You are on page 1of 2

PRIVACY ACT

IMPACT
THE
COLLECTION
OF PERSONAL
INFORMATION

RELATED APP(s)

EXPLANATION

APP 3: collection of
solicited personal
information
APP 4: dealing with
unsolicited personal
information
APP 5: notification of
the collection of
personal information

APP3: the collected


information must be
necessary
App4: unsolicited
information must be
deleted after required use
APP5: must inform the
individual when
information is being
collected

HOW
PERSONAL
INFORMATION
IS USED

APP 2: anonymity
and pseudonymity
APP 6: use or
disclosure of
personal information
APP 10: quality of
personal information
APP 13: correction of
personal information

APP2: must give the


individual the option to
remain anonyms/ have an
alias.
APP6: If an entity holds
personal information
about an individual that
was collected for a
particular purpose the
entity must not use or
disclose the information
for another purpose
APP10: an entity must
ensure that the collected
information is up to date
and accurate
APP13: if the entity feels
that the information they
have collected is out of
date or not accurate they
must take measures to
try and fix this.

ACCESS TO
PERSONAL
INFORMATION

APP 1: open and


transparent
management
APP 11: security of
personal information
APP 12: access to
personal information

IMPLICATIONS
OF IDENTITY

APP 2: anonymity
and pseudonymity

APP1: if an individual
request information about
the APP then the entity
must take measures to
get the individual a copy
APP11: if an entity holds
personal information then
they must take security
measures to protect this
information
APP12: If an entity holds
personal information
about an individual, the
entity must, on request
by the individual, give the
individual access to the
information.
APP2: if an individual
requests to be

LINK TO CASE
STUDY/EXAMPLE
In Ashlee Madison case study
the complied with APP3
collecting only the necessary
information. But they didnt
comply with APP4 as they
didnt delete information that
the individual payed to be
removed. APP5 was followed
as in the signup for Ashlee
Madison they told them that
the information was going to
be recorded.
Ashlee Madison allowed the
individuals an option to
remove themselves from the
site in accordance to APP2.
Ashlee Madison also didnt
use the collected information
for another purpose following
APP6. Ashlee Madison
collected and updated
information when they could
including credit card
information and personal.
Ashlee Madison tried to keep
the information secure on
their site but hackers have
got into the site and have got
the personal information of
all individuals

If a user of Ashlee Madison


request to see their
information and change it
then the site provider must
allow the user to see this. The
site didnt protect the
information of its users as a
hacker got onto the system
and got into the personal
information and Ashlee
Madison didnt do much to
protect it.

On the Ashlee Madison site it


must give the option to the

THEFT

APP 11: security of


personal information

anonymous then the APP


must deal with this
APP11: if the entity holds
personal information it is
their job to hold this
information securely and
protect it

SAFE DISPOSAL
OF DATA

APP 9: adoption, use


or disclosure of
government related
identifiers
APP 4: dealing with
unsolicited personal
information

APP9: cannot adopt


government identifiers
unless instructed to.
APP4: the entity must, as
soon as practicable but
only if it is lawful and
reasonable to do so,
destroy the information or
ensure that the
information is DE
identified

users to give another name


and become anonymous
which they did but this makes
it hard for you to prove
yourself as you have become
fraudulent with a different
name on the site matched
with a different credit card.
The site didnt protect the
information of its users as a
hacker got onto the system
and got the information of
the users enabling them to
get a false identity with the
having access to the user
credit card details and their
names.
The site by the privacy laws
was meant to delete the held
information on request but
they charged the users to do
this and even after paying
they held the data and now
they had their credit card
details so when the hackers
got into the site they got all
of this so called deleted
information.

You might also like