Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:data_protection:instructions [2018-07-16 18:07] – vesely | public:data_protection:instructions [2020-04-30 07:38] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== The Economics Institute GDPR instructions ====== | + | ====== The Economics Institute GDPR instructions |
+ | |||
+ | ---- | ||
Česká verze //Pokynů// týkajících se ochrany osobních údajů je k dispozici na stránce [[https:// | Česká verze //Pokynů// týkajících se ochrany osobních údajů je k dispozici na stránce [[https:// | ||
Line 6: | Line 8: | ||
GDPR primary contact person: Petr Veselý, Head of Computer Office\\ | GDPR primary contact person: Petr Veselý, Head of Computer Office\\ | ||
Primární kontaktní email / Primary contact: [[helpdesk@cerge-ei.cz|]] | Primární kontaktní email / Primary contact: [[helpdesk@cerge-ei.cz|]] | ||
+ | |||
+ | ---- | ||
===== Instruction no. 4 – Addressing multiple recipients in emails ===== | ===== Instruction no. 4 – Addressing multiple recipients in emails ===== | ||
- | In the case of **sending an email to the private addresses of multiple recipients, it is strongly recommended to put their email addresses into the Bcc: address field ** (Blind carbon copy) only. Using the To: or Cc: fields exposes their private email addresses to the other recipients and violates privacy principles (a private email address is considered to be personal data). | + | In the case of **sending an email to the private addresses of __multiple recipients__, it is strongly recommended to put their email addresses into the Bcc: address field ** (Blind carbon copy) only. Using the To: or Cc: fields exposes their private email addresses to the other recipients and violates privacy principles (a private email address is considered to be personal data). |
This instruction does not apply to situations where recipient addresses are their working emails (no matter whether an internal or third party) or communication participants obviously know each other. | This instruction does not apply to situations where recipient addresses are their working emails (no matter whether an internal or third party) or communication participants obviously know each other. | ||
Line 15: | Line 19: | ||
===== Instruction no. 3 – Using private e-mail addresses in work communication ===== | ===== Instruction no. 3 – Using private e-mail addresses in work communication ===== | ||
- | For the purpose of work communication within the Economics Institute (EI) or towards third parties, EI employees may use only their work e-mail addresses with the cerge-ei.cz (or ei.cas.cz) domain. The GDPR does not permit the use personal e-mail addresses for any type of work communication including communication with students. | + | **For the purpose of work communication within the Economics Institute (EI) or towards third parties, EI employees may use __only__ |
As an exception, EI employees may use e-mail addresses from other official domains for the purpose of work communication related to their EI work agendas when they are employees of any of the following organizations associated with the domains: Charles University, the Czech Academy of Sciences (including their joint workplaces), | As an exception, EI employees may use e-mail addresses from other official domains for the purpose of work communication related to their EI work agendas when they are employees of any of the following organizations associated with the domains: Charles University, the Czech Academy of Sciences (including their joint workplaces), | ||
Line 34: | Line 38: | ||
\\ | \\ | ||
- | **Any lost or stolen electronic/ | + | **Any lost or stolen electronic/ |
This instruction concerns any device containing personal data which might conceivably be lost or stolen or containing passwords, the stealing of which might lead to personal data loss (typically PCs, laptops, portable devices including tablets and mobile phones, external data drives and cards, etc.). Personal data include, e.g. students’ seminar papers, seminar attendance lists, students’ grades, personal information contained in research data files, etc. | This instruction concerns any device containing personal data which might conceivably be lost or stolen or containing passwords, the stealing of which might lead to personal data loss (typically PCs, laptops, portable devices including tablets and mobile phones, external data drives and cards, etc.). Personal data include, e.g. students’ seminar papers, seminar attendance lists, students’ grades, personal information contained in research data files, etc. |