Get ready for Privacy Act changes: Privacy Commissioner

Businesses, government agencies should review polices before March 2014, says Timothy Pilgrim.

With new Australian Privacy Principles (APPs) coming into law in March 2014, Privacy Commissioner Timothy Pilgrim says now is the time for organisations to start preparing by conducting a review of privacy policies.

The Privacy Amendment (Enhancing Privacy Protection) Bill 2012 was passed in Parliament on 29 November 2012. It updates the Privacy Act 1988 and includes a number of reforms including the introduction of the APPs and changes to how personal information is handled, including when it can be used for direct marketing and sent overseas.

Mixed reaction to improved privacy protection

Privacy Act reforms - the implications for the digital environment

Privacy bill given the go-ahead

Pilgrim has recommended that businesses and government agencies should review information collection notices, outsourcing arrangements and direct marketing practices including the availability of `opt out’ options.

“Over the coming months, the Office of the Australian Information Commissioner [OAIC] will produce detailed guidance to assist businesses and agencies understand the impact of the reforms and make the necessary changes to their personal information handling practices,” he said in a statement.

Pilgrim added that the OAIC will conduct talks with industry bodies and consumer groups about some of the guidance documents.

Data privacy day

In addition, the OAIC will be celebrating Data Privacy Day on 28 January 2013. The internationally observed day is an effort to empower people to protect their privacy, control their digital footprint and escalate the protection of privacy/ data as everyone’s priority.

"In the age of big data, social media and cloud computing it is increasingly important that people think about the concept of privacy and what it means to them,” Pilgrim said.

“I am concerned that people aren’t considering the potential risks of disclosing too much personal information, particularly when engaging online.”

He added that organisations should also be vigilant about privacy, in particular, the protection of personal information entrusted to them by customers.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Tags: Timothy Pilgrim, Privacy Act 1988, Privacy Amendment (Enhancing Privacy Protection) Bill 2012, security, OAIC, privacy

Microsoft confirms HTTP Strict Transport Security for IE 12

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Trend Micro Mobile Security

Comprehensive enterprise protection for mobile devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.