<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity Archives - Perlman &amp; Perlman</title>
	<atom:link href="https://perlmanandperlman.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Providing Legal Counsel to the Philanthropic Sector for More Than Sixty Years</description>
	<lastBuildDate>Sat, 25 Feb 2023 15:11:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://perlmanandperlman.com/wp-content/uploads/2021/10/cropped-Perlman-amp-Perlman_avatar_1477336346-96x96-1-32x32.png</url>
	<title>cybersecurity Archives - Perlman &amp; Perlman</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Readiness &#8211; If it Ain’t Broke, You May Still Want to Fix It…</title>
		<link>https://perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Thu, 27 Jan 2022 19:21:06 +0000</pubDate>
				<category><![CDATA[Technology, Data Privacy & Cybersecurity]]></category>
		<category><![CDATA[cyber readiness]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data retention]]></category>
		<guid isPermaLink="false">https://perlmanandperlman.com/?p=9047</guid>

					<description><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to [&#8230;]</p>
<p>The post <a href="https://perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness &#8211; If it Ain’t Broke, You May Still Want to Fix It…</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to represent a pragmatic approach to “triaging” issues.  When it comes to cyber-security readiness, however, this approach is ill-advised.  Put another way, the fact that your organization has not experienced a security incident to date should not be rationale for maintaining the status quo.</p>
<p>Data breaches are the leading threat in today’s digital world, with a new cyberattack occurring approximately every 39 seconds. <strong>N</strong><strong>on-profit organizations are increasingly being targeted</strong> by cybercriminals, not only because of the wealth of data they possess, but because they simply do not take the same precautions nor employ the same resources as their for-profit counterparts.  In fact, small-to-medium-sized organizations are actually more likely to be targeted by hackers for that very reason.</p>
<p>The financial cost of managing a data breach is well documented.  A recent study estimated the average cost of a breech in 2021 at 4.24 million dollars, a 10% rise from 2019.  Although less tangible, the potential loss of trust of the nonprofit’s donors, volunteers and the community can be significant. Such a loss is not only difficult to restore, it can also affect fundraising activities, volunteer engagement, and partnerships with other organizations for years to come.</p>
<p>For organizations seeking to decrease their cybersecurity vulnerabilities, a good first step is to obtain a comprehensive understanding of the current risk environment. For example, what kind of data does your organization collect, store, share and transmit?  Where and how is the data being stored, and who has access to the data?  How does the organization transmit data? (Data transmission is often one of the most significant vulnerabilities; any time data is sent from one location to another, there is a risk of interception.) During the COVID-19 pandemic, the risk of insecure data transfer has increased as more and more individuals have begun accessing critical data from personal mobile devices or using personal digital storage solutions.  Assessing these weak points can be achieved through a data-privacy audit whereby information gathered is then used to strengthen the organization’s cyber-readiness.</p>
<p>Additionally, organizations should consider implementing the following measures:</p>
<p><strong><em>Implement (Or Update) Organization-Wide Cybersecurity Policies</em></strong><br />
The first step in ensuring the security of an organization’s data is to have consistent, documented cybersecurity policies in place for all employees to follow.</p>
<p><strong><em>Provide Ongoing Cybersecurity Training</em></strong><br />
Next, all individuals within the organization who have access to secure data should receive annual cybersecurity training.</p>
<p><strong><em>Focus Your Cybersecurity Efforts/Revaluate Third-Party Vendors</em></strong><br />
Focus on security controls that would be the most effective based on your specific needs and resources. And as many breaches occur from the actions/omissions of third-party vendors who store an organizations data, review the legal terms of all such agreements to make sure there are appropriate terms and conditions to protect your organization (<em>read</em> <em><a href="/are-you-protected-five-points-to-include-in-every-technology-agreement/">Are You Protected? Five Points to Include in Every Technology Agreement</a>).</em></p>
<p><strong><em>Create A Data Retention and Deletion Policy</em></strong><br />
Most organizations collect more data than they need, and hold the data longer than necessary or practical.  The more data your organization stores, the greater the liability if a breach occurs.  It is imperative that organizations adopt a policy that dictates the types of data to be stored, and when/how that data is deleted when no longer relevant.</p>
<p><strong><em>Prepare for the Unexpected</em></strong><br />
Every organization needs a plan for what to do in case of a data breach. An incident response can help organizations plan to comply with applicable laws and regulations, and launch a rapid and coordinated response that will mitigate the damaging consequences of a data breach.  On a side note, the recently enacted NY SHIELD Act requires organizations that collect information from NY residents to have both a Data Retention and Deletion policy as well as an Incident Response plan in place, among other requirements (<em>read</em> <em><a href="/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a>).</em></p>
<p>The post <a href="https://perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness &#8211; If it Ain’t Broke, You May Still Want to Fix It…</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2021 &#8211; A Very Private New Year &#8211;  Steps all Nonprofits Can Take</title>
		<link>https://perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 22:21:40 +0000</pubDate>
				<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Data Privacy & Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[New York SHIELD Act]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</guid>

					<description><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The [&#8230;]</p>
<p>The post <a href="https://perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 &#8211; A Very Private New Year &#8211;  Steps all Nonprofits Can Take</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The 2019 reporting year also saw a return to the pattern of the ever-increasing number of breaches and volume of records exposed.</p>
<p>As most organizations continue to have a significant portion of their workforce work remotely, 2020 will likely show a significant uptick in unauthorized access to personal information.  Additionally, the average cost for each lost or stolen record containing sensitive and confidential information increased by 4.8 percent year over year to $148. Such financial repercussions as well as the risk of incurring reputational harm that could follow unauthorized access of customer data, indicate that privacy and cyber security should be a top concern.</p>
<p>Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees, and it is incumbent upon them to safeguard that information. The fact is, that with each passing year, the number of data breaches grows, and the related financial cost and reputational harm along with it. Additionally, the regulatory landscape is becoming more complex, requiring organizations to comply with an increasing number of requirements or face penalties.</p>
<p>Due to the continued need to protect information, New York State enacted Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”) on March 21 of 2020.   This new law applies to any organization that receives or collects private information about New York residents through the Internet, and requires, among things that your organization.   The Act requires specific actions and imposes a variety of obligations, and significant fines may be levied for non-compliance.  Among other requirements, to meet the SHIELD Act requirements organizations must:</p>
<ol>
<li>conduct a risk assessment of its cybersecurity program;</li>
<li>properly vet all third-party service providers to ensure they can comply with the NY SHIELD Act, and include in its contracts specific provisions related to cybersecurity practices;</li>
<li>have policies and procedures related to the deletion and/ or disposal of data within a reasonable amount of time after it is no longer needed for business purposes;</li>
<li>develop and implement a written incident/data breach response plan so that you can comply swiftly and completely with the Acts reporting requirements (or face potentially harsh penalties); and</li>
<li>designate a “point person” to coordinate your data-security program to meet compliance.</li>
</ol>
<p>The good news is that conducting a privacy audit can significantly reduce potential “data incidents” and minimize the related risks.  It is also a big step to achieving SHIELD compliance.   A privacy audit is essentially a process to identify, across the organization (and chapters), the types of personal information collected, the ways in which it is protected, and with whom such information is shared.</p>
<p>The following risk assessment methodology is a good place to start.<br />
• <strong>Inventory </strong>Locate the places in the organization (and vendors operating on its behalf) that house/store Personally Identifying Information (“PII”), identifying both electronic files/databases and physical files<br />
• <strong>Safeguards</strong> Assess the safeguards in place – including the physical, administrative and technical controls – and whether they are adequate and reasonable considering the type of PII being stored (SSN vs. email address for example might have different levels of protection).<br />
• <strong>Gaps</strong> Determine the compliance gap – essentially the difference between that what it should be doing, and the organizations actual practices.<br />
• <strong>Risk Assessment </strong>For most organizations there will be a number of gaps. As a first step, for the PII held in various locations and with various vendors, assess the risk of non-compliance, determine the impact of non-compliance and likelihood of risk occurrence, and use this to help prioritize compliance efforts.<br />
• <strong>Remediation</strong> Depending upon the finding/conclusions in the previous steps, remediation should be a joint effort among various members of the organization to address and remedy any identified shortfalls/gaps.</p>
<p>As organizations look to identify material risks and implement processes and procedures to protect their data and hence their missions &#8211; data privacy and cyber security will no doubt continue to be a critical concern.  Now is the right time to conduct a privacy audit.</p>
<p>&nbsp;</p>
<p>The post <a href="https://perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 &#8211; A Very Private New Year &#8211;  Steps all Nonprofits Can Take</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>We Won’t Get Fooled Again &#8211; Blackbaud Data Breach</title>
		<link>https://perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 18:04:24 +0000</pubDate>
				<category><![CDATA[Contracts & Commercial Transactions]]></category>
		<category><![CDATA[Technology, Data Privacy & Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[vendor contract]]></category>
		<guid isPermaLink="false">https://perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</guid>

					<description><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or [&#8230;]</p>
<p>The post <a href="https://perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again &#8211; Blackbaud Data Breach</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or not your organization was affected, the recent Blackbaud breach &#8211; and their very-delayed and by many accounts lackluster response &#8211; is a wake-up call for organizations to consider the terms of their relationship with all third-party vendors.</p>
<p>The reality is that most of the “default” third-party terms are invariably one-sided in favor of the vendor. Should things go awry as they did with the Blackbaud incident, it is vital to have the appropriate legal terms in the contract to protect your interests.  While it is impossible to provide an exhaustive list of issues to be considered in negotiating a contract, I recommend that the following five points should always be addressed prior to signing a third-party technology contract.</p>
<p><strong>1. Adjust the Limitation of Liability Cap</strong></p>
<p>Vendors routinely attempt to limit any claims for loss or damage that might be incurred.  Typically, they try to limit the recovery period to six months, or even less, of fees paid.  I suggest that the “cap” be set at some multiple of the contract value, and not be tied to monies paid to date. This avoids having limited recompense for claims that occur early on in the contract term.</p>
<p><strong>2. Draft Exclusions to the Limitation of Liability Cap</strong></p>
<p>Related to the first provision, most types of damage are “capped” at some pre-agreed dollar amount.  However, certain damage, because it poses a greater risk to your organization and its reputation, should be excluded.  As an example, damage that results from a data breach, indemnified claims and breaches of your confidential information should never be capped. In the case of the Blackbaud breach, such an exclusion would have allowed your organization to fully recover all losses and expenses.</p>
<p><strong>3. Require Breach Notification and Credit Monitoring Expenses</strong></p>
<p>The Blackbaud incident illustrates that breaches happen.  Although unfortunate, the reality is that no system or platform is “breach proof.”  Even if your vendors maintain all the various physical, logical and administrative security precautions that have been reasonably requested, breaches can occur.</p>
<p>If a breach occurs and notification is required, your vendor is obligated to notify you alone, not your end-user donors.  For this reason, I strongly recommend that you require <em>any </em>vendor that has access to personally identifiable information on your behalf, to agree to pay for all fines, expenses and costs related to the breach, including notification to your donors, regulatory fines, and credit monitoring services for the potentially affected individuals.  They should also be required to promptly notify you of any breach or suspected breach – my recommendation is within 48-72 hours.  Blackbaud took over two months to provide notification!  This is reprehensible &#8211; but they are now the exception that proves the rule: contractually obligate your vendors to timely notice.</p>
<p><strong>4. Insist on Specific Cyber/Privacy Representations and Warranties</strong></p>
<p>During the sales pitch, prospective clients are presented with polished and detailed marketing materials that exhaustively detail the various aspects of the vendor’s product, including the various cyber-security precautions they have in place.  However, most contracts provide scant details of the actual precautions to be undertaken.  Bottomline, if a vendor is getting access to any personally identifiable information, you should have specific and detailed cyber-security and privacy requirements spelled out in the contract.</p>
<p><strong>5. Request Transition Services</strong></p>
<p>Vendor relationships do not last forever.   When the time comes to change a vendor, the transition can be a lengthy and arduous process.  When the existing vendor is reluctant to assist with the facilitation of the transition, the client gets stuck with the logjam.  To mitigate this issue, I always insist on including a provision in the contract that requires the vendor to provide ongoing services and specific transition support at their current standard rates for a specified period of time.</p>
<p>In the sentiments of Robert Frost, good contracts make good vendors.  As the Blackbaud data breach illustrates, “stuff” happens.  While this is one of many third-party providers to suffer a data breach, the attack on Blackbaud serves as a stark example of why organizations need to take the time to carefully evaluate third-party vendor privacy and cyber security practices, as well as insist on specific contractual terms that define accountability and responsibilities in the event of an incident.  (And FYI, the NY SHIELD Act requires all organizations that collect information on NY residents to review all such contracts with third-party vendors to endure that such contracts impose specific technological, administrative and physical safeguards). Failure to do so could leave your organization with limited recourse and remedies when the worst happens.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again &#8211; Blackbaud Data Breach</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The SHIELD Act – A New York State of Mind … and Privacy</title>
		<link>https://perlmanandperlman.com/shield-act-new-york-state-mind-privacy/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 20 Nov 2019 20:35:27 +0000</pubDate>
				<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Data Privacy & Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[New York Law]]></category>
		<category><![CDATA[New York SHIELD Act]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy law]]></category>
		<guid isPermaLink="false">https://perlmanandperlman.com/shield-act-new-york-state-mind-privacy/</guid>

					<description><![CDATA[<p>The Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”), which went into effect on October 23, 2019, substantially broadens the scope of the existing New York State breach notification and data protection laws. This new law applies to any for profit or nonprofit organization that receives or collects private information about New York [&#8230;]</p>
<p>The post <a href="https://perlmanandperlman.com/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <strong>Stop Hacks and Improve Electronic Data Security Act</strong> (“SHIELD Act”), which went into effect on October 23, 2019, substantially broadens the scope of the existing New York State breach notification and data protection laws. This new law applies to any for profit or nonprofit organization that receives or collects private information about New York residents.  Simply put, if your organization has a website, it’s likely you need to comply with the provisions of the SHIELD Act.</p>
<p>The SHIELD Act creates two primary obligations: 1) the adoption and maintenance of a comprehensive cybersecurity data protection program to safeguard private information; and 2) compliance with specific data breach notification requirements.</p>
<p>The SHIELD Act broadens what is considered to be personally identifiable information (“PII”) which means that most organizations will be deemed to be collecting PII.  Under the Shield Act, any organization that collects PII must “develop, implement and maintain reasonable safeguards to protect the security, confidentiality and integrity” of the PII.   While the extent of the safeguards is expected to be relational to the size and complexity of the organization, it is clear that all organizations will have to meet the minimum requirements as outlined below.</p>
<ul>
<li>Develop, implement and maintain “reasonable [administrative, physical and technical] safeguards to protect the security, confidentiality and integrity” of PII.</li>
<li>When utilizing third-party service providers, include specific contractual provisions that stipulate that maintenance of appropriate cybersecurity practices are necessary for compliance. (This suggests that all current, and certainly future, vendor agreements must be reviewed and appropriately negotiated).</li>
<li>Adopt a data retention and destruction policy to safely and securely store, and when appropriate, permanently dispose of, PII.</li>
</ul>
<p>Added to this, the SHIELD Act broadens the definition of data breach, requiring prompt notice to affected individuals and to government authorities.  For those organizations that have yet to adopt a “data breach response plan”, the time to do so is now.   This clause includes penalties for failing to provide timely notice in the event of a data breach as well as for failing to adopt reasonable safeguards.</p>
<p>The organizational costs related to unauthorized access continue to grow.  Therefore, procuring and maintaining a comprehensive and appropriate tailored cyber-security insurance policy has never been more important (also see <a href="https://www.perlmanandperlman.com/cyber-security-insurance/" target="_blank" rel="noopener noreferrer nofollow"><em>Cyber Security Insurance – A Must Have</em></a>).</p>
<p>Although the law took effect on October 23, 2019, it provides organizations a grace period until March 21, 2020 for the establishment of the required data protection policies and practices. I highly suggest organizations use this time wisely!  Businesses that have not previously been subject to cybersecurity regulatory requirements should promptly evaluate the sufficiency of their internal policies and practices &#8211; as well as the third-party service providers they use &#8211; to ensure compliance with the SHIELD Act requirements.  Those organizations with existing cybersecurity programs should review and update their policies and practices in light of these new requirements.</p>
<p>The post <a href="https://perlmanandperlman.com/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy Audit – Make it Your Organization’s New Year’s Resolution!</title>
		<link>https://perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 20:31:59 +0000</pubDate>
				<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Data Privacy & Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[privacy audit]]></category>
		<guid isPermaLink="false">https://perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/</guid>

					<description><![CDATA[<p>It&#8217;s the time of year when its typical to focus on self-betterment, so let’s not leave the organization you work for out. Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees. Unfortunately, most organizations could be doing more to protect this information. The fact is that with each passing [&#8230;]</p>
<p>The post <a href="https://perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/">Privacy Audit – Make it Your Organization’s New Year’s Resolution!</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s the time of year when its typical to focus on self-betterment, so let’s not leave the organization you work for out.  Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees.  Unfortunately, most organizations could be doing more to protect this information.  The fact is that with each passing year, the number of data breaches grows, and the financial cost and reputational harm along with it.  Additionally, the regulatory landscape is becoming more complex, requiring organizations to comply with an increasing number of requirements or face penalties.  The good news &#8211; a significant portion of data breaches and related risks can be avoided or minimized with a bit of due care. As such, it has never been more critical to have a more practical understanding of the types of personal information collected, stored and shared by your organization.  A first step for any organization wishing to better understand (and minimize) their privacy risk is to conduct a privacy audit. </p>
<p>A privacy audit is essentially a process to identify, across the organization (and chapters), the types of personal information collected, the ways in which it is protected, and with whom such information is shared.   The following risk assessment methodology is a good place to start.<br />
•<strong>Inventory</strong>    Locate the places in the organization (and vendors operating on its behalf) that house/store Personally Identifying Information (“PII”), identifying both electronic files/databases and physical files.<br />
•<strong>Safeguards</strong>    Assess the safeguards in place – including the physical, administrative and technical controls – and whether they are adequate and reasonable considering the type of PII being stored (SSN vs. email address for example might have different levels of protection).<br />
•<strong>Gaps</strong>  Determine the compliance gap – essentially the difference between that what it should be doing, and the organizations actual practices.<br />
•<strong>Risk Assessment</strong>    For most organizations there will be a number of gaps.  As a first step, for the PII held in various locations and with various vendors, assess the risk of non-compliance, determine the impact of non-compliance and likelihood of risk occurrence, and use this to help prioritize compliance efforts.<br />
•<strong>Remediation</strong>   Depending upon the finding/conclusions in the previous steps, remediation should be a joint effort among various members of the organization to address and remedy any identified shortfalls/gaps.</p>
<p>The above are general guidelines. As a first step, I typically provide clients with a customized, detailed checklist that is an essential tool for our audit.  Not surprisingly, most of these audits reveal a variety of gaps and poor practices, which once addressed and remedied, reduces the likelihood of a breach, and leaves the organization better prepared should one occur.</p>
<p>The post <a href="https://perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/">Privacy Audit – Make it Your Organization’s New Year’s Resolution!</a> appeared first on <a href="https://perlmanandperlman.com">Perlman &amp; Perlman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
