Marc and Ally.  Privacy Act 1988  It protected peoples personal information and handling  Privacy Act Amendments 2000  Was amended to protect the.

Slides:



Advertisements
Similar presentations
Legal – permitted by law, lawful. Ethics - that branch of philosophy dealing with values relating to human conduct, with respect to the rightness and.
Advertisements

SES Ethics Workshop. Compliance or Culture How to institutionalise ethics in public administration.
The VLRC is an independent, government funded organisation that develops monitors and coordinates law reform in Victoria. The role of the Victorian Law.
AMSRO Leaders Forum 2014 Presentation by Timothy Pilgrim to AMSRO Sydney, Thursday 20 March 2014.
Copyright & PR Presented by John MacPhail Partner.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
2012, Team-Tiger- Northwestern McCormick MSIT 2013 Confidential 1 ©2011, Cognizant Northwestern McCormick MSIT October 20 th, 2012 Information Security.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
You’ve been hacked, now what? by Wild Wild West. Engineering firm that makes speakers. Startup, new game changing product with Twatter technology. 40.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
Managing Personal Information - Australian Companies Outsourcing to India and the Philippines Professor Margaret Jackson and Marita Shelly.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
15.5 The Impact of the New Deal
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Privacy Data Loss An Operational Risk Approach Michael Aiello Polytechnic University FE675 Operational Risk.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
By Aidan, Lochie, Curtis. WORKPLACE DISPUTES  Negotiation: Is a method of compromising disputes within a workplace. This easygoing approach usually.
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Public Communications Law Lecture 1 Slide 1 The First Amendment This course is fundamentally a study of the First Amendment freedoms and how they apply.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Chapter 04 Legal Liability of CPAs McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Civil Law Ch Academic Civics. Civil Law Legal action against another person or group to collect damages Lawsuit – case brought forth by a plaintiff.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
LAW REFORM Legal Studies 3C. REASONS WHY LAWS MAY NEED TO CHANGE Changing values and attitudes in society.
2-1 Copyright © 2014 McGraw-Hill Education (Australia) Pty Ltd PPTs to accompany Barron, Fundamentals of Business Law 7Rev This is the prescribed textbook.
CHAPTER FOUR THE PROTECTION OF RIGHTS PART TWO 2013 GLENVALE SCHOOL VCE Legal Studies UNIT 3.
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
VLAF STRATEGIC CAMPAIGNING FORUM 2012 The law that was missing A law reform case study.
Rules of Engagement Mark Dwyer. AGENDA 1.Spam and Consent 2.Privacy 3.Advice Warnings and Notices 4.Disclosures 5.Other Matters.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Today’s Agenda Any Announcements? Any Questions? Let's Review our Bellwork.... Now... Let’s Begin Today’s Lesson…..
TERMS OF A CONTRACT.
Public Communications Law Lecture 9 Slide 1 Commercial Speech and the First Amendment Commercial speech (advertising products, etc.) does enjoy certain.
BREACH OF CONFIDENCE 3/12/ What is Breach of Confidence? Spans several areas of law - Intellectual property, Tort and Equity Based on principle.
Presentation to the Local Authorities Revenue Management Association – October 2012 The role of the Office of the Information Commissioner.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
 The U.S. Securities and Exchange Commission (SEC) oversees the key participants in the securities world.  Concerned with promoting disclosure of important.
2011 Annual May Workshop The Australian Privacy Law Reform Project: a snapshot Karin Clark 4 May 2011.
WELCOME TO EVIDENCE 2016 Miiko Kumar. What is evidence law about? Where is evidence law from? Where is evidence law now? What are the aims of the laws.
CHAPTER 6 LEGAL ASPECTS OF BUSINESS
How the Executive Branch Works
Chapter 6 Administration of the Corporations Act and Securities Industry Corporate Governance.
Director, Regulation and Strategy
Freedom Independence Transition
ALL ABOUT THE FTC By: Brandon Baldwin.
Malcolm Crompton International Privacy: Managing Privacy in a Global Organisation – Identity, HR, Security & more IAPP TRUSTe Symposium: Privacy.
APP entities (organisations)
Charter of Rights and Freedoms
How the Executive Branch Works
CHAPTER 22 E-COMMERCE 2011 Thomson Reuters Legal & Regulatory Ltd. All Rights Reserved. PowerPoint slides to accompany A Guide to Business Law, 19th.
Introduction to Health Privacy
Law Reform Rule of Law Institute of Australia 2019.
By: Matthew Harris and brendan salvas
LO1 - Know about aspects of cyber security
Sources of law.
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Marc and Ally

 Privacy Act 1988  It protected peoples personal information and handling  Privacy Act Amendments 2000  Was amended to protect the private sectors  Sony Phone Hacking 2011  Condition that gave rise to law reform  Privacy Amendments 2012  This was a legal response to conditions that gave rise to law reform  2014 Privacy Law Reform  This reform has lead to peoples private information be protected from businesses  2014 Privacy Awareness Week (4 th -10 th May)  This is to warn people of privacy issues

 Breach of privacy can greatly impact a persons life, allow personal information to be accessed  Allows issues like identity theft to be more common, putting thousands at risk.

 Legal Reponses to Privacy Laws have been:  Privacy Act 1988 Amendments made in 2000, 2012 and 2014 ▪ Changes made due to advancements in technology  Non-Legal Responses: - Privacy Awareness Week - Informs people on privacy issues

Victoria Park Racing and Recreation Grounds Co. Ltd v. Taylor [1937] - Held at the High Court of Australia - The plaintiff claimed he had a right to privacy from Taylor - The court ruled that there was no legal right to privacy

 Privacy Laws to be beefed up following Sony attack – May 3 rd,  1.5 million user accounts information compromised on PlayStation network.  Federal Government looking to introduce tighter laws to protect information breaches.

 There were advancements in technology that could not protect all personal information.  Information was being illegally accessed, continuously, more reports for privacy breaches

 Courts - Grosse v Purvis [2001] – One of the first cases that was decided based on a breach of privacy - Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] HCA 63 Parliament: - Amended the Privacy Act of 1988 to current Privacy Law Reform

 Australian Law Reform Commission – the ALRC is the main agency dealing with Law Reform in Australia  Australian Privacy Foundation – A lobby group, campaigning for privacy protections for Australians

 After the 2012 amendments were made there were 10, 576 privacy enquires and 1, 496 privacy complaints in  The Privacy amendment was effective in only certain areas of the issue of privacy.  Has received 30% more complaints in the financial year  Not being protected enough, people asking for more laws concerning surveillance, e.g. Drones (Surveillance Devices Act 2004)

 There is continuous pressure for more laws that protect privacy both personal information and information that is handled by firms and government  Continually adjusting the law can be a timely, difficult matter, needing to pass through the parliament