SlideShare uma empresa Scribd logo
1 de 26
Privacy Introduction



“Privacy Matters”
Presentation Overview
               Content
Module One     Legislation, Definitions & Key Exemptions


Activity       Pair Activity
Module Two     Collection, Use & Disclosure

Module Three   Management & Access

Activity       DVD

Module Four    Complaints/ Post -Quiz


“Privacy Matters”
Learning Objectives

Today you will learn about Victorian
privacy requirements
                       This session will better equip you to
                       understand:
                       •collection, use & disclosure,
                       management and access to personal
                       information;
                       •Perform your job functions in a manner
                       consistent with privacy requirement; &
                       •where to go for privacy related help.



“Privacy Matters”
Icebreaker - PrYvacy Bingo

Instructions:
   As quickly as you can complete
   a line of the pryvacy bingo card
   with names.

  The first person to get a vertical
  or horizontal line will win a prize

  Note you may only use a name
  once

“Privacy Matters”
Module 1 Privacy legislation


Information Privacy Act         State government agencies,
(Vic) 2000                      local councils, Ministers &
                                Statutory agencies.


Health Records Act (Vic) 2001   Health information in Victorian
                                public and private sectors,
                                hospitals, doctors & employers.



“Privacy Matters”
Module 1 Privacy – Key definitions

  Personal information              Recorded information about a living
                                    identifiable or easily identifiable
                                    individual.
  Health information                Information able to be linked to a living or
                                    deceased person about a person’s physical,
                                    mental or psychological health.
  Sensitive information             Includes information about a person’s race
                                    or ethnicity and criminal record.




  Is a photo personal information? Are details of a person’s position and salary
  recorded on their personnel file? Small Group activity

“Privacy Matters”
Module 1 Relationship to other laws

   Privacy laws          What they say                    Examples

 Information      If there is, any inconsistency   • Section 30 of the
 Privacy Act      between the Information          Corrections Act 1991.
 (section 6).     Privacy Act and a provision in
                  another Act, the other Act’s     • Section 141 of the Fair
                  provision prevails to the        Trading Act 1999.
                  extent of the inconsistency.




   Are you familiar with what your primary legislation states you
   can do with personal information? Pair Activity
“Privacy Matters”
Module 1 Court Services


                           Courts & Tribunals are partially
                           exempted from privacy laws in
                           exercising their judicial or quasi-
                           judicial functions.



Are human resources functions covered?
What about filming inside a court room?
Would a court-issued subpoena be a judicial function?

 “Privacy Matters”
Module 1 Law enforcement exemption


  Who is covered?         How does it work?                 Examples
                      If there is a reasonable
Corrections (Prisons, belief that non-compliance    Police checks of the
CCS & CORE); CAV; is necessary for law              Register of Births and
RAJAC;                enforcement purposes;         Deaths for name changes.
Business Licensing    then exempt from
                                                    In emergency situations,
Agency; &             main collection, use,         locating next of kin.
Enforcement           disclosure and transfer
Management.           obligations, but still must   Inspectors investigating
                      comply with some              motor car traders.
                      requirements.


“Privacy Matters”
“Privacy Matters”
Module 1 Law enforcement agencies

  IPP8         IPP1.1 &       IPP2.2         IPP3      IPP4       IPP5
                  1.2
If lawful     Collect       Record uses     Be         Be       Have
and           personal      & disclosures   accurate   secure   privacy
practicable   information   between law                         policies &
offer         responsibly   enforcement                         processes
anonymity                   agencies




“Privacy Matters”
Module 2 other functions?
• For all other non-judicial and non-law
  enforcement functions employees must
  comply with the 10 information privacy
  principles (IPPs)

• The IPPs are connected and guide how
  personal information should be handled:

       • Collection (IPPs 8, 1, and 10);
       • Use and Disclosure (IPPs 2 and 9);
       • Management of personal information
         (IPPs 3,4, 5, & 7); and
       • Access and Correction (IPP6 and FOI)


“Privacy Matters”
Module 2 Collection

Collection (IPPs 8, 1, and 10)
Preserve anonymity if you can. Collect only what you need.
Do it lawfully, fairly, directly and not unreasonably intrusively.
Tell people you are doing it and why through a privacy statement.
Be extra careful with sensitive information.


                      Scenario
                      Photos are taken at the end of year staff party. The
                      photos are added to a bank of stored images used for
                      promotional purposes in newsletters and the website.
                      Are there any collection issues?

 “Privacy Matters”
Module 2 Tips for compliance

     • When drafting or handling forms
       check for a privacy statement.
       Think of a statement as a food label.
     • Be able to justify why you need
       personal information if asked.
     • Do not over collect personal
       information.
     • Be mindful, if investigating crimes, to
       act within the law and collect fairly.
“Privacy Matters”
Module 2 Use and Disclosure

Think of a traffic light when
disclosing personal information.


  you must             you may         you can’t
Disclosure is        You have choice   No choice
mandatory


“Privacy Matters”
Module 2 You may disclose under IPP2

Under IPP2 you may disclose:             to law enforcement agencies for the
                                         purpose of prevention, detection,
• with consent.                          investigation, prosecution or
                                         punishment of criminal offences or
                                         breaches of a law.
• if information is from a publicly
available source.
                                          where the information is reasonably
• information for statistical or research believed to be necessary to lessen or
purposes; no identifiers.                 prevent a serious threat to public
                                          health / safety / welfare.
• investigation of unlawful activity.

• other reasons in IPP2.
“Privacy Matters”
Use & Disclosure Scenario

    In 2003 the Arthurs Seat chairlift collapsed
    and 18 people were injured. The chairlift
    managing director was quoted in the media
    saying that he wished to extend his best
    wishes to those injured however was
    prevented from doing so as privacy laws
    prohibited the police releasing the names of
    the people involved.

    Considering the use and disclosure
    principle, what options exist for providing an
    apology to the victims?
“Privacy Matters”
Module 3 Management of personal information




“Privacy Matters”
Module 3 Management & Access

Access and Correction
(IPP6 & FOI Act)
People have a right to access & correct
personal information. Assume people will
see what you write. If involved in
discovering documents respond promptly.

Management
(IPPs 3, 4, 5 & 7)
Keep personal information accurate &
secure. Follow Departmental policies.

 “Privacy Matters”
DVD
• When watching the DVD consider –
   – What the privacy issues might be?
   – Whether you or your work area may have
     experienced a similar situation?




“Privacy Matters”
Module 4 Complaints




“Privacy Matters”
What constitutes a privacy complaint?


• A breach of a privacy principle
• A complainant may be concerned
  about:
   – a mix up in correspondence
   – gossiping about them in their community
   – a facsimile or email sent to the wrong
     person
   – their information being out of date or
     incorrect on a database

“Privacy Matters”
Complaint intake
• Anyone can complain using the privacy
  complaint form available on J-NET

• In the first instance you need to refer any
  potential privacy complaint to your business
  unit privacy coordinator

• The Coordinator will follow the
  department’s privacy complaint handling
  policy and procedure


“Privacy Matters”
Recap & Key Messages
• Most information held by the department will be capable of
  being personal information

• The privacy principles are about the right information to
  the right people for the right reason at the right time

• Build privacy protections into your work area and work
  practices

• Follow privacy policies and bring privacy incidents to your
  manager’s attention



“Privacy Matters”
Where to go for help?
• Privacy, Records Management & Freedom of Information
  materials are on J-NET>Our Business>Knowledge Management
• Each of the Dept’s business units has a Privacy Coordinator
   – Gaming & Racing- Mai Hua 8684 6401
   – Human Resources – Bree Tozer 8684 0052
   – Corrections Victoria - Lina Marrocco & Joanna Richardson
     8684 6576/6572
   - Crime & Violence Prevention – Georgia Dodds 8684 1717
   - Brent Carey, Senior Privacy Adviser can be contacted on 8684 0071
     or by e-mail privacy@justice.vic.gov.au
• EDRMS (records) helpdesk 8684 0555; the FOI unit 8684 0063
• Privacy Victoria www.privacy.vic.gov.au



“Privacy Matters”
Training Quiz




“Privacy Matters”

Mais conteúdo relacionado

Mais procurados

Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Werksmans Attorneys
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
GlobalForum
 
Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...
Werksmans Attorneys
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
OvationsGroup
 

Mais procurados (20)

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
New Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & ConfidentialityNew Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & Confidentiality
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
POPI
POPI POPI
POPI
 
New Law on Access to Public Information:
New Law on Access to Public Information:New Law on Access to Public Information:
New Law on Access to Public Information:
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Healthcare Security Essentials jean pawluk april 28 2011
Healthcare Security Essentials jean pawluk  april 28 2011 Healthcare Security Essentials jean pawluk  april 28 2011
Healthcare Security Essentials jean pawluk april 28 2011
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
 

Semelhante a Privacy introduction

Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadows
brentcarey
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
brentcarey
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
mpcislides
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
tinkusing
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Frank Dawson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
Mediabistro
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 

Semelhante a Privacy introduction (20)

Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadows
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
 
4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance booklet
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshop2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshop
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Privacy introduction

  • 2. Presentation Overview Content Module One Legislation, Definitions & Key Exemptions Activity Pair Activity Module Two Collection, Use & Disclosure Module Three Management & Access Activity DVD Module Four Complaints/ Post -Quiz “Privacy Matters”
  • 3. Learning Objectives Today you will learn about Victorian privacy requirements This session will better equip you to understand: •collection, use & disclosure, management and access to personal information; •Perform your job functions in a manner consistent with privacy requirement; & •where to go for privacy related help. “Privacy Matters”
  • 4. Icebreaker - PrYvacy Bingo Instructions: As quickly as you can complete a line of the pryvacy bingo card with names. The first person to get a vertical or horizontal line will win a prize Note you may only use a name once “Privacy Matters”
  • 5. Module 1 Privacy legislation Information Privacy Act State government agencies, (Vic) 2000 local councils, Ministers & Statutory agencies. Health Records Act (Vic) 2001 Health information in Victorian public and private sectors, hospitals, doctors & employers. “Privacy Matters”
  • 6. Module 1 Privacy – Key definitions Personal information Recorded information about a living identifiable or easily identifiable individual. Health information Information able to be linked to a living or deceased person about a person’s physical, mental or psychological health. Sensitive information Includes information about a person’s race or ethnicity and criminal record. Is a photo personal information? Are details of a person’s position and salary recorded on their personnel file? Small Group activity “Privacy Matters”
  • 7. Module 1 Relationship to other laws Privacy laws What they say Examples Information If there is, any inconsistency • Section 30 of the Privacy Act between the Information Corrections Act 1991. (section 6). Privacy Act and a provision in another Act, the other Act’s • Section 141 of the Fair provision prevails to the Trading Act 1999. extent of the inconsistency. Are you familiar with what your primary legislation states you can do with personal information? Pair Activity “Privacy Matters”
  • 8. Module 1 Court Services Courts & Tribunals are partially exempted from privacy laws in exercising their judicial or quasi- judicial functions. Are human resources functions covered? What about filming inside a court room? Would a court-issued subpoena be a judicial function? “Privacy Matters”
  • 9. Module 1 Law enforcement exemption Who is covered? How does it work? Examples If there is a reasonable Corrections (Prisons, belief that non-compliance Police checks of the CCS & CORE); CAV; is necessary for law Register of Births and RAJAC; enforcement purposes; Deaths for name changes. Business Licensing then exempt from In emergency situations, Agency; & main collection, use, locating next of kin. Enforcement disclosure and transfer Management. obligations, but still must Inspectors investigating comply with some motor car traders. requirements. “Privacy Matters”
  • 11. Module 1 Law enforcement agencies IPP8 IPP1.1 & IPP2.2 IPP3 IPP4 IPP5 1.2 If lawful Collect Record uses Be Be Have and personal & disclosures accurate secure privacy practicable information between law policies & offer responsibly enforcement processes anonymity agencies “Privacy Matters”
  • 12. Module 2 other functions? • For all other non-judicial and non-law enforcement functions employees must comply with the 10 information privacy principles (IPPs) • The IPPs are connected and guide how personal information should be handled: • Collection (IPPs 8, 1, and 10); • Use and Disclosure (IPPs 2 and 9); • Management of personal information (IPPs 3,4, 5, & 7); and • Access and Correction (IPP6 and FOI) “Privacy Matters”
  • 13. Module 2 Collection Collection (IPPs 8, 1, and 10) Preserve anonymity if you can. Collect only what you need. Do it lawfully, fairly, directly and not unreasonably intrusively. Tell people you are doing it and why through a privacy statement. Be extra careful with sensitive information. Scenario Photos are taken at the end of year staff party. The photos are added to a bank of stored images used for promotional purposes in newsletters and the website. Are there any collection issues? “Privacy Matters”
  • 14. Module 2 Tips for compliance • When drafting or handling forms check for a privacy statement. Think of a statement as a food label. • Be able to justify why you need personal information if asked. • Do not over collect personal information. • Be mindful, if investigating crimes, to act within the law and collect fairly. “Privacy Matters”
  • 15. Module 2 Use and Disclosure Think of a traffic light when disclosing personal information. you must you may you can’t Disclosure is You have choice No choice mandatory “Privacy Matters”
  • 16. Module 2 You may disclose under IPP2 Under IPP2 you may disclose: to law enforcement agencies for the purpose of prevention, detection, • with consent. investigation, prosecution or punishment of criminal offences or breaches of a law. • if information is from a publicly available source. where the information is reasonably • information for statistical or research believed to be necessary to lessen or purposes; no identifiers. prevent a serious threat to public health / safety / welfare. • investigation of unlawful activity. • other reasons in IPP2. “Privacy Matters”
  • 17. Use & Disclosure Scenario In 2003 the Arthurs Seat chairlift collapsed and 18 people were injured. The chairlift managing director was quoted in the media saying that he wished to extend his best wishes to those injured however was prevented from doing so as privacy laws prohibited the police releasing the names of the people involved. Considering the use and disclosure principle, what options exist for providing an apology to the victims? “Privacy Matters”
  • 18. Module 3 Management of personal information “Privacy Matters”
  • 19. Module 3 Management & Access Access and Correction (IPP6 & FOI Act) People have a right to access & correct personal information. Assume people will see what you write. If involved in discovering documents respond promptly. Management (IPPs 3, 4, 5 & 7) Keep personal information accurate & secure. Follow Departmental policies. “Privacy Matters”
  • 20. DVD • When watching the DVD consider – – What the privacy issues might be? – Whether you or your work area may have experienced a similar situation? “Privacy Matters”
  • 22. What constitutes a privacy complaint? • A breach of a privacy principle • A complainant may be concerned about: – a mix up in correspondence – gossiping about them in their community – a facsimile or email sent to the wrong person – their information being out of date or incorrect on a database “Privacy Matters”
  • 23. Complaint intake • Anyone can complain using the privacy complaint form available on J-NET • In the first instance you need to refer any potential privacy complaint to your business unit privacy coordinator • The Coordinator will follow the department’s privacy complaint handling policy and procedure “Privacy Matters”
  • 24. Recap & Key Messages • Most information held by the department will be capable of being personal information • The privacy principles are about the right information to the right people for the right reason at the right time • Build privacy protections into your work area and work practices • Follow privacy policies and bring privacy incidents to your manager’s attention “Privacy Matters”
  • 25. Where to go for help? • Privacy, Records Management & Freedom of Information materials are on J-NET>Our Business>Knowledge Management • Each of the Dept’s business units has a Privacy Coordinator – Gaming & Racing- Mai Hua 8684 6401 – Human Resources – Bree Tozer 8684 0052 – Corrections Victoria - Lina Marrocco & Joanna Richardson 8684 6576/6572 - Crime & Violence Prevention – Georgia Dodds 8684 1717 - Brent Carey, Senior Privacy Adviser can be contacted on 8684 0071 or by e-mail privacy@justice.vic.gov.au • EDRMS (records) helpdesk 8684 0555; the FOI unit 8684 0063 • Privacy Victoria www.privacy.vic.gov.au “Privacy Matters”