LexisNexis Practical Guidance®

Straightforward guidance across a range of topics

Overview

  • Privacy by design

  • Planning and implementing new projects

  • Engaging in direct marketing

  • Using cookies and other emerging forms of online behavioural advertising

Whether it is customer lists, customer preferences, patient medical records or customer financials, personal information and data are the all-important “DNA” of many organisations.

As data volumes increase at an exponential rate and the landscape becomes increasingly complex with the use of the third-party service providers, cloud enabled technology, personal profiling, sophisticated analytics and multijurisdictional data flows, tackling questions regarding privacy can be daunting.

Certain organisations are required to comply (APP entities) with the Privacy Act 1988 (Cth). Key obligations include that such organisations:

Privacy by design is a “whole of business” approach which provides a practical framework for dealing with privacy. It aims to ensure that privacy is considered before, at the start of, and throughout the development and implementation of initiatives, projects, and products or services that involve the collection and handling of personal information.

The concept of privacy by design is not new. However, the requirement for APP entities to take reasonable steps to implement practices, procedures and systems that will ensure they comply with the APPs effectively enshrines in Australian law the principle of “privacy by design”.

The concept of privacy by design is also enshrined in the new European Union (EU) General Data Protection Regulation (GDPR). If these laws apply to your organisation, you will also be required to take privacy by design approach to compliance. You can read more about the GDPR here as well as our Practical Guidance on the GDPR available here.

In addition, in the context of the mandatory data breach notification scheme which requires an “eligible data breach” to be notified to the Information Commissioner and affected individuals, a privacy by design approach is an essential risk mitigation strategy for organisations to implement. See Identifying whether the data breach notification regime applies to you.

Whether your client or organisation is launching an online payment system, transitioning to a cloud service provider or activating a marketing campaign, privacy by design demands that you consider privacy at the forefront, and not merely as an afterthought.

In this subtopic you will learn:

This subtopic will be useful for in-house and external advisers:

  • wanting to obtain an understanding of the relationship between privacy, cybersecurity and what is meant by “cyber or data resilience”;
  • advising on general privacy issues of an organisation and whether they satisfy the openness and transparency requirements of APP 1;
  • applying a privacy by design approach to initiatives, projects, products or services that involve the collection and handling of personal information; and
  • advising on what constitutes “reasonable steps” for the purpose of APP 11 .

In order to mitigate the risk of privacy issues, cyber security threats and achieve data resilience, it is important to take a proactive approach to privacy.

This means thinking critically about privacy during the planning and implementation stages of a project. As discussed in Implementing a privacy by design approach, privacy by design is essential to proactive management of privacy issues.

Conducting a privacy impact assessment

A privacy impact assessment (PIA) is an essential part of implementing new projects in order to achieve privacy by design.

A PIA is a systematic evaluation of a project that identifies the impact that the project might have on the privacy of individuals, and sets out recommendations for managing, minimising or eliminating that impact.

See Conducting a privacy impact assessment.

Obtaining consent to collect personal information

For any new project where personal information is collected, it is vital to consider the issue of consent. Consent is relevant to the operation of a number of Australian Privacy Principles (APPs). In some APPs, consent is an exception to a general prohibition against personal information being handled in a particular way (for example, an APP entity can only collect “sensitive information” if an individual consents, unless an exception applies. In others, consent provides authority to handle personal information in a particular way (for example, sensitive information cannot be used for marketing with out express consent and obtaining express consent after disclosure that the relevant information will not be protected by APP1 allows disclosure of personal information overseas).

The Information Commissioner has made clear that consent is a particular regulatory focus. She has stated publicly that “The practical application of concepts of fairness and the role of consent will be central to the future of privacy in Australia. It is a key issue that unites my regulatory priorities and, accordingly, I also think it should be a key focus point for every organisation moving forward.”

Given these statements, consent, when relied on as a basis for complying with the Privacy Act needs to be carefully considered by organizations.

Separately, once an APP entity collects personal information from an individual, APP 5 — Notification of the collection of personal information requires that the individual be notified of certain mandatory issues.

See Obtaining consent to collect personal information.

In this subtopic, you will learn:

This subtopic will be useful for in-house and external practitioners:

  • wanting to understand what a PIA is;
  • who are required to conduct and/or draft a PIA;
  • who are required to provide advice on privacy issues for new projects or changes within an organisation;
  • who need to assess issues regarding consent; and
  • who need to draft a collect statement which complies with APP 5 — Notification of the collection of personal information in respect of collecting personal information from individuals.

At the most basic level, direct marketing involves the use of personal information to promote goods and services.

Direct marketing can occur via many different channels and take on many different forms, from:

  • sophisticated targeted online campaigns;
  • promoting a new product range via electronic message; or
  • soliciting customer feedback (and gently spruiking a new service) via phone to good old-fashioned snail mail.

Whether you are advising a client on the launch of a new product range, or the organisation you work for is rolling out a global client feedback survey with an option to upgrade to the latest software service package, direct marketing is likely to be an issue you are going to have to tackle at some point.

The direct marketing landscape provided for under APP 7 — Direct marketing is very customer/consumer-focused. In fact, direct marketing is prohibited, unless an exception applies.

In addition, direct marketing has become more complex due to the engagement of third parties to execute direct marketing campaigns or facilitate back-end technical support (eg cloud-based solutions for an SMS marketing campaign).

In any case, engaging third party providers and entrusting them, in many cases, with your most valuable data (your customer or client lists) increases the cyber security risks. There is an increased risk of misuse, interference and loss, as well as unauthorised access, modification or disclosure of such personal information.

In addition, even if you do engage in direct marketing, the customer/consumer focus of APP 7 — Direct marketing has strict mandatory opt-out provisions.

If you breach APP 7 — Direct marketing because you have engaged in direct marketing when you did not have the right to, or you failed to include mandatory opt-outs or failed to implement an opt-out, not only could you be in breach of Australian privacy laws, but the risk of reputational damage and loss of customer base is significant.

In this subtopic you will learn:

Today, organisations have access to more data than ever before. “Big data” is the new normal as organisations collect data across a broad range of channels such as apps, email, and web browsing. That data is then harnessed to provide valuable business insight.

Identifying the form(s) of online behavioural advertising

Online behavioural advertising describes a wide range of activities companies engage in to collect information about users’ online activity (such as webpages visited, links clicked and online transaction history) which is subsequently used to show more tailored or relevant content and advertisements.

See Identifying the form(s) of online behavioural advertising.

Deciding what types of personal information are used

Sometimes the data collected is not personal information in the traditional sense (such as your name, phone and contact details), but rather generic information linked to an online identifier which is used to collect information unique to you (if you log-in), your browser (if you accept cookies) or to your devices (where device ID is tracked) then used to make inferences based on online activity (such as your age group and potential interests).

See Deciding what types of personal information are used.

Cookies, online behavioural advertising, aggregate data and complying with the Privacy Act

Vast amounts of data can be collected and stored and information from various sources aggregated together to provide a picture of a person, their behaviour and their preferences. Where descriptive and/or predictive data is associated with a persistent identifier that relates to a unique individual, the individual is identified and the information is “personal information” and regulated by the Privacy Act 1988 (Cth).

See Cookies, online behavioural advertising, aggregate data and complying with the Privacy Act.

In this subtopic, you will learn about:

  • different forms of online behavioural advertising;
  • how to determine if personal information is being collected;
  • what to do if personal information is being collected; and
  • risks associated with trying to aggregate and de-identify personal information for data analytics.

Guidance

Show All Guidance

Checklists

  • Cybersecurity strategy — Checklist for remote working

    LexisNexis Legal Writer Team
  • EU general data protection regulation (GDPR) — Checklist for controller versus processor

    S. Sharma, Special Counsel and B. Tomlinson, Partner, Maddocks
  • Data security — Checklist for Disaster recovery planning

    A. Mitchell, Unisys
  • Data security — Checklist for Data security audit plan

    A. Mitchell, Unisys
  • Data security — Checklist for De-identification of personal information

    A. Mitchell, Unisys
  • Privacy — Checklist for Privacy policy

    S. Sharma, Special Counsel, Maddocks
  • Privacy — Internal privacy guidelines for staff

    S. Sharma, Special Counsel, Maddocks
  • Workflow Checklist: Assessing a suspected data breach

    D. Kneller, Madgwicks Lawyers
  • Checklist for Transfers of personal data outside the European Economic Area

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for Complying with both the Privacy Act and the GDPR

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for computer and device use

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Content of notification

    D. Kneller, Madgwicks Lawyers
  • Cybersecurity strategy — Checklist for Overall cybersecurity strategy

    P. Fair and S. Lee, Baker McKenzie
  • Data Breach Assessment Guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Data breach response guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Ensuring data protection compliance

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Exceptions to notification obligations

    D. Kneller, Madgwicks Lawyers
  • EU General Data Protection Regulation (GDPR) — Compliance checklist

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Workflow Checklist: Identifying when a data breach is notifiable

    D. Kneller, Madgwicks Lawyers
  • Threshold compliance checklist — GDPR and the Privacy Act

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Privacy by design — practical checklist

    S. Sharma, Maddocks
  • Privacy — Checklist for direct marketing

    S. Sharma and E. Lau, Maddocks
  • Checklist for Staff training on data protection compliance

    P. Fair and S. Lee, Baker McKenzie

Legislation

Forms & Precedents

Implementing a privacy by design approach

Securing personal information across the information life cycle

Identifying the form(s) of online behavioural advertising

Latest Legal Updates

18 May 2020

No right to not hire or force staff to sign up to COVIDSafe app

18 May 2020

Cybercrime Squad detectives charge woman over unlawful digital currency exchange

15 May 2020

COVIDSafe privacy safeguards become law

14 May 2020

UK Supreme Court’s decision on vicarious liability for employee’s data breach highlights importance of robust organisational privacy policy, security and training for remote workers

07 May 2020

Privacy Awareness Week — Tips on staying secure from the Australian Information Commissioner and the Office of the Privacy Commissioner of Canada

06 May 2020

COVIDSafe draft legislation released

30 Apr 2020

Privacy class action representative complaint for Optus data breach made to the Australian Information Commissioner

28 Apr 2020

OAIC supports privacy protections in COVIDSafe contact tracing App

22 Apr 2020

ACSC warns cyber scams mount during COVID-19 crisis

16 Apr 2020

The Office of the Australian Information Commissioner reiterates importance of conducting Privacy Impact Assessments to assess privacy risks with remote working arrangements during COVID-19 pandemic

02 Apr 2020

Ongoing threat of COVID-19-related online scams and increased risk of notifiable data breaches

26 Mar 2020

Australian Signals Directorate issues cyber security warning for remote working in response to COVID-19

26 Mar 2020

Office of the Information Commissioner publishes guidance on privacy obligations during the COVID-19 pandemic

16 Mar 2020

Australian Information Commissioner brings action against Facebook for contravention of the Privacy Act

19 Feb 2020

Do you have access to Victorian Government information? Are you aware of the revised protective data security standards?

13 Feb 2020

Beneficial changes to credit reporting come into effect

12 Feb 2020

Optus pays largest infringement notice issued under the Spam Act for unwanted marketing messages

30 Jan 2020

Privacy (Australian Bushfires Disaster) Emergency Declaration (No. 1) 2020 enhances information-sharing about individuals affected by the Australian bushfires

09 Jan 2020

Pioneering Australian class action lawsuit for alleged breach of privacy settles

25 Nov 2019

All organistions should consider cybersupply risk management as part of their overall cyber strategy

18 Nov 2019

UK and US governments sign historic data-sharing agreement to speed up criminal investigations and prosecutions

27 Sep 2019

Consumer Data Right scheme introduces data portability for consumers

25 Sep 2019

Notifiable Data Breaches on the rise again — human error accounts for large proportion of breaches

01 Jul 2019

Watch our for these top 12 scam email subject lines

24 Jun 2019

ACSC’s Six Day Easy Step Guide to protect yourself from cyber criminals

17 Jun 2019

Has your personal information been lost, released or accessed without your permission? What steps can you take now

13 Jun 2019

New phone scam — scammers impersonating ACSC and seeking help to act against cybercriminals

08 Feb 2019

Notifiable Data Breaches Quarterly Report (October – December 2018)

28 Jan 2019

Human Rights Watch looks into Australia’s surveillance and cybersecurity practices

25 Jan 2019

Key cybersecurity trends businesses should know in 2019

14 Jan 2019

2019’s first data breach took less than 24 hours

09 Jan 2019

My Health Record reported 42 data breaches in 2018

17 Dec 2018

Australian Government Information Security Manual updated

13 Dec 2018

Encryption bill becomes law

10 Dec 2018

Federal government releases new cybersecurity reports

06 Dec 2018

Australian Parliament passes legislation to strengthen My Health Record privacy

26 Nov 2018

My Health Record opt-out period has been extended to 31 January 2019

23 Nov 2018

Preventing data breaches should be business as usual

12 Nov 2018

The Assistance and Access Bill 2018

08 Nov 2018

Milestones for privacy and information access in 2017–18

30 Oct 2018

Facebook security breach investigated by OAIC

22 Oct 2018

Digitised crime reporting via cloud

08 Oct 2018

Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 (Cth)

02 Oct 2018

Telecommunications executives liable for misleading advertisements

24 Sep 2018

Unveiling of cybersecurity strategy

19 Sep 2018

Hacker convention on cyber-attack simulation

12 Sep 2018

Treasury Laws Amendment (Consumer Data Right) Bill 2018 (Cth)

12 Sep 2018

My Health Records Amendment (Strengthening Privacy) Bill 2018 (Cth)

03 Sep 2018

Cybersecurity strategy — Tech giants face $10m fines in new cyber security laws

28 Aug 2018

Cybersecurity strategy — Decryption laws edge closer to reality

20 Aug 2018

Mandatory data breach notification — Notifiable data breaches second quarterly report released

13 Aug 2018

Cyber security is being tightened at Australian airports after an identity card data hack

06 Aug 2018

Watch out for fake myGov tax refund email

30 Jul 2018

Timehop data breach impacts 21 million users

17 Jul 2018

My Health Record opt-out period begins, but privacy concerns remain

10 Jul 2018

Privacy by design — Aussie businesses look to get ahead of GDPR privacy requirements

10 Jul 2018

Privacy by design — Privacy business resource 21: Australian businesses and the EU General Data Protection Regulation

06 Jul 2018

Threat and kidnap scams targeting Chinese community

25 Jun 2018

Data security obligations and data security breaches — ASD confirms new cyber manual

19 Jun 2018

Service providers, security and data breach notification — ACSC working with PageUp People on security incident

11 Jun 2018

General Data Protection Regulation guidance for Australian businesses

05 Jun 2018

General Data Protection Regulation commences 25 May 2018

29 May 2018

Cybersecurity strategy — Pacific Cyber Security Operational Network

24 May 2018

Data security — Stop and check: is this for real? — Scams Awareness Week 2018

11 May 2018

Privacy — Privacy Awareness Week 2018 website launched

27 Apr 2018

Mandatory data breach notification — Global shipping company Svitzer announces first data breach under Australian Data Breach Notification Laws

18 Apr 2018

Data security — Scam calls claiming to be from ACSC

22 Feb 2018

The data breach notification regime — Guide to data breach preparation and response released

22 Feb 2018

Anti-piracy website-blocking regime under review

12 Jan 2018

The data breach notification regime — Small business cybersecurity guide released

07 Dec 2017

The data breach notification regime — What the Notifiable Data Breaches scheme means for schools

29 Nov 2017

Data security obligations and data security breaches — Updated 2017 ISM Controls

23 Nov 2017

ACSC: Threat Report 2017

06 Nov 2017

Understanding the relationship between privacy, cybersecurity and data resilience — Australian government agencies Privacy Code

02 Nov 2017

Australian data protection strategy — Reports 467 — Cybersecurity compliance — Inquiry based on Auditor-General’s report 42 (2016–17)

26 Oct 2017

Privacy by design — Australians continue to exercise choice and control over their personal information — OAIC Annual Report 2016–17 released

18 Oct 2017

The data breach notification regime — Guide to mandatory data breach notification in the My Health Record system

09 Oct 2017

Australian data protection strategy — Government to push for expansion of biometric surveillance — Seeks to have states hand over driver’s licence photos

06 Oct 2017

Personal data security breach management — New guide paves way for better data privacy management

06 Oct 2017

The data breach notification regime — New notifiable data breaches scheme resources released