• /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /

Privacy Impact Assessments (PIA) / Privacy Threshold Analysis (PTA)

VerSprite provides an array of privacy services that help identify data flows and where privacy concerns are warranted. This plays a critical role in an evolving and complex world where privacy laws like the Health Insurance Portability & Accountability Act (HIPAA) as well as Global Data Privacy Regulation (GDPR) require greater assurances around privacy authorization and protection controls.

Using our PASTA methodology, VerSprite helps you deliver a privacy strategy that is not only backed by your legal adherence to more stringent laws, but also to develope and manage technology that supports greater privacy protection for your customers.

PIA / PTA:

Need to determine the impact level to which your data may be infringing upon personal privacy?

Both PIAs and PTAs are good indicator as to identify the following:

  • Has authorization to use the data been obtained?
  • Is the data retention period infringing on any retention laws for the data or a subset?
  • To what degree is the data being protected (e.g. – encrypted, access controled, etc.)?
  • Is there a clear business need to use the data?
  • How much data is being obtained as part of the authorized business function?

  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /

VerSprite Addresses Your Privacy Challenges

VerSprite provides a managed service model to deliver PIAs and/or PTAs as an ongoing and integrated service to your business. Mergers and acquisitions and third-party vendors can jeopardize data privacy and compliance adherence.

Our holistic security process considers privacy risks that could affect an organization. We employ our PASTA threat modeling framework to address privacy challenges.

PASTA for Privacy Framework

We introduced a PASTA for Privacy framework which represents a risk-centric approach to scoping data environments, evaluating data management strategies, and evaluating security controls like encryption, backup policies, and retention practices.

  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /
  • /

Download Envisions 2023: Critical Threat Report

Explore how cyberwarfare and geopolitics intersect to fuel threat campaigns targeting remote work, medical services, global logistics, cyberattacks on cost-effective business support services, and more.