ImageVerifierCode 换一换
格式:PDF , 页数:259 ,大小:15.74MB ,
资源ID:621592      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-621592.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf)为本站会员(confusegate185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf

1、PLUS 8300 Making the CSA Privacy Code Work for You A workbook on applying the CSA Model Code for the Protection of Personal Information to your organization (CAN/CSA-Q830) PLUS 8300 Making the CSA Privacy Code Work for You A workbook on applying the CSA Model Code for the Protection of Personal Info

2、rmation (CAN/CSA-Q830) to your organization Published in December 7 996 by Canadian Standards Asssociation 7 78 Rexdale Boulevard, ftobicoke, Ontario, Canada M9 W 7 R3 Acknowledgments This Publication was developed under the guidance of the Technical Committee on Privacy and, in particular, the foll

3、owing individuals: M. Long - Ottawa - Publication Coordinator and Prime Author C. Bennett - Victoria - Associate Professor, University of Victoria T. Campbell - Toronto - Contributor A. Coles - Edmonton - Contributor D. McKendry - Ottawa - Contributor R. Roy - Ottawa - Contributor Note on tailoring

4、the Code Organizations may choose to develop an organization-specific code based on the CIA Code. The commentaries which accompany each of the Code principles may be tailored to provide organization-specific examples. The principles themselves are interrelated and must be applied in their entirety a

5、nd without alteration (see CSA Code, General Requirements, Clauses 3.7.7 and 3.7 -2, and Appendix D of this Publication). Note on registering with the Quality Management Institute - a division of CSA A separate publication is attached which gives details of tbe steps to be undertaken should you wish

6、 to register your organizations adoption of the Code with the Quality Management Institute (OW. ISBN 0-921 347-57-X 0 Canadian Standards Association - 1996 All rights reserved. No part of this Publication, other than sections indicated bejow, may be reproduced in any form, in an electronic retrieval

7、 system or otherwise, without express prior permission of the publisher. This workbook contains forms which may be used to document personal information management practices and procedures. These forms are clearly identified and may be reproduced without perm iss ion. Technical Editor: Robin Haighto

8、n Managing L ditor: Gary Burford Making the CSA Privacy Code Work for You Contents Introduction The purpose of this workbook Chapter 1 The importance of u national voluntary informa tion protection code Chapter 2 Significonce of the ten prhciples Chapter 3 How to implement the CSA Code in your orgun

9、lzution Stage 1: Establishing an implementation ream and plan Stage 2: Assessing your current information use policies and practices Stage 3: Bringing poIicies and practices in line with the CSA Code Step 7. Step 2. How to identify information purposes Ways to explain purposes and obtain consent Ste

10、p 3. What to do when you want to use information for new purposes Step 4. Step 5. How long you should keep information How to make sure personal information is secure Step 6. How to address individuol concerns about personal information use Stage 4: Documenting policies and procedures Stage 5: Truin

11、ing employees and implementing Q communications plan Stage 6: Periodic review and auditing Appendices A - Privacy publications and information sources B - QMI recognition program C - Information on safeguards and security D - Tailoring the Code: report to CSA Technical Committee on Privacy Page V 1

12、7 21 23 26 34 34 37 42 45 48 54 61 64 69 75 ai 83 87 E - Health information December 1996 89 PLUS 8300 iV December 7 996 In trod u ction The purpose o this workboo k HE PUBLICATION CAN/CSA-Q830, A Mode/ Code for the Protection of Personal information, T referred to as the CSA Code, (a) provides the

13、principles for the management of personal information; (b) specifies the minimum requirements for the adequate protection of personal information held by pa rtic i pati n g organizations; (c) makes the Canadian public aware of how personal information should be protected; and (d) provides standards

14、by which the international community can measure the protection of personal information in Canada. This workbook is designed to provide practical, useful advice to help organizations understand and apply CSAs Model Code for the protection of personal information. The workbook is intended to be used

15、in conjunction with the CSA Code, but it is not a replacement. The text of the CSA Code in its entirety should be referred to, when required, as the final authority on matters of.interpretation. The workbook was developed and reviewed by the CSA Technical Committee on Privacy, to provide guidance on

16、 how to apply the CSA Code effectively, Organizations will find it a valuable tool, particularly for those individuals directly responsible for implementing the CSA Code. However, the use of the workbook is not mandatory. The CSA Code can be applied in all types of organizations, from small sole pro

17、prietorships to large corporate enterprises; from service clubs and charities to universities and hospitals; from organizations that hold very little personal information to those that specialize in information collection and use. While CSA has produced only one workbook to cover this vast range of

18、information users, the principles of the CSA Code are universal and can, accordingly, be applied to all types of organizations whether they are large or small, locally based or multinational, and whether they use the simplest of information management methods or are at the leading edge of electronic

19、 information use. What differs principally between organizations is the amount and variety of information collected, its sensitivity, and its relative value, both to the individuals providing it and the organizations using it. The workbook addresses these differences with examples drawn from a range

20、 of organizational experiences and with practical, commonsense solutions. Whatever type of organization you are involved with, this workbook will provide you with basic information you need to implement the CSA Code in an appropriate way. December 7 996 V PLUS 8300 The CSA Code was developed as a na

21、tional voluntary standard for personal information protection. As you apply the CSA Code, remember that its ultimate success depends upon an underlying commitment to integrity and fairness in the use of personal information. Organizations must always balance their need for information collection, us

22、e, and disclosure with the privacy rights of the i nd ivid u a I. Implementing the CSA Code may be a time-consuming task; however, once implemented, the ongoing maintenance of systems and procedures to meet the Standard should become a routine operation. In support of the CSA Code, the Quality Manag

23、ement Institute (QMI) is offering three levels or tiers of recognition as follows: Tier 1 - Declaration of the organizations intent to apply the CSA Code. Tier 2 - Verification by QMI that the CSA Code has been implemented to an acceptable standard. Tier 3 - Registration with QMI. For more details o

24、n these tiers and the role of the Quality Management Institute, see Appendix 8. CSA has also published (August 7 995) the background research report, Implementing Privacy Codes of Practice: A Report to the Canadian Standards Association (PLUS 8830), written by Colin Bennett of the University of Vict

25、oria. Readers who seek further background information about the functions and implementation of Privacy Codes in Canada and overseas might also want to obtain this publication. December 7 996 Chapter 3 The importance of a national voluntary information protection code S NUMEROUS SURVEYS and polls ha

26、ve indicated, Canadians have become increasingly A concerned about their privacy and the protection of their personal data. In 1990, the Canadian Standards Association embarked on the development of a Model Code for the Protection of Personal Information that would provide useful guidance to organiz

27、ations, increase consumer confidence, and establish a process whereby individuals and organizations could resolve privacy concerns. CSA has a long history in the development of voluntary standards. Development of the CSA Code was, therefore, a natural outgrowth of CSA activities in business manageme

28、nt, reflecting CSA interests in safety, consumer concerns, and international harmonization. The finai CSA Code, subsequently approved by the Standards Council of Canada as a National Standard of Canada, and published in March 1996, provides a common standard for the protection of personal informatio

29、n that can be employed throughout all levels of public and private enterprise, supported by the broad resources of the Ca n ad i a n St and a rd s Association . The Code is based on the Organization for Economic Co-operation and Development (OECD) “Guidelines on the Protection of Privacy and Transbo

30、rder Flows of Personal Data“ to which the Government of Canada made a commitment in 1984. However, with the rapid increase in electronic data communications and the new interactive world of the information highway, the OECD privacy principles have been reformulated to better reflect the Canadian con

31、text and the new challenges of data protection in the information society. The ten principles of the CSA Code, when taken together, constitute a fair and equitable balance between the privacy rights of individuals and the legitimate personal information requirements of private and public rector orga

32、nizations. They also reflect excellent business practices that can considerably improve the confidence of consumers who provide their personal information to o rg a n iza ti o n s. Adhering to the CSA Code will improve the quality of personal information management within an organization. This can c

33、ontribute to competitive advantages such as a stronger relationship with customers, better employee relations, and more cost-effective management of personal information. December 1996 7 PLUS 8300 In inter-firm transactions, other organizations may prefer to deal with entities that also adhere to th

34、e Code, as a quality assurance measure. Privacy Tip: the meaning of “personal information” Personal information is any information about a specific, identifiable individual, including such commonly available details as name, address, and telephone number. Despite the fact that some personal informat

35、ion is widely available (eg, through telephone directories or public databases), this does not, in any way, lessen the responsibility to apply the Codes principles to its collection, use, and disclosure. The CSA Code incorporates the principles that every element of personal information should only

36、be used for purposes that are defined and explained in advance to the individual, and that use or disclosure for any other purposes requires further knowledge and consent. (See Principal 3, page 11, for methods to obtain consent.) The CSA Code also provides a national standard for personal informati

37、on protection that can be applied on an organization-specific or sectoral basis to address concerns about transborder data flow. Data protection laws, giving governments the authority to block data flow to jurisdictions without adequate data protection, have been passed by members of the European Un

38、ion, as well as New Zealand. Canadians now face the very real prospect that transborder flow of personal data between Canada and other countries may be prohibited, unless we adopt adequate data protection standards. The CSA Model Code for the Protection of Personal Information is expected to become

39、a standard upon which Canadians will judge the effectiveness of personal information protection in all types of organizations. Adopting the Code as a responsible, proactive measure makes good business sense. Impacts of privacy loss in the information age Many Canadians feel they have lost control ov

40、er the use of their personal information. Personal data provided to organizations for specific reasons may end up being used for completely unrelated purposes -often without any form of consent or knowledge by the individual concerned. In addition, data profiling - the use of computer data-matching

41、capabilities to create profiles of individuals - allows previously separate pieces of personal information to be compiled in ways never intended by the individual. A data profile is a powerful information or marketing tool that can be used by organizations to target clients or, conversely, limit and

42、 deny access to services. No one would deny the immense benefits of computerization in improving organizational efficiency and providing more personalized service. However, without proper safeguards to prevent the collection, use, or disclosure of erroneous data, or to prevent the use or disclosure

43、of information without consent, there can be unintended consequences. Stories are reported regularly in the media about individuals whose privacy, dignity, and even freedom have been eroded because incomplete, incorrect, or irrelevant data was entered into a file. While people may have the opportuni

44、ty to correct such erroneous data, the burden of proof is usually on the individual - and it can be a frustrating, demoralizing, or even insurmountable challenge to locate the source of “bad data,” convince others that it is indeed wrong, and have it corrected. Individuals also pay the price when pe

45、rsonal information - correct or otherwise - is purposely or inadvertently disclosed without their permission. There is no means of regaining privacy once it has been lost. 2 December 7 996 Making the C5d Privacy Code Work for You Moreover, organizations themselves pay a high price for failing to ade

46、quately safeguard personal data that has been entrusted to them. The consequences of such failures are measured in public anger and cynicism, diminished consumer confidence, lost business opportunities, and the high cost of correcting mistakes after they have been made. The following stories illustr

47、ate just how high the cost can be, for both individuals and organizations, due to inadequate personal information protection practices. A telecommunications company regularly donated computer printouts to local day care centres as drawing paper. On one occasion, the printouts included details of cal

48、ling card customer names and numbers. With the disclosure of this sensitive data, the company was forced to recall and reissue all of its customer calling cards, at a cost of more than $500,000 and considerable public embarrassment. Adequate procedures in the disposal of company records might have p

49、revented this disclosure. A woman received a phone call from a funeral home offering its services shortly after a hospital visit in which she was diagnosed with terminal cancer. The patient and her family were outraged by the insensitivity of this call and, upon further investigation, learned that a member of the hospital staff had provided the funeral home with details of the womans illness. The incident was widely reported in the media and a lawsuit subsequently was launched against both the hospital and the funeral home. While it is always more difficult to guard against such deliberat

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1