Facebook s Emotional Contagion: Social Media Research
|
|
|
- Darleen Lynch
- 10 years ago
- Views:
Transcription
1 Facebook s Emotional Contagion: Social Media Research Mount Allison University March 11, 2015 Gordon DuVal, SJD [email protected]
2 Emotional Contagion 2
3 3
4 Facebook Research In 2012, Facebook researchers, in conjunction with academic researchers at Cornell, undertook a study on emotional contagion. Purposes: o Does emotional contagion operate in written/read interactions? o Is there a reverse emotional contagion in social media? o Basic research about human emotions that may be helpful to Facebook s promotion and marketing in future? o To help the US military? - Cornell press releases initially said that The study was funded in part by the James S. McDonnell Foundation and the Army Research Office. A subsequent release retracted this. 4
5 Facebook Research The study used Linguistic Inquiry and Word Count (LIWC) software to analyze and send disproportionately either positive or negative content to 689,003 subscribers newsfeeds. They then assessed these subscribers subsequent postings to see if the positive or negative messages resulted in happier or sadder emotional content. No notice was given or consent requested directly from participants. Result was that more positive content in news feeds did result in more positive emotional content, and perhaps happier subscribers. The reverse was also found. Both effects were found to be small, but significant. 5
6 Facebook Research What s the Problem? No ethics review and approval No informed consent Minors were almost certainly involved No debriefing Study was unnecessary and used bad methodology 6
7 Facebook Research No Problem? Subscribers newsfeeds have to be limited anyway, so what s the problem? Complaining about social media research is naïve. Manipulation is the essence of marketing. o Any/every social network exists to learn about you so that you can be manipulated to think certain things or buy certain products. (online comment on the Atlantic site) It s free. If you don t like it, don t use it. Anyway, if it had had ethics review, it would have been approved. 7
8 Internet Based Research Social media emotional contagion and similar research Qualitative research (eg with chat rooms and discussion groups) Online surveys, questionnaires and interviews Recruiting for traditional studies 8
9 Requires Ethics Review? Facebook Study Cornell University s IRB had determined that its researchers had no direct contact with subjects and therefore no review was necessary. The Cornell people had helped design the study and then helped analyze the already collected data. US - no requirement to review privately funded studies (exc. FDA) Canada roughly the same. No contact with subjects who are non-identifiable(?) 9
10 Research Requiring Review? TCPS 2 Art. 2.2 Research that relies exclusively on publicly available information does not require REB review when: a) The information is legally accessible to the public and appropriately protected by law; or b) The information is publicly accessible and there is no reasonable expectation of privacy. Research that relies exclusively on information that is publicly available, or made accessible through legislation or regulation, does not require REB review. 10
11 Reasonable expectation of privacy Are chat rooms, message board, or other internet postings: o Intended to be public like a newspaper letter to the editor or speaking in public? o Intended for the private use of a closed audience? 11
12 Reasonable expectation of privacy Indicators of a reasonable expectation of privacy? o password protection o aims/purposes of the group o sensitivity of subject matter o group's protocols, privacy rules and boundaries o nature of the target audience o membership or registration required o the real or assumed number of users 12
13 Reasonable expectation of privacy Bruckman (2002), any online information may be [ ] analyzed as long as: 1. it is officially and publicly archived, 2. no password is required to access it, 3. no site regulations prohibit its analysis, and 4. the subject is not too sensitive. What if you suspect that people have a false sense of privacy and security in online activity? 13
14 Research Requiring Review? Extending the Spectrum: The TCPS and Ethical Issues in Internetbased Research (2008) (Spectrum) web-based research need not be submitted for ethical assessment, but... researchers should demonstrate that the material collected is in the public domain and that there are no problems related to intellectual rights or copyright. 14
15 Research Requiring Review? REB review required for: o Engaged web-based research, even with minimal involvement where the researcher is participating or interacting in the group discussions and o Online research collecting information through interviews discussion group surveys or questionnaires. REB review not required for: o Non-intrusive, web-based research of non-public sites with no researcher interaction (it draws on text data or data from web sites or discussion groups that the researcher observes). 15
16 Informed consent? Facebook said that permission to do research, among other things, was contained in the terms of service, but: o Arguably this was not valid informed consent because study was not described to prospective subjects; o Facebook should know that the terms of service agreements are rarely read prior to use; and anyway o Reference to research in the Facebook terms of service did not appear until four months after the study was completed. 16
17 Waiving informed consent? Art 3.7: The REB may approve research that involves an alteration to the requirements for consent if satisfied that: a) The research is no more than minimal risk; b) The alteration to consent is unlikely to adversely affect the welfare of participants; c) Is impossible or impracticable to carry out the research if prior consent is required; d) The precise nature and extent of the alteration is defined; and e) The plan to provide debriefing (if any) shall be in accordance with Art 3.7B 17
18 Waiving informed consent? Art 3.7B: Debriefing must be done whenever possible, practicable and appropriate 18
19 Obtaining informed consent? (From TCPS Spectrum)... engaged web-based research (chat rooms and online fora) may require researchers to make themselves known and to explain the research objectives.... for online research (interviews, online questionnaires, experiments), researchers must explain the strategies they intend to use to obtain informed consent, as well as the verification mechanisms they intend to use for cases involving minors in particular. 19
20 Obtaining consent to the group? Contact with the group administrator/owner (for advice or consent)? Direct contact with each participant whose postings are used? Do other members of the group get to say no? Informed consent ascertaining understanding/comprehension of participants? ascertaining age and capacity to consent? Ensuring eligibility -- are they who they say they are? 20
21 Risks and benefits emotional reaction/trauma (usually little the researchers can do to help) o... where the research presents risks, researchers must explain the monitoring strategies they intend to use... (Spectrum) confidentiality breach either to outside world or within the online group -- real identities versus online identities damage to the welfare of the group -- no longer a "safe place" for participants, particularly for sensitive subject matter of the group. 21
22 Protection of privacy... sending research data over the Internet requires the use of encryption software to prevent the data s being intercepted by unauthorized people and to maintain anonymity and confidentiality. (Spectrum)... in general, data kept on a computer that is connected to the Internet should be encrypted. (Spectrum) Anonymity vs. pseudonymity 22
23 Deception and Withholding Relevant Information Is it okay to "lurk in a discussion group before identifying as a researcher? Is it okay to interact as a member of the group without identifying as a researcher? Is it okay to take on an assumed persona to elicit responses from group members? If so, is it necessary to de-brief group members afterwards? If so, should participants have the option to withdraw their data? 23
24 Participation of minors How would you know if respondents are minors or that parental consent is that of the real parents? Worry is heightened for research on sensitive topics. 24
25 Validity of the Data Are participants who they say they are? Who is the researcher really dealing with? Responses may be less likely to be genuine Sample may be badly skewed, not representative 25
26 Security of Research Data 26
27 Security of Research Data TCPS: identifiable information = personal information Research Design Collect only minimum necessary personal information Remove identifying information as soon as possible Limit access to identifying information to only those with valid research need 27
28 Security of Research Data Consent How will information be collected? How will information be recorded? Will information be coded, how? How will information be stored? Who will have access? Plan for safeguarding data and limiting access. When will information be deleted or destroyed? Warn of potential for insecurity privacy cannot be guaranteed 28
29 Security of Research Data Physical Security Locked doors, file cabinets and other data storage locations Don t leave data file open on desktop Beware of casual viewing by passers-by or others 29
30 Security of Research Data Data Security Measures should be proportionate to the need for security i.e. sensitivity and confidentiality obligations. Use sign-on passwords for files and computers Avoid storing information on portable devices (memory sticks, smart phones, tablets, laptops) particularly if not encrypted. If storage on portable devices is unavoidable, transfer data to more secure storage as soon as possible. After data destruction, sanitize (scrub) storage devices to make data unrecoverable. 30
31 Security of Research Data Data Security Appropriate back-up that offers proportionate level of security. Data recovery in case of loss. Controlling access: o o o logging successful and failed access attempts. background checks of research team Terminate user access for those no longer with the project. 31
32 Security of Research Data Data Security -- Encryption Using encryption software for: o o data at rest encrypting stored data, documents, files etc. data in flight protecting unencrypted data while it passes through the network, , online data transfers, etc. to create secure modes of communication. 32
33 Security of Research Data Data Security -- Breach of security Provisions for notifying participants in case of breach of security. 33
SOP 502L: INTERNET/SOCIAL MEDIA-BASED RESEARCH
University of Oklahoma Office of Human Research Participant Protection : INTERNET/SOCIAL MEDIA-BASED RESEARCH 1. POLICY Internet/social media-based research projects are reviewed by the IRB just as any
ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS
ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS LIBBY BISHOP. RESEARCHER LIAISON UNIVERSITY OF ESSEX TCRU/NOVELLA SPECIAL SEMINAR - LONDON 29 MAY 2012 THE & ESDS QUALIDATA forty years experience
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Payment Cardholder Data Handling Procedures (required to accept any credit card payments)
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
Information Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
Assessing Risk in Social and Behavioral Sciences
Tracy Arwood, MS Clemson University Sangeeta Panicker, PhD American Psychological Association Assessing Risk in Social and Behavioral Sciences Assessing Risk in Social and Behavioral Sciences Content Authors
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Social Media, Research, and Ethics: Challenges and Strategies
Social Media, Research, and Ethics: Challenges and Strategies Elizabeth A. Buchanan, Ph.D. Endowed Chair in Ethics University of Wisconsin-Stout Presentation for The Department of Energy and the University
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016
Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD 2013 CANADIAN PAYMENTS ASSOCIATION 2013 ASSOCIATION CANADIENNE DES PAIEMENTS This Rule is copyrighted
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
MRS Guidelines for Online Research. January 2012
MRS Guidelines for Online Research January 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence and customer
STANDARDS OF PRACTICE (2013)
STANDARDS OF PRACTICE (2013) COLLEGE OF ALBERTA PSYCHOLOGISTS STANDARDS OF PRACTICE (2013) 1. INTRODUCTION The Health Professions Act (HPA) authorizes and requires the College of Alberta Psychologists
REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Miami University: Human Subjects Research General Research Application Guidance
Miami University: Human Subjects Research General Research Application Guidance Use the accompanying Word template for completing the research description. You must provide sufficient information regarding
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
Information Technology (IT) Security Guidelines for External Companies
Information Technology (IT) Security Guidelines for External Companies Document History: Version Name Org.-Unit Date Comments 1.1 Froehlich, Hafner Audi I/GO VW K-DOK 25.05.2004 Table of Contents: 1. Goal...3
Enterprise Information Security Procedures
GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3
Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2
Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have
Nexed s Privacy Policy tells you what information we use, collect or disclose to third parties about our users.
ANSWERABLES BETA VERSION PRIVACY POLICY Effective Date: August 30, 2013 This Privacy Policy applies to the Answerables software, associated services and website located at www.nexed.com, its sub-domains
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
TERMINAL CONTROL MEASURES
UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to [email protected] when requesting a stand-alone dial up terminal. The University
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures
Privacy Policy At Cambrian, Your Privacy is Our Priority At Cambrian Credit Union, we know our members are concerned about the confidentiality and security of their personal information. This Policy ensures
The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures
The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures to protect and secure a covered entity s electronic information
Estée Lauder Companies Global Jobs Website Privacy Policy
Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we
Toronto School of Theology Guidelines for the Preparation and Ethics Review of Doctor of Ministry Thesis Projects Involving Human Subjects
Toronto School of Theology Guidelines for the Preparation and Ethics Review of Doctor of Ministry Thesis Projects Involving Human Subjects The Doctor of Ministry Program at the Toronto School of Theology
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
THE RESEARCHER S GUIDE TO DATA PRIVACY
THE RESEARCHER S GUIDE TO DATA PRIVACY PAUL HANCOCK, ACCESS AND PRIVACY MANAGER, OFFICE OF THE UNIVERSITY COUNSEL KAITLYN GUTTERIDGE, LEAD PRIVACY, POLICY AND AGREEMENTS, POPULATION DATA BC Overview Introduction
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
Standard Operating Procedure. Secure Use of Memory Sticks
Standard Operating Procedure Secure Use of Memory Sticks DOCUMENT CONTROL: Version: 2.1 (Amendment) Ratified by: Finance, Infrastructure and Business Development Date ratified: 20 February 2014 Name of
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
How To Know What You Can And Can'T Do At The University Of England Students Union
HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
Acceptable Use and Security of UBC Electronic Information and Systems
The University of British Columbia Board of Governors Policy No.: 104 Approval Date: June 2013 Title: Responsible Executive: Vice-President, Academic and Provost Deputy Vice-Chancellor (UBC Okanagan) Acceptable
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015.
McZeely Coterie, LLC Privacy Notice Effective Date of this Privacy Notice: February 11, 2015. We at McZeely Coterie, LLC, the company that proudly brings you Plan Z by Zola ( Plan Z ), respect your concerns
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
Data Security Plan Development Guide for Researchers
Data Security Plan Development Guide for Researchers November 2014 Prepared for: Association for Public Policy Analysis and Management Fall Research Conference Submitted by: Sean Owen, CISSP, CAP and Teresa
Ethical Guidelines for the Online Researcher
Ethical Guidelines for the Online Researcher The practice of using the internet as a tool for social science research is a comparatively new phenomenon. It is of paramount importance that the researcher
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
Fraud Policy FEBRUARY 2014
Fraud Policy FEBRUARY 2014 TABLE OF CONTENTS 1. Application of Policy... 2 2. Purpose of Policy... 2 3. Fraud Policy... 2 4. Definition of Fraud... 2 5. Duties and Responsibilities of an Employee or Contractor...
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
