Do you know where your company’s data is? Without strong security controls in place, your data could be anywhere — and you could be dealing with a privacy breach. As technology grows more complex and the flow of information accelerates, opportunities for the misuse and abuse of data are bound to increase.
Flow Chart of Data
It’s imperative that you know exactly what data your business collects. Pay particular attention to the personally identifiable information (PII) you have for both customers and employees. Create a detailed flow chart showing what information is gathered, how it is captured, how it is used, where it is stored, how it is shared, and how it is ultimately disposed of.
Risk and Regulations
An effective data management plan helps ensure compliance and manage risk by establishing policies and procedures that control the flow and use of information. In addition to federal privacy legislation, the vast majority of states have laws to prevent security breaches, and some industries have developed their own privacy guidelines. Note that each phase of the information “life cycle” may require a unique set of controls.
Privacy Policies
Privacy policies are the “public” face of your data management plan. Best practices include:
- Notify customers about your privacy policies. Explain why information is collected, how it is used, why it is retained, and why it is disclosed (if it is).
- Obtain customers’ consent to use the information as outlined in your policies.
- Collect only the information you need and only for the purposes outlined.
- Keep personal information secure.
- Allow customers to review and update their PII.
- Do not retain information any longer than needed to fulfill your stated purpose or as required (by law or regulation).
- If you disclose information to a third party, do so only with consent and only for the purposes outlined.
- Monitor your compliance efforts on an ongoing basis.
For more tips on how to keep business best practices front and center for your company, give us a call at 631-474-2500 for a free, confidential consultation. We look forward to working with you.
Having a qualified default investment alternative relieves you and plan fiduciaries of certain liabilities. Click through to enhance 401(k) plans by providing investments with potential for long-term growth regardless of how engaged employees are.
Every interaction with your customers can enhance your image. Here’s how QuickBooks Online contributes to that.
QuickBooks Online lets you turn fields on and off in your sales forms and specify other preferences.
It’s easy to specify which fields should appear on your invoices, what the labels should say, and how wide the space should be.
You have control over the messages that go out with your invoices.
Whether you use a desktop computer, a laptop, or a smartphone, you have probably come to rely on e-mail to communicate with vendors, customers, and business associates. It’s just as likely that many of your e-mails have attached files that contain confidential information or some other highly private data. Unfortunately, private, important data can be stolen, accidentally forwarded, or leaked through malicious software programs. That’s why you need to focus on enhancing your security measures. Here are some enhancements to consider.
Any business with employees must withhold money from its employees’ paychecks for income and employment taxes, including Social Security and Medicare taxes (known as Federal Insurance Contributions Act taxes, or FICA), and forward that money to the government. A business that knowingly or unknowingly fails to remit these withheld taxes in a timely manner will find itself in trouble with the IRS.
Business owners who travel out of town on business sometimes like to extend their trips and take a little time to relax and see the sights. When a trip is partly for business and partly for pleasure, various expenses may still be deductible.