Supplementary Policy on Data Breach Notification Legislation
|
|
|
- Coleen Sarah Franklin
- 10 years ago
- Views:
Transcription
1 4 May 2013 Supplementary Policy on Data Breach Notification Legislation Introduction It has been reported that the Australian Government is considering the introduction of data breach notification legislation. The APF makes the following comments on what is needed from Commonwealth legislation. These comments supplement the APF's Policy Statement on Data Breach Notifications, a copy of which is attached. Generally, the APF welcomes action by the Commonwealth to create formal obligations that will expose inadequate data security practices, and provide individuals with information about mishandling of their data. 1. The Costs to Regulated Entities Legislative proposals usually require regulatory impact information. Requirements to notify data breaches, including the refinements we propose, are not punitive, or even expensive. They should all be regarded as a normal cost of doing business. The costs of preventing breaches are in any case generally lower than the costs of handling them once they have occurred; and it is widely recognised that it is good business practice to proactively manage risks rather than to merely react when something goes wrong. Further, the prevalence of mal-performance by organisations in relation to the security of personal data is so great that all of these requirements are justified. APF s policy is that data breach notification requirements are warranted and are not unduly onerous. 2. The Title of the Legislation APF s view is that, to avoid confusion, a Bill should use the conventional term data breach notification, and hence the title of a Bill should be something like Privacy Amendment (Data Breach Notifications) Bill The APF Australia s leading public interest voice in the privacy arena since 1987
2 3. The Scope of Applicability of Data Breach Requirements Data breach notification obligations should not be limited to those organisations that are within the scope of the Privacy Act. This would be seriously inadequate. There is no justification for exempting from these provisions such organisations as small business enterprises, political parties, media organisations, and national security and law enforcement agencies. Nor is there any justification for exempting records that are exempt from the Privacy Act, such as data relating to employees. APF s policy is that any legislation must apply to all organisations and all personal data that are reasonably within reach of Commonwealth jurisdiction. 4. The Nature of the Harm Caused APF S view is that the potential harm which can trigger data breach notification requirements, and the harm which is compensable, should clearly be of the widest possible ambit, and it should be clear that it is not limited to any specified categories such as harm to reputation, economic harm and financial harm. For example, the following need to be included: serious inconvenience without financial or economic harm occurring; onerous effort needed to right a wrong; unreasonable denial of a loan;; emotional distress, and psychological harm. APF s policy is that it is essential that any law make clear that all forms of harm to individuals' interests must be taken into account. 5. The Trigger for Notification The APF s view is that the trigger for notification must not be set at too high a risk of harm, and that risk of harm should not be the only trigger for notification (at least to the OIAC). Aggregation of terms limiting the nature of the harm that triggers notification increases the risk that organizations will argue that one or other aggregated term do not apply to them. For example, a phrase such as "real risk of serious harm" is a very high threshold, because of the combination of 'real' (i.e. 'not remote') risk, 'serious' harm (with no clear notion of seriousness) and harm which may be given a limited definition (as discussed in 4. above). In addition, a second trigger is necessary. Any significant breach should be subject to notification in any case. If that were not the case, then a significant insecurity would not become apparent, and would not be addressed, and it would be very likely that it would later give rise to a serious breach that was eminently avoidable. A single threshold test would result in a scheme which was a failure. APF s policy is that a Bill should be based on either of two conditions being satisfied: (a) a real risk of harm without qualifications such as 'serious'; OR (b) a significant breach, whether or not real risk of harm has arisen. 2
3 6. Enforcement of Organisations' Security Responsibilities If legislation is based on requiring notification only in the case of some, very serious breaches, then, although we understand the desire to avoid undue costs to organisations, and to avoid undue load on the OAIC, this means that the provisions will only have a very limited impact on organisations that have inadequate security safeguards. Hence two complementary features are necessary, as stated in the next two sections. 6.1 Clear Statement of Organisations' Security Responsibilities In January 2013, APF submitted to OAIC, in relation to its revision of the Guide to Information Security, at that: (1) The OAIC's document needs to be revised to provide more direct guidance relating to the minimum safeguards that are required, together with references to documents that contain more detailed advice on specific security safeguards. (2) The OAIC's document needs to be revised to make very clear that privacy-sensitive personal information must be subject to additional safeguards, well beyond the minimum safeguards, that address risks that arise in the particular context. (3) The OAIC's document needs to be revised to project the following additional Key Messages, and provide supporting information: security safeguards are a mandatory requirement of the law, not optional; organisations that fail to implement the basic set of well-known safeguards for personal data are prima facie in breach of the Privacy Act, and are subject to enforcement actions; and organisations that handle privacy-sensitive personal information but fail to implement additional safeguards appropriate to the risks involved, are in breach of the Privacy Act, and are subject to enforcement actions. APF s policy is that Data Breach Notification legislation needs to be complemented by clear and specific instructions by OAIC to organisations in relation to their obligations. 6.2 Non-Compliance to be an Interference with Privacy Non-compliance with an obligation to notify needs to also be an 'interference with privacy', and to trigger the Commissioner's investigation and enforcement powers in the same way that other non- Principle breaches become actionable (e.g. of TFN Guidelines and credit rules). The policy justification for this simple change is that, if this is omitted, then legislation would not empower individual data subjects who have been adversely affected by failure to notify a serious data breach to initiate any remedial action. The proposed change would allow such individuals to lodge a complaint with the Commissioner concerning the non-compliance, and obtain any individual remedies to which they are entitled. Without such a provision legislation would be incomplete and insufficient in that it would rely completely on enforcement initiatives by the Commissioner, with no provision for individual data subjects to obtain a remedy. Such an approach is also necessary because non-compliance with data breach notification requirements would not necessarily be accompanied by any other breach of the APPs, so a data subject would not necessarily be able to make a complaint even though they have been very adversely affected by a failure to notify. This would not impose any additional compliance costs on regulated entities. APF s policy is that non-compliance with an obligation to notify needs to be an 'interference with privacy' and to trigger the Commissioner's investigation and enforcement powers. 3
4 7. Exceptions Privacy legislation in Australia generally contains excessive exceptions which harm its effectiveness. APF s policy in relation to any proposed exceptions is that: Any exemption should apply only to specific individuals; Exemptions should not apply to notification to the OAIC; Any organisation claiming exemption should be under an obligation to provide sufficient information to OAIC, or at the very least to a regulator such as the Inspector General of Security, in order to demonstrate compliance with exemption conditions; and Organisations should be under an obligation to notify as soon as the likelihood of prejudice that an exemption is aimed to prevent has expired. 8. Discretion for the OAIC APF s policy is that no discretions should be given to the OAIC in relation to the operation of a data breach notification system; and that, if any is given, then it should be minimal, and should: specify the precise circumstances in which it is available; and create an effective control over use of the discretion, such as publication of sufficient details that the public can evaluate the use of the provision. 9. Publication of Data Breach Notifications by the OAIC Some data breach notification schemes only require publications of notifications by the organisation concerned. The APF s view is that, whenever, publication of notification by an organisation is required, that notification should also be published on the website of the OAIC, and such notifications should be retained there permanently. The principal policy reasons for this policy are that: Unless this aggregation occurs, most notifications will (i) never come to public attention because they do not fall under subsections (h) above; and (ii) even if they are published on a organisation s website, they will not be findable permanently after the event nor findable in the one location; It is important that all notifications, over time, be able to be browsed and searched, so that interested parties (and not only the OAIC) can identify any recurrent aspects of breach notification; and Transparency in data breach notifications is also likely to have a deterrent effect, and this is desirable. The cost implications of compliance with this policy are negligible for organisations, because they would already be required to provide a copy of the notifications to be published to the Commissioner, and the cost of web republication by the Commissioner would be negligible. APF s policy is that all serious data breach notifications must be required by the Act to be published on the Commissioner's website and retained there permanently. 10. Sanctions APF s policy is that the new civil penalty provisions in the Privacy Act should b e applicable where there has been a serious or repeated non-compliance with mandatory notification requirements. This is essential to ensure that compliance is not merely voluntary. 4
5 The Australian Privacy Foundation Data Breach Notification POLICY Media Resources Campaigns About Us What Can I Do? Big Brother Contact Us APF Policy Statement on Data Breach Notification A data breach occurs when personal data is exposed to an unauthorised person. It is a breach of trust by the organisation. It is commonly also a breach of the law. Unfortunately breaches of data protection laws are seldom subject to enforcement actions. Data breaches occur remarkably frequently. Parliaments have failed to impose meaningful sanctions, and privacy oversight agencies have failed to exercise such powers and influence as they have to force organisations to ensure that appropriate security safeguards are in place. In 2003, the Californian legislature responded to inadequacies in organisational practices by passing a Security Breach Notification Law. By 2006, 33 other US States had passed similar laws. Australian law reform has moved at glacial pace, and lags the US in this matter by a decade. This document declares the APF's Policy on Data Breach Notification. It comprises the following sections: Definitions The Purposes of Data Breach Notification Organisations' Obligations in Relation to Data Security Organisations' Obligations in Relation to Data Breach Notification The Reponsibilities of the Oversight Agency Enforcement Definitions A Data Breach occurs where personal data held by an organisation has been subject to, or is reasonably likely to have been subject to, unauthorised access, disclosure, acquisition or loss. A Serious Data Breach is a Data Breach that gives rise to a reasonable risk of harm to an individual. A Data Breach Notification is a statement of the facts relating to a Data Breach. The purposes of Data Breach Notification are: The Purposes of Data Breach Notification to inform the public, at a meaningful level of detail, about: breaches inadequacies in organisations' security safeguards to inform individuals who have been affected by breaches, so that they can judge whether to: take action to prevent or mitigate potential harm arising from the breach seek compensation for harm caused change their service-providers to shame organisations that have seriously inadequate security safeguards into changing their ways to encourage all organisations to implement adequate security safeguards Data breach notification processes, guidelines and regulations need to be designed so as to achieve these purposes. 1 of 4 22/4/13 13:06
6 The Australian Privacy Foundation Organisations' Obligations in Relation to Data Security All organisations must ensure that personal data is at all times subject to security safeguards commensurate with the sensitivity of the data. The APF has previously published a Policy Statement on Information Security All organisations must take the steps appropriate in their particular circumstances to: deter Data Breaches prevent Data Breaches detect Data Breaches mitigate harm arising from Data Breaches; and enable their investigation All organisations must implement awareness, training and control measures to ensure appropriate practices by their staff All organisations must conduct audits of security safeguards periodically, and when the circumstances warrant All organisations must perform a Privacy Impact Assessment (PIA) when data systems are in the process of being created, and when such systems are being materially changed, in order to ensure that appropriate data protections are designed into their systems, and to demonstrate publicly that this is the case Organisations' Obligations in Relation to Data Breach Notification 1. Conduct of an Investigation Where grounds exist for suspecting that a Data Breach may have occurred, the organisation must conduct an investigation, in order to establish a sufficient understanding of the circumstances and the outcomes. The results of the investigation must be documented in a form that enables subsequent evaluation. 2. Submission of a Data Breach Notification Where a Data Breach has occurred, or is reasonably likely to have occurred, the organisation must: Submit a Data Breach Notification to the relevant oversight agency, in a manner consistent with the guidance issued by that oversight agency, as soon as practicable and without delay Communicate sufficient information to affected categories of individual, the media, and/or representative and advocacy agencies, as appropriate to the circumstances 3. Form of a Data Breach Notification A Data Breach Notification must include sufficient detail to enable the reader to achieve a proper understanding of the Data Breach, its causes, its scale, its consequences, mitigation measures, and the rights of individuals affected by it. Details whose publication might result in harm or facilitate attacks on that or other organisations can be included within a separate Appendix whose distribution can be limited. 4. Additional Obligations in the Case of a Serious Data Breach Where a Serious Data Breach has occurred, or is reasonably likely to have occurred, the organisation must, in addition: Provide an explanation, apology and advice to each individual whose data is, or is reasonably likely to be, the subject of the Data Breach, as soon as feasible and without delay, but taking into account the possible need for a brief delay in the event that criminal investigation activities require a breathing-space Publish an appropriate notice and explanation in a manner that facilitates discovery and access by people seeking the information Where material harm has occurred, provide appropriate restitution 2 of 4 22/4/13 13:06
7 The Australian Privacy Foundation 4. Inform the oversight agency of the actions taken The Reponsibilities of the Oversight Agency 1. Publish guidance in relation to data security safeguards. This must make clear that organisations have obligations to perform Security Risk Assessment, and to establish an Information Security Risk Management Plan whereby information security safeguards are implemented and maintained, commensurate with the sensitivity of the data 2. Publish guidance in relation to Data Breach Notifications 3. In relation to Data Breaches: Liaise with organisations that have suffered Data Breaches Facilitate the Submission of Data Breach Notifications Inform the Public Publish the Data Breach Notifications in a Public Register 4. In relation to Serious Data Breaches: Review the outcomes of the organisation's internal investigation Where doubt exists about the quality of the internal investigation, conduct its own independent investigation Publish the results of the review and/or investigation Add details of the investigation into the Public Register 5. Facilitate improvements in organisational practices relating to data security 6. Facilitate remedies for individuals who have suffered as a result of Data Breaches Enforcement All obligations in relation to Data Breach Notification must be subject to sanctions and enforcement. The sanctions applied must reflect: the organisation's degree of culpability, including: the extent to which the organisation had implemented safeguards commensurate with the sensitivity of the data the extent to which the threat(s) and vulnerability/ies that gave rise to the Data Breach were well-known or novel the promptness and effectiveness with which the organisation reacted once grounds existed for suspecting that a Data Breach may have occurred mitigation measures adopted by the organisation once it was apparent that a Data Breach had occurred, or was reasonably likely to have occurred any avoidance activities, misinformation or delays by the organisation in responding to the Data Breach and in its interactions with the oversight agency the scale of the Data Breach the sensitivity of the data that was the subject of the Data Breach the measures undertaken by the organisation in order to address the risk of recurrence of Data Breaches (as distinct from the organisation's statements about what it intends to do) to the extent that financial penalties are applied, the size of the organisation APF thanks its site-sponsor: This web-site is periodically mirrored by the Australian National Library's Pandora Archive 3 of 4 22/4/13 13:06
8 The Australian Privacy Foundation Created: 12 April Last Amended: 15 April 2013 by Roger Clarke - Site Last Verified: 11 January 2009 Australian Privacy Foundation Inc., Mail to Webmaster Site Map - This document is at - Privacy Policy 4 of 4 22/4/13 13:06
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department
Data Breach Notifications Submission by the Australian Communications Consumer Action Network to the Attorney General s Department November 2012 About ACCAN The Australian Communications Consumer Action
COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES
COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: [email protected] Website:
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
NATIONAL COMPLIANCE AND ENFORCEMENT POLICY
1. Introduction NATIONAL COMPLIANCE AND ENFORCEMENT POLICY The Commonwealth, state and territory governments have agreed to harmonised work health and safety laws to improve work health and safety, provide
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
Data breach notification guide: A guide to handling personal information security breaches
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
Data breach notification guide: A guide to handling personal information security breaches
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual
Daltrak Building Services Pty Ltd ABN: 44 069 781 933 Privacy Policy Manual Table Of Contents 1. Introduction Page 2 2. Australian Privacy Principles (APP s) Page 3 3. Kinds Of Personal Information That
Explanatory Paper TPB(EP) 03/2010
Explanatory Paper TPB(EP) 03/2010 Professional Indemnity Insurance This TPB explanatory paper (TPB(EP)) is intended as information only. It provides a detailed explanation of the Board s professional indemnity
Privacy fact sheet 17
Privacy fact sheet 17 Australian Privacy Principles January 2014 From 12 March 2014, the Australian Privacy Principles (APPs) will replace the National Privacy Principles Information Privacy Principles
Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement
Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement Regulation Impact Statement i Contents Background... 1 Australian Law Reform Commission Report on Privacy...
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760
Procedure Name: HITECH Breach Notification The ReHabilitation Center 1439 Buffalo Street. Olean. NY. 14760 Purpose To amend The ReHabilitation Center s HIPAA Policy and Procedure to include mandatory breach
Securing safe, clean drinking water for all
Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament
DELEGATED REGULATION (EU)
RTS 15: Draft regulatory technical standards on market making, market making agreements and marking making schemes COMMISSION DELEGATED REGULATION (EU) No /.. of [date] supplementing Directive 2014/65/EU
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms Background In calling for the culture of the NHS to become more open and honest, Robert Francis QC,
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES (MUNICIPAL POLICY) POLICY ENF-97.003 I. INTRODUCTION A. PURPOSE AND INTENT This policy sets forth how the Department of Environmental Protection (DEP)
Principles of Good Complaint Handling
Principles of Good Complaint Handling Principles of Good Complaint Handling Good complaint handling means: 1 Getting it right 2 Being customer focused 3 Being open and accountable 4 Acting fairly and proportionately
Civil Aviation Authority. Regulatory Enforcement Policy
Civil Aviation Authority Regulatory Enforcement Policy PAGE 2 REGULATORY ENFORCEMENT POLICY Civil Aviation Authority This policy is subject to a phased implementation process please therefore check applicability
Plumbing and Drainage Regulation 2012
Regulatory Impact Statement Subordinate Legislation Act 1989 Plumbing and Drainage Regulation 2012 A regulation under the Plumbing and Drainage Act 2011 April 2012 Enquiries to: NSW Fair Trading Policy
The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include:
ABN 47 001 768 190 AFSL 244526 Our Privacy Policy At Capital Insurance Brokers, we are committed to protecting your privacy in accordance with the Privacy Act 1988 (Cth) (Privacy Act) and the Australian
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
communications between us and your financial, legal or other adviser, or your broker or agent;
Privacy policy Updated: 25 June 2014 This Privacy Policy applies to information collected by 255 Finance Pty Ltd ABN 23 168 112 507 and its related bodies corporate ( 255 Finance or we ). This policy outlines
A guide to the water charge (infrastructure) rules: Tier 2 requirements
A guide to the water charge (infrastructure) rules: Tier 2 requirements June 2011 Australian Competition and Consumer Commission 23 Marcus Clarke Street, Canberra, Australian Capital Territory, 2601 Commonwealth
Submission on Professional Standards of Financial Advisers Bill 2015
Submission on Professional Standards of Financial Advisers Bill 2015 January 2016 About National Seniors Australia National Seniors Australia is a not-for-profit organisation that gives voice to issues
Code of Practice. for Inspecting and Certifying Buildings and Works. Building Control Regulations 2014
for Inspecting and Certifying Buildings and Works Building Control Regulations 2014 February, 2014 Table of Contents 1. Introduction 1 1.1 Status and Purpose of Code 1 1.2 Overview of Code 1 1.3 Application
Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner
Submission of the Office of the Data Protection Commissioner (DPC) on the data-sharing and Governance Bill: - Policy Proposals (dated the 1 st of August 2014) Public Consultation regarding Data Sharing
University of New England Compliance Management Framework and Procedures
University of New England Compliance Management Framework and Procedures Document data: Document type: Administering entity: Framework and Procedures Audit and Risk Directorate Records management system
Assist Members in developing their own national arrangements through being able to draw on and hence benefit from the experience of other members;
Introduction IFIAR is an organization of independent audit regulators (hereinafter, audit regulators ). The organization s primary aim is to enable its Members to share information regarding the audit
It is hereby notified that the President has assented to the following Act which is hereby published for general information:-
PRESIDENT'S OFFICE No. 967. 14 June 1996 NO. 29 OF 1996: MINE HEALTH AND SAFETY ACT, 1996. It is hereby notified that the President has assented to the following Act which is hereby published for general
COMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy
General Conditions of Business INET-CASH with Webmaster. (As of August 09, 2013)
1 General Conditions of Business with Webmaster (As of August 09, 2013) A. General Conditions of Business... 2 1. Contract partners, contractual object... 2 2. Relationship between the parties... 2 3.
Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002
Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002 Act No. 24 of 2002 Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002 TABLE OF PROVISIONS Section Page CHAPTER 1 PRELIMINARY PART 1 INTRODUCTION 1 Short
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS Content of principles I. ORGANISATION AND ORGANISATIONAL STRUCTURE 1. 1 The organisation of a supervised institution should enable meeting
Residential Tenancies and Rooming Accommodation Amendment Bill 2011
Residential Tenancies and Rooming Accommodation Amendment Bill 2011 Explanatory Notes Title of the Bill Residential Tenancies and Rooming Accommodation Amendment Bill 2011 (the Bill) Objectives of the
7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data
Akzo Nobel N.V. Executive Committee Rules 7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data Source Directive Content Owner Directive 7.08 Protection of Personal Data AkzoNobel Legal
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
Workers Compensation Mandatory Attorney Fees
STATE OF NEW JERSEY NEW JERSEY LAW REVISION COMMISSION Draft Tentative Report Relating to November 7, 2011 This draft tentative report is distributed to advise interested persons of the Commission's tentative
Anti-bullying jurisdiction
Anti-bullying jurisdiction Summary of the case management model For implementation from 1 January 2014 1 Overview 1.1 Purpose 1. This paper summarises the procedures and associated functions to be adopted
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Quality Assurance and Safeguards Working Arrangements for the Launch of the NDIS in Victoria
Quality Assurance and Safeguards Working Arrangements for the Launch of the NDIS in Victoria As agreed between the Commonwealth of Australia and Victoria As at 6 May 2013 1 Contents 1. Background... 3
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
Privacy business resource 3
Privacy business resource 3 June 2013 Credit reporting what has changed As part of the reforms to the Privacy Act 1988 (Privacy Act), credit reporting in Australia is regulated by a new Part IIIA. 1 The
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
Community Housing Providers (Adoption of National Law) Bill 2012
Passed by both Houses [] New South Wales Community Housing Providers (Adoption of National Law) Bill 2012 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Objects of Act 2 4 Definitions
IC 4-22-2 Chapter 2. Adoption of Administrative Rules
IC 4-22-2 Chapter 2. Adoption of Administrative Rules IC 4-22-2-0.1 Application of certain amendments to chapter Sec. 0.1. The amendments made to this chapter by P.L.44-1995 apply as follows: (1) The amendments
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy The success of the University is dependent on its most important resource, its staff. It is therefore vital that all employees are encouraged to work to the best
PERSONAL INJURIES PROCEEDINGS BILL 2002
1 PERSONAL INJURIES PROCEEDINGS BILL 2002 EXPLANATORY NOTES General Outline Purpose of legislation The main purpose of this Act is to facilitate the ongoing affordability of insurance through appropriate
E-PRIVACY DIRECTIVE: Personal Data Breach Notification
E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou [email protected] Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification
Disclosure is the action of making new or secret information known.
/PURPOSE OF POLICY Pty Limited (Momentum) is required and committed to comply with the Australian Privacy Principles (APPs) in the Privacy Act 1998 (Cth) (Privacy Act). The APPs regulate the manner in
Motor Accidents Compensation Amendment (Claims and Dispute Resolution) Act 2007 No 95
New South Wales Motor Accidents Compensation Amendment (Claims and Dispute Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of Motor Accidents Compensation Act 1999 No 41 2 4 Amendment of other
Zinc Recruitment Pty Ltd Privacy Policy
1. Introduction Zinc Recruitment Pty Ltd Privacy Policy We manage personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles. This policy applies to information collected
1.4 For information about our management of your other personal information, please see our Privacy Policy available at www.iba.gov.au.
Indigenous Business Australia Credit Information Policy 1 Purpose and application of this policy 1.1 This credit reporting policy (Credit Information Policy) describes and establishes how Indigenous Business
Providing remedies. Fact Sheet 3. Remedies for the individual. November 2008. Expectations and obligations. Individual issues and systemic problems
Fact Sheet 3 November 2008 The Australian community has the right to expect a high standard of administration by Australian Government agencies. People expect agencies to act legally, fairly, in a timely
KEY ADVOCACY POINTS #1: ESTABLISH SPECIFIC AND CONSISTENT NETWORK ADEQUACY STANDARDS
NAIC MANAGED CARE NETWORK ADEQUACY MODEL ACT REVISION KEY ADVOCACY POINTS PAI urges the National Association of Insurance Commissioners (NAIC) to consider the following advocacy points as it works to revise
PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013
1.0 Summary of Changes Amendments to the 1 st bullet point of section 4.5 and the 3 rd, 4 th, 6 th and 7 th bullet point in section 4.8 have been made. Section 4.9 has been removed as the content is now
Bills Digest No. 56 2001 02
Department of the Parliamentary Library I NFORMATION AND R ESEARCH S ERVICES Bills Digest No. 56 2001 02 Health and Other Services (Compensation) Legislation Amendment Bill 2001 ISSN 1328-8091 Copyright
ATO Submission Inquiry into penalties for white collar crime
ATO Submission Inquiry into penalties for white collar crime Senate Economics References Committee 1 April 2016 EXTERNAL UNCLASSIFIED Table of Contents Introduction... 3 Executive summary... 3 The scope
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
Guidelines on endorsement as a nurse practitioner
Guidelines on endorsement as a nurse practitioner 7160 Introduction The National Registration and Accreditation Scheme (the National Scheme) for health professionals in Australia commenced on 1 July 2010
2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Finance Platforms) Regulations 2015
Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 5 of the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S T R
ASSEMBLY BILL No. 597
AMENDED IN ASSEMBLY APRIL 14, 2015 california legislature 2015 16 regular session ASSEMBLY BILL No. 597 Introduced by Assembly Member Cooley February 24, 2015 An act to amend Sections 36 and 877 of, and
ACTION: Direct final rule with request for comments. SUMMARY: Defense Logistics Agency (DLA) is exempting records
1 This document is scheduled to be published in the Federal Register on 07/09/2015 and available online at http://federalregister.gov/a/2015-16575, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF
12 May 2014. Professor Barbara McDonald Commissioner Australian Law Reform Commission GPO Box 3708 Sydney NSW 2001. By Email to: [email protected].
12 May 2014 Geoff Bowyer T 03 9607 9497 F 03 9607 5270 [email protected] Professor Barbara McDonald Commissioner Australian Law Reform Commission GPO Box 3708 Sydney NSW 2001 By Email to: [email protected]
NATIONAL INSURANCE BROKERS ASSOCIATION OF AUSTRALIA (NIBA) Submission to WorkCover Western Australia. Legislative Review 2013
NATIONAL INSURANCE BROKERS ASSOCIATION OF AUSTRALIA (NIBA) ABOUT NIBA Submission to WorkCover Western Australia Legislative Review 2013 February 2014 NIBA is the peak body of the insurance broking profession
