SlideShare a Scribd company logo
1 of 3
Download to read offline
30 JULY 2013
BUSINESS
I
n August 2011 the Law Commission
completed its review of privacy
law and made a number of
recommendations.
Recent high profile cases of data
protection breaches highlight the
importance of the government overhauling
the 20-year-old privacy laws. Without new
modern regulation the public are less likely
to have the confidence to take part in the
digital economy.
In March 2012, the government agreed to
many of the Commission’s proposals, but
indicated that further work by the Ministry
of Justice was required on others.
Contrary to popular belief, the Privacy
Act 1993 (the Act) governs data protection
rather than facilitating the right to individual
privacy. The aim of the Act is to promote
and protect individual privacy in accordance
with the data protection guidelines of the
Organisation for Economic Cooperation
and Development, of which New Zealand
is a member.
The Act controls how “agencies” collect,
use, disclose, store and give access to
personally identifiable information (PII). PII
is information that can be used to uniquely
identify, contact, or locate a single person or
can be used with other sources to uniquely
identify a single living individual. By way of
example; a person’s name, Inland Revenue
number and bank account number, to name
a few, clearly classify as PII.
Section two of the Act defines an agency
as any person or body of persons whether
Is your
clients’ data
protected?
A refresher on how you can
uphold your professional
obligations in regards to
privacy.
by Zowie Murray CA
An
accounting
firm is
responsible
for the
personal
information
it holds,
including
information
that has been
transferred
to a third
party for
storage,
custody or
processing
corporate or not and whether in the public
sector or private sector. Therefore, NZICA
members working as accountants who hold
and use their clients’ personal information
unequivocally fall under this definition
and must demonstrate a good working
knowledge of the Act.
The privacy principles
At the heart of the Act are 12 information
privacy principles (IPPs). These
principles reflect internationally accepted
standards for good personal information
handling. The privacy principles
cover the attributes seen in table 1.
Protecting yourself protects clients
It is widely recognised that as an accountant
or auditor, your client holds you in a position
of trust. Not only do you have access to a
whole host of confidential information
regarding their business finances and
business performance, but if you have access
to payroll data too, you will have in-depth
knowledge of their employees’ personal
information.
An accounting firm is responsible for the
personal information it holds, including
information that has been transferred
to a third party for storage, custody or
processing. Therefore accounting firms must
incorporate special provisions into their
IT security strategies in order to provide
effective protection of their client data. The
following questions are to facilitate your
assessment around whether your practice
has the most basic of principles in place to
begin protecting your clients’ data.
1.	Are your client files encrypted? Only the
employees handling that particular client
should be granted access to the data.
Other employees should not be able to
access that client file.
2.	Do you have a rotational server backup
system in place? There is, of course,
always the possibility that a hard drive
may be defective or that an employee will
accidentally delete data. Taking regular
backups means that any lost data can
always be restored.
3.	Do all data storage devices have secure
passwords? A password should be at least
eight characters in length and contain
upper-case and lower-case letters, as
31JULY 2013
well as numbers and special characters.
Storage devices include smart phones,
tablet computers and memory sticks etc.
4.	Do you provide regular staff training?
All staff that deal with information, from
databases to personnel records, need to
be aware of the legislation surrounding
data protection.
The education for employees may begin
with seemingly trivial aspects of security
such as: not leaving data storage devices
unattended; always locking your computer
when not at your desk; using a laptop lock
at all times; not leaving your laptop in your
car overnight or taking it into public places
with you; and so on.
Ensure that employees are aware that
they could be liable if they knowingly or
recklessly disclose personal information in
breach of the policy and, as a minimum,
that serious breaches of the policy will be a
disciplinary matter, even if the breach was
accidental.
Employers should consider incorporating
such information in the general induction
process for new employees and regularly
reminding employees of their obligations. 
Compliance – the only option
Personal information is private and should
not be divulged unnecessarily. However,
with greater expectations surrounding the
speed of access to information, along with
new social media, people are more likely to
share what used to be considered private
information.
It is vital to the success of your own
business that you assure your clients that
their data is fully protected. You have a
duty of care to your client to maintain high
levels of confidentiality and security, and
the consequences of non-compliance are
significant not only in terms of possible
damages claims but also the harm done to
your professional reputation.
Data protection compliance is not simply
about consent wording in engagement
letters or placing a few policies on your
intranet. Complying with these laws
requires awareness of the data protection
rules amongst your staff and a culture that
encourages secure data handling practices.
Many breaches continue to occur simply
Collection
of personal
information (IPPs
1-4)
An agency can only collect personal
information directly related to its activities
and only by fair means. The collection of this
information should not unreasonably intrude
upon the privacy of the individual concerned.
In most cases, when collecting personal
information an agency must advise an
individual why the information is being
collected; and to whom the information is
normally disclosed.
Reasonable steps are to be taken by an
agency to ensure that personal information
collected is relevant, up-to-date and complete.
The collection of information must not
unreasonably intrude upon the individual’s
personal affairs.
Storage and
security
(IPP 5)
Agencies in possession of personal information
are to ensure that there are reasonable
safeguards to prevent unauthorised access, use,
modification, or disclosure of the information.
Access and
alteration (IPPs
6-7)
Individuals are entitled to access records
containing their personal information and to
request the record keeper to alter those records
if they are inaccurate.
Accuracy (IPP 8)
Reasonable steps are to be taken by agencies to
ensure that any personal information proposed
to be used is accurate, up-to-date and complete.
Retention (IPP 9)
An agency that holds personal information
shall not keep that information for longer than
is required for the purposes for which the
information may lawfully be used.
Use and disclosure
(IPPs 10-11)
In general, an agency must use personal
information only for the purpose for which
it was collected and disclose personal
information only if the individual concerned
has consented to that disclosure.
However, an agency may use or disclose
personal information if it is authorised by law
or if it is necessary for certain types of law
enforcement.
Unique identifiers
(IPP 12)
Unique identifiers must not be assigned
to individuals unless this is necessary for
the organisation concerned to carry out its
functions efficiently.
Table 1
through ignorance. Firms need to be very careful about who they
trust with their clients’ information – getting it wrong could have
significant consequences.
There is still no sign of the government’s new privacy Bill, but
recently, MP Sue Moroney’s private member’s bill (the Privacy
(Giving Privacy Commissioner Necessary Tools) Amendment Bill)
was introduced to the House. Also Justice Minister Judith Collins
said she was expecting an official report and would take a paper
to Cabinet later in the year. So there may be some action by the
government sooner, rather than later, in this area.
Zowie Murray CA is a Technical Advisor in NZICA’s Technical
Services Team.
Copyright of Chartered Accountants Journal is the property of Institute of Chartered
Accountants of New Zealand and its content may not be copied or emailed to multiple sites or
posted to a listserv without the copyright holder's express written permission. However, users
may print, download, or email articles for individual use.

More Related Content

What's hot

Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!Now Dentons
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About PrivacyNow Dentons
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysiakhenghoe
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Data protection training emea new joiners. mandatory quiz
Data protection training emea new joiners. mandatory quizData protection training emea new joiners. mandatory quiz
Data protection training emea new joiners. mandatory quizDeborahchiesa
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to KnowThe Capital Network
 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationLance Michalson
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Ltd
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 

What's hot (20)

Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About Privacy
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Data protection training emea new joiners. mandatory quiz
Data protection training emea new joiners. mandatory quizData protection training emea new joiners. mandatory quiz
Data protection training emea new joiners. mandatory quiz
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisation
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 

Viewers also liked

Viewers also liked (11)

Vectored diseases
Vectored   diseasesVectored   diseases
Vectored diseases
 
Invitación a un desafío
Invitación a un desafíoInvitación a un desafío
Invitación a un desafío
 
тарелка
тарелкатарелка
тарелка
 
Gabbar & the art of public speaking!
Gabbar & the art of public speaking!Gabbar & the art of public speaking!
Gabbar & the art of public speaking!
 
EPFL_TH1852
EPFL_TH1852EPFL_TH1852
EPFL_TH1852
 
Ganhi
GanhiGanhi
Ganhi
 
1311 Auditor Reporting
1311 Auditor Reporting1311 Auditor Reporting
1311 Auditor Reporting
 
FlexiPresentation v1.3
FlexiPresentation v1.3FlexiPresentation v1.3
FlexiPresentation v1.3
 
vision prospectiva
vision prospectivavision prospectiva
vision prospectiva
 
ITDM & PR SOFTWARE vs APT
ITDM & PR SOFTWARE vs APTITDM & PR SOFTWARE vs APT
ITDM & PR SOFTWARE vs APT
 
10
1010
10
 

Similar to 1307 Privacy Act

data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfkiruthigajawahar6
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. dan hyde
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance bookletGerardo Medina
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpraudrey miguel
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
 

Similar to 1307 Privacy Act (20)

data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
Data protection
Data protectionData protection
Data protection
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
GDPR Whitepaper
GDPR WhitepaperGDPR Whitepaper
GDPR Whitepaper
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance booklet
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpr
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection Regulation
 
How to Protect Your Data
How to Protect Your DataHow to Protect Your Data
How to Protect Your Data
 

More from Zowie Murray

8. NZICA October 2013
8. NZICA October 20138. NZICA October 2013
8. NZICA October 2013Zowie Murray
 
7. Investor September 2013
7. Investor September 20137. Investor September 2013
7. Investor September 2013Zowie Murray
 
6. Academic August 2013
6. Academic August 20136. Academic August 2013
6. Academic August 2013Zowie Murray
 
5. Auditor July 2013
5. Auditor July 20135. Auditor July 2013
5. Auditor July 2013Zowie Murray
 
4. Management June 2013
4. Management June 20134. Management June 2013
4. Management June 2013Zowie Murray
 
3. Audit Committee May 2013
3. Audit Committee May 20133. Audit Committee May 2013
3. Audit Committee May 2013Zowie Murray
 
2. Standard Setter April 2013
2. Standard Setter April 20132. Standard Setter April 2013
2. Standard Setter April 2013Zowie Murray
 
1404 Audit client A&C
1404 Audit client A&C1404 Audit client A&C
1404 Audit client A&CZowie Murray
 
1403 Legislative updates
1403 Legislative updates1403 Legislative updates
1403 Legislative updatesZowie Murray
 
1402 Audit Pricing Politics
1402 Audit Pricing Politics1402 Audit Pricing Politics
1402 Audit Pricing PoliticsZowie Murray
 
1311 Reviews reviewed
1311 Reviews reviewed1311 Reviews reviewed
1311 Reviews reviewedZowie Murray
 
1305 Licensed to Audit!
1305 Licensed to Audit!1305 Licensed to Audit!
1305 Licensed to Audit!Zowie Murray
 
1305 Changes for Charities
1305 Changes for Charities1305 Changes for Charities
1305 Changes for CharitiesZowie Murray
 
1303 Financial Reporting Changes
1303 Financial Reporting Changes1303 Financial Reporting Changes
1303 Financial Reporting ChangesZowie Murray
 
1303 Code of Ethics
1303 Code of Ethics1303 Code of Ethics
1303 Code of EthicsZowie Murray
 
1302 Assurance requirements
1302 Assurance requirements1302 Assurance requirements
1302 Assurance requirementsZowie Murray
 
1210 Auditor Reporting
1210 Auditor Reporting1210 Auditor Reporting
1210 Auditor ReportingZowie Murray
 
1209 Auditor Withdrawal
1209 Auditor Withdrawal1209 Auditor Withdrawal
1209 Auditor WithdrawalZowie Murray
 
1208 Assurance engs on GHG stmts
1208 Assurance engs on GHG stmts1208 Assurance engs on GHG stmts
1208 Assurance engs on GHG stmtsZowie Murray
 
1204 Assurance Providers Respond
1204 Assurance Providers Respond1204 Assurance Providers Respond
1204 Assurance Providers RespondZowie Murray
 

More from Zowie Murray (20)

8. NZICA October 2013
8. NZICA October 20138. NZICA October 2013
8. NZICA October 2013
 
7. Investor September 2013
7. Investor September 20137. Investor September 2013
7. Investor September 2013
 
6. Academic August 2013
6. Academic August 20136. Academic August 2013
6. Academic August 2013
 
5. Auditor July 2013
5. Auditor July 20135. Auditor July 2013
5. Auditor July 2013
 
4. Management June 2013
4. Management June 20134. Management June 2013
4. Management June 2013
 
3. Audit Committee May 2013
3. Audit Committee May 20133. Audit Committee May 2013
3. Audit Committee May 2013
 
2. Standard Setter April 2013
2. Standard Setter April 20132. Standard Setter April 2013
2. Standard Setter April 2013
 
1404 Audit client A&C
1404 Audit client A&C1404 Audit client A&C
1404 Audit client A&C
 
1403 Legislative updates
1403 Legislative updates1403 Legislative updates
1403 Legislative updates
 
1402 Audit Pricing Politics
1402 Audit Pricing Politics1402 Audit Pricing Politics
1402 Audit Pricing Politics
 
1311 Reviews reviewed
1311 Reviews reviewed1311 Reviews reviewed
1311 Reviews reviewed
 
1305 Licensed to Audit!
1305 Licensed to Audit!1305 Licensed to Audit!
1305 Licensed to Audit!
 
1305 Changes for Charities
1305 Changes for Charities1305 Changes for Charities
1305 Changes for Charities
 
1303 Financial Reporting Changes
1303 Financial Reporting Changes1303 Financial Reporting Changes
1303 Financial Reporting Changes
 
1303 Code of Ethics
1303 Code of Ethics1303 Code of Ethics
1303 Code of Ethics
 
1302 Assurance requirements
1302 Assurance requirements1302 Assurance requirements
1302 Assurance requirements
 
1210 Auditor Reporting
1210 Auditor Reporting1210 Auditor Reporting
1210 Auditor Reporting
 
1209 Auditor Withdrawal
1209 Auditor Withdrawal1209 Auditor Withdrawal
1209 Auditor Withdrawal
 
1208 Assurance engs on GHG stmts
1208 Assurance engs on GHG stmts1208 Assurance engs on GHG stmts
1208 Assurance engs on GHG stmts
 
1204 Assurance Providers Respond
1204 Assurance Providers Respond1204 Assurance Providers Respond
1204 Assurance Providers Respond
 

1307 Privacy Act

  • 1. 30 JULY 2013 BUSINESS I n August 2011 the Law Commission completed its review of privacy law and made a number of recommendations. Recent high profile cases of data protection breaches highlight the importance of the government overhauling the 20-year-old privacy laws. Without new modern regulation the public are less likely to have the confidence to take part in the digital economy. In March 2012, the government agreed to many of the Commission’s proposals, but indicated that further work by the Ministry of Justice was required on others. Contrary to popular belief, the Privacy Act 1993 (the Act) governs data protection rather than facilitating the right to individual privacy. The aim of the Act is to promote and protect individual privacy in accordance with the data protection guidelines of the Organisation for Economic Cooperation and Development, of which New Zealand is a member. The Act controls how “agencies” collect, use, disclose, store and give access to personally identifiable information (PII). PII is information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single living individual. By way of example; a person’s name, Inland Revenue number and bank account number, to name a few, clearly classify as PII. Section two of the Act defines an agency as any person or body of persons whether Is your clients’ data protected? A refresher on how you can uphold your professional obligations in regards to privacy. by Zowie Murray CA An accounting firm is responsible for the personal information it holds, including information that has been transferred to a third party for storage, custody or processing corporate or not and whether in the public sector or private sector. Therefore, NZICA members working as accountants who hold and use their clients’ personal information unequivocally fall under this definition and must demonstrate a good working knowledge of the Act. The privacy principles At the heart of the Act are 12 information privacy principles (IPPs). These principles reflect internationally accepted standards for good personal information handling. The privacy principles cover the attributes seen in table 1. Protecting yourself protects clients It is widely recognised that as an accountant or auditor, your client holds you in a position of trust. Not only do you have access to a whole host of confidential information regarding their business finances and business performance, but if you have access to payroll data too, you will have in-depth knowledge of their employees’ personal information. An accounting firm is responsible for the personal information it holds, including information that has been transferred to a third party for storage, custody or processing. Therefore accounting firms must incorporate special provisions into their IT security strategies in order to provide effective protection of their client data. The following questions are to facilitate your assessment around whether your practice has the most basic of principles in place to begin protecting your clients’ data. 1. Are your client files encrypted? Only the employees handling that particular client should be granted access to the data. Other employees should not be able to access that client file. 2. Do you have a rotational server backup system in place? There is, of course, always the possibility that a hard drive may be defective or that an employee will accidentally delete data. Taking regular backups means that any lost data can always be restored. 3. Do all data storage devices have secure passwords? A password should be at least eight characters in length and contain upper-case and lower-case letters, as
  • 2. 31JULY 2013 well as numbers and special characters. Storage devices include smart phones, tablet computers and memory sticks etc. 4. Do you provide regular staff training? All staff that deal with information, from databases to personnel records, need to be aware of the legislation surrounding data protection. The education for employees may begin with seemingly trivial aspects of security such as: not leaving data storage devices unattended; always locking your computer when not at your desk; using a laptop lock at all times; not leaving your laptop in your car overnight or taking it into public places with you; and so on. Ensure that employees are aware that they could be liable if they knowingly or recklessly disclose personal information in breach of the policy and, as a minimum, that serious breaches of the policy will be a disciplinary matter, even if the breach was accidental. Employers should consider incorporating such information in the general induction process for new employees and regularly reminding employees of their obligations.  Compliance – the only option Personal information is private and should not be divulged unnecessarily. However, with greater expectations surrounding the speed of access to information, along with new social media, people are more likely to share what used to be considered private information. It is vital to the success of your own business that you assure your clients that their data is fully protected. You have a duty of care to your client to maintain high levels of confidentiality and security, and the consequences of non-compliance are significant not only in terms of possible damages claims but also the harm done to your professional reputation. Data protection compliance is not simply about consent wording in engagement letters or placing a few policies on your intranet. Complying with these laws requires awareness of the data protection rules amongst your staff and a culture that encourages secure data handling practices. Many breaches continue to occur simply Collection of personal information (IPPs 1-4) An agency can only collect personal information directly related to its activities and only by fair means. The collection of this information should not unreasonably intrude upon the privacy of the individual concerned. In most cases, when collecting personal information an agency must advise an individual why the information is being collected; and to whom the information is normally disclosed. Reasonable steps are to be taken by an agency to ensure that personal information collected is relevant, up-to-date and complete. The collection of information must not unreasonably intrude upon the individual’s personal affairs. Storage and security (IPP 5) Agencies in possession of personal information are to ensure that there are reasonable safeguards to prevent unauthorised access, use, modification, or disclosure of the information. Access and alteration (IPPs 6-7) Individuals are entitled to access records containing their personal information and to request the record keeper to alter those records if they are inaccurate. Accuracy (IPP 8) Reasonable steps are to be taken by agencies to ensure that any personal information proposed to be used is accurate, up-to-date and complete. Retention (IPP 9) An agency that holds personal information shall not keep that information for longer than is required for the purposes for which the information may lawfully be used. Use and disclosure (IPPs 10-11) In general, an agency must use personal information only for the purpose for which it was collected and disclose personal information only if the individual concerned has consented to that disclosure. However, an agency may use or disclose personal information if it is authorised by law or if it is necessary for certain types of law enforcement. Unique identifiers (IPP 12) Unique identifiers must not be assigned to individuals unless this is necessary for the organisation concerned to carry out its functions efficiently. Table 1 through ignorance. Firms need to be very careful about who they trust with their clients’ information – getting it wrong could have significant consequences. There is still no sign of the government’s new privacy Bill, but recently, MP Sue Moroney’s private member’s bill (the Privacy (Giving Privacy Commissioner Necessary Tools) Amendment Bill) was introduced to the House. Also Justice Minister Judith Collins said she was expecting an official report and would take a paper to Cabinet later in the year. So there may be some action by the government sooner, rather than later, in this area. Zowie Murray CA is a Technical Advisor in NZICA’s Technical Services Team.
  • 3. Copyright of Chartered Accountants Journal is the property of Institute of Chartered Accountants of New Zealand and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.