Data Protection Policy

Data Protection Policy

The Data Protection Policy outlines the principles that must generally be complied with when processing personal data, in particular when transferring such data. The objective of this policy is to ensure compliance with legal requirements when processing personal data.

Minimum Global Standards:

a. Principles of data processing

b. Requirements for the disclosure or transfer of personal data

c. Handling requests for information from concerned persons

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. DEFINITION OF “PERSONAL DATA”
4. GENERAL RULES WITH REGARD TO THE PROCESSING OF PERSONAL DATA
4.1 DEFINITION OF “PROCESSING”
4.2 PRINCIPLES OF DATA PROCESSING
5. CONDITIONS PERTAINING TO THE DISCLOSURE AND TRANSFER OF PERSONAL DATA
5.1 EXPLANATION OF THE TERMS “DISCLOSURE” AND “TRANSFER”
5.2 PRINCIPLES: NEED-TO-KNOW
5.3 CONDITIONS PERTAINING TO THE DISCLOSURE AND TRANSFER OF PERSONAL DATA TO THIRD PARTIES OR ABROAD
5.4 ADVANCE INSPECTION OF NEW DATA FLOWS AND PROCEDURES
6. MANDATES
6.1 INDIVIDUAL MANDATE
7. REQUESTS FOR INFORMATION BY CONCERNED PERSONS
8. DATA PROTECTION SPECIALIST UNIT
8.1 TASKS OF THE DATA PROTECTION SPECIALIST UNIT
8.2 EMPLOYEE TASKS WITH REGARD TO THE DATA PROTECTION SPECIALIST UNIT
9. EXCEPTIONS
10. FINAL CONSIDERATIONS
10.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
10.2 DOCUMENT REVISION

Pages: 12

Review Data Protection Policy.

Your email address will not be published. Required fields are marked *

Related Products:

€1,719.99

Purchase

This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!

€79.99

Purchase

The objective of the Business Continuity Management Policy is to establish the framework for the proper business continuity management of the Company.

€49.99

Purchase

This document highlights the standard requirements for Information Security Incident Handling within the Company.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link