Data Privacy & Compliance Policy
Effective Date: March 1, 2022
Updated Version: February 16th, 2025
Last Reviewed: July 21, 2025
Welcome Statement
01
At Knight Eagle Consulting Services (KECS), we believe privacy is not just a legal responsibility—it’s a reflection of trust, integrity, and the values we share with every client and partner. Whether you’re a veteran entrepreneur or a strategic stakeholder, this policy outlines how KECS collects, safeguards, and respects your data.
02
Purpose
To establish a framework for responsible management of sensitive information, including:
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
- Confidential business or strategic data
03
Scope
Applies to:
- All KECS employees, contractors, consultants, and vendors
- All platforms, software, and systems used to store or process data
- All service domains: strategic consulting, healthcare, justice, marketing, and technology
04
Core Principles
KECS follows industry-standard data governance practices:
- Transparency in data practices
- Purpose Limitation—data used only as needed
- Data Minimization—only necessary data collected
- Integrity & Confidentiality via robust safeguards
- Retention & Secure Disposal of expired data
05
Technology & Platform Disclosure
KECS uses Core Quantum Leads as our CRM system.
Our business communications and infrastructure rely on Google Workspace, which meets rigorous data protection and security standards.
06
Regulatory Compliance
KECS aligns with:
- U.S. HIPAA & FERPA
- California Consumer Privacy Act (CCPA)
- European Union General Data Protection Regulation (GDPR)
- Arizona-specific and VA guidelines for veteran services
Legal Basis (GDPR):
- Consent (e.g., for events or updates)
- Contractual necessity (for service delivery)
- Legitimate interest (e.g., strategic communications)
CCPA Compliance:
- KECS does not sell personal data
- California residents may submit opt-out requests via contact info listed below
07
Website Usage & Analytics
If visiting our website, note:
- We may use session cookies for functionality
- Marketing pixels (e.g., LinkedIn, Google Ads) may be present for campaign tracking
(Users may opt out via browser settings or by contacting KECS directly.)
08
Risk Management & Security
Our layered security infrastructure includes:
- Multi-Factor Authentication (MFA)
- Role-Based Access Control (RBAC)
- End-to-end encryption for data in transit and at rest
- Scheduled penetration testing and software patching
- Vendor audits and internal system reviews
09
Third-Party Data Handling
Any third-party vendor, subcontractor, or affiliate handling data on KECS’s behalf must:
- Sign a binding Data Processing Agreement (DPA)
- Undergo periodic compliance assessments
- Align with KECS’s security and data integrity standards
10
Rights of Data Subjects
We uphold your right to:
- Access, correct, or delete your personal data
- Object to processing or withdraw consent
- Request information on third-party sharing
Send privacy-related inquiries to:
📧 info@knighteagleconsulting.com
📞 888-359-9850 (Toll-Free)
KECS does not sell, rent, or transfer phone numbers or SMS consent to third
parties for marketing purposes.
11
SMS/Text Messaging Consent & Mobile Data
SMS/Text Messaging Consent & Mobile Data
If you provide your phone number to Knight Eagle Consulting Services (KECS) through
our website forms, onboarding forms, service agreements, scheduling systems, or direct
communication, you may be given the option to consent to receive SMS/text messages
from KECS. Message frequency may vary. Message and data rates may apply. You may
opt out at any time by replying STOP. For help, reply HELP or contact us at
info@knighteagleconsulting.com.
Mobile Information Sharing Policy
No mobile information will be shared with third parties or affiliates for marketing or
promotional purposes. All other categories of data sharing exclude text messaging
originator opt-in data and consent; this information will not be shared with any third
parties.
12
Incident Response
If a data breach occurs:
- KECS will notify affected parties within 72 hours, or as legally required
- A full internal investigation will be initiated per KECS’s Incident Response Plan
- Remediation steps and security enhancements will be communicated transparently
13
Training & Oversight
- All KECS team members undergo annual privacy and cybersecurity training
- Confidentiality agreements are renewed yearly
- Managers enforce compliance at the team level
14
Continuous Improvement
KECS regularly reviews this policy to reflect:
- Changing legal landscapes
- Technological innovations
- Sectoral best practices across healthcare, justice, and veteran advocacy
Signed,
Donald E J Jacobson JR
🖊️ Donald E.J. Jacobson Jr.
Founder & CEO, Knight Eagle Consulting Services
