Access - Exceptions, v1.0

Defines privacy requirements related to organizations providing individuals access to sensitive information about them that the organization holds, and applicable exceptions.

Assessment Step

1
Access - Exceptions (Access-Exceptions)
Does the organization require individuals to have access to sensitive information about them that the organization holds, except where the burden or expense of providing access would be disproportionate to the risks to the individual's privacy in the case in question, or where the legitimate rights of persons other than the individual would be violated. Other reasons for denying or limiting access are: a. Interference with execution or enforcement of the law, including the prevention, investigation or detection of offenses or the right to a fair trial; b. Interference with private causes of action, including the prevention, investigation or detection of legal claims or the right to a fair trial; c. Disclosure of sensitive information pertaining to other individual(s) where such references cannot be redacted; d. Breaching a legal or other professional privilege or obligation; e. Breaching the necessary confidentiality of future or ongoing negotiations, such as those involving the acquisition of publicly quoted companies; f. Prejudicing employee security investigations or grievance proceedings; g. Prejudicing the confidentiality that may be necessary for limited periods in connection with employee succession planning and corporate re-organizations; or h. Prejudicing the confidentiality that may be necessary in connection with monitoring, inspection or regulatory functions connected with sound economic or financial management; or i. Other circumstances in which the burden or cost of providing access would be disproportionate or the legitimate rights or interests of others would be violated. The organization which claims an exception has the burden of demonstrating its applicability?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
Parameter
Information Typesrequired
ENUM_MULTI : Select the type(s) of sensitive information that apply.
  • PII
  • PHI
  • III
  • IIHI
  • Other

Conformance Criteria (1)

C-1
Individuals must have access to personal information about them that an organization holds, except where the burden or expense of providing access would be disproportionate to the risks to the individual's privacy in the case in question, or where the legitimate rights of persons other than the individual would be violated. Other reasons for denying or limiting access are: a. interference with execution or enforcement of the law, including the prevention, investigation or detection of offenses or the right to a fair trial; b. interference with private causes of action, including the prevention, investigation or detection of legal claims or the right to a fair trial; c. disclosure of personal information pertaining to other individual(s) where such references cannot be redacted; d. breaching a legal or other professional privilege or obligation; e. breaching the necessary confidentiality of future or ongoing negotiations, such as those involving the acquisition of publicly quoted companies; f. prejudicing employee security investigations or grievance proceedings; g. prejudicing the confidentiality that may be necessary for limited periods in connection with employee succession planning and corporate re-organizations; or h. prejudicing the confidentiality that may be necessary in connection with monitoring, inspection or regulatory functions connected with sound economic or financial management; or i. other circumstances in which the burden or cost of providing access would be disproportionate or the legitimate rights or interests of others would be violated. An organization which claims an exception has the burden of demonstrating its applicability.
Citation
SAFE-HARBOR
Access