<!DOCTYPE html>
<html>
<head>
        <title>Data Breach Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
              text-align:center;
              font-size:10px;
              color:#333;
              width:600px !important;
              margin:0px auto;
                    font-family:Verdana, Arial, Helvetica, san-serif;
              }
           #aweber_rem a {
              text-decoration:none;
              }
           #aweber_rem a:hover {
              text-decoration:underline;
              }
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
        <tbody>
                <tr>
                        <td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
                        <div style="font-size:12px; text-align:right"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span><br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA" target="_blank" title="Trouble viewing this email? ">Trouble viewing this email?</a></span></div>

                        <div style="font-size:14px; text-align:right"><br />
                        <u style="text-decoration:underline"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qRpS2jYRWy0n9763je1Lp8920Q/zY5sZenP8eZaeu5qJL5oFA" title="CD-ROM Subscriptions">CD-ROM Subscriptions</a></strong></u>

                        <div style="font-size:12px; text-align:right"> </div>

                        <div style="font-size:12px; text-align:center"> 
                        <hr /> 
                        <p><span style="color:#000000"><span style="font-size:24px"><strong>Data Breach Standard Requirements</strong></span></span></p>

                        <p><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>

                        <ol>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">One day; you may be the victim of a data breach and need to answer questions from customers and the press immediately. Are you ready for each possible scenario; have you decided on a communication plan that reduces the impact on your support team while giving the most accurate information to the data subjects? Who is your company spokesperson and will you be ready even if the breach becomes public out of usual office hours?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">You do not want to be informed of a data loss incident from the users themselves or from the data protection authority. Do you have technology that can detect breaches that have taken place; forensics available to investigate how the data was lost (or changed); and can you go back in time with full user logs and identify the incident to understand its scope and impact?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If a breach occurs or the regulator investigates the organization; you need to have documents to explain the complete data flows. Are you ready to answer those questions as the level of fines will take into account the processes; technology; and documentation that describes the systems and flow of data.</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Have policies and procedures been established to ensure the continuity of data services in an event of a data breach, loss, or other disaster (this includes a disaster recovery plan)?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Estimate organization exposure if cloud vendor experiences an illegal or unauthorized release/breach of data. How many private records will the organization be storing in the cloud?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Does it stand to reason that in all instances when damages occur that there was previously a reasonable likelihood for harm giving rise to liability for a failure to warn?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">When you talk about data analytics, you use words such as machine learning, algorithms and data mining. However, do you actually know the meaning of these terms?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Who owns the data, what rights or recourse do you have for security breaches or incidents, what happens when you want to move to another provider?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">In light of the highly publicized data breaches that have shaken some of the worlds top brands, where should our IT leaders focus their security efforts?</span></span></li>
                        </ol>
                        <br />
                        <br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span></div>

                        <div style="text-align:center">
                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img align="right" alt="" height="900" src="https://cdn5.bigcommerce.com/s-ilcoov/products/141179/images/170772/Data_Breach_FC__70676.1523745576.1280.1280.gif?c=2" style="margin:5px" width="600" /></a>   </span></span></p>
                        </div>

                        <div>
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>WHY OWN THE  DATA BREACH SELF-ASSESSMENT?</strong></span></span></span></span></span></p>

                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The Data Breach Self-Assessment will make you a Data Breach expert by:  </span></span></span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Reducing the effort in the Data Breach work to be done to get problems solved</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensuring that plans of action include every Data Breach task and that every Data Breach outcome is in place</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Saving time investigating strategic and tactical options and ensuring Data Breach opportunity costs are low</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><u><em><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Delivering tailored Data Breach advise instantly with structured going-forward plans</span></span></span></span></em></u></li>
                        </ul>
                        <span style="color:#000000"><span style="font-family:verdana"> </span></span></div>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img alt="" height="311" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141179/images/170819/Data_Breach_RACI_Matrix__62139.1523746879.1280.1280.jpg?c=2" width="600" /></a></strong></span></span></span></span></p>

                        <hr />
                        <p style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>SET NEW DATA BREACH STANDARDS OF EXCELLENCE</strong></span></span></span></span></span></p>

                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The Data Breach Self-Assessment helps our clients create such high levels of Data Breach value that they set new standards of excellence.</span></span></span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensures you don't miss anything: 842 criteria in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants</span></span><br />
                                 </span></span></li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix</span></span><br />
                                 </span></span></li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Gives you a professional Dashboard to guide and perform a thorough Data Breach Self-Assessment</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Is secure: Ensures offline data protection of your Self-Assessment results</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><em><u><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Dynamically prioritized projects-ready RACI Matrix shows your organization exactly what to do next</span></span></span></span></u></em></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img alt="" height="311" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141179/images/170814/Data_Breach_Questionnaire__63266.1523746879.1280.1280.jpg?c=2" width="600" /></a></span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img align="left" alt="" height="311" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141179/images/170816/Data_Breach_Radar_Chart_-_Process_Average__47187.1523746879.1280.1280.jpg?c=2" style="margin:5px" width="600" /></a></span><br />
                        <br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img align="right" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156251/Service_Level_Agreement_Participant_view__62705.1503431033.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></span><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img align="left" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156249/Service_Level_Agreement_Summary_responses__92019.1503431031.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></strong></span></span></span></p>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td colspan="1">
                        <div style="text-align:left">
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="font-size:16px"><strong>COST/BENEFIT ANALYSIS; DATA BREACH<br />
                        SELF-ASSESSMENT JUSTIFICATION AND APPROVAL TOOLS:</strong></span></span></span></span><br />
                         </p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Purchasing a The Art of Service Self Assessment will spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of criteria that will aid in gaining approval and give you the ability to validate and review your Self-Assessment investment:</span></span></span><br />
                         </p>

                        <ul>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Excluding hired consultants and advisors from top management consulting firms, internal Data Breach Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.</span></span></span><br />
                                 
                                <ul>
                                        <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Statistics according to Glassdoor and <a href="" https:="" jobs="" www.indeed.com="">Indeed</a> tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee's annual pay by <a computing-hourly-rates-of-pay-using-the-2087-hour-divisor="" fact-sheets="" href="" https:="" pay-administration="" pay-leave="" policy-data-oversight="" www.opm.gov="">260 days</a>. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.</span></span></span><br />
                                         </li>
                                </ul>
                                </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Top management consulting firms <a how-much-do-top-management-consulting-firms-charge-clients-per-consultant="" href="" https:="" www.quora.com="">start at $2,000 a day</a>, with rates typically charged up to 40 hours per week.</span></span></span></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align:center"><span style="font-size:18px"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><strong>For a fraction of this the Self-Assessment will make you<br />
                        a Data Breach domain authority.</strong></span></span></span></span></p>

                        <p style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/DlTDSH0jIOpr763fpO1AYX2w/zY5sZenP8eZaeu5qJL5oFA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span><br />
                        <br />
                        <br />
                         </span></span></p>
                        </div>

                        <hr />
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/nMOFclQxpT71QdzdlTI7Xw/zY5sZenP8eZaeu5qJL5oFA" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>

                        <div style="text-align:center">
                        <div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
                         </span></span></div>

                        <div style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/mtd8V40rXqpk6td2iGtbEQ/zY5sZenP8eZaeu5qJL5oFA"><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/itil-training-organization-newlogosmall.jpg" width="280" /><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/prince2-training-organization-newlogo-small.jpg" width="280" /></a></span><br />
                          </span></span>

                        <p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework:  <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/V0zsyI8U19QKyau8m5hHkA/zY5sZenP8eZaeu5qJL5oFA">https://www.nist.gov/cyberframework/industry-resources</a></p>
                        <span style="color:#000000"><span style="font-family:verdana">  </span></span>

                        <hr /></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>

                        <p> </p>
                        <span style="color:#000000"> </span></div>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px"> 
                        <p> </p>

                        <p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>

                        <p> </p>

                        <p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/zY5sZenP8eZaeu5qJL5oFA" >Manage Subscription</a>  </p>

                        <p> </p>
                        </td>
                </tr>
        </tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/zY5sZenP8eZaeu5qJL5oFA/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>