.

Wednesday, May 6, 2020

Australian Privacy Act 1988-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Australian Privacy Act. Answer: Introduction This report discusses about the Australian privacy act which was made in 1988 and the objectives it suggests. On the basis of privacy act it addresses the concern in the various sectors like marketing, banking and healthcare. The report further analyzes an Australian company Computershare privacy policy and compare with the privacy act. The report finally makes some suggestions as why company should comply with its privacy policy on the basis of two case studies. Discussion Personal Information Any information about the individual which he is not comfortable to share with any organization can be termed as personal information (Sadeh et al, 2013). According to Australian Privacy Principle (APP) guidelines and the privacy act 1988. The following information can be termed as personal. Health information Credit card information Tax files id Sensitive information which includes religious beliefs, criminal records, political information Australia privacy act ThePrivacy Act 1988which was regarding Privacy rights of individual, was passed by the parliament of Australia in the year 1988 and it became active in 1989 (Park, Campbell, and Kwak, 2012). At the beginning the Act had only two objectives which were: To safeguard the personal information which was under the Australian Government .The Privacy Act contains eleven Information Privacy Principles designed on (Organization for economic cooperation and development) OECD guidelines which set the standard for Australian Government agencies to collect, store, using and disclosing and to providing access to, and correcting personal information Implementation and safeguard for the collection and usage of tax file numbers the Privacy Act included theInterim Tax File Number Guidelines, which will regulate the handling oftax file numbers. Areas of concerns Health To access the quality health care is top priority of the Australia country but it is equally important to protect the individuals privacy (Gajanayake et al, 2012). The private act 1988 says that the health service providers can share the patient information with each other in keeping the mind that the information needs to be safeguard. In the recent times the privacy protection need to be protected both in electronic healthy records and paper based record. The Privacy Amendment (Private Sector) Act 2000 redresses the Privacy Act 1988 to establish privacy standards for the Australian health sector. The legislation is active from 21 December 2001. The Privacy Act forges single consistent framework over Australia for protecting privacy (Huckvale et al 2015). According Privacy Act to provide health service includes activity that involves: recording, assessing and maintaining, improving a persons health; diagnosing a persons illness or disability; Dispensing of a prescription drug by a pharmacist Marketing In marketing the personal information of the information of the user is used and shared for business purpose to promote goods and services of the company through telephone, SMS, mail, email and online advertising on social sites thus compromising the users privacy (Ifinedo,2012). The personal information of the user is obtained from various sources which include public records, business documents, professional and trade organizations online and information from paper-based documents or phone surveys and online accounts such as purchase history or the browsing habits (cookies) of users. Banking and finance (Solove and Schwartz, 2014)When a user opens a account in the bank he has to provide various information like his name, number ,address, his financial status which comes under the personal information and all these information is stored online thus it is the it is the duty of bank to protect the customers data from misuse. Business privacy policy with the privacy act 1988 The selected company for the privacy policy is Computershare. The privacy policy written on the Computershare website says it complies with the private act 1988. It states that Computershare Limited (ABN 71 005 485 825) and its subsidiaries (Computershare) collects and use the personal information of its customers to work on the suitability of the customers. It states that to safeguard the information provided to the company is important and is only used for recruitment purposes (Wright and De Hert, 2012). Computershare collects uses and protects people personal information when he applies for a position with Computershare. It further states that sometimes it may request particular information about certain client but it will take the responsibility to inform the client the purpose for which the information is collected (Martini and Choo, 2012). Some information is obtained from a third party and is used with the consent with them. Regarding storage and Security of Personal Informati on the company says that the personal information of its employees is maintained in secure electronic databases and it take measurable steps for the security processes to protect the security and confidentiality of personal information from breaching (Torigai, 2012). The information of the Paper applications is also stored in a secure storage. The applications and personal information are accessible only to recruiting managers. Recommendations and changes Although the company claims that it takes all possible measures to protect the data and is accessible only by recruiting team and all the personals data is used with users consent and also strictly follows the privacy act 1988. However in December 17, 2015 Computershare has been fined over five laky dollars for multiple breaches of regulations and in another case, in 2011 thousands of sensitive information lost by a employee thus the two news implies that the regulation written in privacy policy of Cloud share is only limited to website and is not implemented properly by the company. Thus it is suggested that the privacy policy made by company should be strictly followed and should not be compromised at any circumstances. Conclusion From the report it can be concluded that the protection and utilization of the personal data of individual is the huge challenge that is faced by all the company the privacy act 1988 has been made which had two objectives that includes the protection the personal information in the possession of Australian Government .The Privacy Act contains eleven Information Privacy Principles designed on (Organization for economic cooperation and development) OECD guidelines which set the standard for Australian Government agencies to collect, store, using and disclosing and to providing access to, and correcting personal information. Various sectors like banking marketing and healthcare contains the personal information of its client and its their duty to abide by the privacy act to use the data. Cloudshare company claims that it follows the privacy act to utilize the sensitive information but the two describes case tell another story. Therefore the privacy laws formulated by the company should not only keep in the paper but also should be utilized. References Sadeh, N., Acquisti, A., Breaux, T.D., Cranor, L.F., McDonald, A.M., Reidenberg, J.R., Smith, N.A., Liu, F., Russell, N.C., Schaub, F. and Wilson, S., 2013.The usable privacy policy project. Technical Report, CMU-ISR-13-119, Carnegie Mellon University. Gajanayake, R., Lane, B., Iannella, T. and Sahama, T., 2012. Legal issues related to Accountable-eHealth systems in Australia. Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.J. and Car, J., 2015. Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment.BMC medicine,13(1), p.214. Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers Security,31(1), pp.83-95. Martini, B. and Choo, K.K.R., 2012. An integrated conceptual digital forensic framework for cloud computing.Digital Investigation,9(2), pp.71-80. Park, Y.J., Campbell, S.W. and Kwak, N., 2012. Affect, cognition and reward: Predictors of privacy protection online.Computers in Human Behavior,28(3), pp.1019-1027. Solove, D.J. and Schwartz, P., 2014.Information privacy law. Wolters Kluwer Law Business Torigai, M., Fujii, M. and Tsukamoto, Y., Mieko Ishii, 2012.Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program. U.S. Patent 8,171,556. Torigai, M., Fujii, M. and Tsukamoto, Y., Mieko Ishii, 2012.Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program. U.S. Patent 8,171,556. Wright, D. and De Hert, P., 2012. Introduction to privacy impact assessment. InPrivacy Impact Assessment(pp. 3-32). Springer Netherlands

No comments:

Post a Comment