Australian Privacy Principles

Autralian Privacy Principles

What is your legal obligation?

Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Privacy Amendment Act)

The reforms were introduced on March 12, 2014, requiring organisations to greater safeguard peoples’ personal information. It also includes giving greater powers to the Australian Information Commissioner to seek civil penalties in the case of serious or repeated privacy breaches, and to conduct assessments of privacy performance.

There are many small businesses that have been forced to write new or create Privacy Policies, in order to continue doing business with APP (Australian Privacy Principles) Entities, as a result of the reforms.

There are 13 New Reforms under the Amendment, in order to simplify the requirements of the New Reforms, we have provided extracts and Links allowing you a quick overview of the definitions, this information is readily available from the Office of the Australian Information Commissioner.  www.oaic.gov.au

Chapter 11:APP 11 – Security of Personal Information

APP 11 …..requires an APP entity to take active measures to ensure the security of person information it holds, and actively consider whether it is permitted to retain personal information.

  • This link will provide the Key points to the New Reforms 

Destroying or de-identifying personal information

11.22 An APP entity must take reasonable steps to destroy personal information or ensure it is de-identified if it no longer needs the information for any purpose for which it may be used or disclosed under the APPs (APP 11.2). Destroying personal information — irretrievable destruction.

Destroying  personal information — irretrievable destruction

11.36 Personal information is destroyed when it can no longer be retrieved. The steps that are reasonable for an organisation to take to destroy personal information will depend on whether the personal information is held in hard copy or electronic form.

11.37 For example, for personal information held:

  • in hard copy, disposal through garbage or recycling collection would not ordinarily constitute taking reasonable steps to destroy the personal information, unless the personal information had already been destroyed through a process such as pulping, burning, pulverising, disintegrating or shredding.

 

For your secure document shredding needs, get in touch with the team at iShred Document Destruction today

Get in touch

Latest Posts

Secure Document Destruction for Private Investigators

Secure Document Destruction for Private Investigators

Privacy is the currency of private investigators. It is in your job title and the job description. As a private investigator, you are privy to information – personal or sensitive – about a variety of different people. Your clients expect your discretion and...

Telecommunications Industry Document Destruction

Telecommunications Industry Document Destruction

Telecommunications Industry Document Destruction – are you in this massive industry? You need to get serious about security!   Telecommunications Industry Document Destruction is becoming increasingly important in the modern era and aims to protect everybody from...

Digital Media Destruction – Not Just Paper!

Digital Media Destruction – Not Just Paper!

Secure onsite destruction is not just for paper – it is just as important to have good digital media destruction practices. If privacy is important to you then digital media destruction is essential. Even small devices need to be disposed of carefully, as failing to...