ServiceAreaSubPageBanner

CSR Privacy Solutions

ATI Secure Docs is proud to introduce a new service to our customers: CSR Privacy Solutions. CSR delivers easy and intuitive data privacy tools that you can integrate into your existing business to improve both your internal information security and your defense against a data breach.

Choose the CSR solution that best meets the needs of your company and improve your privacy protection today!

Protect the Personally Identifiable Information (PII) of Your Employees and Customers

PII is any information that can identify an individual and possibly lead to identity theft or fraud. All businesses have PII, it comes from customers, employees, and vendors and is usually found in every department. It can be as obvious as a social security number or just an email address or phone number.

Protect Yourself and Your Business

Many laws cover the retention and/or destruction of PII, breach, and consumer notification protocol. Your responsibility for data protection encompasses all paper records and electronic files containing PII.
ATI Secure Docs Readiness Pro Edition, powered by CSR, will help your business reduce the risk of a data breach, and in the event of an actual or suspected breach, CSR takes the headache and hassle out of the legal requirements to report the loss or breach of PII to an ever-increasing number of authorities, as well as mandated notification to your customers.

How CSR Benefits Your Business

  • Save time and money
  • Provide you and your customers with peace of mind
  • Makes privacy laws clear and easy to act on
  • Mitigates risks from incorrect breach reporting
  • Effortlessly fulfill breach reporting requirements
  • Simplify your privacy and incident response plans

What is CSR Readiness®?

The core element of the CSR Readiness® program is a specialized risk assessment questionnaire, which you can use to conduct a thorough evaluation of your existing information and data breach protection standards. Once you’ve established the areas that require improvement, the CSR Readiness® program will automatically generate remediation instructions, policies, and suggested best practices for you to implement.

This includes:

  • Compliance
  • Security
  • Audits
  • Incident Response Planning

Once you’ve made the recommended adjustments, you’ll receive a CSR Readiness Certificate of Completion, which publicly attests to the fact that your business carefully and correctly handles personal and confidential information.

How CSR Readiness Works: Three Simple Steps

CSR program flayer

Breach Reporting Service (BRS)

The Breach Reporting Service is the reactive counterpart to CSR Readiness. In the event of a data breach, this solution fulfills your legal requirement to report the breach and notify your customers. This patented, award-winning service is provided by Certified Information Privacy Professionals and will help protect your reputation and mitigate fines.

Four Easy Steps

  1. Collect all necessary information
  2. Call the toll-free number: 888-301-6449
  3. The CSR Privacy Professional will evaluate the incident using the powerful and patented CSR systems
  4. CSR completes all necessary reporting and, if needed, works with the user to complete consumer notification
SecurityImage
Readiness Pro Logo

ATI Secure Docs Readiness® Pro Edition

The Readiness® Pro Edition will help your business reduce the risk of a data breach, and in the event of an actual or suspected breach, CSR takes the headache and hassle out of the legal requirements to report the loss or breach of PII to an ever-increasing number of authorities, as well as mandated notification to your customers.

Readiness® Pro comes complete with the original Readiness® program as well as the award-winning Breach Reporting System.

Watch CSR’s Breach Reporting Service and Readiness videos to learn why reporting and notification are mandatory, how the service works, and who the experts are behind it.

Discover the #1 data privacy solution for small to medium sized businesses.

The Texas Privacy Protection Act

Texas Governor Greg Abbot signed into law the Texas Privacy Protection Act (“TPPA”) which amends Texas’ existing breach notification law, the Texas Identity Theft Enforcement and Protection Act (“TITEPA”) and creates the Texas Privacy Protection Advisory Council (the “Council”). The TPPA is in effect as of January 1, 2020.

Per the TPPA, “persons conducting business in Texas and owns or licenses computerized data that includes sensitive personal information” of Texas residents, who experience a breach of security, must provide consumer notification to all affected state residents without unreasonable delay and no later than 60 days from the date of discovery of the breach.

Reporting must also be provided to the attorney general when the breach involves at least 250 Texas residents, and must be made no later than 60 days from the date of discovery of the breach. The contents of the breach reporting to the attorney general must include:

  1. A detailed description of the nature and circumstances of the breach or the use of sensitive
    personal information acquired as a result of the breach;
  2. The number of residents of this state affected by the breach at the time of notification;
  3. The measures taken by the person regarding the breach;
  4. Any measures the person intends to take regarding the breach after the notification under this
    subsection; and
  5. Information regarding whether law enforcement is engaged in investigating the breach.

Businesses handling the personal information of Texas residents must implement an incident response plan for investigating and responding to security breach incidents, including employee and vendor breach training and awareness.

CSR Privacy Solutions, Inc. can ease the tension small to medium size businesses (SMB) may feel with implementing and keeping up to date with necessary policies and procedures. We are privacy made simple with a focus on risk awareness, avoidance, and evaluation.

Got Questions? Check Out Our CSR FAQ Page!

States With Mandatory PII Security Programs

Close