This form provides a method of communicating the initial known details of a possible information security incident within an organization. The form is offered in word format for easy customizing.
The Information and Privacy Commissioner of Ontario provides a practical guide for implementing the principles of Privacy by Design in the mobile communications industry.
The U.S. Federal Trade Commission released this report setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their personal data.
The Vermont Law School created this policy intended to protect consumers while supporting a national rollout of a smart electric grid, utility companies would ensure customer information is not disclosed to third parties except when the customer consents, disclosure is required to provide reliable electric service or disclosure is required by law, such as warrants or "sunshine" laws.
In order to bridge differences in approaches to privacy and provide a streamlined means for U.S. organizations to comply with the Directive, the U.S. Department of Commerce in consultation with the European Commission developed this "safe harbor" framework. This site provides the information organizations need to evaluate and join the U.S.-EU Safe Harbor program.
The Interactive Advertising Bureau Self-Regulatory Program for Online Behavioral Advertising aims to help protect consumers’ privacy rights and expectations in ad-supported online media. It was developed through a three-year collaboration of the marketing-media industry.
Created by the National Advertising Initiative, this is a set of self-regulatory principles that require NAI member companies to provide notice and choice with respect to online behavioral advertising, limits the types of data that member companies can use for advertising purposes and imposes a host of substantive restrictions on member companies' collection, use, and transfer of data used for online behavioral advertising.
This green paper by the Department Of Commerce Internet Policy Task Force recommends consideration of a new framework for addressing online privacy issues in the U.S., recognizing a continued set of challenges presented by rapidly changing technology and economic conditions.
Created by Nicholas Cramer of AllClear ID, this whitepaper takes a close look at key considerations involved in responding to data breaches of all sizes to help privacy, risk, legal and compliance professionals understand some of the nuances involved in a data breach response.
This IT security guide created by the British Information Commissioner’s Office aims to give small businesses practical advice in the area of IT security.
This guidance published by the CIO Council and the Chief Acquisition Officers Council provides federal agencies guidance in effectively implementing the government’s “Cloud First” policy and moving forward with the Federal Cloud Computing Strategy by focusing on ways to more effectively procure cloud services within existing regulations and laws.
This document created by the Expertise Department of the CNIL is a catalogue of good practices intended to treat risks that the processing of personal data may pose to the civil liberties and privacy of data subjects. It supplements the risk management method of the CNIL, the French data protection authority, with regard to risks to civil liberties and privacy and helps to determine the measures proportionate to the risks identified using this method.
This document created by the Expertise Department of the CNIL describes a method for managing risks that the processing of personal data can generate to individuals. It includes a complete analytical approach for improving the processing personal data.
Issued by the Mobile Marketing Association Privacy & Advocacy Committee in December 2011, this framework provides mobile application developers with policy language that can be “quickly and completely understood by the consumer.”
Created by Mozilla, this guide includes three major sections: How Do Not Track fits into the history of Internet privacy, case studies from four different types of companies and annotated code samples in a DNT tutorial.
Page 6 of 10 pages ‹ First < 4 5 6 7 8 > Last ›