top of page

   Cyber (Operations)

 

  • Ensured that data security practices such as logging, monitoring and auditing did not conflict with privacy requirements.

 

  • Worked closely with the technology services teams to anticipate potential privacy problems embedded in the application of emerging technologies, and developed, implemented and managed a domestic corporate privacy protocol.

 

  • Managed investigations regarding privacy complaints and provided timely advice and responses.

 

  • Provided strategic assessment of privacy risks and proactively worked with business teams to mitigate risk.

 

  • Conducted privacy awareness training and orientation for all employees, application developers, HR and marketing.

 

  • Ensured that the client was informed and able to engage with customers and the market regarding privacy issues.

 

  • Ensured that the client maintained the appropriate privacy and confidentiality consent, authorization forms and notices.

 

  • Devised and updated policies and procedures for customers, employees relating to privacy incidents and responses.

 

  • Developed privacy requirements for products and for subsequent regional deployments thereof.

 

  • Ensured that third-party suppliers' contracts and operating-level agreements met the client’s privacy requirements.

 

  • Spearheaded the client's responses to privacy-related emergencies and other potentially damaging events.

 

  • Ensured that business units, technology teams and third parties followed the client's privacy program, met privacy policy requirements and addressed privacy concerns, and collaborated with business units and technology departments to formulate action plans to remediate privacy compliance issues, and experience with subscriptions.

 

  • Experience with marketing and marketing campaigns, including digital, direct, interpersonal, print, telemarketing.

 

  • Consultation regarding e-commerce matters such as content license, web and mobile app design and development agreements, digital advertising laws and agreements, with particular attention given to privacy implications.

 

  • Consultation for technology and information security professionals regarding privacy policy issues.

 

  • Participated in new business initiatives and product development activities to identify and escalate privacy considerations to the appropriate key personnel, and audited disaster recovery testing.

 

  • Participated in the evaluation and selection process for new and replacement security vendors, applications and systems.

 

  • Consultation for the tokenization of real property (the process of converting the cash value of a property in US dollars into a fungible digital currency equivalent, called a virtual token, on a blockchain – an electronic string of calculations, each verifying the authenticity of the other – to represent a fractional ownership of a particular real property or a group of real properties).

    Last updated 200513_2225

bottom of page