Browse Definitions :
Definition

privacy policy

Contributor(s): Matthew Haughn

A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.

Most websites make their privacy policies available to site visitors.  A privacy page should specify any Personally identifiable information that is gathered, such as name, address and credit card number, as well as other things like order history, browsing habits, uploads and downloads.  The policy should also explain if data may be left on a user’s computer, such as cookies. According to best practices, the policy should disclose if data may be shared with or sold to third parties and if so, what the purpose is.

There is no concensus as to whether or not privacy policies are legally binding and no consistency in enforcement.  In the United States, the Federal Trade Commission (FTC) promotes enforcement of existing laws and industry self-regulation.  Generally for the FTC, data breaches are not sufficient for legal action if there is no loss of money associated with the breach.  

The European Union’s Data Protection Directive has confronted companies such as Google about privacy changes that went contrary to E.U. law, threatening sanctions on the massive company.

Often, the first statement found in an online privacy policy is one to the effect that, by visiting the web page (which you are doing if you’re reading the policy), you agree to the details of the site’s privacy policy.

This was last updated in October 2013

Continue Reading About privacy policy

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close