Tom Considine & Associates
"Information Privacy Professionals"

Your Subtitle text

Compliance with consumer and patient protection laws does not have to be difficult or expensive.  Compliance requires a plan and providing the necessary training your Information Protection Manager needs to accomplish the tasks effectively and efficently.

Laws and requirements such as;

Nevada NRS 603A - Protection of Personal Information of Nevada Residents   
NRS-603A compliance training Nevada Revised Statues 603A Identity Theft Protection compliance training
Massachusetts 201 CMR 17 - 
Standards for the Protection of Personal Information of a Resident of the Commonwealth    MA201CMR17 compliance training, MA 201 CMR 17 compliance training, Identity Theft Protection / Prevention Law MA 201 CMR 17.
Payment Card Industry Data Security Standards (PCI DSS)
Contractual requirements for the protection of payment card information for all organizations that accept/process payment cards for goods or services

Fair and Accurate Credit Transaction Act "Red Flags Rules" - Identity Theft Prevention Program  Red Flag Rules training Information Protection Manager Identity theft Prevention

Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH)

Require Written Information Security Programs (WISP) and Identity Theft Prevention Policies to achieve compliance.  Information Protection Managers (IPM) are needed to properly safeguard sensitive materials organizations maintain on consumers and employees in the course of daily business. 

Our Information Protection Manager (IPM) certification program is designed to simplify the compliance process.    

Our program is based on sound information protection principles which comply with ISO/IEC 2700x information security standards meeting federal and state protection requirements. 

Because our program utilizes lean Six-Sigma principles, staff performance increases while reducing duplicated tasks and excessive storage of patient and consumer sensitive information.  By implementing sound information security programs in the beginning, future changes to protection laws become nothing more than simple updates.     

Our former DOD Security Specialists will provide the materials and training necessary to achieve compliance while saving organizations many thousands of dollars on consultants and regulatory infractions. 

Steps to compliance are:

Help Us, Help Them!

Tom Considine and Associates is a PROUD sponsor of the Wounded Warrior Project.

Everyday our nations Hero's return home unsure what the future holds for them and their families.  As a Service Disabled Veteran Owned Business (SDVOB), we've been there, and understand their needs and concerns.   
For every 30 enrollments to our Information Protection Manager training program, we will provide IPM training and job placement assistance to a Wounded Warrior free of charge.  
Sponsorship opportunities exist for organizations who would like to sponsor a Wounded Warrior to attend our training.

                                              Tom Considine & Associates
                                         Information Privacy Professionals

                                                                  Ph:        (702)   722-3492