Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 23 additions & 7 deletions guide/data-privacy.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,22 +68,38 @@ Develop a plan for responding to data breaches. Outline steps to mitigate damage

## Implementing Data Privacy Standards

### Example Data Privacy Policy (Snippet)

```markdown
### Data Privacy Policy

> ### Example Data Privacy Policy (Snippet)
>
>
> ### Data Privacy Policy
>
#### Data Collection and Usage
> #### Data Collection and Usage
#### Data Collection and Usage

>

We collect personal data (e.g., names, email addresses) only with explicit consent and for specified purposes. Data is used solely for internal communication and organizing purposes.
We collect personal data (e.g., names, email addresses) only with explicit consent and for specified purposes. Data is used solely for internal communication and organizing purposes.
> We collect personal data (e.g., names, email addresses) only with explicit consent and for specified purposes. Data is used solely for internal communication and > organizing purposes.
We collect personal data (e.g., names, email addresses) only with explicit consent and for specified purposes. Data is used solely for internal communication and organizing purposes.
We collect personal data (e.g., names, email addresses) only with explicit consent and for specified purposes. Data is used solely for internal communication and organizing purposes.

>

#### Data Security

All personal data is stored securely using industry-standard encryption methods. Access is restricted to authorized personnel only.
All personal data is stored securely using industry-standard encryption methods. Access is restricted to authorized personnel only.


#### Data Security
#### Data Retention


We retain personal data only as long as necessary for organizational purposes or as required by law. Data will be securely deleted when no longer needed.
All personal data is stored securely using industry-standard encryption methods. Access is restricted to authorized personnel only.


#### Consent and Rights

Expand Down Expand Up @@ -119,8 +135,8 @@ What is a potential consequence of not having strong data privacy protections in

**Top Answer:**
```
Author: [your name here]
Author: [Tess]

[your answer here]
[compromising private information]

```