Privacy 101: Steps to Establishing a Sustainable Privacy Program
1 hr | February 24, 2022 |11:00 AM | EST
There is no denying that privacy and data protection continue to go mainstream. International and domestic privacy laws are increasing in number, and a global pandemic has meant that countries and private corporations alike are collecting more sensitive data than ever before. On top of it all, consumer practices and expectations are evolving, requiring companies to safeguard information not only to meet regulatory requirements, but also to simply do the right thing. As a result, many companies are struggling to balance these new considerations with business goals and limited privacy budgets.
During this on-demand session, we will walk through the importance and timeliness of, and key considerations for, establishing a risk-based, sustainable privacy program that is pragmatic and flexible to adapt to evolving needs. Additionally, we will equip you with a three-step plan to implement and sustain a baseline privacy program that reduces risk, improves compliance, builds a privacy-aware culture, and meets your stakeholders’ expectations.
Three-Step Plan to Establish a Sustainable Privacy Program:
- Step 1: Identify sensitive data
- Step 2: Assess privacy risk
- Step 3: Implement privacy processes
Furthermore, to equip you with the tools you need to get your privacy program off the ground and ensure its success as you grow, CrossCountry Consulting is offering all attendees a free consultation to discuss your privacy program’s current and desired future states. Details on how to take advantage of this valuable offer are provided during this interactive, on-demand session.
Who is CrossCountry Consulting?
CrossCountry Consulting is a trusted business advisory firm that provides comprehensive solutions encompassing privacy, cybersecurity, technology, risk management, business transformation, and accounting. Our Privacy & Data Protection team specializes in privacy program design and implementation, data discovery and classification, and data protection technologies, with the ultimate goal of leveraging data as an asset while managing risks.
CIPT, CDPSE, OTCP, CIA, CISA
CIPP/US, CIPP/E, CIPM, FIP