Corporate Policy and Procedure
|
|
|
- Claud Greene
- 9 years ago
- Views:
Transcription
1 Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. CCTV traffic monitoring, when utilized with other Intelligent Transportation System (ITS) measures, is an effective means of ensuring the efficiency and safety of City roads, the individuals who use them, and the assets located within the Municipal Road Allowance. The need to ensure optimal efficiency and safety must be balanced with an individual s right to privacy. The purpose of this policy is to establish procedures which are intended to achieve this balance. Specifically, this policy addresses requirements and responsibilities with respect to: the installation and operation of the CCTV Traffic Monitoring System; the use of the information obtained through the CCTV Traffic Monitoring System; and custody, control and access to any Records created. LEGISLATED REQUIREMENTS This policy reflects the provisions of the Municipal Freedom of Information and Protection of Privacy Act (MFFIPA), as amended. Refer to Corporate - Freedom of Information and Protection of Privacy for general information regarding MFFIPA. SCOPE This policy applies to the CCTV Traffic Monitoring System installed by the City within Municipal Road Allowances.
2 Page Page 2 of 9 Any use of the CCTV Traffic System by Corporate Security, Facilities and Property Management, Corporate Services Department, for the purposes of conducting or aiding in an investigation pertaining to a law enforcement issue is subject to Corporate - Corporate Administration - Video Surveillance. DEFINITIONS For the purposes of this policy: CCTV Traffic Monitoring System or CCTV Traffic System means any system or device that enables continuous or periodic recording, observing or monitoring of the Municipal Road Allowance. The information collected through the CCTV Traffic System will be routinely overwritten. Incident means an event within the Municipal Road Allowance involving a vehicle(s), pedestrian(s), and/or cyclist(s) that causes interruption to the normal traffic patterns within the Municipal Road Allowance. Manager means the Manager, Traffic Engineering and Operations, Engineering Works Division, Transportation and Works Department, or his/her designate, in writing. Municipal Road Allowance means the width of the roadway from the property line on one side of the roadway to the property line on the opposite side of the roadway, for roadways within the boundaries of the City of Mississauga, whether under the jurisdiction of the City of Mississauga or the Region of Peel. Record means information that has been retrieved from the CCTV Traffic System while it is being utilized for the purpose of traffic monitoring and is stored in a media format that allows the image(s) to be viewed for the purposes outlined in this policy only. There are two (2) types of Records: Corporate Security Records means Records that were created by Corporate Security at the request of law
3 Page Page 3 of 9 enforcement agencies or as a result of a request received under MFFIPA. Engineering and Works Records means Records that were created by Corporate Security at the request of Engineering and Works staff in order to assess the effectiveness of traffic system and efficiency measures. ADMINISTRATION The City's Transportation and Works Department, Engineering and Works Division will be responsible for the installation, operation and maintenance of the CCTV Traffic System, the administration of this policy and the custody and security of any Engineering and Works Records. Corporate Security, Facilities and Property Management, Corporate Services Department, will be responsible for the custody and security of any Corporate Security Records. Information Technology will be responsible for the network infrastructure service provisions of the CCTV Traffic System infrastructure. CCTV TRAFFIC SYSTEMS Use of CCTV Traffic Systems CCTV Camera Location The use of the CCTV Traffic System, including specific camera positions, is determined on the basis of reasonable and justifiable grounds for the purposes of the provision of public road safety, determining traffic flow and assisting in Incident detection and mitigation within the Municipal Road Allowance. Each proposed CCTV camera position will be assessed on a caseby-case basis to determine the effects the CCTV Traffic System may have on movement within the Municipal Road Allowance. The City will take all reasonable steps to mitigate any adverse effects. For example, no CCTV camera will be placed so that it views into an area where individuals have a greater expectation of privacy, such as private buildings or other facilities which are not
4 Page Page 4 of 9 within the Municipal Road Allowance. Approval ACCOUNTABILITY Departmental Directors Manager, Traffic Engineering and Operations All locations for the installation of the CCTV Traffic System require the approval of the Manager. All applicable departmental directors are accountable for: ensuring all applicable managers/supervisors are aware of this policy and of any subsequent revisions; and ensuring compliance with this policy. The Manager is responsible for: creating, maintaining and reviewing protocols for the installation, operation and use of the CCTV Traffic System and for the control of and access to the CCTV Traffic System; designating persons to operate the CCTV Traffic System and maintaining an up-to-date list; only those who have been designated may be permitted to operate the CCTV Traffic System; providing Corporate Security with a list of persons authorized to request Engineering and Works Records; ensuring that all CCTV Traffic System monitoring equipment and devices are securely stored in a controlled access area; establishing a training program for the operation of the equipment, including responsibilities with respect to protection of privacy and confidentiality, and ensuring that all operators are trained appropriately; maintaining custody and security of all Engineering and Works Records, from creation through to final disposition; and ensuring that all proposed changes or additions to the CCTV Traffic System meet the requirements of this policy, as well as other City policies and by-laws, prior to implementation.
5 Page Page 5 of 9 Corporate Security Corporate Security is responsible for: and reviewing protocols for the custody, control, access to and retention of Corporate Security Records created from the CCTV Traffic System; maintaining custody and security of all Corporate Security Records, from creation through to final disposition; accessing the data collected and stored by the CCTV Traffic System to provide Engineering and Works Records to designated staff in accordance with this policy; and authorizing access to CCTV Traffic System information or creating Corporate Security Records in accordance with this policy. Information Technology Information Technology is responsible for the network infrastructure service provisions for the CCTV Traffic System, on behalf of the Engineering and Works Division. Managers/Supervisors Employees Managers/supervisors with staff who are responsible for the installation, operation and use of the CCTV Traffic System and/or the custody, control, access to or retention of CCTV Traffic System information or Records are accountable for: ensuring that each member of staff in their respective work units have signed an acknowledgement that they have read this policy and any subsequent revisions, and that staff are aware of any related protocols; ensuring applicable staff are trained on this policy and any related protocols, as well as any subsequent revisions, with respect to their specific job function; and ensuring staff comply with this policy and follow any related protocols. Applicable employees are responsible for: reviewing this policy and/or attending training related to this policy, as required; complying with this policy in performing their duties and
6 Page Page 6 of 9 functions related to the operation of the CCTV Traffic System; refraining from accessing or using the information contained in the CCTV Traffic System, its components, files, or databases for personal reasons, or destroying, erasing or altering any Record or information without proper authorization; and protecting the privacy of individuals with respect to personal information under MFIPPA. USE OF INFORMATION COLLECTED CCTV Traffic Systems are not surveillance systems and are intended for the purpose of traffic monitoring only. The information collected through CCTV Traffic Systems will be used only: to assess the effectiveness of traffic system and efficiency measures, such as traffic signal timing plans, works maintenance operations programs, temporary work zones, etc.; to mitigate the effects of detected Incidents which impact the normal traffic patterns within the Municipal Road Allowance; to provide law enforcement agencies with evidence related to an Incident or, upon request, other occurrence under police investigation; and for Transportation and Works to investigate Incidents involving the safety of pedestrians, cyclists, motorists or City assets. INFORMATION AND RECORDS MANAGEMENT The information collected through the CCTV Traffic System is retained in accordance with system requirements (e.g. captured images will be routinely over-written). A Record will be created from the information collected only when requested under the Use of Information Collected section of this policy, provided the requested information has not already been over-written. No
7 Page Page 7 of 9 other Records will be created or retained. Access Restrictions In accordance with MFFIPA, access to the information or Records created by the CCTV Traffic System is restricted. Access is limited to: individuals responsible for the operation or administration of the CCTV Traffic System; individuals who have a legitimate need to access the information for one of the purposes listed in the Use of Information Collected section of this policy; and individuals whose request for access under MFFIPA has been granted. When used in this policy, access means any of the following: Corporate Security staff may provide a summary of the information collected; the information may be viewed in the presence of Corporate Security staff; or if required by a law enforcement agency or Engineering and Works staff, a Record of the information may be provided. Access s Requests from Engineering and Works Access s Requests from Other Sources Engineering and Works staff designated by the Manager may contact Corporate Security directly by to obtain a Record when it is required for the purpose of traffic monitoring only. Corporate Security will create an Engineering and Works Record and forward it to the requestor. Engineering and Works staff will keep a log for audit purposes that includes: the date and time at which the Record was received; the identification of the staff person requesting the Record; and the specific reason for the request. Only those having a legitimate need to view CCTV Traffic System information or a Record will be given access.
8 Page Page 8 of 9 An access request form must be completed and submitted to Corporate Security. In making a determination, Corporate Security may consult with Legal Services and/or the Freedom of Information Coordinator, Office of the City Clerk, Corporate Services Department. When access to CCTV Traffic System information or a Corporate Security Record is given, the following information will be logged for audit purposes: the date and time at which the access was allowed or the date on which disclosure was made; the identification of the party who was allowed access or to whom disclosure was made; the reason for allowing access or disclosure; the extent of the information to which access was allowed or which was disclosed; and provisions for the return of the Corporate Security Record or its destruction. Staff who have authorized access to CCTV Traffic System information or any Corporate Security Record created through the CCTV Traffic System will be required to sign a written agreement regarding his or her duties, obligations, and responsibilities with respect to the confidentiality, use and disclosure of the Corporate Security Record. Unauthorized Disclosure Any unauthorized disclosure of CCTV Traffic System information is cause for disciplinary action, up to and including termination of employment. Any City of Mississauga employee having knowledge of any unauthorized disclosure of an Engineering and Works Record must immediately inform the Manager of the breach. The Manager, Corporate Security, must be informed of any
9 Page Page 9 of 9 unauthorized disclosure of a Corporate Security Record. REFERENCE: GC LAST REVIEW DATE: The Manager will inform the Freedom of Information Coordinator, and together they will take all reasonable actions to recover the Record and limit the Record s exposure. CONTACT: For more information related to the CCTV Traffic System, contact the Engineering and Works Division, Transportation and Works Department. For more information related to Corporate Security Records, contact Corporate Security, Facilities and Property Management, Corporate Services Department. For more information related to MFFIPA, contact Legislative Services/Office of the Clerk, Corporate Services Department.
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001
I. Introduction. Traffic Engineering and Highway Safety Division Policy for the Design and Operation of Closed-Circuit Television (CCTV) in Advanced Traffic Management Systems September 4, 2001 The New
Last updated: 30 May 2016. Credit Suisse Privacy Policy
Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using
Title of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL (AHS AND
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
Camera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
CCTV PROCEDURES To support Information Security Policy Framework
CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
HIPAA Privacy Rule Policies
DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment
Exhibit 2. Business Associate Addendum
Exhibit 2 Business Associate Addendum This Business Associate Addendum ( Addendum ) governs the use and disclosure of Protected Health Information by EOHHS when functioning as a Business Associate in performing
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: HUMAN RESOURCES RECRUITMENT EMPLOYEE RECRUITMENT POLICY STATEMENT PURPOSE SCOPE The City of Mississauga ensures equality in employment for all applicants and is
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
SCHEDULE "C" ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING AMONG ALBERTA HEALTH SERVICES, PARTICIPATING OTHER CUSTODIAN(S) AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015
What s New in Access, Privacy and Health Care Brian Beamish Commissioner Ontario Connections May 21, 2015 The Three Acts The IPC ensures compliance with: o Freedom of Information and Protection of Privacy
Records and Information Management. General Manager Corporate Services
Title: Records and Information Management Policy No: 057 Adopted By: Chief Officers Group Next Review Date: 08/06/2014 Responsibility: General Manager Corporate Services Document Number: 2120044 Version
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Administrative Procedures Memorandum A2005
Page 1 of 12 Date of Issue: June 2014 Original Date of Issue: Subject: References: Links: Contact: June 2014 RECORDS AND INFORMATION MANAGEMENT Policy 2196 Records and Information Management Policy 2197
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
PRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
BUSINESS ASSOCIATE AGREEMENT TERMS
BUSINESS ASSOCIATE AGREEMENT TERMS This Addendum ( Addendum ) is incorporated into and made part of the Agreement between SIGNATURE HEALTHCARE CORPORATION ("Covered Entity ) and ( Business Associate"),
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1
HIPAA Privacy Policies & Procedures
HIPAA Privacy Policies & Procedures This sample HIPAA Privacy Policies & Procedures document will help you with your HIPAA Privacy compliance efforts. This document addresses the basics of HIPAA Privacy
1 LAWS of MINNESOTA 2015 Ch 67, s 2. CHAPTER 67--S.F.No. 86 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:
1 LAWS of MINNESOTA 2015 Ch 67, s 2 CHAPTER 67--S.F.No. 86 An act relating to data practices; classifying data related to automated license plate readers and requiring a governing policy; requiring a log
Estée Lauder Companies Global Jobs Website Privacy Policy
Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we
Appendix : Business Associate Agreement
I. Authority: Pursuant to 45 C.F.R. 164.502(e), the Indian Health Service (IHS), as a covered entity, is required to enter into an agreement with a business associate, as defined by 45 C.F.R. 160.103,
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
NOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. IF YOU HAVE ANY
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
Privacy Impact Assessment
DECEMBER 20, 2013 Privacy Impact Assessment MARKET ANALYSIS OF ADMINISTRATIVE DATA UNDER RESEARCH AUTHORITIES Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES DEFINTIONS Terms used, but not otherwise defined, in this Agreement shall have the same meaning
Directory of Personal Information Banks
Directory of Personal Banks 1. Business Continuity Various departments within the AESO. Name, home and cellular telephone numbers, email addresses, areas of responsibility, organizational charts, workspace
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
ORDER MO-3203. Appeal MA13-490. Toronto Police Services Board. May 27, 2015
ORDER MO-3203 Appeal MA13-490 Toronto Police Services Board May 27, 2015 Summary: The appellant requested records pertaining to a specified incident. The Toronto Police Services Board identified responsive
