatory and contractual risks. This spectrum of risks continues to expand particularly when dealing with customers and vendors who are operating in…
Offerings
- CCPA Compliance Gap Assessment
-
AS-IS Review
- Review of current policies & procedures on PI data privacy and security
- Review of data flow diagram and data register (if any)
- Review of sample contracts with third party data processors or service providers
PII Data Discovery & Data flow assessment
- 1:1 meeting with key stakeholders
- Data gathering workshop with cross functional team
- Discover PII across enterprise and processes governing the usage and management of the PII data
- Data flow diagrams and issue identification
Reporting
- Detailed report on organization CCPA Compliance current state & remediation steps
- High level roadmap and CCPA awareness among stakeholders
- Privacy risk report
- PI Data Map
Staff Training
- CCPA Awareness Training for customer-facing staff members
- Review of current policies & procedures on PI data privacy and security
- Gap Remediation
-
Guide & Assist in Policies and Procedures and Design/Re-alignment
- Data Protection Policies and procedures
- Data Protection Impact Assessment
- Data collection procedures
- PII Data processing procedures
- Data Usage procedures
- Data Subject Request processing procedures
- Complaints procedures
- Internal Auditing procedures
- Breach Notification policy and procedures
- Privacy and consent notices
- Training and Awareness
Technical Remediation
- Implement Privacy by Design principles
- Design & Implement Data Protection Solutions –
- Data Discovery & Classification
- Data Loss Prevention (Endpoint, Network, Cloud, Email)
- Data Masking & Encryption
Privacy Officer as a Service
- Policy & Procedures Review
- Audit & Assessment
- Data Security Management
- Data Rights Management
- Breach Management
- Training & Awareness
- Ongoing Management Services
-
- Policy and process review
- Data breach management
- Data inventory management
- Consumer right request management
- CCPA compliance periodic audits and assessment
- Periodic training & awareness
- Analytics driven compliance management