ACM Privacy Recommendations - Accountability, v1.0

Profile of Accountability requirements from the Association for Computing Machinery (ACM) Privacy Recommendations
Publication Date: 2018-04-10
Issuing Organization:
No Responder help@trustmarkinitiative.org 404-407-8956 75 5th Street NW, Suite 900, Atlanta, GA 30308
Keywords: There are no keywords.
Legal Notice: This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
Loading...

Trust Expression:

TD_AccountabilityAuditLogs and TD_AccountabilityAuthorizedPartiesRisks and TD_AccountabilityAuthorizedPartiesViolations and TD_AccountabilityCollection and TD_AccountabilityEquippedPartiesRisks and TD_AccountabilityEquippedPartiesViolations and TD_AccountabilityIndependentAudits and TD_AccountabilityInternalReviews and TD_AccountabilityMaintenance and TD_AccountabilityMotivatedPartiesRisks and TD_AccountabilityMotivatedPartiesViolations and TD_AccountabilitySanctions and TD_AccountabilitySharing and TD_AccountabilityTrainingRisks and TD_AccountabilityTrainingViolations and TD_DataQualityandIntegrityProvenance

References (16)

TD_AccountabilityAuditLogs
Defines privacy requirements related the enforcement of adherence to privacy polices through audit logs.
TD_AccountabilityAuthorizedPartiesRisks
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy risks are authorized to do so.
TD_AccountabilityAuthorizedPartiesViolations
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy violation incidents are authorized to do so.
TD_AccountabilityCollection
Defines privacy requirements related to the promotion of accountability for how sensitive information is collected.
TD_AccountabilityEquippedPartiesRisks
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy risks are equipped to do so.
TD_AccountabilityEquippedPartiesViolations
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy violation incidents are equipped to do so.
TD_AccountabilityIndependentAudits
Defines privacy requirements for enforcing adherence to privacy policies through independent audits.
TD_AccountabilityInternalReviews
Defines privacy requirements for enforcing adherence to privacy policies through internal reviews.
TD_AccountabilityMaintenance
Defines privacy requirements for organizations to promote accountability for how sensitive information is maintained.
TD_AccountabilityMotivatedPartiesRisks
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy risks are motivated to do so.
TD_AccountabilityMotivatedPartiesViolations
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy violation incidents are motivated to do so.
TD_AccountabilitySanctions
Defines privacy requirements for enforcing adherence to privacy policies through sanctions for policy violations.
TD_AccountabilitySharing
Defines privacy requirements for organizations to promote accountability for how sensitive information is shared.
TD_AccountabilityTrainingRisks
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy risks are trained to do so.
TD_AccountabilityTrainingViolations
Defines privacy requirements organizations to ensure that parties most able to mitigate potential privacy violation incidents are trained to do so.
TD_DataQualityandIntegrityProvenance
Defines privacy requirements for organizations to maintain provenance over sensitive information.
Also available as XML or JSON