Nearly 58% of data breaches happen to small businesses. Resources that educate businesses on the ever changing data privacy legislation are at an all-time low. We have felt a deep responsibility to our customers through out the State of Michigan to provide suggested protocol and best practices to mitigate the risk that data breaches bring to a business.
Protect the Personally Identifiable Information (PII) of your employees and customers
PII is any information that can identify an individual and possibly lead to identity theft or fraud. All businesses have PII, it comes from customers, employees, and vendors, is usually found in every department. It can be as obvious as a social security number or just an email address or phone number.
Employees alone contribute nearly seventy-five percent of breaches, either intentionally or by accident. Portable devices, technology, and "remote" working are only adding to the growing problem.
Protect yourself and your business
Many laws cover the retention and/or destruction of PII, breach and consumer notification protocol. Your responsibility for data protection encompasses all paper records and electronic files containing PII.
Shred Experts Readiness Pro Edition, powered by CSR, will help our business reduce the risk of a data breach, and in the event of an actual or suspected breach, CSR takes the headache and hassle out of the legal requirements to report the loss or breach of PII to an ever-increasing number of authorities, as well as mandated notification to your customers.
How it works
CSR Readiness® - 3 simple steps
A self-assessment data privacy questionnaire:
Generation of remediation instructions, policies and best practices regarding compliance, security, incident response planning and audit; and
24/7 access to allow ongoing input and regular monitoring.
CSR Readiness is a PROACTIVE solution that helps your business improve the way it handles personal information and will identify potential privacy or security deficiencies. It then provides a prioritized remediation schedule to fill the gaps in your privacy policies and practices. This is critical should you ever come up in any sort of investigation or legal process related to a breach.