Privacy

Our Approach

We offer an array of services to help you review, assess, and improve your privacy compliance profile, ranging from the technical details of data security to the overarching policies and procedures which set the compliance tone for your organization.

At the outset of an engagement, we work to develop a deep understanding of your business, corporate culture, and the unique challenges at hand. After completing an initial assessment, we develop a comprehensive privacy program that is reasonably designed to address privacy risks related to the development and management of new and existing controls to protect the privacy and confidentiality of Personal Information on your IT systems.

We identify records, both digital and physical, requiring privacy protection under any regulatory framework, assess their current level of protection, and recommend any needed improvements. We can also prepare or review your existing data breach response plan to ensure you are in compliance with the data breach notification laws to which your organization might be subject.

Contact Us

a close up of a computer chip on a motherboard

Why Guidepost

  • The Federal Trade Commission and other regulatory authorities commonly require organizations that have had problematic privacy performance to implement an independent monitorship to review the organization’s compliance program and mitigate the risk of future breaches. Our experience acting as an independent monitor is unparalleled and we can provide the necessary oversight to help an organization satisfy regulatory obligations.
  • Our experienced compliance team has earned these credentials:
    • Certified Information Privacy Professional (CIPP)
    • Certified Information Systems Auditor (CISA)
    • Certified Information Systems Security Professional (CISSP)

Related Resources

July 30, 2024

Can a Failed Privacy Program Lead to Fentanyl Trafficking or OFAC Violations?

Continue Reading
July 18, 2024

Proactive Measures for Corporate Security in an Escalating Threat Environment

Continue Reading
June 12, 2024

Artificial Intelligence Governance – First, Build On What You Have

Continue Reading
April 2, 2024

Change Healthcare Ransomware Attack: 10 Lessons Learned

Continue Reading
a child drawing a picture from a tablet
March 28, 2024

FTC Proposes Strengthening Children’s Privacy Rule

Continue Reading
August 1, 2023

New EU-U.S. Data Privacy Framework Legalizes Personal Data Transfers from the EU to US

Continue Reading
five hot air balloons are flying in the sky at sunset
March 22, 2023

Forget Spy Balloons – The Bigger Threat is TikTok

Continue Reading
December 17, 2020

Good Intentions May Still Be Destructive To Privacy

Continue Reading
unfocused picture of people walking through a professional event
July 18, 2024

International Data Law Forum

International Data Law Forum

Continue Reading
a blurry picture of a convention with a blue floor
September 25, 2024

National Conference on AI Law, Ethics and Compliance

National Conference on AI Law, Ethics and Compliance

Continue Reading
a coffee cup sits on a saucer in front of a group of people
October 31, 2023

National Conference on AI Law, Ethics and Compliance

National Conference on AI Law, Ethics and Compliance

Continue Reading
an open magazine
September 3, 2024

Plan Adviser

Cybersecurity Best Practices for Retirement Plans

Continue Reading
a stack of folded newspapers
July 24, 2023

Cybernews.com

Eurostar adopts biometric check-in on UK-France trains, experts warn of risks

Continue Reading
a cartoon newspaper
February 12, 2019

securitysales.com

Security Consultant Talks Privacy Concerns, Convergence of Physical & Cyber Tech

Continue Reading
a close up of a microphone in front of a laptop
February 27, 2023

Guidepost in Motion Privacy Matters Part 3: Balancing Social Media Presence and Privacy

Listen to Podcast
a close up of a microphone with a sound wave behind it
February 27, 2023

Guidepost in Motion Privacy Matters Part 3: Balancing Social Media Presence and Privacy

Listen to Podcast
a close up of a microphone with a sound wave behind it
December 13, 2022

Guidepost in Motion: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media

Listen to Podcast
a close up of a microphone in front of a laptop
December 13, 2022

Guidepost in Motion: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media

Listen to Podcast
a close up of a microphone with a sound wave behind it
November 29, 2022

Guidepost in Motion: Privacy Matters Part 1: Privacy vs. Convenience

Listen to Podcast
a close up of a microphone with a sound wave behind it
November 29, 2022

Guidepost in Motion: Privacy Matters Part 1: Privacy vs. Convenience

Listen to Podcast
a close up of a microphone in front of a laptop
October 11, 2021

Guidepost in Motion EP 16: Vori Health: Privacy Challenges in the Virtual Start-up Setting

Listen to Podcast
InvestigationHotlines