A board of directors plays a critical role in shaping a company’s strategy, maintaining relationships with shareholders, and safeguarding the company’s reputation. Appointing a new director may bring welcome...
Chloe Silvester , Head of General Practice, Practical Guidance Stephen Tuck , Legal Writer, Practical Guidance Personal Injury Victoria Ben Newling , Legal Writer, Practical Guidance Personal Injury NSW...
Jennifer Raphael , Senior Legal Writer, Practical Guidance Construction, LexisNexis ® In 2024, several pivotal decisions were made across New South Wales, Victoria, and Queensland concerning Security...
Jennifer Raphael , Senior Legal Writer, Practical Guidance Construction, LexisNexis ® In the ever-evolving landscape of construction law, 2025 promises to be a pivotal year for legal practitioners...
Jada Lam , Practical Guidance Legal Writer – Employment and WHS The Fair Work Act 2009 has been updated with the 'Employee Choice Pathway,' offering new rights for casual employees. Read on for essential...
Privacy by design is a practical framework that aims to “embed” privacy into the design and architecture of information systems, business processes and networked infrastructure. It aims to ensure that privacy is considered before, at the start of, and throughout the development and implementation of initiatives, projects and products and services that involve the collection and handling of personal information.
What are the benefits of implementing a privacy by design approach?
Privacy by design is a “best practice” approach to privacy governance and an essential tool for moving towards “data resilience”.
Implementing a robust privacy by design approach is a practical way to ensure compliance with key Australian Privacy Principles (APPs), however, it will also effectively help mitigate cybersecurity risks including to minimise the impact of a cybersecurity incident and allow your client or business to (potentially) continue to operate effectively during a cybersecurity event.
The Australian Government Agencies Privacy Code (the Code) was registered on 27 October 2017 and commenced on 1 July 2018. The Code sets out specific requirements and key practical steps that Australian Government agencies must take as part of complying with Australian Privacy Principle 1.2.
The Code requires agencies to move towards a best practice approach to privacy governance to help build a consistent, high standard of personal information management across all Australian Government agencies.
Seven key principles of privacy by design
There are seven internationally recognised foundational principles of privacy by design. These should be considered in all business projects and decisions that involve personal information:
Below are some basic steps you can take to ensure that your organisation or client is taking a privacy by design approach:
What are reasonable steps to protecting personal information held?
APP 11.1 states that an APP entity that holds personal information must take reasonable steps to protect the information from misuse, interference and loss, as well as unauthorised access, modification or disclosure. What constitutes “reasonable” steps will depend on the circumstances of collection and factors such as the amount and sensitivity of the personal information held and the possible adverse consequences for an individual in the case of a breach.
However, the Office of the Australian Information Commissioner has published the Guide to securing personal information which includes detailed information regarding what could constitute “reasonable steps”. While the Guide to securing personal information is not legally binding, it is very prescriptive. Accordingly, if an APP entity has in place the measures described in the Guide to securing personal information, it would help in ensuring compliance with APP 11.1 if it were ever under investigation.
Appropriate security measures for protecting personal information need to be considered in regard to all of your entity’s acts and practices. Taking a whole of business collaborative approach and adopting a “privacy by design” approach is essential with clear procedures for oversight, accountability and lines of authority for decisions regarding personal information security established.
To read the full guidance notes ‘Understanding personal data’ and ‘Securing personal information across the information life cycle’, subscribe to Practical Guidance Cybersecurity, Data Protection & Privacy module.