Privacy & Data Protection Solutions

Privacy & Data Protection Solutions

If your company processes customer data, you build trust with your customers through transparent data privacy practices, procedures, and policies.  To build accurate, transparent practices, procedures, and policies you need advisors who not only understand your business, privacy law, information security practices but also provide practical, contextual legal advice.

How do we help you to build a trust-worthy data protection and privacy compliance program?

The first step is to assess your data privacy maturity. Next, we'll build a technology-enabled privacy compliance program to create an automated, auditable privacy compliance program. Our privacy compliance technology platform allows us to manage your program holistically and efficiently. We build a control framework relevant to your business, create data maps and records of processing activities, ensure your policies stay up to date, manage data subject rights requests, and manage data privacy impact assessments.  Our annual assessments, legislative updates and board reports ensure that your company's leadership is informed and engaged in the program.

Representative Experience
  • Managed data privacy, compliance, and information security functions across multiple organizations, including financial/banking technology, marketing technology, and human resources technology companies.
  • Created data protection compliance programs tailored to HIPAA, GDPR, and CCPA.
  • Built and managed SOC2, FedRAMP and ISO programs, including audits and certifications.
  • Provided data privacy and compliance advisory and consulting services to global enterprise software companies.
  • Performed InfoSec/Privacy due diligence on multiple acquisition targets.
  • Operationalized internal compliance audit, creating a mini-internal audit team to facilitate ongoing, transparent privacy practices.
  • Implemented GDPR compliance program in the US and EU for a global FinTech company.
  • Managed data subject rights request processes.
  • Managed data breach procedures and war room processes.
  • Conducted table top exercises for C-Level and technology leadership.
  • Provided training to C-Suite, product and engineering teams, sales teams and information security teams about changing data protection laws, privacy by design and best practices.