Site Changes
- Note 1: Major changes to the Privacy Act 1988 will come into effect in March 2014. Agencies, businesses and not for profits need to start preparing for these changes. For more information go to our privacy law reform page at www.oaic.gov.au
- Note 2: From 12 March 2013 content is no longer being added to, or amended, on this site, consequently some information may be out of date. For new privacy content visit the www.oaic.gov.au website.
Types
Information Sheet (Private Sector) 6 - 2001: Security and Personal Information
pdf (77.27 KB)
National Privacy Principle (NPP) 4.1 provides that an organisation must take reasonable steps to protect the personal information it holds from misuse and loss and from unauthorised access, modification or disclosure.
Data security is an important way of ensuring that personal information is only used for permissible purposes. In general, personal information should be treated as confidential and sensitive information as highly confidential.
The key to effective compliance with NPP 4 is developing an organisational culture that respects privacy. Organisations need to ensure that management and staff have a good understanding of their responsibilities in protecting personal information from misuse, loss, corruption or disclosure.
| Tip for compliance
One way to promote a respect for privacy would be to develop a security policy. A security policy would cover all organisational systems used for processing, storing or transmitting personal information. The security risks faced by the organisation could be assessed in the development of the policy, and then cost-effective measures devised to reduce the risks to acceptable levels. To be effective, a security policy would need to be monitored and periodically reviewed. Staff and management would need to be made aware of the protective security policies and how to implement them. |
Reasonable steps
In deciding what are reasonable steps to ensure data security there are several factors to consider. What is reasonable depends on the circumstances in which personal information is held. The sensitivity of personal information being stored is an important factor and higher levels of security could be expected for sensitive information. The costs of any security systems also need to be considered in relation to the risks faced by the organisation. In the case of an organisation holding non-sensitive information, with a low risk of unauthorized access and little likelihood of serious consequences to the individual, then basic security measures may be adequate. However, for a large organisation with vast amounts of personal information and the risk of significant detriment from improper access, higher levels of security may be expected.
| Tip for compliance
Particularly for larger organisations or organisations where security breaches are high risks, it is worth considering compliance with relevant Australian Standards Organisation (ASO) and International Standards Organisation (ISO) standards including:
|
Aspects of security to consider
The range of security measures to consider covers physical security, computer and network security, communications security and personnel security.
Physical security
Information may be stored in a range of paper based and electronic forms. Physical security measures prevent unauthorised access to information and are relevant to all forms of storage.
|
Tips for compliance Physical measures could include:
|
Computer and network security
Information technology systems have the potential to increase the risk of unauthorized disclosure of personal information. Organisations need to assess their security risks and take appropriate measures to protect the integrity of their information systems and networks. Risk assessments could cover information systems for storing, processing and transmitting information. The appropriate protective measures will depend on the circumstances and risks involved.
|
Tips for compliance
|
Data security tools representing good practice include audit trails and digital signatures that authenticate authorship and guarantee detection of unauthorised modification.
Communications security
As many computing systems make use of telecommunications networks, security of computing and communications are increasingly interrelated. There are two kinds of communication risks to consider: interception of transmissions and unauthorised intrusion into networks.
Transmission of information may involve insecure telecommunications lines that may be vulnerable to interception.
|
Tips for compliance
Good practice computer and network security would include both systems, such as firewalls, routers, network intrusion detection systems, host intrusion detection systems, appropriate encryption and expert monitoring. |
Unauthorised intrusion into computer networks not only jeopardises the confidentiality of information, it also threatens network integrity by corrupting data. Connections to public networks are often useful and convenient but they can create a route for 'hackers' to intrude into an organisation's information system.
What are considered 'reasonable steps' will depend on the particular circumstances of the organisation and the information it holds.
Personnel security
Personnel security refers to limiting access to personal information to authorised staff only. Organisations could also ensure that those who do have access respect the organisation's culture of privacy. In general, personal information should only be accessed by those people who 'need-to-know', that is, they need it to carry out their duties.
|
Tips for compliance
|
Destruction and de-identification
NPP 4.2 requires an organisation that no longer needs to hold personal information for any purpose to take reasonable steps to destroy or permanently de-identify the information. A legal requirement to retain the personal information is considered to be a purpose to continue holding it.
What are considered 'reasonable steps' in destruction or de-identification of the information will depend on the circumstances. For example, if a small organisation holds non-sensitive personal information in secure storage, at low risk to the individual, it may be sufficient to destroy the information only as the organisation becomes aware of it in the normal course of its activities. For other organisations with higher risks and adequate resources it may be more appropriate to develop procedures that include criteria for retaining, destroying or de-identifying personal information. Periodic audits could then be conducted and old information destroyed or de-identified according to specified procedures.
Destruction
To protect individual's privacy rights destruction needs to occur by secure means. Garbage disposal of intact documents leaves personal information extremely vulnerable to unauthorised access and misuse. This method of disposal should generally be avoided. Electronic records that are no longer needed should be deleted. However, it is very difficult to reliably remove all traces of electronically stored information. Organisations will need to be aware that deletion may only remove the file-reference but leave all the other information intact.
|
Tips for compliance Secure disposal of paper-based records could include:
|
Good practice could also include the deletion of back-up files.
De-identification
Permanently de-identifying information means removing from the record any information by which an individual may be identified. Simply removing the name and address may not be sufficient to de-identify the information. Permanent de-identification also means that an organisation is not able to match the de-identified information with other records to re-establish the identity of individuals.
|
Tips for compliance The test for whether information is identifiable is whether the identity of the individual is apparent, or may reasonably be ascertained, from the information using the definition of 'personal information' in section 6 of the Privacy Act. A de-identification procedure would not be complete if, from the resulting information, the identity of an individual could be reasonably ascertained. Reasonable steps to de-identify information may include:
|
|
About Information Sheets Information sheets are advisory only and are not legally binding. (The NPPs in Schedule 3 of the Privacy Act 1988 (Cth) (the Privacy Act) do legally bind organisations.) Information sheets are based on the Office's understanding of how the Privacy Act works. They provide explanations of some of the terms used in the NPPs and good practice or compliance tips. They are intended to help organisations apply the NPPs in ordinary circumstances. Organisations may need to seek separate legal advice on the application of the Privacy Act to their particular situation. Nothing in an information sheet limits the Privacy Commissioner's freedom to investigate complaints under the Privacy Act or to apply the NPPs in the way that seems most appropriate to the facts of the case being dealt with. Organisations may also wish to consult the Commissioner's guidelines and other information sheets. |
Office of the Privacy Commissioner ISBN 1 - 877079 - 28 - 6 Privacy Hotline 1300 363 992 (local call charge)



Get RSS feeds