Meeting and exceeding data privacy compliance requirements is a growth accelerator for startups. Potential investors are increasingly prioritizing data privacy compliance when doing their due diligence before investing in startups. The good enough safeguards and controls employed by startups in the past are no longer satisfactory in the current climate of ransomware attacks and dataContinue reading “USING DATA PRIVACY COMPLIANCE AS GROWTH ACCELERATOR”

Happy Cybersecurity Awareness Month!

As data continues to be the core layer of modern organizations, cybersecurity will continue to be crucial to protecting data from unauthorized access. Data breaches have become the new norm; reaching their highest numbers of 1,291 in 2021.[i] Comparing this number to 1,108 in 2020, one cannot help but see an increase in case numbers.   MostContinue reading “Happy Cybersecurity Awareness Month!”

Endpoint Security: Protect Your Business and Your Clients

Oftentimes, businesses remotely connect their computer networks to their clients’ devices. These devices include laptops and cellphones. By connecting these devices to corporate networks, paths are created that allow for security threats. Endpoint Security protects devices from unauthorized access.  Endpoint security software uses encryption techniques to control security by monitoring and blocking certain activities onContinue reading “Endpoint Security: Protect Your Business and Your Clients”

Penetration Testing: The Hacking That Might Just Save Your Business

As all applicable organizations should know, the NY SHIELD Act took effect March 21, 2020, to protect the private information of New York residents from unauthorized access. This includes the private information of both employees and non-employees held by New York businesses. If a New York business has private information on New York residents andContinue reading “Penetration Testing: The Hacking That Might Just Save Your Business”


OVERVIEW During the COVID-19 pandemic, hedge fund employees were forced to work from home. This new normal created new challenges for hedge funds looking to prevent and monitor insider trading risk. Insider trading refers to purchasing or selling securities while in possession of material non-public information concerning such securities, or tipping such information, where theContinue reading “INSIDER TRADING & EMPLOYEE PRIVACY DURING COVID-19”

Who Regulates Whom? An Overview of the U.S. Privacy Regulatory Framework

Introduction In the United-States, both federal and state legislators have enacted privacy and security laws. While the Constitution does not contain the word privacy, the Supreme Courts has recognized individual privacy rights over personal issues. State Constitutions may – or may not – provide residents with stronger privacy rights than are provided by the Constitution.Continue reading “Who Regulates Whom? An Overview of the U.S. Privacy Regulatory Framework”

Telehealth and Privacy Issues

This paper surveys the privacy and security issues facing health care providers using video conferencing applications. Stricter privacy protection for health information date back thousands of years. Why are their stricter laws in place to protect health information? Well, embarrassing health information can lead to stigmatization. Keeping health information private makes patients more inclined toContinue reading “Telehealth and Privacy Issues”

Who Needs to Comply with PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) was enacted by the PCI Security Standards Council (PCI SSC) to combat financial fraud. Specifically, to protect against criminals stealing and using personal consumer financial information from payment card transactions and processing systems. PCI DSS created standards of practice for businesses that process credit card data.Continue reading “Who Needs to Comply with PCI DSS?”

Steps for CCPA Compliance

In this article, we try to demystify the California Consumer Privacy Protection Act (CCPA) for small and medium-sized enterprises (SMEs) concerned about CCPA compliance. The CCPA became law in California on June 28, 2018. The CCPA gives consumers more control over the personal information that businesses collect about them. Moving forward, businesses that target CaliforniaContinue reading “Steps for CCPA Compliance”

HIPAA Basics for Providers

Health Insurance Protection and Accountability Act of 1996 (HIPAA), as updated by the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) protect medical information within the United-States healthcare industry. HIPAA does not preempt stricter state privacy laws. The Privacy Rule standards address the use and disclosure of individuals’ health information –Continue reading “HIPAA Basics for Providers”