A Guide to Data Subject Access Requests

To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...

Marriott Breach – Learn From One of the Largest Breaches in History

This Info-Tech briefing will provide a synopsis of what occurred and how organizations can leverage this data breach to expand their security program.

Data Retention Schedule Tool – GDPR

Use this tool to dynamically document all data that is retained by the organization, how long it will be stored, and other details.

Privacy Notice Template – External Facing

Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and...

Cookie Policy Template – External Facing

Use this external-facing template to customize a cookie policy that provides users with a clear and comprehensive understanding of what cookies are, how they are...

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Privacy Framework Tool

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...

Privacy Analysis by Business Unit Tool

A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Data Security Technical Report

Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us