Professional Documents
Culture Documents
2. Using Google, find three (3) news ICT stories about privacy infringement, write no more than 500 words
about the infringement, repercussions and effected Australian Privacy Policy. What impact do you think
this has on professional ethics?
a. Location Tracking
A huge bit of the web customers happily moves their electronic media posts highlighting
their current region close by naming friends and family. It's fun and stimulating to give your life
events to friends and family, yet this data doesn't remain restricted to your ordinary group in a
manner of speaking. This identical data is taken care of on the electronic media page you are
using and stays there consistently, oftentimes without you knowing (anyway you may have given
consent through a terms and organizations course of action). Close by online media applications,
Google Maps and different applications in like manner demand your zone and by turning on your
zone you are giving direct information to the world about where unequivocally you are and what
your best strategy is, which is certainly risky and inconsistent
b. Information Mishandling
There are various districts on the web that need your own information to acquire induction to
their organizations. These objections oftentimes store treats and save your own information and
later use it for various purposes. As a general rule this information isn't encoded and can be
gotten to by anyone. This abusing of individual information may incite certifiable outcomes. The
high level example of e-banking and e-business passageways have expanded the perils related
with online security. By sharing your bank nuances and imperative records on the web, you are
clearing ways for cheats and making yourself frail against cybercriminals.
The Privacy Act 1988 (Privacy Act) covers relationship with a yearly turnover of more than $3
million and working in Australia, and some various affiliations. If the online relational association
you use is such a relationship, by then the individual information you share on it is made sure
about by the Privacy Act. Such affiliations join Facebook, Instagram, Twitter, Snapchat and
LinkedIn.
A couple of components go into picking if an affiliation works in Australia, remembering for the
occasion that they have a presence in Australia or carry on a business in Australia.
You should similarly observe that the Privacy Act doesn't cover individuals acting in an individual
breaking point. This infers you generally can't approve a security straightforwardly against an
individual. Regardless, you may have rights under various laws, for instance, copyright or insulting
laws.
Exactly when you are on the web, you are spied by a couple of trackers for various
purposes. Trackers track your interest history and track all your online activities through various
strategies. This gives them an away from of what your personality is and your tendencies, which is
an enter of online security methodology and makes you a public property. Usually, this after is for
advertisement purposes just and it grants marketing specialists to show advancements according
as you would prefer and interests. However, at times this information is used by cybercriminals to
do unapproved and criminal activities taking a risk with your online presence.
It makes sure
about the
prosperity,
security and
government
help of all
experts at
work. It also
guarantees the
prosperity and
security of any
leftover people
who might be
affected by the
work.
Privacy is the When something is private to The Privacy
privacy capacity of an a person, it usually means that Act 1988
individual or something is inherently special or
gathering to sensitive to them. The domain of
disconnect privacy partially overlaps
themselves, or with security, which can include the
data about concepts of appropriate use, as well
themselves, as protection of information. Privacy
and in this may also take the form of bodily
manner integrity. The right not to be
communicate subjected to unsanctioned invasions
specifically. of privacy by the government,
corporations or individuals is part of
shield many countries' privacy laws, and in
ourselves from some cases, constitutions.
inappropriate
obstruction in
our lives, which
permits us to
arrange what
our identity is
and how we
need to
interface with
the world
around us.
4. Fill in the blanks - Register Copyright and protect your creative works and innovations for lifetime in 176
countries by Notary deposit. Our Copyright deposit service is based on international Bern Convention
gathering 176 countries. Protect Your Creative Works by a Copyright certified by Public Notary: We
protect your Logos, Books, Websites, Screenplays, Music, Written Works, Artworks, Photos, Internet
Domains.
Copyright sanctioning looks at the explanation and character, nature, proportion of noteworthiness and
the effect it invites on the normal market. The electronic arrangement act 2000 has acquired some new
rights respects to the issue of copyright; copyright holders are outfitted with the decision and power what
is to put on the web. None can get the particular induction control beside the permitted purposes by the
copyright holder. For any endeavour or works the affiliation have done and is available on the web, it
might be gotten to by the individuals by the approval or grant. According to territory 36 in copyright
authorisation act, the copyright in an insightful, hair-raising, melodic and innovative work, by the person
who doesn't have the duty regarding copyright or owner of that record in Australia is seen as copyright.
7. Compare both QUT’s and UQ’s privacy protection, do they both align to Australian Privacy Principles?
Which one does not? If not, why not?
Both QUT and UQ doesn’t align to Australian Privacy Principles. QUT’s doesn’t align to Australian Privacy
Principles as it is committed to protecting the privacy of personal information in accordance
with the 11 Information Privacy Principles of the Information Privacy Act 2009 whereas the Australian
Privacy Principles (or APPs) are the cornerstone of the privacy protection framework in
the Privacy Act 1988 (Privacy Act).
APP5 Notification of the collection of personal An APP entity that collects personal
information information about an individual must take
reasonable steps either to notify the
individual of certain matters or to ensure the
individual is aware of those matters.
APP6 Use or disclosure of personal information An APP entity can only use or disclose
personal information for a purpose for which
it was collected (known as the ‘primary
purpose’), or for a secondary purpose if an
exception applies.
APP7 Direct marketing An organisation may only use or disclose
personal information for direct marketing
purposes if certain conditions are met.
APP8 Cross-border disclosure of personal Outlines the steps an APP entity must take to
information protect personal information before it is
disclosed overseas.
APP9 Adoption, use or disclosure of government Outlines the limited situations when an
related identifiers organisation may adopt a government-
related identifier of an individual as the
organisation’s own identifier or use or
disclose a government-related identifier of an
individual.
APP10 Quality of personal information An APP entity must take reasonable steps to
ensure the personal information it collects is
accurate, up to date and complete. An entity
must also take reasonable steps to ensure
the personal information it uses or discloses
is accurate, up to date, complete and
relevant, having regard to the purpose of the
use or disclosure.
APP11 Security of personal information An APP entity must take reasonable steps to
protect personal information it holds from
misuse, interference and loss, and from
unauthorised access, modification or
disclosure. An APP entity has obligations to
destroy or de-identify personal information in
certain situations.
APP12 Access to personal information Outlines an APP entity’s obligations when an
individual request to be given access to
personal information held about them by the
APP entity. This includes a requirement to
provide access unless a specific exception
applies.
APP13 Correction of personal information Outlines an APP entity’s obligations for
correcting the personal information it holds
about individuals.
9. You received a complaint from one of the department heads who discovered a USB drive in the company
car park. Inside the USB stick were copies of employee resumes and other personnel records such as
employee appraisal reports, which must be kept confidential.
a. Write an email advising the complainant of the next steps to be taken in determining the
complaint. Send a copy of the email to your facilitator.
To,
The department Head,
It has gone to my notification that a USB drive has been as of late found in the vehicle leave that
is being utilized by our organization. You have referenced that the drive has a place with one of
our workers. You likewise said that inside the drive, there were different sorts of records which
could be classified. Being one of the head of division, I was expecting you knew about the
circumstance and you haven't opened any one the documents as it might prompt the penetrate
of security strategy, yet it appears you have. Presently you should not tell anybody about the data
and furthermore not show the reports of anybody as there may be touchy materials in it. Thus, I
might want to demand you to hand the USB roll over to the facilitator and meanwhile, we will
attempt to locate the proprietor of the USB drive.
Kind Regards,
CEO
Joshua Lee
b. Refer to the Privacy Policy and determine whether there has been a breach of the Privacy
Principles.
Since the personal documents have been looked into, according to “APP5 i.e. Notification of the
collection of personal information”, there has been a breach of the Privacy Principles.
c. Send an email to your facilitator advising him/her of any action required in order to remedy the
breach.
To,
The Facilitator,
I might want to advise you that there has been a penetrate of the Privacy Principle in our
organization. One of our workers found a USB drive and saw that there was different private data
about the proprietor. You will before long get the drive and I would demand you to put together a
pursuit party to discover who it has a place with. All the archives are to be kept classified and
security ought to be kept up.
Kind Regards,
CEO
Joshua Lee
Reference:
www.acs.org.au
en.wikipedia.org
https://copyright-australia.com/