Privacy and the Cloud
|
|
|
- Gerald Watts
- 10 years ago
- Views:
Transcription
1 Privacy and the Cloud Speech to Cloud Computing Conference and Expo 9 September 2010 Andrew Solomon A/g Assistant Commissioner, Operations
2 Good morning ladies and gentlemen. I d like to thank the Cloud Computing Conference and Expo for the opportunity to speak to you today about cloud computing and the protection of personal information. Overview My discussion today primarily focuses on the type of cloud computing that involves shifting computing capabilities, such as data collection, processing or storage from the enterprise to specialist third parties, generally using the internet as the communication and delivery mechanism. This fundamental change in the way information is collected, stored and handled by businesses and government agencies poses significant questions about how the collection and handling of personal information is appropriately undertaken in this new environment. I m not here today to act as a nay-sayer or to try to scare you all with worst case scenarios. Technology developments such as cloud computing can provide great opportunities to improve the way we work and these developments and the protection of personal information are reconcilable goals. Indeed, there is a significant potential for cloud computing to enhance the protection of personal information. Stories about security breaches due to lost or stolen laptops and USB devices, or inappropriately secured enterprise computing systems abound. Storing data in the cloud, rather than on these devices or on an inadequately secured in-house system, if done well, may reduce these risks. The challenge, in order to take advantage of these new opportunities, is to ensure that personal information can be moved to a third-party service provider s facilities securely and that those facilities are also appropriately secure. The nature of the work of a private sector organisation or government agency, the level of personal information it handles and the sensitivity of that information can all vary widely. Each organisation will have to weigh up the opportunities and risks on an individual basis. This morning I am going to start by discussing personal information regulation in Australia including the obligations placed on most businesses and Australian Government agencies when handling personal information. I will then discuss some of the challenges of protecting personal information in a cloud computing environment and ways of identifying and mitigating those challenges. The Privacy Act The Australian Privacy Act is designed to regulate the collection and handling of the personal information of individuals. Personal information is defined as any Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 2
3 information or opinion about an individual whose identity is apparent or can reasonably be ascertained from that information. For example, a client mailing list containing names and addresses would be considered personal information for the purposes of the Act. Other items of information, eg; an ISP address or telephone number may or may not be personal information depending on the context, including the availability of connecting information. Some personal information is also classified as sensitive information. Sensitive information includes any personal information concerning a person s race or ethnicity, their religious, political or philosophical beliefs or affiliations, and health information, including genetic information. Additional protections apply to personal information that is considered sensitive. At present, these higher protections for sensitive information only apply in the private and not for profit sectors but it is likely that proposed legislative reforms, accepted by the Australian Government last October, will extend these higher protections for sensitive information to Australian Government agencies as well. It also important to note that Australians concerns about the protection of personal information, and particularly the implications of technology developments on the protection of personal information, are increasing. Community attitude surveys undertaken by our Office have shown that people are becoming more concerned about the protection of personal information, especially online. 1 This means that it is very important for businesses and government agencies to get the protection of personal information right, by designing and building privacy into new technologies from the start. In 2008 the Australian Law Reform Commission released its largest ever report: Report For Your Information; Australian Privacy Law and Practice. That report comprises approximately 3000 pages of detail about the state of privacy law in Australia and made 297 recommendations concerning the future of the protection of personal information. One of its main recommendations was that the Privacy Act should remain technology neutral. This means that the law should be principlesbased and not attempt to pre- or proscribe the uses of specific technologies in relation to handling personal information. This gives the law flexibility to accommodate new developments in technology and minimises it becoming dated too quickly. However, the Law Reform Commission also noted that organisations that use advanced technology solutions to handle personal information will need to ensure 1 Office of the Privacy Commissioner, Community Attitudes to Privacy 2007, Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 3
4 that they have appropriate measures in place to meet their obligations under the Privacy Act. 2 Another of the Law Reform Commission s recommendations was that a single set of privacy principles for government and the private and not for profit sectors be introduced. At present, under the Privacy Act, Australian Government agencies are bound by the Information Privacy Principles and private and not for profit sector organisations, with some exemptions, are bound by the National Privacy Principles. The proposed combined principles, currently called the Australian Privacy Principles, in exposure draft legislation that the Senate Finance and Public Administration Committee is currently reviewing, will, if enacted, replace the two existing sets of principles and provide unified guidance for all entities in Australia that are bound by the Privacy Act. So what are the general obligations found in the privacy principles and what are the implications of cloud computing? Today, I m going to focus on those principles with the greatest relevance to protecting personal information in a cloud computing environment. These concern the collection of data, the security of that data and the transfer of data outside Australia. Data in the Cloud There are, of course, at least two parties concerned in any cloud-computing transaction, the organisation or agency using the cloud service and the cloud service provider. One of the most basic issues that an organisation wishing to use cloudbased computing faces is maintaining control of the information once it leaves their environment and is on its way to, or in, the hands of the cloud service provider. Our Office has produced guidelines for non-government organisations that transfer information to third party contractors. In some circumstances for the purposes of the Privacy Act a contractor may be considered to be part of the contracting organisation, in the same way that a direct employee is, but this is not usually the case. A cloud service provider would generally be considered as a separate organisation. Because of this the transfer of personal information to a contractor is generally considered to be a disclosure for the purposes of the Privacy Act. 3 2 Australian Law Reform Commission, ALRC 108: For your information: Australian Privacy Law and Practice, 2008, paragraphs 10.9; 10.51, 3 Office of the Privacy Commissioner, Information Sheet (Private Sector) : Contractors at accessed 23 August Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 4
5 Organisations entering into contracts that will involve the transfer of personal information need to ensure that, even if the contractor is not bound by the Privacy Act, the personal information will continue to be protected. Cloud service providers are frequently based outside Australia and thus may not be subject to Australian legislation or it may be difficult for a regulator to enforce action against the organisation if something goes wrong. This means that it is very important that Australian organisations ensure, when they enter into a contract with a cloud service provider, that the terms of the contract enable them to continue to meet their obligations under the Privacy Act and that there is minimal risk in relation to the protection of personal information. By its nature, cloud computing involves the virtualisation of resources such as data storage space. As information is transferred around the globe, questions arise concerning the jurisdiction over that information. This issue is probably the most complex so I think it will make more sense if I begin my discussion at the point where information is collected. Collection The privacy principles state that an organisation should only collect information about an individual that it needs for its functions. For an organisation or agency considering moving customer records to a cloud service provider, there is not much to worry about here if the organisation is still undertaking the collection before it is transferred to the cloud service provider as their existing systems should be in line with this principle. The privacy principles also require that organisations and agencies inform individuals if their information will be disclosed to a third party. It is important, therefore, that individuals are informed given appropriate notice that their information will be stored in facilities provided by a third party. Security Data security is a crucial concern for any organisation transferring information over the internet. You ll be having a presentation on Security and the Cloud later today so I ll restrict my comments on security to its implications for the protection of personal information. Under the privacy principles, organisations and government agencies have an obligation to protect the personal information that they hold from loss or misuse and unauthorised access, modification or disclosure. The private sector principles also require organisations to take reasonable steps to ensure that any personal information that they hold is either destroyed or permanently de-identified once it is no longer needed. Under the proposed new Australian Privacy Principles, this requirement will also be extended to government agencies. Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 5
6 As I mentioned earlier, cloud-computing has the potential to enhance the security of information, thus aiding in the protection of personal information. For example, storing information in cloud facilities makes it centrally accessible and so, if business processes are properly designed, they can minimise the number of copies of personal information that are required within an organisation where it is spread geographically. However, once information is stored in a cloud environment, the entity that placed it there may have less direct control over it. If a cloud-provider offers appropriate security measures, such as strong encryption of data and holding data in a purposefully designed fragmentation across servers, this can help to protect the personal information from misuse. 4 A risk occurs, however, if a cloud service provider does not offer good security measures. Organisations should ensure that cloud service providers they intend to use offer personal information security measures that are at least equal to their own and will enable them to continue to meet their obligations under the Privacy Act. 5 We re accustomed to think about the security of our data and the need for backups and recovery strategies. But sometimes we need to be able to dispose of information securely. As I have said, organisations have an obligation either to destroy or de-identify personal information once it is no longer needed. One of the strengths of cloud computing is its ability to offer multiple backups and help protect against data loss. This multiplication of data, however, means that it is less easy to be certain that all copies of the information have been permanently destroyed or de-identified. The capacity of information to persist in online environments presents a challenge for managing the protection of personal information. Indeed, the CEO of Google has been quoted as predicting that, in the future, people will change their names in order to disassociate themselves from their youthful follies, all irrevocably documented online. 6 This is obviously an extreme solution and is particularly related to materials posted on social networking sites. Data permanence does matter, however, in other contexts. For example, the Google Docs privacy policy warns that, due to their backup systems, residual copies of 4 S Johnston, Cloud Computing and Privacy CircleID 16 September 2008, accessed 11 Aug Office of the Privacy Commissioner of Canada, Reaching for the Cloud(s): Privacy Issues related to Cloud Computing, priv.gc.ca/information/pub/cc_201003_e.cfm#toc5 accessed 11 August L Hearn, Google on Privacy: Change your name Sydney Morning Herald 17 August Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 6
7 documents may persist for up to sixty days. 7 To give Google credit, this warning is up front and in plain language. Organisations should question the permanence of data they move to a cloud service provider and ensure that they are able to continue to meet their obligations concerning the disposal of personal information that is no longer required. Transborder data flows The lifecycle of data in the cloud presents one set of concerns for the protection of personal information. Jurisdiction over that information also poses challenges. Data in the cloud may be physically stored a long way from its creators and users, potentially in overseas jurisdictions. This movement of information around the world has implications for the protection of personal information that need to be considered carefully. Thinking around transborder data flows is by no means new. As early as 1980, the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Information, which form the basis of our own Privacy Act, provided that, in developing laws and policies for the protection of personal information, member countries should not enact legislation that unnecessarily creates barriers to the movement of information. The Law Reform Commission report I discussed earlier remains committed to this principle. It is important to protect personal information but creating excessive regulatory burdens benefits no-one. Different jurisdictions have their own requirements concerning the movement of information across their borders. The European Union, for instance, forbids the transfer of personal information to another jurisdiction unless the protection of personal information legislation in that other jurisdiction has been assessed as adequate. 8 Other jurisdictions are less prescriptive. In Canada, organisations are required to ensure that any entity to which they transfer information can provide a comparable level of protection to that in Canada. 9 The emphasis here is on the accountability of 7 Google Docs privacy policy accessed 17 August Australian Law Reform Commission, ALRC 108: For your information: Australian Privacy Law and Practice, 2008, paragraph 31.31, 9 Office of the Privacy Commissioner of Canada, Guidelines for Processing Personal Data across Borders, Jan. 2009www.priv.gc.ca/information/guide/2009/gl_dab_090127_e.cfm accessed 18 August Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 7
8 the collecting organisation. APEC has taken a similar approach, noting the need for cooperation within a highly diverse region. 10 In Australia, the private sector principles provide that personal information should only be allowed to pass outside Australia if the organisation believes that the recipient is subject to comparable privacy regulation or contractual terms or the individual has consented to the transfer. Under the proposed new Australian Privacy Principles, both government agencies and private organisations will remain accountable for the handling of personal information that is transferred overseas unless a series of criteria are met. Once again, by moving information into the cloud, entities lose a degree of control over it. One issue with processing or storing information in another jurisdiction is that it may be subject to the legislation of that jurisdiction. The implications of this were demonstrated in 2006 when it was revealed that the United States Department of the Treasury had been accessing thousands of financial records of the Society for Worldwide Interbank Financial Telecommunication (SWIFT). SWIFT itself is based in Belgium and the records accessed by the US related to transactions performed around the globe. Our Office investigated complaints that Australians personal information had been improperly accessed but found that we did not have jurisdiction over SWIFT s international operations. As a result of this investigation, many Australian financial institutions amended their terms and conditions for telegraphic funds transfers to include explicit consent for customers personal information to be disclosed to overseas entities. The Privacy Commissioner of Canada has also noted that it is impossible to prevent foreign authorities from accessing personal information held by organisations within that jurisdiction. 11 The issue of control of information in the cloud doesn t end here. Cloud service providers are businesses themselves and may be subject to litigation. If a cloud 10 Australian Law Reform Commission, ALRC 108: For your information: Australian Privacy Law and Practice, 2008, paragraph 31.40, 11 Office of the Privacy Commissioner of Canada, Responsibility of Canadian financial institutions in SWIFT s disclosure of personal information to US authorities considered E. Lictblau and J. Risen, Bank Data Is Sifted by U.S. in Secret to Block Terror The New York Times, 23 June accessed 18 August Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 8
9 service provider were to have its records searched or seized as part of an investigation, personal information may be disclosed. 12 I ve already stressed the importance of strong contractual protections. Transfer of the ownership of a cloud service provider, by sale, merger or even bankruptcy, also has implications for the security of personal information held by that provider. Transfer of the cloud business may lead to changes in the terms of a cloud service. In the case of bankruptcy, the ability to retrieve personal information and dispose of copies held by the cloud service provider would partly depend on the strength of the provider s initial privacy policy. 13 I opened this morning by saying that I m not here simply to be negative about cloud computing. The likelihood of these scenarios affecting cloud users adversely may be remote but it is important to remember that personal information stored in the cloud can either have stronger or weaker protections than if held by an organisation itself depending on the several factors, some of which I have outlined today. Privacy Impact Assessments I promised earlier that I would discuss ways of mitigating risk to the protection of personal information when contemplating using cloud facilities. A tool already exists, to assist government agencies and private sector organisations to manage the implications of new projects on the protection of personal information. This tool is called a Privacy Impact Assessment. Conducting a Privacy Impact Assessment includes analysing the flow of personal information in a project and thus helps identify ways in which the protection of personal information may be affected. 14 The Assessment should highlight any potential weak points in the data life-cycle and assist in identifying ways of mitigating these weaknesses. Poor management of personal information by a business or agency poses a number of risks to the entity as well as to the individuals whose personal information is involved. 15 The first is that the entity may not be compliant with privacy legislation. Secondly, if some misuse of personal information does occur, the resultant loss of credibility and public trust can have severe brand impact. Finally, the redesigning of systems after the event to prevent further breaches can be costly, in both time and resources, and highly disruptive. 12 Office of the Privacy Commissioner of Canada, Reaching for the Cloud(s): Privacy Issues related to Cloud Computing, priv.gc.ca/information/pub/cc_201003_e.cfm#toc5 accessed 11 August R. Gellman, Privacy in the Clouds: Risks to privacy and confidentiality from cloud computing World Privacy Forum 23 February 2009, 16; Office of the Privacy Commissioner, 2010, Privacy Impact Assessment Guide, iv-v. 15 Ibid v. Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 9
10 For these reasons, our Office recommends that Privacy Impact Assessments be undertaken early on in a project s initiation phase. This means that any potential weaknesses can be identified early and solutions found at the detailed design stage. In our experience, this is much more effective than trying to rectify a problem once a project is nearing implementation. Conducting a Privacy Impact Assessment shouldn t appear as an unnecessary burden on a business that is trying to grow and develop. Rather, it should form part of the whole risk assessment process for a new undertaking and can be a valuable ongoing tool as the project progresses. Privacy Impact Assessments are crucial if a project involves the handling of large quantities of personal information or sensitive information. 16 It is also very valuable to conduct an assessment if the project is highly innovative or represents a significant departure from previous practice. Adoption of cloud-based computing solutions is a significant innovation in processing and storing information. A Privacy Impact Assessment would, therefore, be very useful in highlighting any potential hazards and assisting an entity to appropriately protect the personal information for which it is responsible. The assessment will provide a useful ongoing decision-making tool as the design develops and can also assist in conducting post-implementation reviews. Further, undertaking a Privacy Impact Assessment, makes a clear statement about the values of an organisation and can help to demonstrate the organisation s leadership commitment to the protection of personal information. Our Office has produced a guide to Privacy Impact Assessments which is available on our website. We also have a list of privacy service providers on our website which would assist if you are looking to employ an external consultant to help you with the design or actually undertaking the assessment. Conclusion It seems fitting that we are gathered today to discuss moving computing into the clouds on the anniversary of the fixing of the first ever computer bug. This was literally a bug, or rather a moth, that was discovered lodged in a relay in the Harvard University Mark II Aiken Relay Calculator on this day in Computers and the way we undertake electronic commerce have developed exponentially from these humble beginnings. Looking forward, computing in the clouds demands detailed attention by those organisations seeking to use it and will 16 Ibid xi accessed 3 September 2010 Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 10
11 promote greater levels of international coordination amongst privacy regulators and others as state boundaries become less significant to the transfer of information. Our Office understands the need to balance the protection of personal information with other important goals such as innovation and business growth. With creativity and cooperation, it is always possible to achieve such aims in a privacy enhancing, rather than a privacy intrusive, way. Thank you. Privacy and the Cloud speech to Cloud Computing Conference and Expo 9/9/2010 Page 11
Information Sheet: Cloud Computing
info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department
Data Breach Notifications Submission by the Australian Communications Consumer Action Network to the Attorney General s Department November 2012 About ACCAN The Australian Communications Consumer Action
Information Privacy Policy
Information Privacy Policy pol-032 Version: 2.01 Last amendment: Oct 2014 Next Review: Aug 2017 Approved By: Council Date: 04 May 2005 Contact Officer: Director, Strategic Services and Governance INTRODUCTION
PRIVACY POLICY Personal information and sensitive information Information we request from you
PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
BLUE BADGE INSURANCE PTY LTD BLUE BADGE COMMUNITY AUSTRALIA PTY LTD PRIVACY POLICY
BLUE BADGE INSURANCE PTY LTD BLUE BADGE COMMUNITY AUSTRALIA PTY LTD PRIVACY POLICY Version 1-1 1 July 2015 Blue Badge Insurance Australia Pty Ltd 2014 ABN 59 162 783 306 A.R. No. 438547 is an Authorised
Guidelines approved under Section 95A of the Privacy Act 1988. December 2001
Guidelines approved under Section 95A of the Privacy Act 1988 December 2001 i Commonwealth of Australia 2001 ISBN Print: 1864961074 Online: 1864961139 This work is copyright. Apart from any use as permitted
POLICY STATEMENT 5.17
POLICY STATEMENT 5.17 DENTAL RECORDS 1 (Including ADA Guidelines for Dental Records) 1. Introduction 1.1 Dentists have a professional and a legal obligation to maintain clinically relevant, accurate and
Police Financial Services Limited Copyright exists in this document Privacy Policy 1
Privacy January 2015 Policy Police Financial Services Limited ABN 33 087 651 661 ('we', 'us', 'our', BankVic ) is bound by the Australian Privacy Principles under the Privacy Act 1988 (Cth) (Privacy Act).
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Disclosure is the action of making new or secret information known.
/PURPOSE OF POLICY Pty Limited (Momentum) is required and committed to comply with the Australian Privacy Principles (APPs) in the Privacy Act 1998 (Cth) (Privacy Act). The APPs regulate the manner in
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include:
ABN 47 001 768 190 AFSL 244526 Our Privacy Policy At Capital Insurance Brokers, we are committed to protecting your privacy in accordance with the Privacy Act 1988 (Cth) (Privacy Act) and the Australian
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
amaysim Privacy Policy
amaysim Privacy Policy Valid as of 07 October 2015-1 of 8 - amaysim Australia Pty Ltd ABN 65 143 613 478 (referred to in this document as amaysim or we or us ). 1. Protection of your privacy and personal
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual
Daltrak Building Services Pty Ltd ABN: 44 069 781 933 Privacy Policy Manual Table Of Contents 1. Introduction Page 2 2. Australian Privacy Principles (APP s) Page 3 3. Kinds Of Personal Information That
1.4 For information about our management of your other personal information, please see our Privacy Policy available at www.iba.gov.au.
Indigenous Business Australia Credit Information Policy 1 Purpose and application of this policy 1.1 This credit reporting policy (Credit Information Policy) describes and establishes how Indigenous Business
Clevertar Privacy Policy
Clevertar Privacy Policy At Clevertar, we take privacy very seriously. We encourage you to read this Privacy Policy Policy carefully. The defined terms in this Policy have the same meaning as in our Terms
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Protecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
FISHER & PAYKEL PRIVACY POLICY
FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed
DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004
DISASTER RECOVERY INSTITUTE CANADA (DRIC) UPDATED APRIL 2004 This website privacy policy is intended to provide DRIC website visitors with information about how DRIC treats private and personal information
ASPEN AUSTRALIA BRANCH PRIVACY POLICY
ASPEN AUSTRALIA BRANCH PRIVACY POLICY INTRODUCTION This policy applies to the operations of Aspen s Australia branch. Aspen is committed to complying with the principles of the Privacy Act 1988 and accordingly
Australian Charities and Not-for-profits Commission: Regulatory Approach Statement
Australian Charities and Not-for-profits Commission: Regulatory Approach Statement This statement sets out the regulatory approach of the Australian Charities and Not-for-profits Commission (ACNC). It
Financial Services Guidance Note Outsourcing
Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
The purpose of this document is to provide a framework for ConnectGroups in dealing with privacy considerations.
PRIVACY POLICY Preliminary Note Before any policy is adopted in this area, there should be wide consultation with all potentially affected parties. Correspondingly, this draft policy should not be adopted,
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
WHAT KIND OF PERSONAL INFORMATION DOES NINE COLLECT AND HOW DOES NINE COLLECT IT?
Privacy Policy Nine Network Australia Pty Ltd (Nine) understands that privacy is important to our viewers, business contacts, and people who appear in our television programs. At Nine we are committed
The Privacy Act 1988 contains 10 National Privacy Principles (the NPPs) which specify how organisations should handle personal information.
Privacy policy Abstract Page 1 Preamble The Privacy Act 1988 contains 10 National s (the NPPs) which specify how organisations should handle personal information. The Anglican Church Diocese of Sydney
PRIVACY AND CREDIT REPORTING POLICY
PRIVACY AND CREDIT REPORTING POLICY 12 March 2014 CONTENTS What is personal information?...3 Information we may collect, use and disclose about you...4 Collection of sensitive information...6 How personal
Credit Reporting Privacy Policy of Baybrick Pty Ltd
Credit Reporting Privacy Policy of Baybrick Pty Ltd Introduction 1. This Credit Reporting Privacy Policy is the official privacy policy of Baybrick Pty Ltd and its subsidiaries which includes JBS Australia
CREDIT REPORTING POLICY
CREDIT REPORTING POLICY The Clean Energy Finance Corporation ("CEFC", we, us, our in this Credit Reporting Policy) respect the privacy of personal information and credit information you may provide to
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Privacy Policy. 30 January 2015
Privacy Policy 30 January 2015 Table of Contents 1 Overview 3 Purpose 3 Scope 3 2 Collection 3 What information do we collect? 3 What if you do not give us the information we request? 4 3 Use of information
Zinc Recruitment Pty Ltd Privacy Policy
1. Introduction Zinc Recruitment Pty Ltd Privacy Policy We manage personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles. This policy applies to information collected
Belmont 16 Foot Sailing Club. Privacy Policy
Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This
Direct Recruitment Privacy Policy
Direct Recruitment Privacy Policy Direct Recruitment manages personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles (APP). This policy applies to information collected
Opal Privacy Policy. Opal Electronic Ticketing System
Opal Electronic Ticketing System Contents 1 Background... 4 1.1 The Opal Ticketing System... 4 1.2 Channels for acquiring Opal cards... 4 1.3 TfNSW... 4 2 Scope of policy... 5 2.1 Applicable privacy legislation...
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
How To Understand The Privacy Policy Of Racing Internet Services
Racing Internet Services Privacy Policy I. ABOUT THIS POLICY Racing Internet Services and its related bodies corporate ( Company or we ) want you to be familiar with how we collect, use and disclose information
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Privacy Statement. What Personal Information We Collect. Australia
Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect
communications between us and your financial, legal or other adviser, or your broker or agent;
Privacy policy Updated: 25 June 2014 This Privacy Policy applies to information collected by 255 Finance Pty Ltd ABN 23 168 112 507 and its related bodies corporate ( 255 Finance or we ). This policy outlines
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
Data breach notification guide: A guide to handling personal information security breaches
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH
NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH Council of Australian Governments An agreement between the Commonwealth of Australia and the States and Territories, being: The State of New South Wales The State
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
PRIVACY POLICY. Privacy Statement
PRIVACY POLICY Privacy Statement Blue Care is one of Australia's leading providers of retirement living, community health, help at home services and aged care homes, caring for more than 12,500 people
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Data breach notification guide: A guide to handling personal information security breaches
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
Privacy Policy. Approved by: College Board, 01/12/2005 Principal from 14/02/2014
Privacy Policy Approved by: College Board, 01/12/2005 Principal from 14/02/2014 Revised Date: 11/01/2008 26/08/2011 19/03/2013 14/02/2014 Review Date: 14/02/2016 PLEASE NOTE: Version control for this document
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Ausgrid Privacy Policy
Ausgrid Privacy Policy Ausgrid is responsible for the safe and reliable supply of electricity to homes and businesses throughout Sydney, the Hunter and the Central Coast. Its network is made up of more
