This video from Intel aims to encourage employees to put greater importance on data privacy considerations using statistics on consumer trust and outlining how technology is driving the emphasis on protecting privacy protections.
This code of practice from the UK Information Commissioner’s Office is designed to help businesses collect and use information appropriately by drafting clear and genuinely informative privacy notices.
California Attorney General Kamala D. Harris released these guidelines on preventing and remedying medical identity theft, including best practice recommendations for the healthcare industry. The guidelines are part of a report, Medical Identity Theft: Recommendations for the Age of Electronic Medical Records, which frames the escalated migration to electronic medical records as an opportunity for the healthcare industry to address this problem.
This paper from the CIO Council addresses various ways the Federal Government can use social media for information sharing, situational awareness, and to support agency operations, and the key considerations for each. The paper also explains privacy best practices for establishing a social media program, from pulling together an intra-agency team of experts to establishing internal social media polices and ensuring transparency of social media uses through published privacy notices and documentation.
The American Medical Association published this toolkit aiming to help physicians review and update their HIPAA policies and procedures. This web page includes a toolkit including a breakdown of the revised rule,FAQs, a sample notice of privacy practices and a sample business associate agreement.
The Office for Civil Rights and Office of the National Coordinator for Health Information Technology collaborated to develop model Notices of Privacy Practices for healthcare providers and health plans, aiming to offer additional guidance on how to create a clear, accessible notice that their patients or plan members can understand.
This booklet brings together the key components of the OECD privacy framework, along with the supplementary documentation to provide context and explanation. The cornerstone of that framework is the revised Privacy Guidelines, which form Chapter 1.
These new guidelines constitute the first update of the original 1980 version that served as the first internationally agreed upon set of privacy principles and focus on the practical implementation of privacy protection through an approach grounded in risk management and the need for greater efforts to address the global dimension of privacy through improved interoperability.
This web page from the U.S. Department of Health and Human Services includes definitions, sample business associate agreement provisions and other information to help covered entities and business associates more easily comply with the business associate contract requirements.
This sample policy addresses the use of employee-owned personal computing devices to access, with certain limitations, the Company’s computing systems.
A sample contract between an employee and employer outlining acceptable uses of company owned computing systems and data owned, operated or controlled by the company.
This voluntary Code of Conduct for mobile application (app) short notices developed through the Multi-Stakeholder Process on application Transparency convened by the United States Department of Commerce. The purpose of the short form notices is to provide consumers enhanced transparency about the data collection and sharing practices of apps that consumers use.
The UK ICO created this toolkit for health organizations as part of its ACCESS AWARE campaign aimed at helping prompt employees to recognize a request for personal information and know how to deal with it. It includes employee awareness posters and a ‘subject access request’ step-by-step guide.
The Privacy Commissioner of New Zealand developed this privacy checklist to help organizations figure out whether their client and staff information will be safe if they switch to cloud services.
This checklist from ReturnPath aims to assist marketers in complying with the CAN-SPAM Act which sets minimum standards for commercial e-mail.
Page 3 of 11 pages < 1 2 3 4 5 > Last ›