In an effort to protect personal data, Turkey has instituted sanctions that set out general principles to protect data and punish those who violate the law.
When GDPR was enacted in May 2018, companies throughout the EU needed to have processes in place to guard personal data. Employee data comes in many different forms so Employers need to create processes to safeguard that information.
How do you deal with employee data after termination? In this article, various companies provide answers in post-termination situations dealing with electronic and company data.
In this publication, the details and secrets of excellent record retention programs are unlocked. Learn how to update traditional methods to better fit your modern workplace. Find a starting point, execute an effective and compliant schedule and evolve with new regulations.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
Information governance (“IG”) is the activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs. One of the first steps to take when embarking on IG is to develop an IG Charter. The IG Charter is a foundational document that explains the purpose, goals, stakeholders, and responsibilities associated with an organization’s IG Program. The following outline explains each element of an IG Charter that an organization would use to plan for and operate its IG program.
This is a sample HIPAA policy.
This is a sample notice of privacy practices policy.
This is a sample workstation security policy.
Learn the top ten considerations for developing a cybersecurity incident response plan.