Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:data_protection:instructions [2018-07-16 18:08] – vesely | public:data_protection:instructions [2020-04-30 07:38] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== The Economics Institute GDPR instructions ====== | + | ====== The Economics Institute GDPR instructions |
+ | |||
+ | ---- | ||
Česká verze //Pokynů// týkajících se ochrany osobních údajů je k dispozici na stránce [[https:// | Česká verze //Pokynů// týkajících se ochrany osobních údajů je k dispozici na stránce [[https:// | ||
Line 6: | Line 8: | ||
GDPR primary contact person: Petr Veselý, Head of Computer Office\\ | GDPR primary contact person: Petr Veselý, Head of Computer Office\\ | ||
Primární kontaktní email / Primary contact: [[helpdesk@cerge-ei.cz|]] | Primární kontaktní email / Primary contact: [[helpdesk@cerge-ei.cz|]] | ||
+ | |||
+ | ---- | ||
===== Instruction no. 4 – Addressing multiple recipients in emails ===== | ===== Instruction no. 4 – Addressing multiple recipients in emails ===== | ||
- | In the case of **sending an email to the private addresses of multiple recipients, it is strongly recommended to put their email addresses into the Bcc: address field ** (Blind carbon copy) only. Using the To: or Cc: fields exposes their private email addresses to the other recipients and violates privacy principles (a private email address is considered to be personal data). | + | In the case of **sending an email to the private addresses of __multiple recipients__, it is strongly recommended to put their email addresses into the Bcc: address field ** (Blind carbon copy) only. Using the To: or Cc: fields exposes their private email addresses to the other recipients and violates privacy principles (a private email address is considered to be personal data). |
This instruction does not apply to situations where recipient addresses are their working emails (no matter whether an internal or third party) or communication participants obviously know each other. | This instruction does not apply to situations where recipient addresses are their working emails (no matter whether an internal or third party) or communication participants obviously know each other. | ||
Line 34: | Line 38: | ||
\\ | \\ | ||
- | **Any lost or stolen electronic/ | + | **Any lost or stolen electronic/ |
This instruction concerns any device containing personal data which might conceivably be lost or stolen or containing passwords, the stealing of which might lead to personal data loss (typically PCs, laptops, portable devices including tablets and mobile phones, external data drives and cards, etc.). Personal data include, e.g. students’ seminar papers, seminar attendance lists, students’ grades, personal information contained in research data files, etc. | This instruction concerns any device containing personal data which might conceivably be lost or stolen or containing passwords, the stealing of which might lead to personal data loss (typically PCs, laptops, portable devices including tablets and mobile phones, external data drives and cards, etc.). Personal data include, e.g. students’ seminar papers, seminar attendance lists, students’ grades, personal information contained in research data files, etc. |