Consulting Services
Privacy Services
- Privacy project management
- Development and drafting privacy and policies, procedures, protocols, documentation
- Benchmarking
- Enterprise reviews
- Privacy training
- Privacy audits
- Privacy impact assessments
- Threat risk assessments
- Document review and revision
- Privacy by Design
- Privacy Officer roles and responsibilities/support/coaching/training
- Social media policy development and drafting
- Risk assessment and management
- Incident/breach investigation and management
- Workshop development and presentations (organization-specific topics, recent developments, issues, innovation and forward compliance strategies)
Information and Cybersecurity Services
- Security project management
- Development and drafting security policies, procedures, protocols, documentation
- Benchmarking
- Enterprise reviews
- Security training
- Security audits
- Threat risk assessments
- Document review and revision
- Privacy by Design
- Risk assessment and management
- Incident/breach investigation and management
- Security and audit standards, specifications, SLAs (ISO/IEC; PCC; SSAE; NIST)
- Workshop development and presentations (organization-specific topics, recent developments, issues, innovation and forward compliance strategies)
Anti-Spam/CASL Compliance Services
- Project management
- Organization-wide assessments
- Inventory of existing contact data –CASL exceptions, qualification
- Development and execution of compliance strategies
- Contact database qualification and upgrades
- Development of consent capturing strategies
- Document development and drafting (consent request; CEM content template; policies and procedures)
- Training
- Compliance policies and procedures
- Email content review
- Supplier contract review and controls
- Compliance monitoring and audits
- Due diligence reviews
- IT compliance
- Workshop development and presentations
Risk Management Services
- Risk assessment and management
- Security and privacy governance
- Enterprise security review
- IT and security architecture
- Threat risk assessments
- Review of practices
Information Governance Services
- Development and execution of information governance frameworks
- Regulatory and information governance compliance
- Records/information management systems
- Policy and procedure development and drafting
- Records retention/destruction schedules
- Security/risk management