EU Data Privacy
This course will explain the laws and regulations regarding the collection, storage, use and other processing of personal data within the EU. (Licensed for use in classroom settings only and not for distribution in any form.)
This course will explain the laws and regulations regarding the collection, storage, use and other processing of personal data within the EU. (Licensed for use in classroom settings only and not for distribution in any form.)
This is a sample Data Privacy Addendum that supplements an agreement between a customer and vendor. It is compliant for California, Virginia, Colorado and Connecticut.
Privacy data breach response policy and crisis management policy.
This is a sample policy concerning a company's data privacy and protection practices.
This is a sample data privacy compliance consent form for employees.
This Privacy Capability Maturity Model provides a detailed maturity model for all aspects of an organization’s privacy program, including its use of Artificial Intelligence (AI) and Machine Learning (ML) using personal information.
It seeks to gauge program capability across a variety of program elements, taking a “big picture” view on an organization’s readiness to comply with these requirements.
The Canadian government issued this document to provide guidance to private sector organizations, both small and large, when a privacy breach occurs. Organizations should take preventative steps prior to a breach occurring by having reasonable policies and procedural safeguards in place, and conducting necessary training. This guideline is intended to help organizations take the appropriate steps in the event of a privacy breach and to provide guidance in assessing whether notification to affected individuals is required. Not all steps may be necessary, or some steps may be combined.
A sample terms of service agreement between an individual and a company concerning the use of the company's website. This agreement includes clauses for license grants, restrictions, user obligations, privacy, and postings.
A checklist of 12 steps for global in-house counsel to consider for the first hours of responding to a data breach.
This is a sample data breach checklist.
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.