ipl-logo

Why Is Privacy Important In Australia

1231 Words5 Pages

Australia has a Privacy act that governs what we must do to ensure protection of personal, sensitive data. The Privacy Act 1988 defines personal information as “information or an opinion, whether true or not, and whether recorded in a material form or not, about an identified individual, or an individual who is reasonably identifiable.” This might include a person's name and address, medical records, bank account details, photos, videos and even information about what an individual likes, their opinions and where they work.
‘Sensitive information’ is an important subset of personal information outlined in the Privacy Act. It covers up health information, political opinions, religious or philosophical beliefs, sexual orientation, criminal …show more content…

The Privacy Regulation 2013 issued by the Governor-General relate to various provisions of the Privacy Act.
Privacy and IT
The internet is becoming increasingly integrated into our daily lives. We as individuals or as community are becoming more interconnected and using the internet as part of that backbone of communication and collaboration. This technological growth is rightly predicted to continue in the coming decades. As a result use of personal information online will continue to increase. Many online services necessitate users to present some kind of personal information in order to use their service. As business IT professionals, we have a lots of responsibility because we are caring for it.
Personal information …show more content…

Under APP 3, you should only collect personal information that is reasonably necessary to carry out your functions or activities. Over-collection can increase risks for the security of personal information. Assessing the security risks to personal information is an important element when we design privacy. We can assess personal information security risks by conducting a privacy impact assessment (PIA). PIA is an information security risk assessment and regular reviews of our personal information security controls. We have to use PIAs and information security risk assessments along with regular reviews. This will increase our awareness regarding various security risks including threats and vulnerabilities, along with the possible impacts before designing and implementing personal information security

Open Document