Understanding Privacy An Overview of our Responsibilities.

Slides:



Advertisements
Similar presentations
P rivacy P olicy T raining For in-house training by member clubs, as per instructions on the final slide.
Advertisements

Part 2. QUEENSLAND INTERNATINOAL BUSINESS ACADAMY.
Data Protection Information Management / Jody McKenzie.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
CHARTERED SECRETARIES AUSTRALIA New Privacy Laws 6 June 2013.
Privacy An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
The Data Protection (Jersey) Law 2005.
Data Protection.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
CSE2500 Systems Security and Privacy Week 11 Privacy Law in Australia (after 2000)
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
© 2012 Morgan Cole LLPExpertise | Experience | Efficiency | Contribution 11th October 2012 Avoiding Data Protection pitfalls when collecting Equality Information.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Volunteers and the Law Riverland Community Legal Service Inc.
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Data Protection for Church of Scotland Congregations
Practical Information Management
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
Data Protection Act obligations and pseudonymisation Dawn Monaghan Group Manager Information Commissioners Office.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Data Protection for Church of Scotland Congregations.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Understanding Privacy An Overview of our Responsibilities.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
An Overview of our Responsibilities
An Overview for Staff Prepared by MSM Compliance Services Pty Ltd
Director, Regulation and Strategy
Privacy principles Individual written policies
Surveying the privacy landscape
Data Protection Act.
IT Applications Theory Slideshows
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
The General Data Protection Regulation (GDPR)
New Data Protection Legislation
Data Protection principles
Data Protection and You
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
IMPLICATIONS OF GDPR ROBERT BELL.
GDPR Workshop MEU Symposium Prague 2018
Data Protection in a Tutorial Context
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Understanding Data Protection
Presentation transcript:

Understanding Privacy An Overview of our Responsibilities

Gioconda Di Lorenzo - University Secretary Privacy Officer & Freedom of Information Officer Education and Regulatory Compliance – Legal & Risk Raffaella Di Maio Privacy & Freedom of Information Coordinator Mary Oppy Education and Training Officer Introductions Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

Information Privacy  What Governs Information Privacy?  The 10 Information Privacy Principles  The information privacy lifecycle  Managing Breaches Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

Privacy Protection Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy Privacy and Data Protection Act 2014 (Vic) Privacy and Data Protection Act 2014 (Vic) All recorded personal information handled by the University, State and local government agencies (other than health related info) Health Records Act 2001 (Vic) Health Records Act 2001 (Vic) All health related personal information held in public and private sectors. Most of the personal info handled by health service

What is Personal Information?  Recorded information or opinion whether true or not about an individual whose identity is apparent or can be reasonably ascertained Education & Regulatory Compliance Legal & Risk, University Services Name Signature Telephone Number , Home or Work Address Employment Position Voice Recordings, Photographs or Videos Medical Records Academic Records Raffaella Di Maio & Mary Oppy

What is Sensitive Information?  Recorded information or opinion whether true or not about an individual whose identity is apparent or can be reasonably ascertained that is of a sensitive nature Education & Regulatory Compliance Legal & Risk, University Services Racial or ethnic origin Political opinions Membership of a political association Religious beliefs or affiliations Philosophical beliefs Membership of a professional or trade association Membership of a trade union Sexual preferences or practices Criminal record Raffaella Di Maio & Mary Oppy

10 Information Privacy Principles Education & Regulatory Compliance Legal & Risk, University Services IPPs 1.Collection 2.Use & Disclosure 3.Data Quality 4.Data Security 5.Openness 6.Access & Correction 7.Unique Identifiers 8.Anonymity 9.Transborder Data Flows 10Sensitive Information Raffaella Di Maio & Mary Oppy

Lifecycle of IPPs I. Prior to, or at the time of collection II. While holding information III. When using the information IV. When you no longer need the information Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

Prior to, or at the time of, collection  Is collection necessary (IPP 1)?  Do we need to collect sensitive information (IPP 10) and unique identifiers (IPP 7.4)?  Can the University allow individuals to transact anonymously (IPP 8)?  Provide a collection notice of the intended uses and individuals’ rights of access (IPP 1)  Does the University have a policy outlining its information handling practices (IPP 5)? Tools: A Privacy Impact Assessment can be used for new or amendments to existing projects or processes. Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

A collection notice must include : Raffaella Di Maio & Mary Oppy Education & Regulatory Compliance Legal & Risk, University Services 1. The identity and contact details of the department/division which is collecting the information. 2. The Primary Purpose for which the information is collected 3. To whom generally (the types of individuals or organisations) the information will be routinely disclosed to. 4. Any Law that requires the particular information to be collected. 5. The main consequences (if any) for the individual if all or part of the information is not provided. 6. The fact that the individual is able to gain access to the Personal Information they have provided. 7. A statement of the University's obligations to protect personal information, and information about the University's Privacy Policy. Item 4 may be omitted if there are no specific Laws that require the collection. Item 5 may be omitted if the consequences of not providing all or part of the information is nil or minimal.

While holding information:  Ensure the University has security measures in place for the information (IPP 4.1)  Provide mechanisms to enable individuals to access and correct their information. IPP 6 / Freedom of Information Act 1982 (Vic)  Update, amend and supplement the information, as necessary (IPP 3) Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

When using the information  Check that the proposed use is permitted under the Privacy and Data Protection Act or otherwise authorised under law, taking extra care with sensitive information (IPP 2)  Ensure that privacy protection travels with information if it is to leave Victoria (IPP 9)  Be careful about assigning, using or disclosing unique identifiers (IPP ) Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

When you no longer need the information  Consider whether, and when, the organisation should destroy or de-identify the information (IPP 4.2)  Do not destroy documents that are required to be retained under other laws Eg Public Records Act 1973 (Vic), Electronic Transactions (Victoria) Act 2000 (Vic), Crimes Act 1958 (Vic) Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy Tools: The Records Services team can provide advice on how long records should be retained and how to manage records no longer required. A comprehensive retention and disposal schedule is available at

Reporting the breach Preventing future breaches Notifying relevant people Evaluating the risks Containing the breach Head of Department Breaches Education & Regulatory Compliance Legal & Risk, University Services Raffaella Di Maio & Mary Oppy

Scenario 1 Omar is a University lecturer who is organising a field-trip for his students. He asks them to complete a form on which they have to give various details including their ethnicity and religion without explaining why he needs this personal information. Has Omar collected this sensitive information appropriately?

Raffaella Di Maio & Mary Oppy Education & Regulatory Compliance Legal & Risk, University Services A Faculty HR Officer receives a phone call from a staff member asking for the home address of a colleague. The staff member is unwell and the team would like to send flowers. What can or should the HR Officer do?

Raffaella Di Maio & Mary Oppy Education & Regulatory Compliance Legal & Risk, University Services “Privacy is not secrecy. It is about giving individuals control over how their personal information is handled; creating customer confidence and trust. As such, good privacy practices and great innovation directly support each other.” Office of the Australian Information Commissioner