With data becoming the new cyber currency and data-gathering activities accelerating, companies are expected to demonstrate a commitment to accountability, lawfulness, transparency, and data protection. The rising tide of regulatory compliance and expansion of data across the extended enterprise requires organizations to re-engineer their business practices, redesign their data privacy policies and practices, and rearchitect their applications and backend infrastructure.
CohnReznick takes a strategic approach to helping organizations implement a comprehensive data privacy program. Using a proven data privacy framework, we help organizations establish an effective governance structure, improve policies and regulatory awareness, enhance data management practices, and devise a robust privacy strategy and roadmap. A holistic privacy management program can give organizations a differentiating, competitive advantage.
Policy & regulation awareness
CohnReznick helps organizations assess the validity of the mechanisms and resources in place to manage privacy within the organization. We do this by helping identify applicable laws, regulations, and gaps.
CohnReznick helps companies with the complete data governance lifecycle by conducting a comprehensive and accurate inventory of its data assets with appropriate classification, determining the different levels of access, implementing protection mechanisms, documenting retention requirements, and establishing secure disposal practices of the data and the assets across the organization’s environment.
Privacy strategy architecture and development
We help design an applicable privacy roadmap tailored to the company’s ecosystem to make certain the organization’s privacy strategy allows the company to continuously measure and improve operations and ensure continued adherence to changing privacy policies. It is imperative that the privacy strategy and architecture are well-defined and documented, and that policies, standards, and procedures are well-documented and communicated.
CohnReznick helps companies develop privacy policies and procedures in alignment with privacy laws and regulations.
Many principles affect the operationalizing of a comprehensive privacy program. CohnReznick helps companies monitor compliance according to internal and third-party privacy policies. We help put a process in place for how to respond to requests from individuals (rights of “to be informed,” “access,” “rectification,” “erasure,” “stop processing,” and “data portability”) and conduct privacy awareness campaigns and training.
We help organizations ensure that privacy requirements are embedded in the organization’s information security policies and procedures, and that there is a process in place to respond to privacy-related data breaches.
Our privacy lifecycle framework helps companies develop their privacy programs through six strategic phases.
Select a stage to learn more.
GovernanceEstablish the overarching organizational roles and responsibilities to help ensure the appropriate governance is in place to manage privacy within the organization.
Policy and regulation awarenessEnsure the organization understands and plans to meet applicable laws, regulations, and other requirements related to privacy.
Data managementEnsure that the company has a complete and accurate inventory of data assets, that it grants access to personal data only to authorized people, that the data is used, ethically, only for the purposes in which it has been collected, and that the data is secure.
Strategy and architectureDefine and document privacy strategy, solutions architecture, and roadmap. The policies, standards, and procedures should also be defined, documented, published, and maintained.
Prioritize and implementImplement the privacy roadmap, solutions architecture, policies, standards, and procedures in a timely manner within organizational, technical, resource, and budgetary constraints.
OperationsRespond to privacy-related data breaches and monitor compliance with internal and third-party privacy policies while also responding to requests from individuals (rights of “to be informed,” “access,” “rectification,” “forgotten,” “stop processing,” and “data portability”).
Continuous improvementContinuously measure and improve privacy operations to help ensure continued adherence to changing privacy requirements.
InsightSolarWinds breach underscores the need for monitoring third parties’ securityBhavesh Vadhani, Deborah NitkaThe malware attack on software provider SolarWinds shows that companies must understand their supply-chain risks – and their own business environment. Learn more.
InsightUsing cybersecurity lessons learned from COVID-19 to advance your remote-work programBhavesh Vadhani, Ali Khraibani, Kiran BhujleRead about steps to take with regard to training, frameworks, protecting against phishing, and more amid the extra security challenges brought by the pandemic.
InsightStart preparing now to earn points on GSA’s Polaris contract opportunityJeff Shapiro, Bhavesh VadhaniLearn what self-assessments, certifications, and other potential requirements to consider now for this upcoming IT services government contracting opportunity.
InsightDigital by Design - A CohnReznick Advisory podcastBusiness leaders need strategies that address current and future changes, support remote work, and enable business continuity. Learn more in our Episode 3.