‘An example ICT Code of Conduct you can use to clearly define professional expectations’
How do you balance the organisation’s requirements for stable, high-performance and secure ICT support with employees’ need for ‘usable’ ICT resources and services – especially with the increase in home working? A Beltug member shares their company’s real ICT Code of Conduct (anonymised) to inspire and inform your own.
‘Best practices for defining data retention periods’
Discover practical guidelines on how to define retention periods, including some best practices. The information comes from Beltug members, the Beltug Privacy Council, the Data Protection Authorities (DPA) of member states and the European Data Protection Board, sector federations and regulations from various EU countries.
‘The protection of valuable information in the light of data exchanges’
Data is said to be more valuable than oil today, especially when it can be shared and exchanged. Inform yourself with these guidelines on what to look at when negotiating data sharing agreements. In addition to the current legal protections, you’ll find sample contractual clauses that you may adapt or draw inspiration from for your organisation’s data sharing contracts.
‘Beltug’s Recommendations on Corporate Policy – 2021 Update: Pragmatic guidelines’
The global Covid-19 pandemic led to significant changes in working conditions, but didn’t change the need for clear agreements between employer and employee. We updated our Recommendations for drafting a corporate policy that covers everything from work email, to BYOD for different devices, to all the issues around homeworking.
‘Cyber insurance – Let’s talk sense and non-sense’
Hear and learn from your peers! Over 60 Beltug members came together at our Debate Room to share their insights on cyber insurance: do you need it or not? What’s going on in the market? And what should you keep in mind when selecting a vendor and a contract? Get a fast, 3-page overview of the takeaways.
You may also like:
What to expect from a DPA investigation: an inventory of received questions
Whether based on a complaint or a general inspection, organisations can find themselves the subject of a DPA investigation. As part of this, the DPA may present the organisation with questions covering a broad range of...
Peer practices: Cyber incident response plan to manage cyber threats
“There are only two types of companies: those that have been hacked, and those that will be”, starts the well-known quote by Robert Mueller. He continued, however: “Even that is merging into one category: those that...