<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jon Dartley - Perlman Sandbox</title>
	<atom:link href="https://dev.staging-perlmanandperlman.com/author/jondartley/feed/" rel="self" type="application/rss+xml" />
	<link>https://dev.staging-perlmanandperlman.com</link>
	<description>Perlman Sandbox</description>
	<lastBuildDate>Thu, 17 Mar 2022 14:12:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>Cyber Readiness &#8211; If it Ain’t Broke, You May Still Want to Fix It…</title>
		<link>https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Thu, 27 Jan 2022 19:21:06 +0000</pubDate>
				<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cyber readiness]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data retention]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/?p=9047</guid>

					<description><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness – If it Ain’t Broke, You May Still Want to Fix It…</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to represent a pragmatic approach to “triaging” issues.  When it comes to cyber-security readiness, however, this approach is ill-advised.  Put another way, the fact that your organization has not experienced a security incident to date should not be rationale for maintaining the status quo.</p>
<p>Data breaches are the leading threat in today’s digital world, with a new cyberattack occurring approximately every 39 seconds. <strong>N</strong><strong>on-profit organizations are increasingly being targeted</strong> by cybercriminals, not only because of the wealth of data they possess, but because they simply do not take the same precautions nor employ the same resources as their for-profit counterparts.  In fact, small-to-medium-sized organizations are actually more likely to be targeted by hackers for that very reason.</p>
<p>The financial cost of managing a data breach is well documented.  A recent study estimated the average cost of a breech in 2021 at 4.24 million dollars, a 10% rise from 2019.  Although less tangible, the potential loss of trust of the nonprofit’s donors, volunteers and the community can be significant. Such a loss is not only difficult to restore, it can also affect fundraising activities, volunteer engagement, and partnerships with other organizations for years to come.</p>
<p>For organizations seeking to decrease their cybersecurity vulnerabilities, a good first step is to obtain a comprehensive understanding of the current risk environment. For example, what kind of data does your organization collect, store, share and transmit?  Where and how is the data being stored, and who has access to the data?  How does the organization transmit data? (Data transmission is often one of the most significant vulnerabilities; any time data is sent from one location to another, there is a risk of interception.) During the COVID-19 pandemic, the risk of insecure data transfer has increased as more and more individuals have begun accessing critical data from personal mobile devices or using personal digital storage solutions.  Assessing these weak points can be achieved through a data-privacy audit whereby information gathered is then used to strengthen the organization’s cyber-readiness.</p>
<p>Additionally, organizations should consider implementing the following measures:</p>
<p><strong><em>Implement (Or Update) Organization-Wide Cybersecurity Policies</em></strong><br />
The first step in ensuring the security of an organization’s data is to have consistent, documented cybersecurity policies in place for all employees to follow.</p>
<p><strong><em>Provide Ongoing Cybersecurity Training</em></strong><br />
Next, all individuals within the organization who have access to secure data should receive annual cybersecurity training.</p>
<p><strong><em>Focus Your Cybersecurity Efforts/Revaluate Third-Party Vendors</em></strong><br />
Focus on security controls that would be the most effective based on your specific needs and resources. And as many breaches occur from the actions/omissions of third-party vendors who store an organizations data, review the legal terms of all such agreements to make sure there are appropriate terms and conditions to protect your organization (<em>read</em> <em><a href="/are-you-protected-five-points-to-include-in-every-technology-agreement/">Are You Protected? Five Points to Include in Every Technology Agreement</a>).</em></p>
<p><strong><em>Create A Data Retention and Deletion Policy</em></strong><br />
Most organizations collect more data than they need, and hold the data longer than necessary or practical.  The more data your organization stores, the greater the liability if a breach occurs.  It is imperative that organizations adopt a policy that dictates the types of data to be stored, and when/how that data is deleted when no longer relevant.</p>
<p><strong><em>Prepare for the Unexpected</em></strong><br />
Every organization needs a plan for what to do in case of a data breach. An incident response can help organizations plan to comply with applicable laws and regulations, and launch a rapid and coordinated response that will mitigate the damaging consequences of a data breach.  On a side note, the recently enacted NY SHIELD Act requires organizations that collect information from NY residents to have both a Data Retention and Deletion policy as well as an Incident Response plan in place, among other requirements (<em>read</em> <em><a href="/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a>).</em></p><p>The post <a href="https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness – If it Ain’t Broke, You May Still Want to Fix It…</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2021 &#8211; A Very Private New Year &#8211;  Steps all Nonprofits Can Take</title>
		<link>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</link>
					<comments>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 22:21:40 +0000</pubDate>
				<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[New York SHIELD Act]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</guid>

					<description><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 – A Very Private New Year –  Steps all Nonprofits Can Take</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The 2019 reporting year also saw a return to the pattern of the ever-increasing number of breaches and volume of records exposed.</p>
<p>As most organizations continue to have a significant portion of their workforce work remotely, 2020 will likely show a significant uptick in unauthorized access to personal information.  Additionally, the average cost for each lost or stolen record containing sensitive and confidential information increased by 4.8 percent year over year to $148. Such financial repercussions as well as the risk of incurring reputational harm that could follow unauthorized access of customer data, indicate that privacy and cyber security should be a top concern.</p>
<p>Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees, and it is incumbent upon them to safeguard that information. The fact is, that with each passing year, the number of data breaches grows, and the related financial cost and reputational harm along with it. Additionally, the regulatory landscape is becoming more complex, requiring organizations to comply with an increasing number of requirements or face penalties.</p>
<p>Due to the continued need to protect information, New York State enacted Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”) on March 21 of 2020.   This new law applies to any organization that receives or collects private information about New York residents through the Internet, and requires, among things that your organization.   The Act requires specific actions and imposes a variety of obligations, and significant fines may be levied for non-compliance.  Among other requirements, to meet the SHIELD Act requirements organizations must:</p>
<ol>
<li>conduct a risk assessment of its cybersecurity program;</li>
<li>properly vet all third-party service providers to ensure they can comply with the NY SHIELD Act, and include in its contracts specific provisions related to cybersecurity practices;</li>
<li>have policies and procedures related to the deletion and/ or disposal of data within a reasonable amount of time after it is no longer needed for business purposes;</li>
<li>develop and implement a written incident/data breach response plan so that you can comply swiftly and completely with the Acts reporting requirements (or face potentially harsh penalties); and</li>
<li>designate a “point person” to coordinate your data-security program to meet compliance.</li>
</ol>
<p>The good news is that conducting a privacy audit can significantly reduce potential “data incidents” and minimize the related risks.  It is also a big step to achieving SHIELD compliance.   A privacy audit is essentially a process to identify, across the organization (and chapters), the types of personal information collected, the ways in which it is protected, and with whom such information is shared.</p>
<p>The following risk assessment methodology is a good place to start.<br />
• <strong>Inventory </strong>Locate the places in the organization (and vendors operating on its behalf) that house/store Personally Identifying Information (“PII”), identifying both electronic files/databases and physical files<br />
• <strong>Safeguards</strong> Assess the safeguards in place – including the physical, administrative and technical controls – and whether they are adequate and reasonable considering the type of PII being stored (SSN vs. email address for example might have different levels of protection).<br />
• <strong>Gaps</strong> Determine the compliance gap – essentially the difference between that what it should be doing, and the organizations actual practices.<br />
• <strong>Risk Assessment </strong>For most organizations there will be a number of gaps. As a first step, for the PII held in various locations and with various vendors, assess the risk of non-compliance, determine the impact of non-compliance and likelihood of risk occurrence, and use this to help prioritize compliance efforts.<br />
• <strong>Remediation</strong> Depending upon the finding/conclusions in the previous steps, remediation should be a joint effort among various members of the organization to address and remedy any identified shortfalls/gaps.</p>
<p>As organizations look to identify material risks and implement processes and procedures to protect their data and hence their missions &#8211; data privacy and cyber security will no doubt continue to be a critical concern.  Now is the right time to conduct a privacy audit.</p>
<p>&nbsp;</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 – A Very Private New Year –  Steps all Nonprofits Can Take</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>We Won’t Get Fooled Again &#8211; Blackbaud Data Breach</title>
		<link>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</link>
					<comments>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 18:04:24 +0000</pubDate>
				<category><![CDATA[Contracts & Commercial Transactions]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[vendor contract]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</guid>

					<description><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again – Blackbaud Data Breach</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or not your organization was affected, the recent Blackbaud breach &#8211; and their very-delayed and by many accounts lackluster response &#8211; is a wake-up call for organizations to consider the terms of their relationship with all third-party vendors.</p>
<p>The reality is that most of the “default” third-party terms are invariably one-sided in favor of the vendor. Should things go awry as they did with the Blackbaud incident, it is vital to have the appropriate legal terms in the contract to protect your interests.  While it is impossible to provide an exhaustive list of issues to be considered in negotiating a contract, I recommend that the following five points should always be addressed prior to signing a third-party technology contract.</p>
<p><strong>1. Adjust the Limitation of Liability Cap</strong></p>
<p>Vendors routinely attempt to limit any claims for loss or damage that might be incurred.  Typically, they try to limit the recovery period to six months, or even less, of fees paid.  I suggest that the “cap” be set at some multiple of the contract value, and not be tied to monies paid to date. This avoids having limited recompense for claims that occur early on in the contract term.</p>
<p><strong>2. Draft Exclusions to the Limitation of Liability Cap</strong></p>
<p>Related to the first provision, most types of damage are “capped” at some pre-agreed dollar amount.  However, certain damage, because it poses a greater risk to your organization and its reputation, should be excluded.  As an example, damage that results from a data breach, indemnified claims and breaches of your confidential information should never be capped. In the case of the Blackbaud breach, such an exclusion would have allowed your organization to fully recover all losses and expenses.</p>
<p><strong>3. Require Breach Notification and Credit Monitoring Expenses</strong></p>
<p>The Blackbaud incident illustrates that breaches happen.  Although unfortunate, the reality is that no system or platform is “breach proof.”  Even if your vendors maintain all the various physical, logical and administrative security precautions that have been reasonably requested, breaches can occur.</p>
<p>If a breach occurs and notification is required, your vendor is obligated to notify you alone, not your end-user donors.  For this reason, I strongly recommend that you require <em>any </em>vendor that has access to personally identifiable information on your behalf, to agree to pay for all fines, expenses and costs related to the breach, including notification to your donors, regulatory fines, and credit monitoring services for the potentially affected individuals.  They should also be required to promptly notify you of any breach or suspected breach – my recommendation is within 48-72 hours.  Blackbaud took over two months to provide notification!  This is reprehensible &#8211; but they are now the exception that proves the rule: contractually obligate your vendors to timely notice.</p>
<p><strong>4. Insist on Specific Cyber/Privacy Representations and Warranties</strong></p>
<p>During the sales pitch, prospective clients are presented with polished and detailed marketing materials that exhaustively detail the various aspects of the vendor’s product, including the various cyber-security precautions they have in place.  However, most contracts provide scant details of the actual precautions to be undertaken.  Bottomline, if a vendor is getting access to any personally identifiable information, you should have specific and detailed cyber-security and privacy requirements spelled out in the contract.</p>
<p><strong>5. Request Transition Services</strong></p>
<p>Vendor relationships do not last forever.   When the time comes to change a vendor, the transition can be a lengthy and arduous process.  When the existing vendor is reluctant to assist with the facilitation of the transition, the client gets stuck with the logjam.  To mitigate this issue, I always insist on including a provision in the contract that requires the vendor to provide ongoing services and specific transition support at their current standard rates for a specified period of time.</p>
<p>In the sentiments of Robert Frost, good contracts make good vendors.  As the Blackbaud data breach illustrates, “stuff” happens.  While this is one of many third-party providers to suffer a data breach, the attack on Blackbaud serves as a stark example of why organizations need to take the time to carefully evaluate third-party vendor privacy and cyber security practices, as well as insist on specific contractual terms that define accountability and responsibilities in the event of an incident.  (And FYI, the NY SHIELD Act requires all organizations that collect information on NY residents to review all such contracts with third-party vendors to endure that such contracts impose specific technological, administrative and physical safeguards). Failure to do so could leave your organization with limited recourse and remedies when the worst happens.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again – Blackbaud Data Breach</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is it Time for a Cyber Risk Check-up?</title>
		<link>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/</link>
					<comments>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Mon, 08 Jun 2020 14:11:35 +0000</pubDate>
				<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[#COVID-19]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[NY SHIELD Act]]></category>
		<category><![CDATA[provacy laws]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/</guid>

					<description><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid,” it is likely that many organizations will continue to ask their employees to work remotely — at least periodically — for some time.   It is important to remember that doing so is not without risks.  As most organizations [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/">Is it Time for a Cyber Risk Check-up?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid,” it is likely that many organizations will continue to ask their employees to work remotely — at least periodically — for some time.   It is important to remember that doing so is not without risks.  As most organizations have information to protect, now is the time to consider the potential “cyber” risks of remote working, and remedial actions that can be taken to mitigate these risks.  The fact is that home office environments are not as secure as work environments.   Unfortunately, hackers are well aware of these vulnerabilities, and “phishing” and other schemes aimed to compromise personally identifiable information has been on the rise over the past couple months.</p>
<p><strong>This is a good time to audit the protocols your organization recently implemented and ensure that your colleagues recognize and alleviate risks when they are routinely working from home.</strong>  Below are some typical risks, with strategies to minimize those risks.</p>
<ul>
<li><strong>Unsecured WIFI networks: </strong>Home networks (and use of public networks) may be vulnerable to malware or ransomware attacks through their wireless router – <em>Secure home WIFI networks with a robust password and, when possible, avoid use of public networks. </em></li>
<li><strong>Working on unsecured personal devices: </strong>Home computers may lack critical security patch management – <em>Employees should only conduct work on their employer-issued computers. Where this is not possible personal laptops should not be allowed to leave the home. </em></li>
<li><strong>Transferring corporate data using personal email accounts:</strong> Employees may send sensitive information to their personal email accounts; non-enterprise email accounts usually lack the protections that commercial accounts often have – <em>Advise employees against sending sensitive company data to their personal email accounts, and to permanently delete any corporate data remaining on their email accounts after they return to their normal working arrangement. </em></li>
<li><strong>“Hard-Copy” document management and destruction</strong>: Employees may take hard-copy sensitive or confidential materials off-site that they would not otherwise – <em>Advise as to proper destruction and to avoid disposing of documents at home or in a public place without proper cross-cut shredding. </em></li>
<li><strong>Unsecured connections to organizational systems:</strong> Absent a secure virtual private network (VPN), employees may attempt to connect to your systems in an insecure manner – <em>Investigate the viability of configuring a VPN for employees accessing your systems.</em></li>
<li><strong>Syncing with personal cloud storage accounts</strong>: Employees working remotely may use a personal cloud service account to transfer documents or data to and from office that may be less secure – <em>Monitor use and consider creating a list of recommended providers.</em></li>
<li><strong>Key vendor relationships</strong>: Most organizations rely on third-party vendors to support both internal and external mission-critical services.  These services could be impacted should these companies also ask their employees to work from home – <em>Proactively reach out to these vendors to inquire as to their plans to continue to support your organization and to keep your data safe (as summarized above); also review the contracts in place to be aware of your rights and remedies.</em></li>
</ul>
<p><strong>It is important to remember that although COVID-19 has posed challenges in regard to good cyber practices, privacy laws, regulations and expectations still apply. </strong></p>
<p>For example, the New York State’s Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”), went into effect on March 21 of this year.   This new law applies to any for profit or nonprofit organization that receives or collects private information about New York residents.  Simply put, if your organization has a website, it’s likely you need to comply with the provisions of the SHIELD Act (and there are substantial fines for noncompliance).  Among the many obligations, the SHIELD Act expects organizations to 1) implement reasonable [administrative, physical and technical] safeguards to protect the security, confidentiality and integrity” of data, and 2) properly vet all third-party service providers and include specific provisions related to cyber-security practices, and 3) designate a “point person” to coordinate your data security program.   <strong><u>Many organizations would have fallen short of these requirements prior to COVID-19 — many more will fall short today as employees continue their work from home</u>.</strong>  While meeting these requirements may seem daunting, they are more easily achieved than one might initially think.  I routinely help organizations to achieve compliance with the SHIELD Act and other similar regulations and best practices, and in doing so these organizations become better “stewards” of the personal information they collect on behalf of their employees and donors.</p>
<p><em>Jon Dartley is an attorney with in-depth knowledge of the laws of data privacy regulation. You may reach him at jon@perlmanandperlman.com. </em></p><p>The post <a href="https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/">Is it Time for a Cyber Risk Check-up?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>COVID-19 and Cyber-Readiness &#8211; Good Practices for Remote Work</title>
		<link>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/</link>
					<comments>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 19:46:21 +0000</pubDate>
				<category><![CDATA[Employment]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/</guid>

					<description><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid”, it is likely that many organizations will at some point be asking their employees to work remotely;  it is important to remember that doing so it not without its risks.  As most organizations have information to protect, now is [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/">COVID-19 and Cyber-Readiness – Good Practices for Remote Work</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid”, it is likely that many organizations will at some point be asking their employees to work remotely;  it is important to remember that doing so it not without its risks.  As most organizations have information to protect, now is the time to consider the potential “cyber” risks of remote working, and remedial actions that can be taken to mitigate these risks.</p>
<ul>
<li><strong>Unsecure WIFI networks: </strong>Home networks (and use of public networks) may be vulnerable to malware or ransomware attacks through their wireless router &#8211; <em>Secure home WIFI networks with a robust password and, when possible, avoid use of public networks. </em></li>
<li><strong>Working on unsecure personal devices: </strong>Home computers may lack critical security patch management &#8211; <em>Employees should only conduct work on their employer-issued computers. Where this is not possible personal laptops should not be allowed to leave the home. </em></li>
<li><strong>Transferring corporate data using personal e-mail accounts</strong>: Employees may send sensitive information to their personal email accounts; non-enterprise email accounts usually lack the protections that commercial accounts often have &#8211; <em>Advise employees against sending sensitive company data to their personal email accounts, and to permanently delete any corporate data remaining on their email accounts after they return to their normal working arrangement. </em></li>
<li><strong>“Hard-Copy” document management and destruction</strong>: Employees may take hard-copy sensitive or confidential materials off-site that they would not otherwise &#8211; <em>Advise as to proper destruction and to avoid disposing of documents at home or in a public place without proper cross-cut shredding. </em></li>
<li><strong>Unsecure connections to organizational systems:</strong> Absent a secure virtual private network (VPN),employees may attempt to connect to your systems in an insecure manner &#8211; <em>investigate the viability of configuring a VPN for employees accessing your systems.</em></li>
<li><strong><em>Synching with personal cloud storage accounts</em></strong><em>: Employees working remotely may use a personal cloud service account to transfer documents or data to and from office that may be less secure &#8211; Monitor, recommend/advise. </em></li>
<li><strong>Key vendor relationships:</strong> Most organizations rely on third-party vendors to support both internal and external mission-critical services.  These services could be impacted should these companies also ask their employees to work from home &#8211; <em>Proactively reach out to these vendors to inquire as to their plans to continue to support your organization and to keep your data safe (as summarized above); also review the contracts in place to be aware of your rights and remedies.</em></li>
</ul><p>The post <a href="https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/">COVID-19 and Cyber-Readiness – Good Practices for Remote Work</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>California Consumer Privacy Act (CCPA)  &#8211; You are not California Dreamin&#8217;!</title>
		<link>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/</link>
					<comments>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Mon, 16 Dec 2019 21:38:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[california]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Privacy Act]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/</guid>

					<description><![CDATA[<p>What Is It? The California Consumer Privacy Act (CCPA) goes into effect January 1, 2020. It is the most recent personal data protection law passed by the State of California, and provides California residents with more control over the collection, use, and protection of their personal information. The CCPA’s broad privacy requirements are entirely new, [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/">California Consumer Privacy Act (CCPA)  – You are not California Dreamin’!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>What Is It?</em><br />
The California Consumer Privacy Act (CCPA) goes into effect January 1, 2020. It is the most recent personal data protection law passed by the State of California, and provides California residents with more control over the collection, use, and protection of their personal information.</p>
<p>The CCPA’s broad privacy requirements are entirely new, and are certainly among the strictest privacy laws in the United States. It is important to note that CCPA is not a replacement for other existing California privacy law &#8211; all of those laws remain  in effect. Here the focus is on CCPA.</p>
<p><em>Does it Apply to Your Company?</em><br />
CCPA applies to any for profit company in the world which collects personal data, and</p>
<ol>
<li>Has annual gross revenues of at least $25 million; or</li>
<li>Obtains personal information of at least 50,000 California residents, households, and /or devices per year; or</li>
<li>Derives at least 50% of its annual revenue from selling California residents’ personal information</li>
</ol>
<p><em>What to Do to Prepare</em><br />
To comply,  companies will have to adopt a variety of new measures, including:</p>
<p>• Draft and post a comprehensive privacy notice <em>( send me an email request for a more detailed list of elements to include)</em><br />
• Conduct a data inventory to “map” the use of California residents personal data and instances of “selling” data<br />
• Implement procedures to meet the new individual rights for data access, deletion and opting-out<br />
• Update all vendor agreements with third-parties who may be processing such data on behalf of the business</p>
<p><em>What are the Penalties for Non-Compliance?</em><br />
Non-compliance with CCPA puts a company at risk for large fines. The Attorney General can levy fines of  up to $7500 per violation, and make the party subject to “private actions” from California residents.</p>
<p><em>Jon Dartley, Esq., 212.889.0575 ext. 224</em><br />
<em>jon@perlmanandperlman.com</em></p>
<p>DISCLAIMER:<br />
These materials were prepared for informational purposes only. The information contained herein is general in nature and may not have application to particular factual or legal circumstances. These materials do not constitute legal advice or opinions and should not be relied upon as such. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Recipients of this information should not act upon any information in this article without seeking professional counsel.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/">California Consumer Privacy Act (CCPA)  – You are not California Dreamin’!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The SHIELD Act – A New York State of Mind … and Privacy</title>
		<link>https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/</link>
					<comments>https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 20 Nov 2019 20:35:27 +0000</pubDate>
				<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[New York Law]]></category>
		<category><![CDATA[New York SHIELD Act]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy law]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/</guid>

					<description><![CDATA[<p>The Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”), which went into effect on October 23, 2019, substantially broadens the scope of the existing New York State breach notification and data protection laws. This new law applies to any for profit or nonprofit organization that receives or collects private information about New York [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The <strong>Stop Hacks and Improve Electronic Data Security Act</strong> (“SHIELD Act”), which went into effect on October 23, 2019, substantially broadens the scope of the existing New York State breach notification and data protection laws. This new law applies to any for profit or nonprofit organization that receives or collects private information about New York residents.  Simply put, if your organization has a website, it’s likely you need to comply with the provisions of the SHIELD Act.</p>
<p>The SHIELD Act creates two primary obligations: 1) the adoption and maintenance of a comprehensive cybersecurity data protection program to safeguard private information; and 2) compliance with specific data breach notification requirements.</p>
<p>The SHIELD Act broadens what is considered to be personally identifiable information (“PII”) which means that most organizations will be deemed to be collecting PII.  Under the Shield Act, any organization that collects PII must “develop, implement and maintain reasonable safeguards to protect the security, confidentiality and integrity” of the PII.   While the extent of the safeguards is expected to be relational to the size and complexity of the organization, it is clear that all organizations will have to meet the minimum requirements as outlined below.</p>
<ul>
<li>Develop, implement and maintain “reasonable [administrative, physical and technical] safeguards to protect the security, confidentiality and integrity” of PII.</li>
<li>When utilizing third-party service providers, include specific contractual provisions that stipulate that maintenance of appropriate cybersecurity practices are necessary for compliance. (This suggests that all current, and certainly future, vendor agreements must be reviewed and appropriately negotiated).</li>
<li>Adopt a data retention and destruction policy to safely and securely store, and when appropriate, permanently dispose of, PII.</li>
</ul>
<p>Added to this, the SHIELD Act broadens the definition of data breach, requiring prompt notice to affected individuals and to government authorities.  For those organizations that have yet to adopt a “data breach response plan”, the time to do so is now.   This clause includes penalties for failing to provide timely notice in the event of a data breach as well as for failing to adopt reasonable safeguards.</p>
<p>The organizational costs related to unauthorized access continue to grow.  Therefore, procuring and maintaining a comprehensive and appropriate tailored cyber-security insurance policy has never been more important (also see <a href="https://www.perlmanandperlman.com/cyber-security-insurance/" target="_blank" rel="noopener"><em>Cyber Security Insurance – A Must Have</em></a>).</p>
<p>Although the law took effect on October 23, 2019, it provides organizations a grace period until March 21, 2020 for the establishment of the required data protection policies and practices. I highly suggest organizations use this time wisely!  Businesses that have not previously been subject to cybersecurity regulatory requirements should promptly evaluate the sufficiency of their internal policies and practices &#8211; as well as the third-party service providers they use &#8211; to ensure compliance with the SHIELD Act requirements.  Those organizations with existing cybersecurity programs should review and update their policies and practices in light of these new requirements.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/shield-act-new-york-state-mind-privacy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Privacy Matters: A Website Privacy Policy is Good Governance</title>
		<link>https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/</link>
					<comments>https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Fri, 14 Jun 2019 15:34:54 +0000</pubDate>
				<category><![CDATA[Nonprofit Governance]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[good governance]]></category>
		<category><![CDATA[privacy policy]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/</guid>

					<description><![CDATA[<p>With the massive expansion of the Internet and online collection of personal information, privacy is a real concern these days.  Your nonprofit organization’s privacy policy is the first step in an overall approach to responsibly collecting, sharing and safeguarding the information you obtain: it is a pledge to your donors and supporters to maintain their [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/">Privacy Matters: A Website Privacy Policy is Good Governance</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>With the massive expansion of the Internet and online collection of personal information, privacy is a real concern these days.  Your nonprofit organization’s privacy policy is the first step in an overall approach to responsibly collecting, sharing and safeguarding the information you obtain: it is a pledge to your donors and supporters to maintain their confidentiality.  Having an up-to-date privacy policy is also considered “good governance” – as an example, the most recent NYC <em>Good Governance Blueprint – recommends that nonprofit organizations “</em>develop, publish, implement, and monitor implementation of its privacy policy.”</p>
<p>So how should one go about drafting a website privacy policy?  The Federal Trade Commission advises that when drafting your privacy policy “say what you mean and mean what you say.”  The first part is easy – you need to have a global understanding of what your organization does with the information it collects.  For example, do you share information with third parties, use cookies and other web tracking technologies, or send promotional emails?  Whatever the practices, they need to be clearly described in your privacy policy.</p>
<p>The second part, “do what you say”, is more of a challenge.  Simply stating the policy is not enough – you must adhere to the policies and procedures as described.  Your organization will be held accountable for any failure to meet its own written standards, thus it’s imperative that everyone in the organization understand what they should be doing – and equally important, what they should<em> </em><em>not</em> be doing.  There are useful tools and approaches for assessing and monitoring such adherence that you may consider adopting, such as a data privacy audit.</p>
<p>Finally, your privacy policy must keep pace with your practices and with changing law.  Web technologies, marketing strategies and other internal practices change regularly.  If the marketing department concludes that a monthly e-newsletter to donors is essential, that’s fine, but make sure that this is addressed in the privacy policy.  Unfortunately, many organizations do not routinely update their privacy policies to keep pace with such changes.</p>
<p>Additionally, the laws applying to privacy practices are in constant flux.  As an example, The General Data Protection Regulation (GDPR) issued by the European Union (EU) became effective May 25, 2018.  Although some organizations have adopted privacy processes and procedures in response to the regulations, many are still unclear as to the impact upon their organizations, and the steps necessary to comply.  In regard to your privacy policy, GDPR does require that you include specific provisions and “right” in your online privacy policy.  Failure to comply could result in significant fines and penalties.</p>
<p>As someone who routinely reviews and drafts privacy policies, I am keenly aware at how quickly these privacy policies can become “outdated.”  If you have a professionally drafted privacy policy, make sure that it is reviewed, followed and updated on an annual basis.  If you are like many organizations and have an outdated and/or inadequate privacy policy, then revising should be a top priority.  The investment today will go a long way in honoring the commitment to the privacy your supporters expect and deserve.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/">Privacy Matters: A Website Privacy Policy is Good Governance</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/privacy-matters-website-privacy-policy-good-governance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Startup to Growth Company – Five Factors For Success</title>
		<link>https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/</link>
					<comments>https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 09 Jan 2019 10:01:27 +0000</pubDate>
				<category><![CDATA[Contracts & Commercial Transactions]]></category>
		<category><![CDATA[Corporate Structure]]></category>
		<category><![CDATA[Hybrid Organizations]]></category>
		<category><![CDATA[Socially Responsible Businesses]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/</guid>

					<description><![CDATA[<p>In his novel Anna Karenina, Tolstoy declares “Happy families are all alike; every unhappy family is unhappy in its own way.&#8221; This famous opening line suggests that there are common elements for a successful family; on the flip side, there are countless ways things can go wrong. Analogizing this to startup companies can be illuminating. [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/">From Startup to Growth Company – Five Factors For Success</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>In his novel Anna Karenina, Tolstoy declares “Happy families are all alike; every unhappy family is unhappy in its own way.&#8221; This famous opening line suggests that there are common elements for a successful family; on the flip side, there are countless ways things can go wrong.</p>
<p>Analogizing this to startup companies can be illuminating. Having founded and run several startups, as well as having advised founders as either an attorney or board member, it has become clear to me that while a variety of factors are needed for an enterprise to be successful, there are several key factors that virtually every startup need to exhibit and embrace in order to be successful.</p>
<p>Accepted wisdom is that most startups will fail. So what makes the outliers successful? In my experience, there are five key factors, and I share them here.</p>
<p>1. <em>Don’t start with a product, start with an open mind.</em><br />
Thanks to lesson from the book the “Lean Startup,” the days of “if we build it, they will come” has thankfully passed. Most companies are founded on a “big idea,” whose founders are, understandably, passionate and committed to pursuing their dream. So what goes wrong? One survey of failed startups determined that 42% of them identified the “lack of a market need for their product” as the single biggest reason.</p>
<p>The brilliance of the concept that an entrepreneur should develop a “minimal viable product” &#8211; build something small, fast and cheap, and then test it &#8211; is its simplicity. Remaining nimble, flexible and open-minded cannot be overstated. (Equally important, of course, is to make sure the appropriate inventions assignment agreements and contractor agreements are drafted to ensure that your company properly owns everything your employees and contractors create).</p>
<p>2. T<em>o build a viable business, you need to build a successful team. </em><br />
Psychological research is rich in the documentation and study of dysfunctional groups (think of Tolstoy’s “unhappy families”.) In the world of startups, many failures are due to discord among the founders. Although most founders are people with high hopes and good intent, when you bring into the mix the differences of personality, background and skills, combined with variation in expectations, conflict is to be anticipated. In most cases where the founders fail to resolve or work around these differences, the demise of the company is not far behind.</p>
<p>Thus, instilling teamwork skills and practice into your company culture is the key to its success. From a legal framework, a “founders” or shareholders agreement that delineates the rights and remedies of shareholders should disagreements or conflicts arise is also essential.</p>
<p>3. <em>When adversity strikes, resilience is essential. </em><br />
Things will go wrong, terribly wrong with your startup. This is not due to bad luck, rather it is part and parcel of launching a new enterprise. Startups operate in a rarefied environment in which market conditions, competition and circumstances (both macro and micro) are constantly in flux. Startup teams must possess the ability to change products, adjust to the changing landscape of competition, shift industries, rebrand the business, or even tear down a business and start all over again.<br />
Resilience in the face of the headwinds of adversity is essential. There are many studies examining what makes one individual more resilient than another. One commonly identified trait is referred to as the “internal locus of control”. Simply put, resilient individuals believe that “they,” and not their circumstances, are the driver of success. So when things go wrong, roll with the “punches” and remain focused on success.</p>
<p>4. <em>Keep your friends close, and your advisors closer.</em><br />
I have helped many startups screen and engage advisors. Advisors and board members can make a significant contribution to a startups success. By providing an imprimatur of credibility, imparting insightful wisdom, making key introductions, or raising seed capital, an advisor can give the startup the foundation it needs to keep on track.</p>
<p>Unfortunately, the reality is that most advisors will not workout. He or she may overpromise, lose interest, or become consumed by competing commitments. You can insure that your advisor agreements provide adequate equity and/or incentives to secure the advisor’s engagement, but also have reasonable “cliffs” and milestones to warrant that compensation is tied to value received.</p>
<p>5. <em>Show me the money!</em><br />
All too often I have seen the never-ending pursuit of founders for money become the crucible that becomes too heavy to bear. Thus some very good ideas and promising companies fail to get very far. Since raising money is so challenging, my advice is to ask for more money than you think you will need, take money when you can get it, and in most cases use a convertible note to quickly (and cheaply, relative to other approaches) bring in the money so that you can focus on growing your company.</p>
<p>Once you have the necessary funds to get things underway, make sure you are disciplined in your spending. That means keeping overhead in line with your cash, recruiting key first employees with a modest (but competitive) salary and a generous equity grant. (And if you don’t have an equity compensation plan/strategy in place for key employees, stop reading this and go get one!)</p>
<p><em>Increase your odds of success.</em><br />
Launching a startup is a momentous endeavor, and one that promises both excitement and heartbreak. While there is simply no “formula” that guarantees success, keeping in mind some of the above lessons may increase your odds.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/">From Startup to Growth Company – Five Factors For Success</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/startup-growth-company-five-factors-success/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Privacy Audit – Make it Your Organization’s New Year’s Resolution!</title>
		<link>https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/</link>
					<comments>https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 20:31:59 +0000</pubDate>
				<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[privacy audit]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/</guid>

					<description><![CDATA[<p>It&#8217;s the time of year when its typical to focus on self-betterment, so let’s not leave the organization you work for out. Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees. Unfortunately, most organizations could be doing more to protect this information. The fact is that with each passing [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/">Privacy Audit – Make it Your Organization’s New Year’s Resolution!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s the time of year when its typical to focus on self-betterment, so let’s not leave the organization you work for out.  Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees.  Unfortunately, most organizations could be doing more to protect this information.  The fact is that with each passing year, the number of data breaches grows, and the financial cost and reputational harm along with it.  Additionally, the regulatory landscape is becoming more complex, requiring organizations to comply with an increasing number of requirements or face penalties.  The good news &#8211; a significant portion of data breaches and related risks can be avoided or minimized with a bit of due care. As such, it has never been more critical to have a more practical understanding of the types of personal information collected, stored and shared by your organization.  A first step for any organization wishing to better understand (and minimize) their privacy risk is to conduct a privacy audit. </p>
<p>A privacy audit is essentially a process to identify, across the organization (and chapters), the types of personal information collected, the ways in which it is protected, and with whom such information is shared.   The following risk assessment methodology is a good place to start.<br />
•<strong>Inventory</strong>    Locate the places in the organization (and vendors operating on its behalf) that house/store Personally Identifying Information (“PII”), identifying both electronic files/databases and physical files.<br />
•<strong>Safeguards</strong>    Assess the safeguards in place – including the physical, administrative and technical controls – and whether they are adequate and reasonable considering the type of PII being stored (SSN vs. email address for example might have different levels of protection).<br />
•<strong>Gaps</strong>  Determine the compliance gap – essentially the difference between that what it should be doing, and the organizations actual practices.<br />
•<strong>Risk Assessment</strong>    For most organizations there will be a number of gaps.  As a first step, for the PII held in various locations and with various vendors, assess the risk of non-compliance, determine the impact of non-compliance and likelihood of risk occurrence, and use this to help prioritize compliance efforts.<br />
•<strong>Remediation</strong>   Depending upon the finding/conclusions in the previous steps, remediation should be a joint effort among various members of the organization to address and remedy any identified shortfalls/gaps.</p>
<p>The above are general guidelines. As a first step, I typically provide clients with a customized, detailed checklist that is an essential tool for our audit.  Not surprisingly, most of these audits reveal a variety of gaps and poor practices, which once addressed and remedied, reduces the likelihood of a breach, and leaves the organization better prepared should one occur.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/">Privacy Audit – Make it Your Organization’s New Year’s Resolution!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/privacy-audit-make-organizations-new-years-resolution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
