When.com Web Search

  1. Ads

    related to: keeping confidentiality in the workplace

Search results

  1. Results From The WOW.Com Content Network
  2. Workplace privacy - Wikipedia

    en.wikipedia.org/wiki/Workplace_privacy

    Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for ...

  3. Protecting your AOL Account

    help.aol.com/articles/protecting-your-aol-account

    In addition, our partner companies are required to adhere to confidentiality agreements to ensure that your information remains safe and secure. We strongly encourage our content, commerce and advertising partners to post clearly their own privacy policies and to have privacy control systems in place to protect your personal information.

  4. Confidentiality - Wikipedia

    en.wikipedia.org/wiki/Confidentiality

    Confidentiality agreements that "seal" litigation settlements are not uncommon, but this can leave regulators and society ignorant of public hazards. In the U.S. state of Washington, for example, journalists discovered that about two dozen medical malpractice cases had been improperly sealed by judges, leading to improperly weak discipline by ...

  5. Privacy law - Wikipedia

    en.wikipedia.org/wiki/Privacy_law

    They encompass strict regulations governing data protection, confidentiality, surveillance, and the use of personal information by both government and corporate entities. [2] Trespassing Laws focus on breaches of privacy rights related to physical intrusion onto an individual's property or personal domain without consent. This involves illegal ...

  6. Information security - Wikipedia

    en.wikipedia.org/wiki/Information_security

    Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. [1] It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.

  7. FTC fair information practice - Wikipedia

    en.wikipedia.org/wiki/FTC_fair_information_practice

    the steps taken by the data collector to ensure the confidentiality, integrity and quality of the data. [12] 2. Choice/Consent [13] Choice and consent in an on-line information-gathering sense means giving consumers options to control how their data is used. Specifically, choice relates to secondary uses of information beyond the immediate ...

  8. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Briefly, work on conflict and topic avoidance, considering the relational impact of privacy turbulence, students and faculty relationships, and workplace relationships have all produced useful information that opens new doors regarding CPM-based research. The mobile phone and its impact on romantic relationships is a good example.

  9. Employee silence - Wikipedia

    en.wikipedia.org/wiki/Employee_silence

    In an article published in Work, Employment and Society in March 2011, Jimmy Donaghey (University of Warwick), Niall Cullinane (Queen's University Belfast), Tony Dundon (NUI Galway) and Adrian Wilkinson (Griffith University) survey the existing literature on employee silence and argue that the approach taken to date neglects an analysis of the ...