Archives: Resource Centers
Often when organizations are expanding rapidly, they do not give sufficient and necessary focus on information security aspects and guidelines, specifically IP protection. The focus has always been on BAU, market growth and business expansions. However, the security of an enterprise’s IP assets is increasingly important in today’s world of cyber threats and data leaks. This is especially critical for manufacturing and healthcare enterprises, as IP protection is the crux of its business….
Offerings
- CCPA Compliance Gap Assessment
-
AS-IS Review
- Review of current policies & procedures on PI data privacy and security
- Review of data flow diagram and data register (if any)
- Review of sample contracts with third party data processors or service providers
PII Data Discovery & Data flow assessment
- 1:1 meeting with key stakeholders
- Data gathering workshop with cross functional team
- Discover PII across enterprise and processes governing the usage and management of the PII data
- Data flow diagrams and issue identification
Reporting
- Detailed report on organization CCPA Compliance current state & remediation steps
- High level roadmap and CCPA awareness among stakeholders
- Privacy risk report
- PI Data Map
Staff Training
- CCPA Awareness Training for customer-facing staff members
- Review of current policies & procedures on PI data privacy and security
- Gap Remediation
-
Guide & Assist in Policies and Procedures and Design/Re-alignment
- Data Protection Policies and procedures
- Data Protection Impact Assessment
- Data collection procedures
- PII Data processing procedures
- Data Usage procedures
- Data Subject Request processing procedures
- Complaints procedures
- Internal Auditing procedures
- Breach Notification policy and procedures
- Privacy and consent notices
- Training and Awareness
Technical Remediation
- Implement Privacy by Design principles
- Design & Implement Data Protection Solutions –
- Data Discovery & Classification
- Data Loss Prevention (Endpoint, Network, Cloud, Email)
- Data Masking & Encryption
Privacy Officer as a Service
- Policy & Procedures Review
- Audit & Assessment
- Data Security Management
- Data Rights Management
- Breach Management
- Training & Awareness
- Ongoing Management Services
-
- Policy and process review
- Data breach management
- Data inventory management
- Consumer right request management
- CCPA compliance periodic audits and assessment
- Periodic training & awareness
- Analytics driven compliance management