IT AND PRIVACY PLANS AND POLICIES
Summary: This book contains a set of 34 tools (8 plans, 19 agreements and policies and 7 procedures) related to the most critical issues of the ‘duty of care' responsibilities on protecting the security and privacy of data.
CONTENTS
Chapter 1. IT and Privacy Plans
This chapter describes a set of minimum (8) Data Protection Plans to support the compliance actions of Data Protection Regimes, such as: GDPR, LGPD, etc. These include: Data Protection Officer Action Plan, IT Systems Testing Plan, IT Application Test Plan, IT Disaster Recovery Plan, Detail Security Controls, Systems Development Security Plan, IT Systems Privacy Plan, and Data Quality Improvement Plan.
Chapter 2. Legal Privacy Agreements and Policies
This chapter describes a set of minimum set (6) of Legal Privacy Agreements and Policies to support the compliance actions of Data Protection Regimes, such as: GDPR, LGPD, etc. These include: Controller-Processor Agreement, Employee Confidentiality Policy, Employee Confidentiality and Privacy Agreement, Employee Privacy Policy, Data Protection Policy and Web Site Privacy Policy.
Chapter 3. IT and Privacy Management Policies
This chapter describes a set of minimum (13) IT and Privacy Policies to support the compliance actions of Data Protection Regimes, such as: GDPR, LGPD, etc. These include: Information Technology (IT) Business Policy, Information Security Policy, Data Classification Policy, Physical Access Security Policy, Information and Data Encryption Policy, Data Quality Policy, Password Policy, User Access Authorization Policy, Internet and E-mail Policy, Acceptable Use Policy, Security Incident and Data Breach Management Policy, Backup and Recovery Policy and Data Retention and Destruction Policy.
Chapter 4. IT and Privacy Procedures
This chapter describes a set of minimum (7) Security and Privacy Procedures to support the compliance actions of Data Protection Regimes, such as: GDPR, LGPD, etc. These include: Backup/Restore Procedure, Personnel Administration Procedures, Data Subject Access Request Procedure, Data Breach Incident Response Procedure, Managing Security Incidents Procedure, Clean Desk and Screen Procedure and IT Change Management Procedure.
Got a question about the product? Email us at support@flevy.com or ask the author directly by using the "Ask the Author a Question" form. If you cannot view the preview above this document description, go here to view the large preview instead.
Source: Best Practices in MIS, Data Privacy PDF: "Duty of Care" IT Privacy Tools PDF (PDF) Document, John Kyriazoglou
|
Download our FREE Digital Transformation Templates
Download our free compilation of 50+ Digital Transformation slides and templates. DX concepts covered include Digital Leadership, Digital Maturity, Digital Value Chain, Customer Experience, Customer Journey, RPA, etc. |