APP Privacy Policy

955 Words2 Pages

APPs summary
1. APP1 — open and transparent management of personal information
Having a clearly expressed and up to date APP privacy policy. Make it publically available and free of charge. Manage personal information in an open and transparent way, so that people know how their personal information will be used.
2. APP2 — anonymity and pseudonymity
Where possible, give people the option of not identifying themselves, or of using a pseudonym (fake name).
3. APP3 — collection of solicited personal information
Only collect personal information that is reasonably necessary to fulfil the organisation’s functions and activities. There is a higher standard to the collection of sensitive information such as details on a person’s health and whether …show more content…

APP10 — quality of personal information
Take reasonable steps to ensure the personal information that is collected is accurate, up to date and complete. Take reasonable steps to ensure the personal information that is used or disclosed is accurate, up to date and complete, having regard to the purpose of the use or disclosure. Relevance and not misleading are also important considerations in terms of the quality of personal information.
11. APP11 — security of personal information
Take reasonable steps to protect personal information held from interference, misuse and loss, and from unauthorised access, modification or disclosure. Security safeguards can be technical or administrative, such as having a “clean desk” policy where all paper records must be locked away at night, and installing virus protection software and firewalls to protect electronic data.
12. APP12 — access to personal information
Provide access to personal information when requested by the person involved unless a specific exception applies (such as denying access is required or authorised by or under an Australian law or a court/tribunal order).
13. APP13 — correction of personal …show more content…

Breaches (such as sending a communication that contains personal information to the wrong recipient) may result in fines, damage to reputation and loss of trust from customers.
Breach prevention
Security is a basic element of information privacy. Organisations should be committed to preventing Breaches, and should have a range of technical, administrative and other security safeguards in place to protect personal information from interference, misuse, loss, unauthorised access, modification or disclosure (in compliance with APP11).
Dealing with Breaches
Organisations should deal with Breaches in an appropriate and timely manner. There may be internal and external actions that need to be taken. In taking any action, organisations may wish to be guided by these steps as suggested by the OAIC on responding to a Breach (whether it is actual or suspected):
1. Step 1: Contain the Breach and do a preliminary assessment
2. Step 2: Evaluate the risks associated with the Breach
3. Step 3: Notification
4. Step 4: Prevent future

Open Document