An organization engaged in online activities or electronic commerce
has a responsibility to adopt and implement a policy for protecting
the privacy of individually identifiable information. Organizations
should also take steps that foster the adoption and implementation
of effective online privacy policies by the organizations with
which they interact; e.g., by sharing best practices with business
partners.
2.
Notice and Disclosure
An organization's privacy policy must be easy to find, read
and understand. The policy must be available prior to or at
the time that individually identifiable information is collected
or requested.
The policy must state clearly: what information is being collected;
the use of that information; possible third party distribution
of that information; the choices available to an individual
regarding collection, use and distribution of the collected
information; a statement of the organization's commitment to
data security; and what steps the organization takes to ensure
data quality and access.
The policy should disclose the consequences, if any, of an individual's
refusal to provide information. The policy should also include
a clear statement of what accountability mechanism the organization
uses, including how to contact the organization.
3.
Choice/Consent
Individuals must be given the opportunity to exercise choice
regarding how individually identifiable information collected
from them online may be used when such use is unrelated to the
purpose for which the information was collected. At a minimum,
individuals should be given the opportunity to opt out of such
use.
Additionally, in the vast majority of circumstances, where there
is third party distribution of individually identifiable information,
collected online from the individual, unrelated to the purpose
for which it was collected, the individual should be given the
opportunity to opt out.
Consent for such use or third party distribution may also be
obtained through technological tools or opt-in.
4.
Data Security
Organizations creating, maintaining, using or disseminating
individually identifiable information should take appropriate
measures to assure its reliability and should take reasonable
precautions to protect it from loss, misuse or alteration. They
should take reasonable steps to assure that third parties to
which they transfer such information are aware of these security
practices, and that the third parties also take reasonable precautions
to protect any transferred information.
5.
Data Quality and Access
Organizations creating, maintaining, using or disseminating
individually identifiable information should take reasonable
steps to assure that the data are accurate, complete and timely
for the purposes for which they are to be used.
Organizations should establish appropriate processes or mechanisms
so that inaccuracies in material individually identifiable information,
such as account or contact information, may be corrected. These
processes and mechanisms should be simple and easy to use, and
provide assurance that inaccuracies have been corrected. Other
procedures to assure data quality may include use of reliable
sources and collection methods, reasonable and appropriate consumer
access and correction, and protections against accidental or
unauthorized alteration.