Blog Layout

Are You Engaging in Good Privacy Practices?

Innovate & Integrate


Are You Engaging in Good Privacy Practices?

Use this checklist to make sure YOUR organization is on top of its privacy practices:



  • Verify services for privacy policies: if an organization does not have an explicit policy related to protecting your personal information, it is not a good sign about handling sensitive information. This same rule applies to apps you install on your devices.
  • Think before you post: in social networks, forums, and chats, post only strictly needed information because search engines can correlate and aggregate random posts, messages, and profiles and get the information you don’t want them to have.
  • Make use of anonymity: when you don’t have to identify your sensitive information, use credentials with no PII or solutions to navigate anonymously.
  • Protect your device and communications: make sure to install and maintain firewall, cryptographic and anti-malware solutions on your device. The first one prevents your device from being hacked and from remote attacks, the second one helps protect your stored data and data in transit, and the last one can avoid the use of malware to track your browsing habits. To prevent direct access to them (in case they are stolen), make sure to set passcodes to access them every time you use them. And, finally, avoid at any costs making use of open Wi-Fi communication, and if you have to use it, do not send sensitive information.
  • Use cryptographic solutions in the cloud: in this day and age, it is standard practice for cloud services to encrypt users’ data to prevent unauthorized access. Encrypt your sensitive documentation.


Risk Assessment

  • Use cryptographic solutions in the cloud: in this day and age, it is standard practice for cloud services to encrypt users’ data to prevent unauthorized access. Encrypt your sensitive documentation.
  • Set software for privacy: make sure to configure the privacy options available in the software.  “Do not track me” and “delete history after log off” are some options you can find.
  • Use your passwords wisely: use different passwords among all services you join, especially those for encrypted or secure sites.
  • Follow your instincts: if you feel uncomfortable disclosing information, or think the information required is too intrusive, personal, or irrelevant to the service or content you are trying to obtain, don’t do it.
  • Implement a privacy policy: your organization should have clear guidelines for its users and employees about what information is collected, for what purpose, how it is used and kept, and how it is protected. Note that these guidelines should comply with local laws and regulations that may differ from state to state.
  • Know what you have: a data inventory should be available to tell an organization all the personal information about users, who is responsible for it, and who can access it.
  • Educate users: consider privacy pages, newsletters, video training, and other forms of education to make users (clients, employees, third parties, etc.) aware of what they should do to protect their privacy and the privacy of others.


AI and Litigation tools, working together
By Innovate & Integrate 25 Apr, 2024
Adapting with technology and AI to create optimal service is an IST Management priority. With image recognition, text analysis, language translation, named entity recognition, speech-to-text, and video content indexing, businesses can unlock deeper insights from data and streamline their operations. Learn more about these AI tools and how we're using them to enhance eDiscovery.
Group of employees working together
By Innovate & Integrate 20 Mar, 2024
Throughout Stuart Schwartz' career with IST, he has realized the critical role that his team plays - they are instrumental to his success in sales and operations.
IST's Digital Mail and Integrated Facilities Management screens
By Innovate & Integrate 27 Feb, 2024
With leading-edge technology and support, facility managers know how to handle any unexpected turn in their business. IST's crafted solutions anticipate the unknown– courier services continue, task management is efficient, and contracts are firm. See how IST's adaptable and innovative technology can create a resilient foundation for your business.
Show More
Share by: