Trustmark Definition Name | Version |
---|---|
Defines privacy requirements for organizations to document the conditions under which it will NOT disclose information to an individual about whom information has been gathered.
|
1.0 |
Defines privacy requirements for organizations to have a point of contact for handling complaints.
|
1.0 |
Defines privacy requirements for organizations to have a point of contact for handling inquiries.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides a process for individuals to have inaccurate personally identifiable information (PII) maintained by the organization corrected or amended, as appropriate.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization establishes a process for disseminating corrections or amendments of the PII to other authorized users of the PII, such as external information-sharing partners.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization establishes a process for notifying affected individuals that their information has been corrected or amended.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization establishes a process for notifying, where feasible and appropriate, affected individuals that their information has been corrected or amended.
|
1.0 |
Defines privacy requirements for ensuring that remedial measures for the protection of sensitive information are proportionate to the likelihood and severity of the harm threatened by its collection.
|
1.0 |
Defines privacy requirements for ensuring that remedial measures for the protection of sensitive information are proportionate to the likelihood and severity of the harm threatened by its transfer.
|
1.0 |
Defines privacy requirements for ensuring that remedial measures for the protection of sensitive information are proportionate to the likelihood and severity of the harm threatened by its use.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides each update of the PII inventory to the CIO or information security official at an organization-defined frequency to support the establishment of information security requirements for all new or modified information systems containing PII.
|
1.0 |
Defines privacy requirements for organizations' privacy policies to identify that responsibility for the organization's overall operation includes: the organization's justice information systems, information collection procedures information retention procedures coordination of personnel, and enforcement of the organization's privacy policy.
|
1.0 |
Defines privacy requirements for organizations to identify who has primary responsibility for the organization's overall operation.
|
1.0 |
Defines privacy requirements for organizations' SAR processes to provide for human review and vetting.
|
1.0 |
Defines privacy requirements for an organization's SAR process to include safeguards to ensure that only information consistent with criminal activities associated with terrorism will be documented and shared.
|
1.0 |
Defines privacy requirements for an organization's law enforcement officers and participating party staff to be trained to recognize behaviors and incidents that are indicative of criminal activity related to terrorism.
|
1.0 |
Defines privacy requirements for organizations to keep a log of accessed organization data.
|
1.0 |
Defines privacy requirements for organizations to document their policies with regard to the qualifications and number of participating party personnel authorized to access organization information and intelligence.
|
1.0 |
Defines privacy requirements for organizations to maintain an audit trail.
|
1.0 |
Defines privacy requirements for organizations to notify originating organizations when sensitive information they provided has been the subject of a suspected or confirmed data breach.
|
1.0 |
Defines privacy requirements for organizations to document their procedures for adhering to data breach notification laws or policies.
|
1.0 |
Defines privacy requirements for organizations to have a designated security officer.
|
1.0 |
Defines privacy requirements for organizations to keep a log of disseminated organization data.
|
1.0 |
Defines privacy requirements for electronic access to organization data to identify the user.
|
1.0 |
Defines privacy requirements for organizations to retain the identity of the user in an audit log upon electronic access to the organization's data.
|
1.0 |