This booklet brings together the key components of the OECD privacy framework, along with the supplementary documentation to provide context and explanation. The cornerstone of that framework is the revised Privacy Guidelines, which form Chapter 1.
These new guidelines constitute the first update of the original 1980 version that served as the first internationally agreed upon set of privacy principles and focus on the practical implementation of privacy protection through an approach grounded in risk management and the need for greater efforts to address the global dimension of privacy through improved interoperability.
This sample policy addresses the use of employee-owned personal computing devices to access, with certain limitations, the Company’s computing systems.
A sample contract between an employee and employer outlining acceptable uses of company owned computing systems and data owned, operated or controlled by the company.
This voluntary Code of Conduct for mobile application (app) short notices developed through the Multi-Stakeholder Process on application Transparency convened by the United States Department of Commerce. The purpose of the short form notices is to provide consumers enhanced transparency about the data collection and sharing practices of apps that consumers use.
The UK ICO created this toolkit for businesses as part of its ACCESS AWARE campaign aimed at helping prompt employees to recognize a request for personal information and know how to deal with it. It includes employee awareness posters and a ‘subject access request’ step-by-step guide.
The Privacy Commissioner of New Zealand developed this privacy checklist to help organizations figure out whether their client and staff information will be safe if they switch to cloud services.
The FDIC offers a summary of the Telephone Consumer Protection Action of 1991; key definitions; information on verification procedures, the do-not-call list and automated dialing, and an examination worksheet tha can be used to review audit work papers, evaluate bank policies, perform transaction testing and train.
This checklist from ReturnPath aims to assist marketers in complying with the CAN-SPAM Act which sets minimum standards for commercial e-mail.
This webpage from L-Soft includes a table that aims to give an overview of the basic e-mail requirements in the United States and Europe and checklists of legal requirements and best practices for e-mail.
Based on the FTC’s prior work in mobile privacy, panel discussions and written submissions, this report offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.
This guide is used by CFPB examiners to oversee companies that provide consumer financial products and services, it describes how the CFPB supervises and examines these providers and gives our examiners direction on how to determine if companies are complying with consumer financial protection laws.
The FTC offers this guide to financial institutions to determine whether they are coveredby the Gramm-Leach-Bliley Act, and if so what their obligations are under the act.
This guidance from the UK Information Commissioner’s Office explains what organizations need to do to make sure they comply with the Data Protection Act when they archive or delete personal data.
Page 3 of 10 pages < 1 2 3 4 5 > Last ›