Employee Privacy Policy
Personal privacy is a cherished value closely linked to concepts of personal freedom and well being. At the same time, personal privacy parallels fundamental principles of the First Amendment to the Constitution, the most important hallmark of personal freedom, the protection of free flow of information in society.
Most organizations require personal information about their employees to carry out business goals and objectives. It is imperative that collected information is safeguarded from intentional or accidental disclosure. Increasingly, automation of personal records permits this information to be used and analyzed in ways that would reduce employee privacy without adequate safeguards.
Organizations must have policies requiring compliance with legal, regulatory, and moral safeguards relative to employee information. These policies should assure that information technologies sustain and do not erode personal information protections in the organization's use, collection, and disclosure of personal information.
It is important that organizations constantly evaluate legislative and regulatory requirements involving the collection, use, and disclosure of personal information
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Nessus is a popular open-source scanner for organizations that choose not to spend the money on other proprietary products. There are s...
-
The IMP should be designed to follow some simple principles in order to be most effective. The plan should reflect the nature of the bus...
-
Often crisis responders will initiate a crisis notification through a verbal briefing. As such, it is imperative that a clear and accurate ...
-
The composition of the crisis and incident response teams should reflect the personnel required to analyze and deal with any events, fro...
-
The company should either establish a permanent facility in which to manage crisis events (if the frequency and scope of crises facing its ...
-
The inability to effectively gather and share information is a frequent management failure during many crisis events both within the incide...
-
Typically, the vulnerability information used by a particular vendor of a VM scanner or analyzer is stored in a database that is des...
-
Definition of hazard • A characteristic or group Of characteristics that provides the potential for a loss. • Examples: Internal and e...
-
The first step in implementing a strategy for deploying physical scanners is to select a central location to which all scanners will re...
-
In many descriptions you will see the words "Critical Incident Response Team" associated with critical incidents. Many incident ...
0 comments:
Post a Comment