• Purse or wallet lost, stolen or missing

    Tag: Confidential information

    If your wallet or purse is stolen or if you left it somewhere and now it’s gone, there are several steps you should take to make sure your information is safe and secure.

    start checklist
  • Determining Whether There is a Data Breach Checklist

    Tag: Personal information (PI)

    Breaches are becoming more common because of the collection and storage of mass amounts of data.

    start checklist
  • Classifying Data

    Tag: Public data

    Under State Technology Policy 141.10, Agencies must classify data into categories based on the sensitivity of the data. This checklist helps Agencies determine what type of data they are collecting and the proper handling of that data.

    start checklist

The Office of Privacy and Data Protection is also the sponsor for “Privacy Modeling,” a web application that identifies the privacy laws relevant to the product or service you wish to create.

Go to Privacy Modelling App

Something went wrong. Please try again.