This guidance from the BC Information Commissioner’s Office provides preliminary steps to responding to an information incident, including those involving personal information, and are intended to guide workers who encounter information incidents.
Nymity’s Data Privacy Accountability Scorecard is an evidence based, scalable framework for privacy offices to demonstrate accountability by monitoring, measuring and reporting ongoing privacy management activities in order to further realize benefits from their current investments in privacy management and from their future investments in privacy management.
The National Conference of State Legislatures has compiled this list of U.S. state laws related to the privacy of Internet users' online activities.
This video from Intel aims to encourage employees to put greater importance on data privacy considerations using statistics on consumer trust and outlining how technology is driving the emphasis on protecting privacy protections.
This code of practice from the UK Information Commissioner’s Office is designed to help businesses collect and use information appropriately by drafting clear and genuinely informative privacy notices.
This paper from the CIO Council addresses various ways the Federal Government can use social media for information sharing, situational awareness, and to support agency operations, and the key considerations for each. The paper also explains privacy best practices for establishing a social media program, from pulling together an intra-agency team of experts to establishing internal social media polices and ensuring transparency of social media uses through published privacy notices and documentation.
This booklet brings together the key components of the OECD privacy framework, along with the supplementary documentation to provide context and explanation. The cornerstone of that framework is the revised Privacy Guidelines, which form Chapter 1.
These new guidelines constitute the first update of the original 1980 version that served as the first internationally agreed upon set of privacy principles and focus on the practical implementation of privacy protection through an approach grounded in risk management and the need for greater efforts to address the global dimension of privacy through improved interoperability.
This sample policy addresses the use of employee-owned personal computing devices to access, with certain limitations, the Company’s computing systems.
A sample contract between an employee and employer outlining acceptable uses of company owned computing systems and data owned, operated or controlled by the company.
This voluntary Code of Conduct for mobile application (app) short notices developed through the Multi-Stakeholder Process on application Transparency convened by the United States Department of Commerce. The purpose of the short form notices is to provide consumers enhanced transparency about the data collection and sharing practices of apps that consumers use.
The UK ICO created this toolkit for businesses as part of its ACCESS AWARE campaign aimed at helping prompt employees to recognize a request for personal information and know how to deal with it. It includes employee awareness posters and a ‘subject access request’ step-by-step guide.
This step-by-step plan from the FTC helps organizations determine whether they are covered by COPPA—and what to do to comply with the Rule, if so.
The following FAQs from the FTC are intended to supplement the compliance materials available on its website. This document serves as a small entity compliance guide and covers general questions about COPPA, enforcement, parental notice and consent and more.
The Privacy Commissioner of New Zealand developed this privacy checklist to help organizations figure out whether their client and staff information will be safe if they switch to cloud services.
Page 3 of 10 pages < 1 2 3 4 5 > Last ›