An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

 Q. Should we keep electronic records  Q. Do you purchase a software package  Q. Do you develop your own package  Q. What solution would be most cost.
CHARTERED SECRETARIES AUSTRALIA New Privacy Laws 6 June 2013.
Privacy An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Australian Privacy Principles Protecting information rights –­ advancing information policy.
Legislation in ICT.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Golden Loans Now ABOUT US GETTING STARTED CONTACT PRIVACY POLICY STOCK LIST VEHICLE LOCATERS ► Competitive finance handled by experienced staff finance.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Volunteers and the Law Riverland Community Legal Service Inc.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
Practical Information Management
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
General Purpose Packages
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
Health & Social Care Apprenticeships & Diploma
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Protecting information rights –­ advancing information policy The Australian Privacy Principles.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Data Protection Act (1998).
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
An Overview for Staff Prepared by MSM Compliance Services Pty Ltd
Level 2 Diploma in Customer Service
Privacy principles Individual written policies
IT Applications Theory Slideshows
Data Protection Act.
APP entities (organisations)
The Data Protection Act 1998
PERSONAL DATA PROTECTION ACT 2010
Data Protection Act.
General Data Protection Regulation
Data Protection principles
A whistle stop tour of GDPR
PERSONAL INFORMATION BILL
Data Protection.
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Data Protection What can I do? GDPR Principles General Data Protection
Presentation transcript:

An NZFFBS Training Module

 Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles of the Privacy Act and the Code of Ethics

 The Privacy Act has twelve information privacy principles.  Principle 1, Principle 2, Principle 3 and Principle 4 govern the collection of personal information. This includes the reasons why personal information may be collected, where it may be collected from, and how it is collected. Principle 1Principle 2Principle 3Principle 4

 Principle 5 governs the way personal information is stored. It is designed to protect personal information from unauthorised use or disclosure. Principle 5  Principle 6 gives individuals the right to access information about themselves. Principle 6  Principle 7 gives individuals the right to correct information about themselves. Principle 7

 Principle 8 and Principle 9, Principle 10 and Principle 11 place restrictions on how people and organisations can use or disclose personal information. These include ensuring information is accurate and up-to-date, and that it isn’t improperly disclosed. Principle 8Principle 9Principle 10Principle 11

 Principle 12 governs how “unique identifiers” – such as IRD numbers, bank client numbers, driver’s licence and passport numbers – can be used. Principle 12  (taken from

 Personal information shall not be collected by any agency unless:  collected for a lawful purpose  collection is necessary for that purpose

 Collect the information directly from the individual concerned.  Exceptions

 Ensure the individual is aware of:  the fact that information is being collected  purpose of collection  intended recipients  the name and address of agency  Laws  consequences  rights to access and correct information

 Personal information shall not be collected  unlawfully  or in ways that are:  unfair  unreasonably intrusive

 An agencies must ensure that:   information is protected against;  loss  unauthorised access, use, modification or disclosure  other misuse  if the information is given to another agency, that agency shall do likewise to protect it. 

 An individual is entitled to:  know what information an agency holds on them  access that information  be advised of their right to request a correction to that information

 An individual is entitled to:   request correction of personal information  request that a statement be attached to the information of the correction requested but not made.   An agency shall:   correct such mistakes  take steps to ensure that the information held is accurate, up to date, complete and not misleading.  inform other holders of the steps taken above.  inform the individual of the steps taken.

 An agency shall take reasonable steps to ensure that the information it uses is:   accurate,   up to date,   complete, relevant and   not misleading. 

 An agency shall not keep information for longer than the purposes for which the information may lawfully be used.

 An agency shall not use information it holds for any other purpose than was originally planned, unless:  the information was sourced from publicly available material  the individual concerned authorised its use  the information is directly concerned with the original purpose  the information is not used in a form that can identify the individual   the information is used for statistical or research purposes and is not published in a form that can identify the individuals.

 An agency shall not disclose information to another party unless:  disclosure is one of the original purposes (or directly related to one of the purposes) for which the information was gathered, or  the individual authorised its disclosure  the information was sourced from publicly available material   the information is not used in a form that can identify the individual  the information is used for statistical or research purposes and is not published in a form that can identify the individuals.

 An agency shall assign a unique identifier:  only if necessary to carry out its functions efficiently  different from other agencies  only to individuals clearly identified  Agencies shall not require individuals to disclose their own other unique identifiers