Acceptable Use, Legal Notices and Privacy June 9, 2011.

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
March  Documentation is everything - If you can’t prove it, it didn’t happen  Insurer reviews  Regulatory audits  Lawsuits and E&O  FINTRAC.
Catherine Metcalf | Dec U.S. Department of Education 2014 FSA Training Conference for Financial Aid Professionals Introducing the FSA ID - The FSA.
TECHNICAL TRAINING December Quick Overview Project Sunlight requires certain New York State entities to report certain appearances by the public.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Factors to be taken into account when designing ICT Security Policies
CUMC IRB Investigator Meeting IRB Frequently Asked Questions October 11, 2005.
Laura Koehne Online Safety: The Gateway to Your Child’s Internet Experience Amanda Biuso Laura Koehne Kyle Findley Hunter Smothers.
What is it? A set of rules that restricts the ways in which a network, website or system may be used. New members are usually asked to sign an AUP before.
Intel’s Innovative Integration of a TMS with a CMS Lew Tarnopol Localisation PM CCAP Marketing Solutions June 16, 2011.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Social Media & the Law Video 4 Social Media Training for Business Teachers #socialmedialaw.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Human Resources Update (January 24, 2011) Chuck Risley, Managing Director Employee Relations and Development.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Welcome to Home Access Center (e-HAC) Our information lives will be better served when we are free to get to our information from wherever we are with.
An Educational Computer Based Training Program CBTCBT.
Maintain Ethical Conduct
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
New Member Experience Getting Started with Healthy Benefits.
Know Your Audience: Build It and They Will Come January 19, 2011.
1 Creating & Maintaining Effective Environments for Student Learning Humanitas Webinar (Part 1)
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
The Moment You Know Proven results Engaging experiences A trusted partner.
2008 Community Door Training & Awareness Workshop Management Support Online (MSO)
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Finding Banner Number, Pin, User name, and password Created by Jennifer Toliver Updated: 8/28/2014.
Amber Johnson U.S. Department of Education WVASFAA Fall 2015 Conference October 29, 2015 FSA ID: The FSA PIN Replacement.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
The Moment You Know Proven results Engaging experiences A trusted partner.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Copyright and Fair Use Website Permissions. What is Copyright? A copyright is a form of protection provided by the laws of the US to authors of “original.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
© 2012 Boise State University1 SecureForms Erin Taylor Office of Information Technology.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
To the ETS – Accounts Setup and Preferences Online Training Course
CHAPTER FOUR OVERVIEW SECTION ETHICS
Monitor Student Test Status and Item Progress
U.S. Customs and Border Protection July 2008
1 The following slides are screenshots of the steps for logging-in to the QualityNet Secure Portal.
IS4680 Security Auditing for Compliance
First Time Login Process
DIGITAL BUSINESS APPLICATIONS
Acceptable Use, Legal Notices and Privacy
1 The following slides are screenshots of the steps for reviewing the EQRS systems roles assigned to your EIDM account ID. Updated 12/21/2017.
KASC – Registration Guide For Swimmers
“Welcome to M.A.P.S. Advocate Training for 2017 Qualifications” Sponsored by: Westmoreland County Wellness Coordinator Westmoreland County MAPS Enhancers.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Technological, Legal, and Ethical Considerations
JOHN BURTON FOUNDATION
To the ETS – Accounts Setup and Preferences Online Training Course
SNA: Local School Wellness Policy Resources Susan Coppess
HIPAA Privacy and Security Update - 5 Years After Implementation
Help Me FedEx – Installing and Using
Presentation transcript:

Acceptable Use, Legal Notices and Privacy June 9, 2011

This Session Covers Acceptable use policies Legal notices Privacy policies

A journey… of a thousand sites begins with a single click. ~Author Unknown

Global Village… June 1995… December 1995… June 2011… March 2011…

Progress… Quick access More information Connections for and with many… Instant services

Challenges… Security of information Purposeful misuse Accidental problems

Proactive Approach… Policies Training Review

Acceptable Use Policies What are they? Do you have one?

Not Just for the Public… Employees Contractors

Key Components… Philosophy Code of conduct Consequences Complaint procedures Disclaimers

Key Components… Waiver of certain rights Investigation Information provided User ID and password Security

Keep in Mind… An AUP… Needs to be your own Needs legal review

Legal Notices What are they? Do you have them?

Possibilities… Website disclaimer Terms and conditions Privacy policy Copyright notice Linking policy

Possibilities… Cookies policy Anti-spam policy Medical disclaimer Legal disclaimer

Privacy How does it relate to your website? Do you have a policy?

Required? Needed? Legal considerations Customer trust

Writing a Privacy Policy What is collected? How is it collected? How is it used? What control does user have? How is information protected?

Reviewing Your Policy Key questions to ask… Privacy policy checklists If updating your policy, how does that affect about previously collected data?

Reference Resources All sources used in this presentation are on the notes page of this slide.

Next Webinar ADA/Accessibility Compatibility July 13, :30 – 2:30 p.m.

Questions? Kristin Hamilton Technology Research Director CCAP Technology

Thank You for Attending!