Skip to content Data Privacy Day: Best Practices to Protect Important Information

Publication

Search Publications




January 2013

Data Privacy Day: Best Practices to Protect Important Information

In recognition of Data Privacy Day, Gordon & Rees reminds its clients to re-examine and regularly re-evaluate their personal and business privacy practices. 

On a personal level:

  • Be sure to protect your and your family’s identity and all personal information.
  • Ensure that all computer and Internet usage, including mobile devices, is secure, with unique and private password protection and practices.
  • Be aware of terms of service and privacy policies when making online purchases, banking, and using social media.
  • Be conscious of what you post, and who has access to that information.
  • Do not open suspicious emails, including attachments or Internet links.
  • Know who you are dealing with, and do not provide personal information over the telephone or through any unsecure Internet connection.

From a business perspective:

  • Employ risk management best practices and ensure that your company maintains a written privacy policy followed by all employees through good and frequent communication, training, and implementation.
  • Encourage employees’ awareness of risk and avoid breaches caused by simple employee negligence, loss, or theft.
  • Make sure your staff is knowledgeable about viruses and spyware, spam, and phishing.
  • Implement sound data collection, storage, use, sharing, and deletion practices to best protect your own clients’ and customers’ information.
  • Develop procedures for regular monitoring and immediate reporting of any cyber threats and actual attacks.
  • Reassess your risks and explore the options of cyber liability insurance coverage.

Gordon & Rees's Privacy and Data Security Practice Group provides the firm's clients with counseling in all aspects of privacy law, including assistance in risk assessment; developing and implementing privacy policies; employee training; and responding to cyber attacks and breaches of personal information.

 

 

Cyber, Privacy & Data Security


Cyber, Privacy & Data Security

Loading...