SlideShare a Scribd company logo
1 of 21
North West Metropolitan
Learning Forum
Privacy – myth busters

“Privacy Matters”
Presentation Overview
• Module 1 – legislation, definitions & key
  exemptions
• Module 2 – Collection & Use & Disclosure
• Module 3 – Management & Access
• Case studies
• Module 4 – Complaints
• Recap - DVD
• Discussion/Questions
“Privacy Matters”
Learning Objectives

Today you will learn about Victorian
privacy requirements
                       This session will better equip you to
                       understand:
                       •collection, use & disclosure,
                       management and access to personal
                       information;
                       •Perform your job functions in a manner
                       consistent with privacy requirements; &
                       •where to go for privacy and records
                       management related help.


“Privacy Matters”
Icebreaker
• PrYvacy Bingo




“Privacy Matters”
Module 1 Privacy legislation


Information Privacy Act         State government agencies,
(Vic) 2000                      local councils, Ministers &
                                Statutory agencies.


Health Records Act (Vic) 2001   Health information in Victorian
                                public and private sectors,
                                hospitals, doctors & employers.



“Privacy Matters”
Module 1 Privacy – Key definitions

  Personal information              Recorded information about a living
                                    identifiable or easily identifiable
                                    individual.
  Health information                Information able to be linked to a living or
                                    deceased person about a person’s physical,
                                    mental or psychological health.
  Sensitive information             Includes information about a person’s race
                                    or ethnicity and criminal record.




  Is a photo personal information? Are details of a person’s position and salary
  recorded on their personnel file? Small Group activity

“Privacy Matters”
Module 1 Relationship to other laws

   Privacy laws          What they say                    Examples

 Information      If there is, any inconsistency   • Section 30 of the
 Privacy Act      between the Information          Corrections Act 1991.
 (section 6).     Privacy Act and a provision in
                  another Act, the other Act’s     • Section 141 of the Fair
                  provision prevails to the        Trading Act 1999.
                  extent of the inconsistency.




   Are you familiar with what your primary legislation states you
   can do with personal information? Pair Activity
“Privacy Matters”
Module 1 Court Services


                           Courts & Tribunals are partially
                           exempted from privacy laws in
                           exercising their judicial or quasi-
                           judicial functions.



Are human resources functions covered?
What about filming inside a court room?
Would a court-issued subpoena be a judicial function?

 “Privacy Matters”
Module 1 Law enforcement exemption


  Who is covered?         How does it work?                 Examples
                      If there is a reasonable
Corrections (Prisons, belief that non-compliance    Police checks of the
CCS & CORE); CAV; is necessary for law              Register of Births and
RAJAC;                enforcement purposes;         Deaths for name changes.
Business Licensing    then exempt from
                                                    In emergency situations,
Agency; &             main collection, use,         locating next of kin.
Enforcement           disclosure and transfer
Management.           obligations, but still must   Inspectors investigating
                      comply with some              motor car traders.
                      requirements.


“Privacy Matters”
“Privacy Matters”
Module 1 Law enforcement agencies

  IPP8         IPP1.1 &       IPP2.2         IPP3      IPP4       IPP5
                  1.2
If lawful     Collect       Record uses     Be         Be       Have
and           personal      & disclosures   accurate   secure   privacy
practicable   information   between law                         policies &
offer         responsibly   enforcement                         processes
anonymity                   agencies




“Privacy Matters”
Module 2 other functions?
• For all other non-judicial and non-law
  enforcement functions employees must
  comply with the 10 information privacy
  principles (IPPs)

• The IPPs are connected and guide how
  personal information should be handled:

       • Collection (IPPs 8, 1, and 10);
       • Use and Disclosure (IPPs 2 and 9);
       • Management of personal information
         (IPPs 3,4, 5, & 7); and
       • Access and Correction (IPP6 and FOI)


“Privacy Matters”
Module 2 Collection

Collection (IPPs 8, 1, and 10)
Preserve anonymity if you can. Collect only what you need.
Do it lawfully, fairly, directly and not unreasonably intrusively.
Tell people you are doing it and why. Be extra careful with
sensitive information.


                       Scenario
                       Photos are taken at the end of year staff party. The
                       photos are added to a bank of stored images used for
                       promotional purposes in newsletters and the website.
                       Are there any collection issues?

 “Privacy Matters”
Module 2 Tips for compliance

     • When drafting or handling forms
       check for a privacy statement.
       Think of a statement as a food label.
     • Be able to justify why you need
       personal information if asked.
     • Do not over collect personal
       information.
     • Be mindful, if investigating crimes, to
       act within the law and collect fairly.
“Privacy Matters”
Module 2 Use and Disclosure

Think of a traffic light when
disclosing personal information.


  you must             you may         you can’t
Disclosure is        You have choice   No choice
mandatory


“Privacy Matters”
Module 2 You may disclose under IPP2

Under IPP2 you may disclose:             to law enforcement agencies for the
                                         purpose of prevention, detection,
• with consent.                          investigation, prosecution or
                                         punishment of criminal offences or
                                         breaches of a law.
• if information is from a publicly
available source.
                                          where the information is reasonably
• information for statistical or research believed to be necessary to lessen or
purposes; no identifiers.                 prevent a serious threat to public
                                          health / safety / welfare.
• investigation of unlawful activity.

• other reasons in IPP2.
“Privacy Matters”
Module 3 Management of personal information




“Privacy Matters”
Module 3 Management & Access

Access and Correction
(IPP6 & FOI Act)
People have a right to access & correct
personal information. Assume people will
see what you write. If involved in
discovering documents respond promptly.

Management
(IPPs 3, 4, 5 & 7)
Keep personal information accurate &
secure. Follow Departmental policies.

 “Privacy Matters”
Module 4 Complaints




“Privacy Matters”
Complaints activity




“Privacy Matters”
Where to go for help?
• Privacy, Records Management & Freedom of Information
  materials are on J-NET>Our Business>Knowledge Management
• Each of the Dept’s business units has a Privacy Coordinator
   – CAV - Maria Maikousis 8684 6401
   – Court Services - Susan Brent 9603 9456
   – Corrections Victoria - Lina Marrocco & Joanna Richardson
     8684 6576/6572
   – Enforcement Management - Rodney McInness 9603 9453
   – Indigenous Issues - Pauline Liew 9651 7472
• Brent Carey, Senior Privacy Adviser can be contacted on
  8684 0071 or by e-mail privacy@justice.vic.gov.au
• EDRMS (records) helpdesk 8684 0555; the FOI unit 8684 0063
• Privacy Victoria www.privacy.vic.gov.au

“Privacy Matters”

More Related Content

What's hot

Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009brentcarey
 
Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction brentcarey
 
MDCC: Privacy and trade practices - 29 October 2014
MDCC: Privacy and trade practices - 29 October 2014MDCC: Privacy and trade practices - 29 October 2014
MDCC: Privacy and trade practices - 29 October 2014Infodec Communications
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for CareAtlantic Training, LLC.
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Werksmans Attorneys
 
Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)guesta04b0
 

What's hot (20)

Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
 
Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction
 
MDCC: Privacy and trade practices - 29 October 2014
MDCC: Privacy and trade practices - 29 October 2014MDCC: Privacy and trade practices - 29 October 2014
MDCC: Privacy and trade practices - 29 October 2014
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for Care
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...
 
Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)
 

Similar to Privacy learning forum broadmeadows

Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)The Pathway Group
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02tinkusing
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance bookletGerardo Medina
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness WorkshopPaul Jacobson
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)JNicholson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson PresentationMediabistro
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityARDC
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_FinalPhillip Mahan
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 

Similar to Privacy learning forum broadmeadows (20)

Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
 
4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance booklet
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Information governance
Information governanceInformation governance
Information governance
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Privacy learning forum broadmeadows

  • 1. North West Metropolitan Learning Forum Privacy – myth busters “Privacy Matters”
  • 2. Presentation Overview • Module 1 – legislation, definitions & key exemptions • Module 2 – Collection & Use & Disclosure • Module 3 – Management & Access • Case studies • Module 4 – Complaints • Recap - DVD • Discussion/Questions “Privacy Matters”
  • 3. Learning Objectives Today you will learn about Victorian privacy requirements This session will better equip you to understand: •collection, use & disclosure, management and access to personal information; •Perform your job functions in a manner consistent with privacy requirements; & •where to go for privacy and records management related help. “Privacy Matters”
  • 5. Module 1 Privacy legislation Information Privacy Act State government agencies, (Vic) 2000 local councils, Ministers & Statutory agencies. Health Records Act (Vic) 2001 Health information in Victorian public and private sectors, hospitals, doctors & employers. “Privacy Matters”
  • 6. Module 1 Privacy – Key definitions Personal information Recorded information about a living identifiable or easily identifiable individual. Health information Information able to be linked to a living or deceased person about a person’s physical, mental or psychological health. Sensitive information Includes information about a person’s race or ethnicity and criminal record. Is a photo personal information? Are details of a person’s position and salary recorded on their personnel file? Small Group activity “Privacy Matters”
  • 7. Module 1 Relationship to other laws Privacy laws What they say Examples Information If there is, any inconsistency • Section 30 of the Privacy Act between the Information Corrections Act 1991. (section 6). Privacy Act and a provision in another Act, the other Act’s • Section 141 of the Fair provision prevails to the Trading Act 1999. extent of the inconsistency. Are you familiar with what your primary legislation states you can do with personal information? Pair Activity “Privacy Matters”
  • 8. Module 1 Court Services Courts & Tribunals are partially exempted from privacy laws in exercising their judicial or quasi- judicial functions. Are human resources functions covered? What about filming inside a court room? Would a court-issued subpoena be a judicial function? “Privacy Matters”
  • 9. Module 1 Law enforcement exemption Who is covered? How does it work? Examples If there is a reasonable Corrections (Prisons, belief that non-compliance Police checks of the CCS & CORE); CAV; is necessary for law Register of Births and RAJAC; enforcement purposes; Deaths for name changes. Business Licensing then exempt from In emergency situations, Agency; & main collection, use, locating next of kin. Enforcement disclosure and transfer Management. obligations, but still must Inspectors investigating comply with some motor car traders. requirements. “Privacy Matters”
  • 11. Module 1 Law enforcement agencies IPP8 IPP1.1 & IPP2.2 IPP3 IPP4 IPP5 1.2 If lawful Collect Record uses Be Be Have and personal & disclosures accurate secure privacy practicable information between law policies & offer responsibly enforcement processes anonymity agencies “Privacy Matters”
  • 12. Module 2 other functions? • For all other non-judicial and non-law enforcement functions employees must comply with the 10 information privacy principles (IPPs) • The IPPs are connected and guide how personal information should be handled: • Collection (IPPs 8, 1, and 10); • Use and Disclosure (IPPs 2 and 9); • Management of personal information (IPPs 3,4, 5, & 7); and • Access and Correction (IPP6 and FOI) “Privacy Matters”
  • 13. Module 2 Collection Collection (IPPs 8, 1, and 10) Preserve anonymity if you can. Collect only what you need. Do it lawfully, fairly, directly and not unreasonably intrusively. Tell people you are doing it and why. Be extra careful with sensitive information. Scenario Photos are taken at the end of year staff party. The photos are added to a bank of stored images used for promotional purposes in newsletters and the website. Are there any collection issues? “Privacy Matters”
  • 14. Module 2 Tips for compliance • When drafting or handling forms check for a privacy statement. Think of a statement as a food label. • Be able to justify why you need personal information if asked. • Do not over collect personal information. • Be mindful, if investigating crimes, to act within the law and collect fairly. “Privacy Matters”
  • 15. Module 2 Use and Disclosure Think of a traffic light when disclosing personal information. you must you may you can’t Disclosure is You have choice No choice mandatory “Privacy Matters”
  • 16. Module 2 You may disclose under IPP2 Under IPP2 you may disclose: to law enforcement agencies for the purpose of prevention, detection, • with consent. investigation, prosecution or punishment of criminal offences or breaches of a law. • if information is from a publicly available source. where the information is reasonably • information for statistical or research believed to be necessary to lessen or purposes; no identifiers. prevent a serious threat to public health / safety / welfare. • investigation of unlawful activity. • other reasons in IPP2. “Privacy Matters”
  • 17. Module 3 Management of personal information “Privacy Matters”
  • 18. Module 3 Management & Access Access and Correction (IPP6 & FOI Act) People have a right to access & correct personal information. Assume people will see what you write. If involved in discovering documents respond promptly. Management (IPPs 3, 4, 5 & 7) Keep personal information accurate & secure. Follow Departmental policies. “Privacy Matters”
  • 21. Where to go for help? • Privacy, Records Management & Freedom of Information materials are on J-NET>Our Business>Knowledge Management • Each of the Dept’s business units has a Privacy Coordinator – CAV - Maria Maikousis 8684 6401 – Court Services - Susan Brent 9603 9456 – Corrections Victoria - Lina Marrocco & Joanna Richardson 8684 6576/6572 – Enforcement Management - Rodney McInness 9603 9453 – Indigenous Issues - Pauline Liew 9651 7472 • Brent Carey, Senior Privacy Adviser can be contacted on 8684 0071 or by e-mail privacy@justice.vic.gov.au • EDRMS (records) helpdesk 8684 0555; the FOI unit 8684 0063 • Privacy Victoria www.privacy.vic.gov.au “Privacy Matters”