Client data risk map starter kit
This starter kit gives you a fast, defensible way to answer the board’s hardest question, where client data lives and who can see it, then shrink overexposure without slowing service.
What it is
The Client Data Risk Map Starter Kit is a one-week, three-worksheet plan to map where sensitive client data enters, where it rests, who touches it, what leaves your org, and what you are keeping “just in case.” It is designed to produce decision-ready clarity, not a months-long security program.
Who it is for
It is for justice support teams and other high-trust service organizations that have client data spread across too many tools, inboxes, drives, spreadsheets, and exports. It is especially useful for leaders without a full-time technology executive who need calm, practical progress in real calendars.
A starter data inventory that distinguishes system of record versus copy, so you can see where reporting fights and risk start.
An access review checklist and a simple access rule (daily, sometimes, no access), plus a script to get real evidence from system owners.
A retention red flags list and a simple retain, archive, delete decision tree, plus a 30-day action plan to reduce top overexposures with owners and dates.
What you will walk away with
FAQs
What is a “client data risk map” in plain language?
It is a clear picture of client information in motion, where it enters, where it sits, who can access it, what leaves your organization, and how long it is kept. It focuses on real locations and behaviors, not your software list.
Is this a full security program or a compliance project?
No. The kit is a flashlight and a floor plan, meant to reduce guessing and create clarity you can act on quickly. It is not months of compliance work or a reason to pause service.
How long will this take and who needs to be involved?
Plan 60 to 90 minutes per worksheet, plus one end-of-week review with the few people who own the key systems. Done beats perfect, you want a rough map you can act on.
What are the most common places risk hides?
Email inboxes, shared drives, spreadsheets, forms tools, case management exports, texting apps, partner portals, dashboards, and AI note tools. The repeat patterns are duplicates, no system of record, shadow tools, shared accounts, and untracked downloads.
What is the fastest “first win” once we see the map?
Remove public sharing links, reduce admin accounts, turn on MFA where client data lives, tighten “everyone can view” permissions, and stop scheduled exports that email data out automatically. Those changes shrink blast radius fast.
How do we set retention rules without putting clients at risk?
Keep what you need for service, reporting, and legal obligations, then safely dispose of the rest. Align with counsel, funder terms, and client safety, because if a retention rule puts a survivor at risk, it is the wrong rule.
Gain access to the client data risk map starter kit
We will email you the Client Data Risk Map Starter Kit and other useful follow-up resources. Unsubscribe anytime.
Turn your output from the kit into clear next steps
In 30 minutes, we will review your top 3 bottlenecks and top 3 trust risks. You will leave with a prioritized next step that fits your mission and capacity.
30 minutes. Clear priorities and a next step you can act on.
