A step-by-step guide to addressing corporate data privacy and security (Part 2)

A data security program is only as strong as its weakest link, which, all too often, can mean your employees

This is the second article in a three-part series aimed at assisting companies in implementing a data privacy and security program. The first article addressed the importance of adopting such a program, how to put together a data privacy and security team, cataloging your company’s data and devices, and understanding the data security risks your company faces.

Tailor data collection and retention practices to your business’s needs, and use safe disposal methods

Contributing Author

author image

Todd C. Toral

Todd C. Toral is a partner with DLA Piper LLP (US) in San Francisco, where he litigates complex business disputes in state and federal courts...

Bio and more articles

Contributing Author

author image

Kathleen S. Kizer

Kathleen S. Kizer is an attorney with DLA Piper LLP (US) in San Francisco, where she litigates complex commercial disputes in state and federal courts...

Bio and more articles

Join the Conversation

Advertisement. Closing in 15 seconds.