This checklist for the UK Information Commissioner’s Office helps small businesses collect and use information about customers properly and offers advice about drafting a privacy notice.
The Edelman Privacy Risk Index (ePRI) helps organizations around the world, better understand security and privacy risk and its impact on corporate reputation. Consumers want to know what´s happening to their data and have expectations about how their privacy is managed. The ePRI was developed in partnership with the Ponemon Institute and is the first global index to compare the level of privacy risk being faced by organizations in 29 different countries and regions with responses from 6,400 risk managers, security professionals and IT Pros.
This code of practice from the UK Information Commissioner’s Office explains the rights of individuals to access their personal data and clarifies what data controllers must do in this regard to comply with their duties as set out in the Data Protection Act 1998.
The FDIC voluntarily complies with the E-Government Act of 2002, which requires an agency to conduct a Privacy Impact Assessment when developing or procuring any information technology (IT) that collects, maintains, or disseminates personal information about members of the public. Provided here are an FDIC PIA template and procedures for completing the PIA template.
This guide from the UK Information Commissioner’s Office offers data protection basics, information on the role of the ICO and key definitions in the Data Protection Act.
This guidance from the U.S. Consumer Financial Protection Bureau offers descriptions of activities that may warrant favorable consierdation from the bureau and aims to encourage activity that has concrete and substantial benefits for consumers and contributes to the success of the Bureau’s mission.
This guidance from the BC Information Commissioner’s Office provides preliminary steps to responding to an information incident, including those involving personal information, and are intended to guide workers who encounter information incidents.
Nymity’s Data Privacy Accountability Scorecard is an evidence based, scalable framework for privacy offices to demonstrate accountability by monitoring, measuring and reporting ongoing privacy management activities in order to further realize benefits from their current investments in privacy management and from their future investments in privacy management.
The National Conference of State Legislatures has compiled this list of U.S. state laws related to the privacy of Internet users' online activities.
This video from Intel aims to encourage employees to put greater importance on data privacy considerations using statistics on consumer trust and outlining how technology is driving the emphasis on protecting privacy protections.
This code of practice from the UK Information Commissioner’s Office is designed to help businesses collect and use information appropriately by drafting clear and genuinely informative privacy notices.
This template is an optional guide for firms to assist them in fulfilling their requirements under the Federal Trade Commission’s Red Flags Rule.
The U.S. Federal Trade Commission has designed this compliance template to help businesses and organizations at low risk for identity theft design their own identity theft prevention program. It has two parts: Part A to help you determine whether your business organization is at low risk, and Part B to help you design your written identity theft prevention program if your business is in the low risk category.
This guide from the U.S. Federal Trade Commission offers help for businesses in educating staff about complying with the Red Flags Rule including FAQs, who needs to comply and what compliance looks like.
This paper from the CIO Council addresses various ways the Federal Government can use social media for information sharing, situational awareness, and to support agency operations, and the key considerations for each. The paper also explains privacy best practices for establishing a social media program, from pulling together an intra-agency team of experts to establishing internal social media polices and ensuring transparency of social media uses through published privacy notices and documentation.
Page 2 of 10 pages < 1 2 3 4 > Last ›