OECD Home › Internet › Publications & Documents › Best Practices / Guidelines
Best Practices / Guidelines
English, , 322kb
The disruption or destruction of critical information infrastructures (“CII”) could have serious consequences. This Recommendation is derived from best practices for CII protection identified in an OECD background report comparing policies in seven countries.
On 12 July 2007, OECD Member countries adopted a Recommendation on Consumer Dispute Resolution and Redress to provide governments with a framework to help consumers resolve disputes and settle claims with business.
The OECD Council adopted a Recommendation encouraging efforts by Member countries to establish compatible, technology-neutral approaches for effective domestic and cross-border electronic authentication of persons and entities. The OECD also developed Guidance to support these efforts.
This recommendation urges enforcement authorities throughout the OECD to share information and work together to tackle what has become a global problem.
OECD governments have agreed on guidelines outlining a framework for international co-operation to protect consumers against the growing problem of cross-border fraud, particularly on the Internet.
English, , 270kb
These guidelines apply to all participants in the new information society and suggest the need for a greater awareness and understanding of security issues, including the need to develop a "culture of security".
These guidelines are designed to help ensure that consumers are no less protected when shopping online than they are when they buy from their local store or order from a catalogue.
English, , 11kb
This Declaration was made by OECD Ministers at the conference, "A Borderless World: Realising the Potential of Global Electronic Commerce" in Ottawa, Canada on 7-9 October 1998 and serves as the basis for OECD privacy protection work since 1998.
The Guidelines are primarily aimed at governments, in terms of the policy recommendations herein, but with anticipation that they will be widely read and followed by both the private and public sectors.
Explosive growth in use of information systems for all manner of applications in all parts of life has made provision of proper security essential.