SlideShare a Scribd company logo
1 of 46
Download to read offline
PRIVACY ACT SEMINAR
welcome
DATAHASALWAYSBEENCENTRALTOOUR
APPROACHTOMODERNMARKETING
Privacy act & data
DATAISTHENEWFRONTIERINMARKETING
THEWORLDHASBECOMEAWASHWITHDATA
THECMOISNOWMOREFOCUSEDON
MARKETINGAUTOMATION&OPTIMISATION
46%
PLANTOINCREASE
BRANDAWARENESS
30%
INCREASEDFOCUSON
LOCATIONBASEDMARKETING
61%
PLANTOINCREASE
INVESTMENTINDATA
& ANALYTICS
60%
PLANTOINCREASE
INVESTMENTIN
MARKETINGAUTOMATION
57%
PLANTOINCREASE
SOCIALMEDIA SPEND
IN2014,CMO’S:
*ExactTarget Cloud Marketing Survey 2014
1ST
PARTY 2ND
PARTY 3RD
PARTY
CAMPAIGNDATA
TRANSACTIONAL DATA
MEDIADATA
SOCIAL DATA
PERSONALDATA
CRM GOOGLE
ANALYTICS
DATA
EXCHANGES
SOCIAL
MEDIA
DATA
NEST
BILLIONSSPENT
ONNEWDATA
$
INSTAGRAM
DMP'S/PERSONALISATION
TWITTER
WHATSAPP
U
ALLFOCUSEDON:
CUSTOMER INTELLIGENCE
MARKETING
PROFIT
>>
NOTHINGISANONYMOUS
EVERYTHING IS IDENTIFIABLE
BEHAVIOURS/ACTIONSCANBEPREDICTED
FAIRPURPOSE
FAIR USE
CONSUMERPROTECTION
?
?
??
?
?
?
? ? ? ?
?
?
issues we will cover
AUSTRALIAN PRIVACY PRINCIPLES
REASONABLE EFFORTS TO ENSURE COMPLIANCE
IT SECURITY
THE POWERS OF THE COMMISSIONER
SOME CASE STUDIES
what is
personal information?
PERSONAL INFORMATION IS INFORMATION OR AN OPINION ABOUT
AN IDENTIFIED INDIVIDUAL, OR AN INDIVIDUAL WHO IS REASONABLY
IDENTIFIABLE WHETHER THE INFORMATION OR OPINION IS TRUE OR
NOT, AND WHETHER THE INFORMATION IS RECORDED IN A
MATERIAL FORM OR NOT.
The Australian
privacy principles
THIRTEEN PRINCIPLES WHICH SET OUT HOW ORGANISATIONS MUST
DEAL WITH PERSONAL INFORMATION
APPLY TO COMMONWEALTH GOVERNMENT AGENCIES AND BUSINESSES
WITH TURNOVER OF MORE THAN $3M
Personal information must be managed in an open and transparent way.
You must take reasonable steps to ensure you comply with the APPs, and you
must have a clearly expressed and up to date Privacy Policy (usually posted on
your website).
OPEN AND TRANSPARENT MANAGEMENT
OF PERSONAL INFORMATION
1
You must provide individuals with the option of not identifying themselves, or
of using a pseudonym when dealing with you.
This obligation doesn’t apply where it is impracticable to do so.
ANONYMITY AND PSEUDONYMITY2
You can only collect personal information where it is reasonably necessary for
your functions or activities.
Higher standards apply to the collection of ‘sensitive information’ (e.g. race,
religion, health information, sexual preference), in which case the individual
must consent to the collection of this information.
COLLECTION OF PERSONAL INFORMATION3
This APP sets out how you must deal with unsolicited information you receive.
Broadly, you will have to determine whether you would have been able to
collect the information in accordance with APP 3. If not, you must destroy or
de-identify the information.
Unsolicited information is that which you receive when you have taken no
active steps to collect it. For example, random job applications, flyers,
purchased mailing lists.
DEALING WITH
4
APP 5 sets out when and in what circumstances you must notify an individual
of certain matters including your identity and contact details.
You should notify the ‘APP 5’ matters at or prior to the point of collection.
‘APP 5’ matters include:
Your identity and contact details
The purposes for which you collect the information
To whom you may disclose the information (including overseas)
Details of your privacy policy
Generally a clear and prominent link to the privacy policy at the point of
collection is OK.
NOTIFICATION OF THE COLLECTION
OF PERSONAL INFORMATION5
You can only use information for the purposes for which you collected it,
unless the person has consented or should reasonably expect that you would
use it for other related purposes.
USE OR DISCLOSURE OF
PERSONAL INFORMATION6
Imposes a general prohibition on use or disclosure of personal information for
direct marketing, unless certain criteria are met:
the person has consented or would reasonably expect you to; and
you provide a simple opt out mechanism.
Note this does not include electronic commercial messages (email, text
message), which are covered by the SPAM Act 2003.
DIRECT MARKETING7
You cannot disclose personal information to overseas recipients unless you
take reasonable steps to ensure that the overseas recipient will comply with
the APPs.
Unless:
You believe that the overseas recipient is subject to a privacy regime
substantially similar to Australia’s;
The individual provided express consent to the disclosure and agreed
that the APPs wouldn’t apply.
What is ‘disclosure’? Cloud computing etc generally not disclosure.
CROSS-BORDER DISCLOSURE
OF PERSONAL INFORMATION8
You cannot use an individual’s government related identifier (eg. passport
number) as your own identifier for that individual.
Example: An accounting firm can’t use tax file numbers as the basis for its
identification system.
You can only use or disclose government related identifier if you reasonably
need to use the identifier to verify the identity of an individual.
ADOPTION, USE OR DISCLOSURE OF
GOVERNMENT RELATED IDENTIFIERS9
You must take reasonable steps to ensure that the personal information you
collect, use and disclose is accurate, up-to-date and complete.
‘Reasonable steps’ depend on the size of your organisation, the types of
information, the consequences of having wrong information.
The Commissioner recommends reviewing personal information regularly,
and providing individuals with a simple means of updating details.
QUALITY OF PERSONAL INFORMATION10
You must take reasonable steps to protect personal information
you hold from:
Misuse;
Interference and loss; and
Unauthorised access, modification or disclosure.
You must destroy personal information which you don’t need.
SECURITY OF PERSONAL INFORMATION11
Generally, you must give individuals access to personal information you hold
about them.
There are a number of exceptions, including where access would threaten life
or safety, it relates to legal proceedings, or the request is frivolous.
You must respond to a request within a reasonable time.
You must verify the identity of an individual before handing over information.
ACCESS TO PERSONAL INFORMATION12
If you know (or the individual tells you) personal information is incorrect,
then you must correct it within a reasonable time.
If you have disclosed information, you must also advise those
entities of the corrections.
CORRECTION OF PERSONAL INFORMATION13
REASONABLE EFFORTS to ensure
information security
WHAT DOES YOUR BUSINESS NEED TO DO TO PROTECT PERSONAL INFORMATION?
SOME THINGS TO CONSIDER:
Access (eg. strong passwords)
Backing up
Communications security (eg. docs left on printers, emails, discussions
outside the office)
Data breaches (have a response plan and know what to do)
Physical security (physical access to the workplace/desks)
Personnel security and training (including contractors and service providers)
Workplace policies
The powers of the
commissioner
The Commissioner could always investigate breaches, but in the absence of a
complaint had no powers but bad publicity.
Now the Commissioner has the full range of remedies even in the event of
‘own motion’ investigations.
investigations
The Commissioner may determine:
To dismiss a complaint;
That a person must take certain steps to redress loss or ensure the breach
doesn’t occur again;
That a person is entitled to a specific amount of compensation.
No further action to be taken.
If a person does not comply with a determination, the Commissioner may
apply to the Federal Court for an order to enforce.
determinations
The Commissioner has the power to accept undertakings from an entity that
it will do certain things to ensure compliance.
If the entity doesn’t comply, the Commissioner may apply to the Court
for enforcement.
Enforceable undertakings
This is new!
If serious or repeated interferences with privacy, the Commissioner may seek
a civil penalty order from the Court.
Currently, the maximum penalty for a corporation is $1.7 million, and an
individual $340,000.
penalties
Real world stuff ups and
their consequences
CASE STUDIES
A mail out to 60,300 customers inadvertently had the wrong
customer addresses.
Telstra’s security measures included:
The contract with the mailing house included privacy and
confidentiality obligations;
They always conducted privacy impact assessments on each new job;
Each mail-out went through a series of approvals
Quality control procedures for staff handling of all campaigns
In the circumstances Telstra got off – the Commissioner said it was due to
human error, and Telstra’s systems were adequate.
Telstra
McDonalds ran a campaign in which it encouraged customers to send their
friends a link on its Happy Meal website, which included promotional games
Result
The Australian Communications and Media Authority (ACMA) thought this
was a breach of the SPAM Act as the recipients did not consent to
receiving commercial electronic messages from McDonald’s, and they
didn’t have an unsubscribe facility.
McDonald’s serves spam
AAPT customer data held by contractor Melbourne IT was hacked and
published online.
The Commissioner found AAPT had breached the Act for failing to adequately
protect customer data from unauthorised access.
The Commissioner said:
It was not clear contractually who was responsible for addressing and
identifying data security issues;
Old versions of applications and software were used; and
Data which was no longer needed was not destroyed.
Under the current Act he couldn’t impose a penalty, but under the changes
to the Act he can.
AAPT
Grays sent an email to its customers introducing its new
website ‘GraysEscape’.
They had decided that it was not commercial, and therefore sent it to
customers who had previously unsubscribed, and it also did not have an
unsubscribe facility.
ACMA found that it was commercial, and hit them with a $165,000 fine.
It was made worse by the fact that Grays made a conscious determination
that the email was not promotional (ie it was not the result of an error).
Grays don’t escape
Crisis management
CUSTOMER INFORMATION (INCLUDING BANK ACCOUNT DETAILS)
OF ABOUT 600 PEOPLE IS INADVERTENTLY EMAILED TO A HOUSEWIFE
IN MILWAUKEE.
WHAT DO YOU DO?
What should you do?
FIRST STEP – LOOK AT YOUR OWN PROCEDURES.
HAVE YOUR SYSTEMS FAILED?
NO OBLIGATION TO NOTIFY THE CUSTOMERS OR THE COMMISSIONER.
LOOK AT IMPACT OF THE DISCLOSURE, THREAT TO THE CUSTOMER?
BE REASONABLE
QUESTIONS?
THANK YOU

More Related Content

Similar to Australian Privacy Principles - Updates presented by WiTH Collective & Marque Lawyers

Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingTokusoudeka
 
GDPR + Sales & Marketing A practical guide by Dan Smith Doogheno
GDPR + Sales & Marketing A practical guide by Dan Smith DooghenoGDPR + Sales & Marketing A practical guide by Dan Smith Doogheno
GDPR + Sales & Marketing A practical guide by Dan Smith DooghenoDaniel Smith
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRRichard Veryard
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteSilverTech
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010DataMotion
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business ReadyMoEngage Inc.
 

Similar to Australian Privacy Principles - Updates presented by WiTH Collective & Marque Lawyers (20)

Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in Marketing
 
GDPR + Sales & Marketing A practical guide by Dan Smith Doogheno
GDPR + Sales & Marketing A practical guide by Dan Smith DooghenoGDPR + Sales & Marketing A practical guide by Dan Smith Doogheno
GDPR + Sales & Marketing A practical guide by Dan Smith Doogheno
 
GDPR Tip Sheet
GDPR Tip SheetGDPR Tip Sheet
GDPR Tip Sheet
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Can we ask that
Can we ask thatCan we ask that
Can we ask that
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready
 

More from WiTH Collective

Digital Download - TCC - Graduate Preso - 23rd Jan 2014
Digital Download - TCC - Graduate Preso - 23rd Jan 2014Digital Download - TCC - Graduate Preso - 23rd Jan 2014
Digital Download - TCC - Graduate Preso - 23rd Jan 2014WiTH Collective
 
TCC - Digital Download - January 2013
TCC - Digital Download - January 2013TCC - Digital Download - January 2013
TCC - Digital Download - January 2013WiTH Collective
 
AdSchool - Digital download - Digital 101
AdSchool - Digital download - Digital 101AdSchool - Digital download - Digital 101
AdSchool - Digital download - Digital 101WiTH Collective
 
Abandoned cart follow-up strategy best practice & recommendations
Abandoned cart follow-up strategy best practice & recommendationsAbandoned cart follow-up strategy best practice & recommendations
Abandoned cart follow-up strategy best practice & recommendationsWiTH Collective
 
Facebook Timeline for Brands
Facebook Timeline for BrandsFacebook Timeline for Brands
Facebook Timeline for BrandsWiTH Collective
 
Digital Download 101 - The Communications Council 2012
Digital Download 101 - The Communications Council 2012Digital Download 101 - The Communications Council 2012
Digital Download 101 - The Communications Council 2012WiTH Collective
 
WiTH Collective - Mentor Program
WiTH Collective - Mentor ProgramWiTH Collective - Mentor Program
WiTH Collective - Mentor ProgramWiTH Collective
 
Future of Digital - an API vision - Youngbloods - October 2011
Future of Digital - an API vision - Youngbloods - October 2011Future of Digital - an API vision - Youngbloods - October 2011
Future of Digital - an API vision - Youngbloods - October 2011WiTH Collective
 
US Retailer Receipt Usages & Incentivised survey - October 2011
US Retailer Receipt Usages & Incentivised survey - October 2011US Retailer Receipt Usages & Incentivised survey - October 2011
US Retailer Receipt Usages & Incentivised survey - October 2011WiTH Collective
 
Apple Online Purchase Survey - October 2011
Apple Online Purchase Survey - October 2011Apple Online Purchase Survey - October 2011
Apple Online Purchase Survey - October 2011WiTH Collective
 
Digital Review Sept 2011
Digital Review Sept 2011Digital Review Sept 2011
Digital Review Sept 2011WiTH Collective
 
Google ThinkMobile Conference
Google ThinkMobile ConferenceGoogle ThinkMobile Conference
Google ThinkMobile ConferenceWiTH Collective
 

More from WiTH Collective (13)

Digital Download - TCC - Graduate Preso - 23rd Jan 2014
Digital Download - TCC - Graduate Preso - 23rd Jan 2014Digital Download - TCC - Graduate Preso - 23rd Jan 2014
Digital Download - TCC - Graduate Preso - 23rd Jan 2014
 
TCC - Digital Download - January 2013
TCC - Digital Download - January 2013TCC - Digital Download - January 2013
TCC - Digital Download - January 2013
 
AdSchool - Digital download - Digital 101
AdSchool - Digital download - Digital 101AdSchool - Digital download - Digital 101
AdSchool - Digital download - Digital 101
 
Abandoned cart follow-up strategy best practice & recommendations
Abandoned cart follow-up strategy best practice & recommendationsAbandoned cart follow-up strategy best practice & recommendations
Abandoned cart follow-up strategy best practice & recommendations
 
Pinterest
PinterestPinterest
Pinterest
 
Facebook Timeline for Brands
Facebook Timeline for BrandsFacebook Timeline for Brands
Facebook Timeline for Brands
 
Digital Download 101 - The Communications Council 2012
Digital Download 101 - The Communications Council 2012Digital Download 101 - The Communications Council 2012
Digital Download 101 - The Communications Council 2012
 
WiTH Collective - Mentor Program
WiTH Collective - Mentor ProgramWiTH Collective - Mentor Program
WiTH Collective - Mentor Program
 
Future of Digital - an API vision - Youngbloods - October 2011
Future of Digital - an API vision - Youngbloods - October 2011Future of Digital - an API vision - Youngbloods - October 2011
Future of Digital - an API vision - Youngbloods - October 2011
 
US Retailer Receipt Usages & Incentivised survey - October 2011
US Retailer Receipt Usages & Incentivised survey - October 2011US Retailer Receipt Usages & Incentivised survey - October 2011
US Retailer Receipt Usages & Incentivised survey - October 2011
 
Apple Online Purchase Survey - October 2011
Apple Online Purchase Survey - October 2011Apple Online Purchase Survey - October 2011
Apple Online Purchase Survey - October 2011
 
Digital Review Sept 2011
Digital Review Sept 2011Digital Review Sept 2011
Digital Review Sept 2011
 
Google ThinkMobile Conference
Google ThinkMobile ConferenceGoogle ThinkMobile Conference
Google ThinkMobile Conference
 

Recently uploaded

Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量acyefsa
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 

Recently uploaded (20)

Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 

Australian Privacy Principles - Updates presented by WiTH Collective & Marque Lawyers

  • 16. issues we will cover AUSTRALIAN PRIVACY PRINCIPLES REASONABLE EFFORTS TO ENSURE COMPLIANCE IT SECURITY THE POWERS OF THE COMMISSIONER SOME CASE STUDIES
  • 17. what is personal information? PERSONAL INFORMATION IS INFORMATION OR AN OPINION ABOUT AN IDENTIFIED INDIVIDUAL, OR AN INDIVIDUAL WHO IS REASONABLY IDENTIFIABLE WHETHER THE INFORMATION OR OPINION IS TRUE OR NOT, AND WHETHER THE INFORMATION IS RECORDED IN A MATERIAL FORM OR NOT.
  • 18. The Australian privacy principles THIRTEEN PRINCIPLES WHICH SET OUT HOW ORGANISATIONS MUST DEAL WITH PERSONAL INFORMATION APPLY TO COMMONWEALTH GOVERNMENT AGENCIES AND BUSINESSES WITH TURNOVER OF MORE THAN $3M
  • 19. Personal information must be managed in an open and transparent way. You must take reasonable steps to ensure you comply with the APPs, and you must have a clearly expressed and up to date Privacy Policy (usually posted on your website). OPEN AND TRANSPARENT MANAGEMENT OF PERSONAL INFORMATION 1
  • 20. You must provide individuals with the option of not identifying themselves, or of using a pseudonym when dealing with you. This obligation doesn’t apply where it is impracticable to do so. ANONYMITY AND PSEUDONYMITY2
  • 21. You can only collect personal information where it is reasonably necessary for your functions or activities. Higher standards apply to the collection of ‘sensitive information’ (e.g. race, religion, health information, sexual preference), in which case the individual must consent to the collection of this information. COLLECTION OF PERSONAL INFORMATION3
  • 22. This APP sets out how you must deal with unsolicited information you receive. Broadly, you will have to determine whether you would have been able to collect the information in accordance with APP 3. If not, you must destroy or de-identify the information. Unsolicited information is that which you receive when you have taken no active steps to collect it. For example, random job applications, flyers, purchased mailing lists. DEALING WITH 4
  • 23. APP 5 sets out when and in what circumstances you must notify an individual of certain matters including your identity and contact details. You should notify the ‘APP 5’ matters at or prior to the point of collection. ‘APP 5’ matters include: Your identity and contact details The purposes for which you collect the information To whom you may disclose the information (including overseas) Details of your privacy policy Generally a clear and prominent link to the privacy policy at the point of collection is OK. NOTIFICATION OF THE COLLECTION OF PERSONAL INFORMATION5
  • 24. You can only use information for the purposes for which you collected it, unless the person has consented or should reasonably expect that you would use it for other related purposes. USE OR DISCLOSURE OF PERSONAL INFORMATION6
  • 25. Imposes a general prohibition on use or disclosure of personal information for direct marketing, unless certain criteria are met: the person has consented or would reasonably expect you to; and you provide a simple opt out mechanism. Note this does not include electronic commercial messages (email, text message), which are covered by the SPAM Act 2003. DIRECT MARKETING7
  • 26. You cannot disclose personal information to overseas recipients unless you take reasonable steps to ensure that the overseas recipient will comply with the APPs. Unless: You believe that the overseas recipient is subject to a privacy regime substantially similar to Australia’s; The individual provided express consent to the disclosure and agreed that the APPs wouldn’t apply. What is ‘disclosure’? Cloud computing etc generally not disclosure. CROSS-BORDER DISCLOSURE OF PERSONAL INFORMATION8
  • 27. You cannot use an individual’s government related identifier (eg. passport number) as your own identifier for that individual. Example: An accounting firm can’t use tax file numbers as the basis for its identification system. You can only use or disclose government related identifier if you reasonably need to use the identifier to verify the identity of an individual. ADOPTION, USE OR DISCLOSURE OF GOVERNMENT RELATED IDENTIFIERS9
  • 28. You must take reasonable steps to ensure that the personal information you collect, use and disclose is accurate, up-to-date and complete. ‘Reasonable steps’ depend on the size of your organisation, the types of information, the consequences of having wrong information. The Commissioner recommends reviewing personal information regularly, and providing individuals with a simple means of updating details. QUALITY OF PERSONAL INFORMATION10
  • 29. You must take reasonable steps to protect personal information you hold from: Misuse; Interference and loss; and Unauthorised access, modification or disclosure. You must destroy personal information which you don’t need. SECURITY OF PERSONAL INFORMATION11
  • 30. Generally, you must give individuals access to personal information you hold about them. There are a number of exceptions, including where access would threaten life or safety, it relates to legal proceedings, or the request is frivolous. You must respond to a request within a reasonable time. You must verify the identity of an individual before handing over information. ACCESS TO PERSONAL INFORMATION12
  • 31. If you know (or the individual tells you) personal information is incorrect, then you must correct it within a reasonable time. If you have disclosed information, you must also advise those entities of the corrections. CORRECTION OF PERSONAL INFORMATION13
  • 32. REASONABLE EFFORTS to ensure information security WHAT DOES YOUR BUSINESS NEED TO DO TO PROTECT PERSONAL INFORMATION? SOME THINGS TO CONSIDER: Access (eg. strong passwords) Backing up Communications security (eg. docs left on printers, emails, discussions outside the office) Data breaches (have a response plan and know what to do) Physical security (physical access to the workplace/desks) Personnel security and training (including contractors and service providers) Workplace policies
  • 33. The powers of the commissioner
  • 34. The Commissioner could always investigate breaches, but in the absence of a complaint had no powers but bad publicity. Now the Commissioner has the full range of remedies even in the event of ‘own motion’ investigations. investigations
  • 35. The Commissioner may determine: To dismiss a complaint; That a person must take certain steps to redress loss or ensure the breach doesn’t occur again; That a person is entitled to a specific amount of compensation. No further action to be taken. If a person does not comply with a determination, the Commissioner may apply to the Federal Court for an order to enforce. determinations
  • 36. The Commissioner has the power to accept undertakings from an entity that it will do certain things to ensure compliance. If the entity doesn’t comply, the Commissioner may apply to the Court for enforcement. Enforceable undertakings
  • 37. This is new! If serious or repeated interferences with privacy, the Commissioner may seek a civil penalty order from the Court. Currently, the maximum penalty for a corporation is $1.7 million, and an individual $340,000. penalties
  • 38. Real world stuff ups and their consequences CASE STUDIES
  • 39. A mail out to 60,300 customers inadvertently had the wrong customer addresses. Telstra’s security measures included: The contract with the mailing house included privacy and confidentiality obligations; They always conducted privacy impact assessments on each new job; Each mail-out went through a series of approvals Quality control procedures for staff handling of all campaigns In the circumstances Telstra got off – the Commissioner said it was due to human error, and Telstra’s systems were adequate. Telstra
  • 40. McDonalds ran a campaign in which it encouraged customers to send their friends a link on its Happy Meal website, which included promotional games Result The Australian Communications and Media Authority (ACMA) thought this was a breach of the SPAM Act as the recipients did not consent to receiving commercial electronic messages from McDonald’s, and they didn’t have an unsubscribe facility. McDonald’s serves spam
  • 41. AAPT customer data held by contractor Melbourne IT was hacked and published online. The Commissioner found AAPT had breached the Act for failing to adequately protect customer data from unauthorised access. The Commissioner said: It was not clear contractually who was responsible for addressing and identifying data security issues; Old versions of applications and software were used; and Data which was no longer needed was not destroyed. Under the current Act he couldn’t impose a penalty, but under the changes to the Act he can. AAPT
  • 42. Grays sent an email to its customers introducing its new website ‘GraysEscape’. They had decided that it was not commercial, and therefore sent it to customers who had previously unsubscribed, and it also did not have an unsubscribe facility. ACMA found that it was commercial, and hit them with a $165,000 fine. It was made worse by the fact that Grays made a conscious determination that the email was not promotional (ie it was not the result of an error). Grays don’t escape
  • 43. Crisis management CUSTOMER INFORMATION (INCLUDING BANK ACCOUNT DETAILS) OF ABOUT 600 PEOPLE IS INADVERTENTLY EMAILED TO A HOUSEWIFE IN MILWAUKEE. WHAT DO YOU DO?
  • 44. What should you do? FIRST STEP – LOOK AT YOUR OWN PROCEDURES. HAVE YOUR SYSTEMS FAILED? NO OBLIGATION TO NOTIFY THE CUSTOMERS OR THE COMMISSIONER. LOOK AT IMPACT OF THE DISCLOSURE, THREAT TO THE CUSTOMER? BE REASONABLE