Samples, Tools and Templates    Marketing/Retail

State Data Security Breach Notification Laws

Created by Mintz Levin, this chart lays out state laws regarding data breach notification as of September 2012, including data and consumers protected; entities covered; notice procedures, timing and exemptions; penalties, and the possibility for a private right of action.

Opelika Power Services Customer Smart Grid Bill of Rights

The City Council of Opelika, Alabama, appointed a committee to create the Opelika Power Services Customer Smart Grid Bill of Rights, which was approved by the council in September of 2012. The policy gives customers rights related to how the utility uses the information it collects through smart grid technology. The rights include the right to be informed, the right to privacy, the right to options and the right to data security.

Data Balance Sheet

The Finnish Office of the Data Protection Ombudsman created this tool to help organizations assess their data processing practices and report key data processing issues to the organization's stakeholders.

Data Protection Laws of the World

Created by Cameron Craig, Jim Halpert and Matt Glynn of DLA Piper, this handbook is intended to provide a quick overview of features of data protection law that are often of greatest practical significance to businesses, such as international data transfer restrictions, security obligations and breach notification requirements.

Getting Accountability Right with a Privacy Management Program

The Office of the Privacy Commissioner of Canada (OPC), and the Offices of the Information and Privacy Commissioners (OIPCs) of Alberta and British Columbia have worked together to develop this document with the goal of providing consistent guidance on what it means to be an accountable organization.

Mobile App Advertising Guidelines

These guidelines created by Lookout Mobile Security cover requirements and suggested best practices around transparency and clarity of data collection, individual control over information collected, ad delivery and display behavior, collection and retention of personal or device-specific data, and secure transport of sensitive data for those building and integrating in-app mobile ad technology.

Model Contract Clauses Guidance

Created by the UK Information Commissioner's Office, this guidance gives an overview of using model contract clauses to transfer personal data outside the EU.

Model clauses for transferring personal data overseas: the May 2010 changes created this guide for European data controllers on the 2010 changes to model clauses for transferring personal data outside of the EU.

Do-Not-Call Policy Guidance

Created by the Direct Marketing Association, this checklist is designed to help marketers developing a Do-Not-Call (“DNC”) policy for consumers that is consistent with The DMA's Guidelines for Ethical Business Practice as well as with Federal and State Do-Not-Call laws.

Complying with the Telemarketing Sales Rule

Created by the U.S. Federal Trade Commission, this guide describes the types of organizations and activities that are subject to the Telemarketing Sales Rule and explains how to comply.

Sample Data Privacy and Security Addendum

A sample addendum to a third-party contract that addresses information security and privacy, requiring confidentiality and the employment of "commercial best practices" for ensuring the security of all organizational information activities.

Privacy Impact Assessment Form

Created by the British Columbia Office of the Government Chief Information Officer.

Sample System Privacy Impact Assessments

Samples of U.S. Department of Health and Human Services privacy impact assessments for systems that collect personally identifiable information.

Sample Third-Party Websites and Applications Privacy Impact Assessments

Samples of U.S. Department of Health and Human Services privacy impact assessments for third-party websites and applications.

Protecting Personal Information: A Guide for Business

Created by the U.S. Federal Trade Commission, this guide offers five key principles to a sound data security plan and checklists to guage your organizations practices.

Page 8 of 11 pages ‹ First  < 6 7 8 9 10 >  Last ›