Why is privacy important?
Privacy is one of the most fundamental human rights that we are privileged to have. The right to privacy is the protection against having a society in which the government completely controls the people’s lives, and requires the government to protect individuals from privacy invasion by other people, governments and non-government organisations such as: Businesses, charities and non-profit charities. Right to privacy ensures that personal emails, bank details and medical records are safe and secure by the government and the organisations that own the services used. This is essential to human dignity and autonomy in all societies around the globe.
What is the Privacy law?
Privacy Act
The …show more content…
The Privacy Act includes thirteen Australian Privacy Principles (APPs), which apply to some private sector organisations, as well as most Australian and Norfolk Island Government agencies. These are collectively referred to as ‘APP entities’. The Privacy Act also regulates the privacy component of the consumer credit reporting system, tax file numbers, and health and medical research.
Also, the Notifiable Data Breaches Amendment. This law makes sure that if a service has been breached, the users of that service are notified that their information may have been taken by a source.
The Privacy Act was passed by the Australian Parliament in 1988 (Australian Labour Party, Prime Minister Bob …show more content…
Punishments vary on the seriousness and breach of the crime, most privacy breaches end in reimbursements of finances to the individuals who had their privacy breached. The Privacy Amendment Act 2012 passed through parliament and took effect on the 12th March 2014. This legislation forces companies and organisations (Including government organisations) to protect Australians private information, otherwise they will have to pay $1.7 million if there is a privacy breach. Companies can protect themselves from breaches by using: firewalls and intrusive prevention, network segmentation, role based access controls, anti-malware, email and web security controls, encryption, remote access with strong authentication, mobile device security and control, patching and vulnerability detection, physical whitelisting, privacy by design, policies and procedures, auditing (testing) and training of personnel. If a breach is detected policy says that the entity must let the impacted individuals, office of the Australian Information Commissioner know about the issue immediately. Also, they must put in place forensic analysis tools and business continuity and disaster recovery tools, to make sure that they identify the breach and make sure that the data is safe and has not been