Part Three: How to Establish Quality Control

You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your law enforcement specialists. They have process documentation to follow. You’ve made it easy for Law Enforcement to know how to submit their requests. But how do you know if everyone is following through with the…

Read More

Part Two: A Standardized Law Enforcement Response Program

online user data

As we discussed in Part One, there are a lot of external pieces to consider when you receive a data request from Law Enforcement (LE). There are different laws, different types of requests, and different kinds of content. But you must also consider all the moving parts in your own company. A standardized process will…

Read More

Part One: Law Enforcement Requests Overview

Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request for data, such as a subpoena, court order or warrant. And if not, there’s a chance you soon will. In today’s world, it’s nearly impossible to run a business without being online. Therefore, almost all companies have…

Read More

Data Privacy Laws and Their Contributions

data privacy laws gavel on keyboard

The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. Learning platforms have increased in accessibility. Businesses are more streamlined. And even out-of-town family and friends are staying connected. As technology becomes more sophisticated, there is a growing demand for data privacy laws and regulation.  Recently, the…

Read More

Cybercrime 101: A Brief Introduction

cybercrime binary matrix

In today’s world, cybercrime is quite common. And it’s expected to continue rising at unprecedented rates.  In fact, every American citizen should presume that all of their data has already been stolen and can be found by cybercriminals on the dark web. What is Cybercrime? Cybercrime occurs when a computer is the object of a…

Read More

CCPA: What You Need to Know About California’s New Privacy Law

Cybercrime law gavel on keyboard

Privacy is taking center stage in today’s digital world. Individuals around the globe demand increased privacy rights as data breaches become the norm and companies sell personal data. The governments of the world are answering this demand with a slew of new privacy laws that leave companies scrambling to keep pace. These laws include the…

Read More

Privacy in the Digital Age: The Necessary Actions

In Part One, Privacy in the Digital Age: The Issues, we discussed several cases involving the amount of data that is available and the lack of privacy laws. Today we’ll look further into what we need to do as consumers, governments and companies to address these problems. We need to be proactive instead of reactive…

Read More