When.com Web Search

  1. Ad

    related to: principles and boundaries of confidentiality in the workplace

Search results

  1. Results From The WOW.Com Content Network
  2. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  3. Confidentiality - Wikipedia

    en.wikipedia.org/wiki/Confidentiality

    Confidentiality agreements that "seal" litigation settlements are not uncommon, but this can leave regulators and society ignorant of public hazards. In the U.S. state of Washington, for example, journalists discovered that about two dozen medical malpractice cases had been improperly sealed by judges, leading to improperly weak discipline by ...

  4. Workplace privacy - Wikipedia

    en.wikipedia.org/wiki/Workplace_privacy

    Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for ...

  5. Generally Accepted Privacy Principles - Wikipedia

    en.wikipedia.org/wiki/Generally_Accepted_Privacy...

    This privacy objective is supported by ten main principles and over seventy objectives, with associated measurable criteria. The ten principles are: Management; Notice; Choice and consent; Collection; Use, retention and disposal; Access; Disclosure to third parties; Security for privacy; Quality; Monitoring and enforcement

  6. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    Milne and Shalini (2010) presented the question of how both of these groups start and upkeep privacy boundaries. Information about the relationship between consumers and marketers has been defined by this fine line of what is the privacy a customer is willing to provide to the marketer. [ 28 ]

  7. Parkerian Hexad - Wikipedia

    en.wikipedia.org/wiki/Parkerian_Hexad

    The Parkerian hexad is a set of six elements of information security proposed by Donn B. Parker in 1998 [1] [2].The Parkerian hexad adds three additional attributes to the three classic security attributes of the CIA triad (confidentiality, integrity, availability).

  8. FTC fair information practice - Wikipedia

    en.wikipedia.org/wiki/FTC_fair_information_practice

    The core principles of privacy addressed by these principles are: 1. Notice/Awareness [12] Consumers should be given notice of an entity's information practices before any personal information is collected from them. [12] This requires that companies explicitly notify some or all of the following: identification of the entity collecting the data;

  9. Email privacy - Wikipedia

    en.wikipedia.org/wiki/Email_privacy

    Generally speaking, the factors courts use to determine whether companies can monitor and read personal emails in the workplace include: (i) the use of a company email account versus a personal email account and (ii) the presence of a clear company policy notifying employees that they should have no expectation of privacy when sending or ...