What data breach procedures we have in place
Notification: Organizations must notify law enforcement, affected businesses, and affected individuals about data breaches. This includes notifying state and federal authorities as required by specific laws. 1 Data Breach Policies: Developing comprehensive data breach policies is essential for preventing, detecting, and responding to data security incidents. These policies should include protocols for safeguarding sensitive information, delineating roles and responsibilities, and outlining procedures for incident management. 1 Compliance with Legal Frameworks: Organizations must comply with various legal frameworks governing data breaches, such as HIPAA, GLBA, and state-specific laws like the CCPA and GDPR. These frameworks establish standards and requirements for responding to data breaches, varying by jurisdiction but often sharing common principles. 2 Incident Response: A well-crafted incident response plan is crucial for minimizing the impact of breaches, reducing legal liabilities, and demonstrating due diligence to regulators and customers. 1 Security Requirements: Organizations must adopt reasonable security procedures and practices appropriate to the nature of the information held by the business. This includes encryption, third-party due diligence, and other security measures as required by applicable laws. 1By understanding and implementing these procedures, organizations can better manage data breaches and protect their stakeholders. It is important to regularly review and update these procedures to stay compliant with evolving legal requirements and to respond effectively to new threats.
How we protect your data
Transparency: Inform consumers about what data is collected and how it’s used. Consent & Opt-Out: Provide mechanisms for opting out of data sales or targeted advertising. Data Security: Implement reasonable safeguards to protect personal information. Rights of Individuals: Access, correction, deletion, and portability of personal data. Breach Notification: Most states require notifying affected individuals (and
Privacy Policy
Who we are Our website address is: https://marymarcotte.com. What personal data we collect and why we collect it Comments When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from
Help Me Launch My New Book!
Although my website sales page WAS broken (thanks universe), my brother-in-law, Gary helped me figure out the issue. Which really means Gary figured it out, but I have spent the entire afternoon days on this computer fixing the issues. So now, dear friends, it is ready to go! New plugin, check. Setup, check. Tested, check.
The Big Unboxing
My boxes of A World Alone came in, but I decided to wait until the family arrived in force to unbox them. The guys were outside enjoying the gorgeous weather and man-talk. The girls, however, were close by so they joined the fun and added a touch of excitement. Teenagers. A huge thanks to Meggan
An excerpt from A World Alone
“Damn, he’s beat up. Good thing we know who he was. You sure can’t tell from his face,” Lemoine said as she homed in on the body. His clothing and body had been torn and ripped as he barreled forward with logs and rocks until coming ashore in this shallow, swampy area where the cypress
A Texas-size Wedding and Big Crowd Food
Last Saturday, I attended a wedding! One of my many nieces said her vows with just the right guy, Em and Zane. The wedding, held in Trinidad, TX, was long because, well, it was in Texas, but also because my sisters all love a great party. Em’s mom, Lee, is just like our mom in
A Quick Trip Around the State – almost
Important: all photo credits go to the Louisiana State Parks website. Last week, Rich and I took a short trip “up north” to the Monroe area, though we did not go into Monroe. Instead, we visited the five state parks in that area. It was fun, but Rich is a goer. He can’t “take a
