Data Privacy Consulting Proactively navigate the data privacy regulation landscape Organisations are experiencing unprecedented change in the data privacy landscape. Changing privacy laws in Hong Kong are forcing constant business, technical, and legal operational changes. These changes often overlap, resulting in highly complex legal and regulatory scenarios.We offer a dedicated global cross-functional team that includes former regulatory agency officials, attorneys, chief privacy and data officers, technologists and privacy consultants, and auditors to help you build, implement, and optimise your data security and privacy program.Our data privacy consultants partner with you to understand jurisdictions and regulatory obligations, assess your privacy needs, implement compliance measures for data privacy and protection laws and safeguards such as China’s Cybersecurity Law, and respond to new and changing regulations. Learn More Data privacy consulting services: Pro Briefcase Privacy compliance Compliance with current and future privacy laws requires disciplined execution. From developing a robust compliance strategy to managing consent order response and data subject requests for information, Protiviti can help at every stage. Pro Building office Data discovery We help establish a formal inventory of data to capture where personal data is collected, processed, and stored. Paired with data privacy flow mapping, classification, and assessments, companies can automate and optimise their data discovery efforts. Pro Rightmark Square Privacy as a service (Protiviti PraaS™) Think of us as an extension of your team. We provide tailored, full-service support to assess privacy needs, implement and automate privacy-related functions, and respond to new and changing regulations. Client Story October 21, 2024 Enhancing Consent Management with OneTrust Protiviti and OneTrust helped a global software and IT solutions provider enhance its consent management processes, ensuring regulatory compliance. Read more Our comprehensive approach to data privacy Data privacy regulations are in flux globally. Even as companies put the finishing touches on extensive preparations to comply with applicable privacy laws, such as the European Union’s GDPR and California’s Consumer Privacy Act and China’s Cybersecurity Law, new regulations continue to be introduced in other countries. As legislators pass new laws, they continuously amend those already in effect. Data privacy regulations are not static.The problem and proposed solutions are complex and evolving. One thing is almost certain—anyone aiming to comply with a specific regulation with a target date in mind will be disappointed as those near-term obligations are supplanted by new and different rules over the mid and long-term.In response to this changing landscape, Protiviti applies a holistic framework that addresses the fundamental aspects of data security and privacy without being locked into any one specific compliance format. We focus on the most pressing data privacy issues companies face, including:Developing strategies to address global data privacy regulationsCompliance with regulatory obligationsAddressing resource and skill shortagesOperationalising privacy needsImplementing privacy tools and remediation supportBy working ahead of the law in a comprehensive fashion, Protiviti helps build the foundations of a strong but flexible privacy program that includes understanding principles, educating stakeholders, and developing an applicable governance structure for managing changes. This base enables companies and their stakeholders to look to the uncertain future of privacy regulations with greater confidence. Leadership Michael Pang Michael is a managing director with over 20 years’ experience. He is the IT consulting practice leader for Protiviti Hong Kong and Mainland China. His experience covers cybersecurity, data privacy protection, IT strategy, IT organisation transformation, IT risk, post ... Learn More Alan Wong Alan is a director at Protiviti Hong Kong with over 21 years of experience in IT and security solutions and project management. He specialises in IT governance, risk assessment, regulatory compliance, and cybersecurity assessment and consulting. He also has an extensive ... Learn More Key Data Privacy partners We partner closely with cybersecurity and privacy market leaders, ensuring our clients receive the best solutions to meet their needs.Notably, Protiviti has performed more global implementations than other OneTrust partners and has well over 175 OneTrust-certified consultants, including more than 10% of the global population of OneTrust Fellows of Privacy Technology spread across Europe, the Americas, and the Asia-Pacific regions.Some of our top partners include: CISO Next CISO Next connects CISOs and security thought leaders to explore and shape how their role will evolve in the current and future business landscape. Stay informed on latest trends, network with fellow CISOs, and build solutions for the future. Get Involved Featured insights SURVEY CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory requirements. INSIGHTS PAPER Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years... BLOGS Prioritise privacy to build trust and elevate customer experience Most businesses recognise the significance of data privacy and identity management in safeguarding information, yet many overlook the relationship between privacy, identity management and customer experience. This connection is becoming increasingly... BLOGS Developing a security function during a CISO’s first 100 days These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks,... BLOGS Building technology resilience: aspects and actions Building technology resilience is a continuous process. Technology resilience programs call for diligent monitoring, constant adaptation to evolving threats and continual evolution to respond to a shifting threat landscape. To begin with, they... INSIGHTS PAPER Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with... INSIGHTS PAPER How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate... BLOGS Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is... BLOGS A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essentialcybersecuritypractices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies... WHITEPAPER China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. WHITEPAPER China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Button Button Trusted Partnerships and Collaborative Efforts Drive Success in Data Privacy Initiatives We partnered with the client in building and maturing a data privacy program, including enhancing the company’s privacy rights process into a universal, globally scalable webform intake, 10+ custom workflows and an encrypted portal. Leveraged OneTrust autoblocking to establish baseline cookie compliance. Read more Rural Lifestyle Retailer Enhances Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. Read more Global Chocolatier Adopts Privacy Technology to Prevent Data Exposure Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. Read more How to successfully implement security and privacy tools The main issue that IT leaders face with security and privacy tools is integrating them with business and IT operations. Find out what the top two factors that influence the successful implementation of these tools are, and how can the team at Protiviti Hong Kong help you protect your organisation's valuable systems. The present and future of Data Privacy What’s next for privacy programmes? Listen to Protiviti leaders around the world talk about the sustainability of privacy investments. A number of organisations are struggling with sustainability. Data breaches will happen at some point in time, hence knowing your personal data and understanding where the data is or mapping data is critical. Watch this video to gain insights on (a) how to sustain the benefits that we have gained through the investments that have been made, (b) what the biggest issues in terms of sustainability are, and (c) how to drive sustainability through your privacy programme.