Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
<p>This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:</p>
<p>— a harmonized terminology for PII deletion;</p>
<p>— an approach for defining deletion rules in an efficient way;</p>
<p>— a description of required documentation;</p>
<p>— a broad definition of roles, responsibilities and processes.</p>
<p>This document is intended to be used by organizations where PII is stored or processed.</p>
<p>This document does not address:</p>
<p>— specific legal provision, as given by national law or specified in contracts;</p>
<p>— specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;</p>
<p>— deletion mechanisms;</p>
<p>— reliability, security and suitability of deletion mechanisms;</p>
<p>— specific techniques for de-identification of data.</p>
Reģistrācijas numurs (WIID)
71673
Darbības sfēra
<p>This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:</p>
<p>— a harmonized terminology for PII deletion;</p>
<p>— an approach for defining deletion rules in an efficient way;</p>
<p>— a description of required documentation;</p>
<p>— a broad definition of roles, responsibilities and processes.</p>
<p>This document is intended to be used by organizations where PII is stored or processed.</p>
<p>This document does not address:</p>
<p>— specific legal provision, as given by national law or specified in contracts;</p>
<p>— specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;</p>
<p>— deletion mechanisms;</p>
<p>— reliability, security and suitability of deletion mechanisms;</p>
<p>— specific techniques for de-identification of data.</p>