SlideShare una empresa de Scribd logo
1 de 30
Taking Responsibility Update January 2008
Taking Responsibility program OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities that govern how we work Underpinning this is Risk management framework ! What price is non-compliance ? ,[object Object],Environmental ,[object Object],Code of Conduct ,[object Object],Information Security ,[object Object],[object Object],Records Management & FOI ,[object Object],[object Object],Privacy
What is privacy? ‘ Personal information’ & ‘health information’ ‘ Health information’ ‘ Personal information’ Cth & ACT public sector & some private sector orgs Vic public & private sectors Vic public sector Federal Privacy Commissioner Health Services Commissioner, Vic Privacy Commissioner, Vic NPPs & IPPs Privacy Act 1988  (Cth) 11 Health Privacy Principles (HPPs) Health Records  Act   2001  (Vic) (HRA)  10 Information Privacy Principles (IPPs) Information Privacy  Act   2000  (Vic) (IPA)
Privacy – Key definitions Is a photo personal information? Are details of a person’s position and salary recorded on their personnel file? Includes information about a person’s race or ethnicity and criminal record. Sensitive information  Information able to be linked to a living or deceased person about a person’s physical, mental or psychological health. Health information   Recorded information about a living identifiable or easily identifiable individual. Personal information
‘ Privacy Statement’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collection, use & disclosure ,[object Object],[object Object],[object Object],[object Object],[object Object],Law requires the disclosure; you  must  disclose. Law requires the usage; you  must  use the information that way. Law requires the collection; you  must  collect. Disclosure Use  Collection Law permits the disclosure; you  may  disclose. Law permits the usage; you  may  use the information that way. Law permits the collection; you  may  collect. Law prohibits the disclosure; you  cannot  disclose. Law prohibits the collection; you  cannot  collect. Law prohibits the usage; you  cannot  use the information that way.
Does This Look Familiar?
[object Object],[object Object],What is a Record?
Activity 1  What is a record?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risk of Poor Recordkeeping
[object Object],[object Object],[object Object],[object Object],[object Object],Tips and Hints   Document type – Subject/Document Title – Version – Date  Ministerial Briefing – Privacy Breach Mr Big – 20 August 2007
Activity 4 Whole Group Case Study  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And remember what FoI mean to you as an employee? ,[object Object],[object Object],[object Object]
What is information security ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips for keeping information secure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips for keeping information secure (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
what is the code of conduct? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
what to do next ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bottom line ,[object Object],[object Object],[object Object],[object Object]
Environmental Management System (EMS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Aims of environmental action plans ,[object Object],[object Object],[object Object]
Implementation phases of  the program Risk Monitoring & Compliance Awareness & Education Policies & Procedures
Watch out for our posters ,[object Object],Primary Poster
Launch of Revised website
Launch of TR Memory Game
Taking Responsibility Ideas Board
Coloured balloon activity Scoping Audit Survey Due Feb 18
February Environment Month
For more information ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
LinkedIn - Panel Discussion 2012
LinkedIn - Panel Discussion 2012LinkedIn - Panel Discussion 2012
LinkedIn - Panel Discussion 2012Spiwe L.A. Pierce
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
How Insurance Companies Increase Profits Using eFileCabinet Document Management
How Insurance Companies Increase Profits Using eFileCabinet Document ManagementHow Insurance Companies Increase Profits Using eFileCabinet Document Management
How Insurance Companies Increase Profits Using eFileCabinet Document ManagementeFileCabinet
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsEthisphere
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Onlinebwiredgroup
 

La actualidad más candente (8)

Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
LinkedIn - Panel Discussion 2012
LinkedIn - Panel Discussion 2012LinkedIn - Panel Discussion 2012
LinkedIn - Panel Discussion 2012
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
How Insurance Companies Increase Profits Using eFileCabinet Document Management
How Insurance Companies Increase Profits Using eFileCabinet Document ManagementHow Insurance Companies Increase Profits Using eFileCabinet Document Management
How Insurance Companies Increase Profits Using eFileCabinet Document Management
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data Threats
 
Duty of Care Online
Duty of Care OnlineDuty of Care Online
Duty of Care Online
 

Similar a Frankston

Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramMSpadea
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Patrick Doyle
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02tinkusing
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Investigative Team
Investigative TeamInvestigative Team
Investigative TeamCTIN
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceFintan Swanton
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leadersDeeson
 

Similar a Frankston (20)

Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leaders
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Frankston

  • 2.
  • 3.
  • 4. What is privacy? ‘ Personal information’ & ‘health information’ ‘ Health information’ ‘ Personal information’ Cth & ACT public sector & some private sector orgs Vic public & private sectors Vic public sector Federal Privacy Commissioner Health Services Commissioner, Vic Privacy Commissioner, Vic NPPs & IPPs Privacy Act 1988 (Cth) 11 Health Privacy Principles (HPPs) Health Records Act 2001 (Vic) (HRA) 10 Information Privacy Principles (IPPs) Information Privacy Act 2000 (Vic) (IPA)
  • 5. Privacy – Key definitions Is a photo personal information? Are details of a person’s position and salary recorded on their personnel file? Includes information about a person’s race or ethnicity and criminal record. Sensitive information Information able to be linked to a living or deceased person about a person’s physical, mental or psychological health. Health information Recorded information about a living identifiable or easily identifiable individual. Personal information
  • 6.
  • 7.
  • 8. Does This Look Familiar?
  • 9.
  • 10. Activity 1 What is a record?
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Implementation phases of the program Risk Monitoring & Compliance Awareness & Education Policies & Procedures
  • 24.
  • 25. Launch of Revised website
  • 26. Launch of TR Memory Game
  • 28. Coloured balloon activity Scoping Audit Survey Due Feb 18
  • 30.

Notas del editor

  1. The Taking Responsibility program is about providing all staff with the tools, training and resources to ensure the department fulfils all of its obligations. Taking responsibility is what we do when we adopt good records management practices and why we ensure sensitive information is handled in a sensitive manner. It is about asking for advice if unsure, so we can all adopt stringent but practical regimes. The program aims to maintain and grow awareness of the key obligations that each staff member has in their day-to-day work. The Program is about supporting you with tools, training, promotional materials and resources to ensure all staff know how to perform their roles and meet all of their obligations on an ongoing daily basis. Some of those obligations include adhering to the VPS Code of Conduct, privacy and freedom of information laws, information security requirements, records management practices and risk and environmental management. The program takes a pro-active approach to compliance through cooperation and coordination and, only where necessary, through intervention. The program emphasises three broad activities. These are: prevention – through policies, procedures, general awareness activities and learning and development tailored intervention – through self assessment tools, monitoring of activities, issues management and feedback treatment and control – through investigations, complaints handling, disciplinary procedures and auditing.
  2. While there are several obligations you need to be mindful of as an employee, responsibilities which are pivotal to the Taking Responsibility program are: Privacy & FOI Records Management Information Security Code of Conduct Environment As a group they form the mnemonic – PRICE. The cost of non- compliance can be “price”-less, whereby breaches exact a heavy “price” on both individuals and the department. What price would you personally put on non-compliance?
  3. The Victorian Information Privacy Act covers personal information, other than health related personal information, held by Victorian public sector organisations. This is the legislation that will be focussed on in this session. The Information Privacy Act came into effect on 1 September 2001. It established the Office of the Victorian Privacy Commissioner which is an independent statutory office along the lines of the Ombudsman or Auditor-General. The Privacy Commissioner, Paul Chadwick, took up a five year appointment in July 2001 which finishes this year. The Privacy Commissioner can receive complaints about perceived breaches of privacy by public sector organisations which took place after 1 September 2002. Each of the two acts contain Privacy Principles which guide how personal information should be handled – these are very similar across the two pieces of legislation.. Most Victorian public sector organisations will be subject to more than one privacy law. For example, many will hold some health related personal information about employees making the organisation subject to both the Information Privacy Act and the Health Records Act .
  4. Under the Victorian Information Privacy Act , personal information is any information or opinion, whether true or not, about an individual whose identity is apparent or can reasonably be ascertained. Information can still be identifying even if it does not include a person’s name. For example an address in today’s age of reverse telephone directories may be personal information. Most public sector organisations hold personal information about members of the public and also about their employees. The Health Records Act defines health information as information able to be linked to a living or deceased person about a person's physical, mental or psychological health. It includes disability related information. Sensitive information includes information about a person’s race, ethnicity and criminal record.
  5. Always assume that whatever you write on a file could be accessed under FoI It is imperative that files are well maintained You should always attach documents in TRIM and to the relevant file (including e-mails) so that they can readily be discovered Information and decisions recorded in TRIM and on files needs to be factual, soundly based, objective and reached in an appropriate manner
  6. The code of conduct is binding and describes the behaviours expected of us as public sector employees. It may be supplemented by other information. Check with your manager or HR to see what other guidelines apply to your work. You might like to mention those that apply in your organisation. The behaviours described in the code are so important to our work that acting otherwise could be regarded as misconduct.
  7. Today was an introduction to the code of conduct, the Victorian public sector values and the behaviours that support them. There are lots of ways you can put the code into practice. Here are some. Can you suggest other ways?
  8. The Taking Responsibility Program consists of four distinct phases: Risk, Awareness & Education, Monitoring & Compliance, & Policies & Procedures. Under each of these headings a number of activities have, or will be occurring. It is important to bear in mind that all of these phases are just as important as each other. All parts of the program need to be ongoing and kept active. Briefly, there will be a number of communication and training activities. There will be regular communication by a variety of means to keep compliance in your mind. Think short presentations ( like this one), posters and giveaways, articles on J-NET, messages on email and e-messages. A few well chosen key messages have been developed. Communication back the other way from you is also just as important! We are also taking a close look at our policies and procedures. Our policies and procedures must be written from the person who will carry them out, so they require direct input from the operating divisions to ensure that they actually work. We are examining how many policies we have, the quality of those polices and how we train you in there requirements. An important part of monitoring is to identify the main potential danger areas in each work practice and pay special attention to those areas on a regular basis. The Programme will be working closely with business units to monitor against unwanted problems. The purpose of monitoring is to ensure that the required procedures are being followed, help resolve difficulties at an early stage, seek, and listen to, any suggestions for improvements, and serve as early waning device. Underpinning a lot of this program, is identifying and controlling danger areas. The prompt rectification of all failures of the system can, to some extent, be managed through a threat and risk assessment approach.
  9. Many of you would have received some promotional materials either electronically or in hard copy as part of Privacy and Human Resources Awareness Week. CCS staff would have received materials from CV Head Office. In the coming months posters and tips will be distributed. Sneak and Peak In addition, hot off the press, is a sneak peak at some of the posters that have been developed and will be rolled out in the coming weeks. Each of the icons in the secondary posters also features in the primary poster. The hand and tree for environment, a USB key and padlock for information security, and a whistle for whistle blowing.
  10. The coloured balloon activity raises awareness of the clear desk and screen policy, especially the importance of securing sensitive and private information. The coloured balloons and cards used green, orange and red to signify how well staff complied with the policy. Coloured cards provided individuals with a personal rating while the balloons indicated team performance. The activity also used black balloons to highlight the importance of being environmentally responsible such as turning off lights and computers at the end of every day. The activity provides Managers with an immediate indication as to which areas could be improved and which were doing things well. Information for Regional Managers on how to host a Coloured Balloon day activity and FAQs and tips on keeping a clear desk and being environmentally will be available from the Taking Responsibility homepage.