{"id":1565,"date":"2024-08-17T07:12:21","date_gmt":"2024-08-17T07:12:21","guid":{"rendered":"https:\/\/assignmenttask.com\/tutorhelp\/?p=1565"},"modified":"2024-08-17T07:13:22","modified_gmt":"2024-08-17T07:13:22","slug":"get-answers-how-to-manage-a-data-privacy-impact-assessment-in-2017","status":"publish","type":"post","link":"https:\/\/assignmenttask.com\/tutorhelp\/get-answers-how-to-manage-a-data-privacy-impact-assessment-in-2017\/","title":{"rendered":"(Get Answers) How to Manage a Data Privacy Impact Assessment in 2017"},"content":{"rendered":"<p style=\"text-indent: 0in; margin: 1.4pt 0in 0.0001pt 5.35pt; text-align: justify;\">Looking for a Privacy Impact Assessment Case Study Question to Answers solution? Cyber-security &amp; privacy are two of the biggest issues facing businesses operating in the Information Age.<\/p>\n<p style=\"text-indent: 0in; margin: 1.4pt 0in 0.0001pt 5.35pt; text-align: justify;\">Cyber-security questions with answers in Privacy Impact Assessment.<\/p>\n<p style=\"text-indent: 0in; margin: 1.4pt 0in 0.0001pt 5.35pt; text-align: justify;\">Get<a href=\"https:\/\/assignmenttask.com\/answers\/\" target=\"_blank\" rel=\"noopener\"><strong>Assignment Questions answers<\/strong><\/a> to Questions in Privacy Impact Assessment from IT Assignment Experts. Get related <a href=\"https:\/\/assignmenttask.com\/assignment-help.html\" target=\"_blank\" rel=\"noopener\"><strong>Assignment Help<\/strong><\/a> &amp; Topics written by native Expert writers in Australia.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-indent: 0in; margin: 1.4pt 0in 0.0001pt 5.35pt;\">Privacy Impact Assessment (PIA)Sample Answers<\/h2>\n<h3 style=\"text-indent: 0in; margin: 1.4pt 0in 0.0001pt 5.35pt;\">Executive Summary<\/h3>\n<p style=\"text-align: justify;\">Consumer choices to accept the risk inherent in a given transaction depend on trust in the vendor. \u2018Decisions regarding the trustworthiness of an e-vendor result from accumulated transactions in the past (cognitive trust) or stem from more emotive bases (affective trust).\u2019<\/p>\n<p style=\"text-align: justify;\">The cybersecurity breach reduced cognitive trust in Deltex and consequently the company must act in a way that promotes customer security of data, since compensatory perks such as discounts can restart the relationship, but without trust, customers will only take advantage of offers that don\u2019t put them in a compromising position.<\/p>\n<p style=\"text-align: justify;\">In order to regain this trust, Deltex must display behaviours and cues that instil consumer trust in their ability, integrity, predictability, and benevolence when dealing with or serving online shoppers.<\/p>\n<p style=\"text-align: justify;\">Trust is also a prerequisite for social licenses and should be factored into best practice considerations due to the primary need to repair damage to increase revenue. Companies should empower stakeholders to be as informed as possible so that choices are made on objective instead of subjective assessments of the compny.<\/p>\n<p style=\"text-align: justify;\">It is therefore argued that Deltex should avoid the strategy of \u2018knowing more than the user knows about themselves\u2019 due to the risk that it poses to a revamped reputation of accountability.<\/p>\n<p style=\"text-align: justify;\">It is proposed that the company adopt the converse strategy and provide individuals with access to all information that Deltex sources from other sites so that individuals are attracted to Kartman for its privacy-promoting functions.<\/p>\n<p style=\"text-align: justify;\">While this act may bring in minimal revenue, the benefits of regaining trust will outweigh any potential lost revenue from dishonest practices such as understaffing the complaints department and covert keystroke surveillance.<\/p>\n<p style=\"text-align: justify;\">Other k recommendations include simplifying the privacy policy to aid understanding and encourage transparency. The policy should include only one clear opt-out source for targeted advertising as well as individual requests that must be responded positively to for each financial transaction and for disclosure to third parties, specifying the content of data to be sent.<\/p>\n<p style=\"text-align: justify;\">The \u2018boiling-frog\u2019 strategy and policy of keystroke\/online monitoring should be abandoned, and all data whose use has expired should be de-identified or destroyed.<\/p>\n<p style=\"text-align: justify;\">Project designers should be wary of different jurisdictional requirements in overseas data centres, the need to encrypt transmitted data and should implement an adequately funded complaints process that provides proper access to data.<\/p>\n<h3 style=\"text-indent: 0in; margin: 1.4pt 0in .0001pt 5.35pt;\"><strong>Threshold Assessment||Description<\/strong><\/h3>\n<p style=\"text-align: justify;\">Amy Hofsteder\u2019s Kartman project,7 involves the development of an electronic personal assistant, which will collect large amounts of personal information, including sensitive medical information, financial details, other personal, social media profiles and data imputed to the user,8 through keystrokes and online activity.<\/p>\n<p style=\"text-align: justify;\">Data collected will be retained as trade secrets,9 held overseas after unencrypted10 transfers and some disclosed to third parties for advertising purposes.11 There are many uses for which the data is collected, some of which, employed without express permission, such as taking out loans in the person\u2019s name.12.<\/p>\n<p style=\"text-align: justify;\">This combination of collection, storage, use and disclosure renders it necessary to conduct a PIA.13 The project\u2019s key milestone is the point at which the project is successful enough to market to other facets of the \u2018corporate foodchain.\u201914<\/p>\n<h3><strong>Methodology||Stakeholders<\/strong><\/h3>\n<p style=\"text-align: justify;\">Whilst Deltex must comply with the Australian Privacy Principles (\u2018APPs\u2019), in order to increase public confidence, this PIA must also address wider privacy concerns through public consultation tailored towards key stakeholders, particularly since \u2018consulted stakeholders are less likely to criticize a project than those who were not consulted.\u2019<\/p>\n<p style=\"text-align: justify;\">The sensitive nature of the data and previous cybersecurity breach carry the consequential obligation to demonstrate that the company is \u2018forthright and careful with information.\u2019<\/p>\n<p style=\"text-align: justify;\">As the initial target market, this approach should prioritise interviews\/online surveys with CEO\u2019s and follow with focus groups and surveys of employees who, on the basis of their workload, would appreciate this service to assess attitudes trickling down \u2018the corporate foodchain.\u2019<\/p>\n<p style=\"text-align: justify;\">Public submissions should be encouraged and meetings arranged with representatives of civil liberties groups and the Federal Privacy Commission. Other relevant stakeholders include designers and manufacturers who may provide further privacy-enhancing recommendations. This PIA must be reviewed and updated throughout the project.<\/p>\n<p style=\"text-align: justify;\">The following list of ranked risks is not exhaustive. It is assumed that Deltex, as a publically listed company, has an annual turnover exceeding $3million, but would likely also constitute a \u2018health service provider,\u2019 since the profile of the calorific intake and exercise habits, PT appointment booking service and contact with doctors would constitute recording and maintaining the individual\u2019s health, particularly since the OAIC identifies weight loss clinics as health service providers.<\/p>\n<p style=\"text-align: justify;\">Thus Deltex must comply with the APPs, breach of which may result in enforceable undertakings, injunctions and civil penalty orders.<\/p>\n<p style=\"text-align: justify;\">For ethical considerations, reference will be made to the Ireland Technical Consultancy Group (TCG) Ethical awareness framework, which takes account of the context and use of the data, consent and choice of the subject, reasonableness of the use, fairness of the outcome, ownership of rights, access to the data and accountability of the entity.<\/p>\n<p><strong>1||PROCEDURAL RISKS<\/strong><\/p>\n<h3>||Encryption||HIGH<\/h3>\n<p style=\"text-align: justify;\">Deltex must take reasonable steps to protect information from misuse, interference and unauthorised access. In <em>AAPT and Melbourne IT<\/em>the OAIC refers to their Guide to Securing Personal Information to clarify \u2018reasonable steps\u2019.<\/p>\n<p style=\"text-align: justify;\">This highlights the importance of encrypting \u2018data in transit,\u2019 indicating that the current transmission plan will render Deltex non-compliant. If financial information is transmitted unencrypted this will breach requirements for encryption under the PCI Data Security Standard.<\/p>\n<p style=\"text-align: justify;\">If this design is not revised, Kartman will not obtain social license, due to failure to establish trust and social legitimacy: which requires compliance with community norms. Society generally expects that sensitive information will be well protected and may even have an expectation of encryption.<\/p>\n<p style=\"text-align: justify;\">In 2006, a US Judge declined to find that \u2018encryption should be used as a routine securityprecaution,\u2019 however technological development may render this notion outdated. To foster trust Deltex must display accountability for its previous breach through heightened security.<\/p>\n<p style=\"text-align: justify;\">Notably, Microsoft includes encryption as a \u2018best practice\u2019 in relation to \u2018sensitive data, including personally identifiable information and financial information\u2019 in transit.<\/p>\n<p style=\"text-align: justify;\">Consequently Deltex should encrypt data in transit, accompanied by proper key management, which is the responsibility of administering employees.<\/p>\n<h3>||Complaints Process||HIGH-Individual||MEDIUM-Deltex<\/h3>\n<p style=\"text-align: justify;\">Deltex is obliged to provide individuals with access to their information on request, and it is unlikely any APP 12 exceptions will apply.<\/p>\n<p style=\"text-align: justify;\">Plans to avoid permitting user access to information places Deltex in breach of their legal obligations and bars achievement of the credibility element of social license due to the purposeful decision not to deliver on the promise of an adequate complaints system.<\/p>\n<p style=\"text-align: justify;\">The entrenchment of this privacy principle in international human rights norms, indicated by inclusion in the OECD Guidelines for Protection of Personal Information, shows that failure to provide a complaint\/access system would be unethical under community standards.<\/p>\n<p style=\"text-align: justify;\">This is high risk for the individual, whose civil liberties are undermined. The CEO should direct more funding towards this process to, at a minimum, meet APP standards.<\/p>\n<h3>||Privacy Policy||MEDIUM<\/h3>\n<p style=\"text-align: justify;\">While the \u2018initial privacy-friendly\u2019 policy would likely adhere to APP requirements, the \u2018boiling-frog\u2019 strategy, though not expressly outlawed, breaches the ethical principle of credibility due to post-breach desires for transparency.<\/p>\n<p style=\"text-align: justify;\">The settlement between Facebook and the FTC, requiring that Facebook obtain express consent before enacting policy changes, indicates that non-consensual privacy policy changes, and automatically changing opt-outs upon updates may amount to deceptive trade practices in breach of section 18 of the <em>Australian Consumer Law<\/em>.<\/p>\n<p style=\"text-align: justify;\">The fact that Deltex is drawing upon knowledge that most users do not read terms and conditions isprobative of an intention to deceive, which is relevant to determinations of liability. However <em>Re Apple Inc<\/em>,<i> <\/i>may indicate that statements in privacy policies won\u2019t result in liability,since the Court held that the blatant lies in Apple&#8217;s privacy policy were not important deciding factors in their iPhone purchases.<\/p>\n<p style=\"text-align: justify;\">Regardless, media coverage of social networking site policy changes encroaching upon privacy indicate that the \u2018boiling-frog\u2019 strategy will not necessarily go unnoticed and could tarnish Deltex\u2019s reputation in a time requiring behavioural cues that instil consumer trust in their integrity.<\/p>\n<p style=\"text-align: justify;\">Examples of this uproar include the challenge by six major consumer privacy groups to Facebook\u2019s policy change in 2013. This \u2018boiling-frog\u2019 strategy is not only an issue in its offence to community values but may result in liability and should be abandoned.<\/p>\n<p style=\"text-align: justify;\">Websites asking users what information they want to share empowers them to share more information than they would have if not given control over sharing information.<\/p>\n<p style=\"text-align: justify;\">Thus options for control should be embedded in the product design and specified in the policy to account for varying preferences in relation to privacy protection. Additionally, simplicity and clarity are key concepts to be mindful of when redesigning the privacy policy to simultaneously avoid information overload and comply with APP requirements of consent.<\/p>\n<h3>||Retained Information||MEDIUM<\/h3>\n<p>Deltex will also be in breach of APP 11.2 for retaining unused data, such as license and\/or passport details obtained for initial identification purposes. It may be that BANK requirements under the <em>Anti-Money Laundering and Counter-Terrorism Financing Act 2006 <\/em>(Cth) excuse the license\/passport information from this requirement and satisfy the exception to APP 9 prohibiting use of a \u2018government related identifier.\u2019<\/p>\n<p>However in relation to other data kept after being used for its consented purpose, it is recommended that Deltex be mindful of its obligation to destroy data rather than retain it as \u2018trade secrets.\u2019<\/p>\n<h3>||Overseas Cloud Storage||LOW<\/h3>\n<p style=\"text-align: justify;\">Applicable APPs when sending personal information overseas depend on whether it is a \u2018use\u2019 or a \u2018disclosure\u2019 of information.<\/p>\n<p style=\"text-align: justify;\">The APP Guidelines <em>(\u2018AG\u2019) <\/em>provide that \u2018use\u2019 occurs when the entity has effective control in handling and managing the information.\u2019 Since the datacentres are in-house and cloud based, Deltex retains rights of data access and control as well as choice of security measures, thus APP 8 and the <em>Privacy Act 1988 <\/em>(Cth)(<em>\u2018PA\u2019) <\/em>s 16C will not apply.<\/p>\n<p style=\"text-align: justify;\">Whilst the in-house factor satisfies the requirement that personal information only be transmitted across international borders with consent or if the organisation believes that the recipient is subject to comparable privacy regulation, Deltex will be subject to different requirements in each jurisdiction.<\/p>\n<p style=\"text-align: justify;\">As the Brussels data centre is an \u2018establishment in the EU\u2019 and if Kartman is sold in the EU, the General Data Protection Regulation will apply from 2018, obliging Deltex to comply with the right to erasure which would conflict with business objectives to keep user data as trade secrets.<\/p>\n<p style=\"text-align: justify;\">If Deltex retains overseas storage, it must comply with each law and be wary of differences that may affect privacy rights, for example, inadvertent disclosure from Chinese network providers scanning Shang-Hai networks for content harmful to the state and monitoring content potentially infringing another\u2019s civil rights.<\/p>\n<p style=\"text-align: justify;\">The PA does not prevent cloud storage,\u2019 however multiplication of data makes it difficult to ascertain whether information has been permanently destroyed, which may conflict with obligations to destroy or de-identify data no longer needed.<\/p>\n<p style=\"text-align: justify;\">Google has overcome this issue by including a warning statement in relation to its Google Docs program, a practice approved of by the Acting Assistant Privacy Commissioner. It is recommended this statement be included in Deltex\u2019s privacy policy.<\/p>\n<h2>2||DESIGN RISKS<\/h2>\n<h3>||Indirectly-disclosed Information||HIGH<\/h3>\n<p style=\"text-align: justify;\">Whilst there may be social license for companies to use cookies for advertising, customers generally condoneadvertising companies holding deeply personal information, for example Target\u2019s 2012 prediction of a pregnancy.<\/p>\n<p style=\"text-align: justify;\">Keystroke surveillance has the potential to pick up personal information as well as highly-sensitive information such as bank passwords.<\/p>\n<p style=\"text-align: justify;\">There is no ethical justification for intrusive covert surveillance, which is indicated by media backlash and legal action for condoned behaviours such as activation of webcams to photograph students and keystroke monitoring by employers.<\/p>\n<p style=\"text-align: justify;\">The lack of consent for this renders it ethically unacceptable and places Deltex in breach of obligations to notify individuals when information is collected about them.<\/p>\n<p style=\"text-align: justify;\">Even if Deltex can successfully argue that the information obtained from keystroke logging is reasonably necessary for, or directly related to functions of marketing services to the user, it would breach requirements to collect personal information only by lawful and fair means.<\/p>\n<p style=\"text-align: justify;\">In <em>&#8216;LP&#8217; and The Westin Sydney<\/em>the commission referred to the AGnoting that a \u2018fair means\u2019 of collection does not involve intimidation or deception, is not unreasonably intrusive and that usually it would be unfair to covertly collect personal information covertly, subject to the circumstances.<\/p>\n<p style=\"text-align: justify;\">Seeing as the keystroke surveillance is non-consensual and could be incredibly intrusive in data collected, this would not constitute \u2018fair\u2019 collection.<\/p>\n<p style=\"text-align: justify;\">Due to the immense breach of both ethical standards and APPs that would occur, it is strongly recommended that this be abandoned from the design.<\/p>\n<p style=\"text-align: justify;\">Utilising location services to suggest nearby restaurants\/services may be more feasible, due to acquiescence of Apple\u2019s use of location services.<\/p>\n<h3>||Autonomous Action||HIGH-customers||MEDIUM-Deltex<\/h3>\n<p style=\"text-align: justify;\">It is not stated whether Kartman contacts doctors and takes out loans with express user approval for each transaction, similar to the Acorn program or whether the privacy policy provides blanket approval for Kartman to invest on the user\u2019s behalf at its discretion.<\/p>\n<p style=\"text-align: justify;\">In regards to the latter, this practice may breach requirements for data accuracy, since this information is inferred. For example, diagnosing a cold on the basis of heart-rate and sleep habits, which may be attributed to other causes.<\/p>\n<p style=\"text-align: justify;\">From an ethical perspective, disclosure of information without direct consent, particularly incorrect data, may result in prejudicial treatment from insurance companies, similarto John Hancock offering discounts proportional to exercise recorded on Fit-Bit, and has the potential to undermine credibility and trust for the company, particularly in conjunction with the understaffed complaints system.<\/p>\n<p style=\"text-align: justify;\">To avoid any prejudicial mistakes, it is recommended that Kartman display notifications to the user seeking consent for each action and confer with professionals only with de-identified information to obtain general (as opposed to user-specific) advice.<\/p>\n<h3>||Advertising Disclosure||MEDIUM<\/h3>\n<p style=\"text-align: justify;\">While the prevalence of targeted marketing, may indicate its normative status and accordingly a social license permitting extraction of data for this purpose, it could also be attributed to the lack of opt-out function and ubiquity of programs such as Facebook that exclude those without accounts.<\/p>\n<p style=\"text-align: justify;\">Socialist privacy legislation requires companies to advertise only once users opt-in, to maximise self-determination. This contradicts plans to split opt- outs across different menus, which offends TCG principles of consent and choice due to limited opportunities to decline and the overriding of choices upon upgrade.<\/p>\n<p style=\"text-align: justify;\">Since the <em>PA <\/em>only applies to \u2018personal information\u2019 or information able to be used for identification, sifting through \u2018online activity\u2019 might only collect general information about the subject\u2019s interests and browsing history, which would release Deltex of <em>PA <\/em>obligations.<\/p>\n<p style=\"text-align: justify;\">However, the large quantity of Kartman data collected may rule out de-identification. In this instance, Deltex may not use\/disclose the information for the purpose of direct marketing without consent of the user.<\/p>\n<p style=\"text-align: justify;\">Kartman activities constitute \u2018direct marketing\u2019 due to use of personal information to select which advertisements are displayed, thus consent of users must be sought.<\/p>\n<p style=\"text-align: justify;\">The opt-out policy would breach the requirement to provide a <u>simple <\/u>means to request ceasing communication, since the AG clarify simplicity as a \u2018process for opting out requiring minimal time and effort\u2019 and that \u2018the individual should be able to easily find out how to opt out.\u2019<\/p>\n<p style=\"text-align: justify;\">If an individual has already requested not to receive advertising material, automatic opt-ins when updating the app would breach APP 7.3(e). Suppose an opt-in policy is too risky in terms of losing advertising profits. In that case, it is recommended that the opt-out policy be simplified and its positions remain stagnant as the product is upgraded further.<\/p>\n<h3>||Correcting Inconsistencies||LOW<\/h3>\n<p style=\"text-align: justify;\">Kartman\u2019s function of correcting inconsistencies will be subject to the requirement that Deltex ensure the information is incorrect before taking reasonable steps to correct it and notifying third parties where the information being corrected is that \u2018held\u2019 or in the possession\/control of Deltex.<\/p>\n<p style=\"text-align: justify;\">The difficulty of discerning what data is attached to your name indicates that there may be a market, following practices of Axicom and RapLeaf, in revealing all information found in other databases since \u2018up to 30% of a person\u2019s profile may be wrong at any given time\u2019 which can be harmful when data is used for employment screening, etc.<\/p>\n<p style=\"text-align: justify;\">While charges for this access may not be excessive, profits for this function would be sourced through the social value of transparency and allowing individuals to correct misinformation before it has a prejudicial effect since it would regain trust. This notion of \u2018knowing more than the user knows\u2019 does not accord with the ethical framework element of accountability and is too dangerous to adopt when seeking to regain trust.<\/p>\n<h3><u>Bibliography<\/u><\/h3>\n<p><strong>A Articles\/Books\/Reports<\/strong><\/p>\n<p style=\"text-align: justify;\">Anderson, Collin, \u2018Iranian Internet Infrastructure and Policy Report\u2019 (Policy Report, Small Media, July-August 2013)<\/p>\n<p style=\"text-align: justify;\">Australian Privacy Commissioner, \u2018AAPT and Melbourne IT\u2019 (Own Motion Investigation Report, Office of the Australian Information Commissioner, 6 August 2012)<\/p>\n<p style=\"text-align: justify;\">Beckett, Lois \u2018Everything We Know About What Data Brokers Know About You\u2019, <em>ProPublica <\/em>(online) 13 June 2014<\/p>\n<p style=\"text-align: justify;\">Carolan, Eoin and Rosario Castillo-Mayen, \u2018Why More User Control Does Not Mean More User Privacy: An Empirical (and Counter-Intuitive) Assessment of European E-Privacy Laws\u2019 (2015) 19(2) <em>Virginia Journal of Law and Technology <\/em>324<\/p>\n<p style=\"text-align: justify;\">Fang, Yulin et al, \u2018The Moderating Role of Perceived Effectiveness of Third-Party Control on Trust and Online Purchasing Intentions\u2019 (Paper presented at Reaching New Heights. 13th Americas Conference on Information Systems, Colorado, 9 August 2007)<\/p>\n<p style=\"text-align: justify;\">Federal Trade Commission, \u2018Facebook Settles FTC Charges That It Deceived Consumers By Failing To Keep Privacy Promises\u2019 (Press Release, 29 November 2011)<\/p>\n<p style=\"text-align: justify;\">Fuchs, Christian, \u2018The Political Economy of Privacy on Facebook Author\u2019 (Research Paper No 9, Unified Theory of Information Research Group, Vienna, 13 January 2011)<\/p>\n<p style=\"text-align: justify;\">Goel, Vindu, \u2018Privacy Groups Aim to Stop Facebook Policy Changes\u2019 <em>New York Times <\/em>(New York) 4 September 2013 Lewis, JD and Andrew Weigert, \u2018Trust as a Social Reality\u2019 (1985) 63(4) <em>Social Forces <\/em>967<\/p>\n<p style=\"text-align: justify;\">Lipman, Rebecca, \u2018Online Privacy and the Invisible Market for Our Data\u2019 (2016) 120 <em>Pennsylvania State Law Review <\/em>777<\/p>\n<p style=\"text-align: justify;\">Livingston, Scott and Graham Greenleaf, \u2018Tort Liability for Online Privacy Violations in China: The 2014 SPC Regulation\u2019 (2015) 136 <em>Privacy Laws &amp; Business International Report <\/em>24<\/p>\n<p style=\"text-align: justify;\">Lyon, David and Elia Zureik (eds), <em>Computers, Surveillance, and Privacy <\/em>(University of Minnesota Press, 1996) Macnish, Kevin, <em>The Ethics of Surveillance: An Introduction <\/em>(Routledge, 2017)<\/p>\n<p style=\"text-align: justify;\">McCole, Patrick, Elaine Ramsey and John Williams \u2018Trust Considerations on Attitudes Towards Online Purchasing: The Moderating Effect of Privacy and Security Concerns\u2019 (2010) 63(9) <em>Journal of Business Research <\/em>1018<\/p>\n<p style=\"text-align: justify;\">Morrison, John, <em>The Social License: How to Keep Your Organization Legitimate <\/em>(Springer, 2014)<\/p>\n<p style=\"text-align: justify;\">Office of the Australian Information Commissioner, \u2018Australian businesses and the EU General Data Protection Regulation\u2019 (Business Resource No 21, May 2017)<\/p>\n<p style=\"text-align: justify;\">Guide to securing personal information (January 2015) Office of the Australian Information Commissioner<\/p>\n<p style=\"text-align: justify;\">&lt;https:\/\/www.oaic.gov.a<\/p>\n<p style=\"text-align: justify;\">u\/agencies-and-organisations\/guides\/guide-to-securing-personal-information&gt;<\/p>\n<p style=\"text-align: justify;\">\u2018Guide to Information Security: \u2018Reasonable Steps\u2019 to Protect Personal Information\u2019 (Commissioner Report, Office of the Australian Information Commissioner, April 2013)<\/p>\n<p style=\"text-align: justify;\">\u2018Guide to Undertaking Privacy Impact Assessments\u2019 (Report, Office of the Australian Information Commissioner, May 2014)<\/p>\n<p style=\"text-align: justify;\">\u2018Online Behavioural Advertising \u2014 Know Your Options\u2019 (Privacy Fact Sheet No 4, Office of the Australian Information Commissioner, December 2011)<\/p>\n<p style=\"text-align: justify;\">Office of the Australian Information Commissioner, \u2018Sending Personal Information Overseas\u2019 (Business Resource No 8, May 2015)<\/p>\n<p style=\"text-align: justify;\">Schaub, Florian, Rebecca Balebako and Lorrie Faith Cranor, \u2018Designing Effective Privacy Notices and Controls\u2019 (2017) 21(3) <em>EEE Internet Computing <\/em>70<\/p>\n<p style=\"text-align: justify;\">Sloan, Robert and Richard Warner, <em>Unauthorized Access: The Crisis in Online Privacy and Security <\/em>(CRC Press, 2016)<\/p>\n<p style=\"text-align: justify;\">Solomon, Andrew, \u2018Privacy and the Cloud\u2019 (Speech delivered at the Cloud Computing Conference and Expo, 9 September 2010) Wright, David, \u2018Making Privacy Impact Assessment More Effective\u2019 (2013) 29(5) <em>The Information Society <\/em>307<\/p>\n<p style=\"text-align: justify;\">Wright, David, Rachel Finn and Rowena Rodrigues, \u2018A Comparative Analysis of Privacy Impact Assessment in Six Countries\u2019 (2013) 9(1) <em>Journal of Contemporary European Research <\/em>160<\/p>\n<p><strong>B <em>Cases<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\"><em>Google Inc v Australian Competition and Consumer Commission <\/em>(2013) 249 CLR 43<\/p>\n<p style=\"text-align: justify;\"><em>&#8216;LP&#8217; and The Westin Sydney <\/em>[2017] AICmr 53 (7 June 2017)<\/p>\n<p style=\"text-align: justify;\"><em>Re Apple Inc. iPhone\/iPad Application Consumer Privacy Litigation <\/em>(US District Court, Northern District of California, 11-md- 02250, 25 November 2013)<\/p>\n<p><strong>C Legislation<\/strong><\/p>\n<p><em>Privacy Act 1988 <\/em>(Cth)<\/p>\n<p><em>General Data Protection Regulation <\/em>[2016] OJ L 119\/29<\/p>\n<p><strong>D <em>Other<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">Bishop, Bryan, <em>Phone Location-Tracking Lawsuit Against Apple is Dismissed <\/em>(27 November 2013) The Verge &lt;https:\/\/www.th everge.com\/2013\/11\/27\/5153954\/iphone-location-tracking-lawsuit-against-apple-is-dismissed&gt;<\/p>\n<p style=\"text-align: justify;\">Fleishman, Glenn, \u2018How iOS 11 changes location tracking on your iPhone and iPad\u2019 <em>MacWorld <\/em>(online) 10 July 2017<\/p>\n<p style=\"text-align: justify;\">&lt;https:\/\/www.macworld.com\/article\/3203365\/ios\/how-ios-11-changes-location-tracking-on-your-iphone-and-ipad.html&gt;<\/p>\n<p style=\"text-align: justify;\">Gemalto Solutions, <em>Enterprise Data Encryption Best Practices <\/em>&lt;https:\/\/safenet.gemalto.com\/protect-sensitive-data-enterprise- encryption\/&gt;<\/p>\n<p style=\"text-align: justify;\">Glasgow, Seth, <em>PCI Encryption Requirements <\/em>(28 December 2015) Secure State &lt;https:\/\/www.securestate.com\/blog\/ 2015\/12\/28\/pci-encryption-requirements-part-1&gt;<\/p>\n<p style=\"text-align: justify;\">Hicken, Melanie, \u2018Find Out What Big Data Knows about You (It may Be Very Wrong)\u2019, <em>CNN Money <\/em>(online), 5 September 2013<\/p>\n<p style=\"text-align: justify;\">&lt;http:\/\/money.cnn.com\/2013\/09\/05\/pf\/acxiom-consumer-data\/index.html&gt;<\/p>\n<p style=\"text-align: justify;\">Mearian, Lucas, \u2018Insurance Company now Offers Discounts &#8212; if you Let it Track your Fitbit\u2019, <em>Computerworld <\/em>(online), 17 April 2015 &lt;https:\/\/www.computerworld.com\/article\/2911594\/insurance-company-now-offers-discounts-if-you-let-it-track-your- fitbit.html&gt;<\/p>\n<p style=\"text-align: justify;\">McCullagh, Declan, <em>Judge: Firm not Negligent in Failure to Encrypt Data <\/em>(16 February 2006) C-Net &lt;https:\/\/www.cnet.co m\/au\/news\/judge-firm-not-negligent-in-failure-to-encrypt-data\/&gt;<\/p>\n<p style=\"text-align: justify;\">Newton-Sims, Timo, \u2018Could your Fitbit Data be Used to Deny You Health Insurance?\u2019, <em>The Conversation <\/em>(online) 17 February 2017 &lt;http:\/\/theconversation.com\/could-your-fitbit-data-be-used-to-deny-you-health-insurance-72565&gt;<\/p>\n<p style=\"text-align: justify;\">Office of the Australian Information Commissioner, <em>Australian Privacy Principles Guidelines <\/em>(31 March 2015) &lt;https:\/\/www.o aic.gov.au\/resources\/agencies-and-organisations\/appguidelines\/APP_guidelines_complete_version_1_April_2015.pdf&gt;<\/p>\n<p style=\"text-align: justify;\"><em>Business resource: Key Health Privacy Concepts <\/em>(2015) Office of the Australian Information Commissioner &lt;https:\/\/www.oaic. gov.au\/engage-with-us\/consultations\/health-privacy-guidance\/business-resource-key-health-privacy-concepts&gt;<\/p>\n<p style=\"text-align: justify;\"><em>Privacy Law<\/em>, Office of the Australian Information Commissioner &lt; https:\/\/www.oaic.gov.au\/privacy-law\/&gt;<\/p>\n<p style=\"text-align: justify;\">Organisation for Economic Co-operation and Development, <em>OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data <\/em>(23 September 1980) &lt;https:\/\/www.oecd.org\/sti\/ieconomy\/2013-oecd-privacy-guidelines.pdf&gt;<\/p>\n<p style=\"text-align: justify;\">Petru, Alexis, \u2018Can Companies Restore Consumer Confidence After a Data Breach?\u2019, <em>Triple Pundit <\/em>(online) 8 July 2014<\/p>\n<p>Randtronics, <em>Key Management and PCI DSS <\/em>&lt;https:\/\/www.randtronics.com\/blog\/item\/key-management-and-pci-dss&gt;<\/p>\n<p>Selby, Judy, <em>Ethical Considerations in Using Social Data <\/em>(30 September 2015) Judy Selby Consulting &lt; https:\/\/judyselbyconsu lting.com\/2015\/09\/30\/considerations-in-social-data\/&gt;<\/p>\n<p>Thompson, Ian, <em>What Is the Social License? <\/em>(2017) Shinglespit Consultants Inc &lt;https:\/\/socialicense.com\/definition.html&gt; Vinton, Kate, How Companies Can Rebuild Trust After A Security Breach (1 July 2014) <em>Forbes &lt; <\/em>https:\/\/www.forbes.com\/sites<\/p>\n<p>\/katevinton\/2014\/07\/01\/how-companies-can-rebuild-trust-after-a-security-breach\/#732dd4de5e6c&gt;<\/p>\n<p>Whitney, Lance, \u2018School Escapes Charges in Webcam Spying Case\u2019 <em>C-Net <\/em>(online), 18 August 2010<\/p>\n<p>&lt;https:\/\/www.cnet.com\/news\/school-escapes-charges-in-webcam-spying-case\/&gt;<\/p>\n<p><strong>Reference No. <a href=\"https:\/\/casestudyhelp.com\" target=\"_blank\" rel=\"noopener\">CSH019001992<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking for a Privacy Impact Assessment Case Study Question to Answers solution? Cyber-security &amp; privacy are two of the biggest issues facing businesses operating in the Information Age. Cyber-security questions with answers in Privacy Impact Assessment. GetAssignment Questions answers to <a href=\"https:\/\/assignmenttask.com\/tutorhelp\/get-answers-how-to-manage-a-data-privacy-impact-assessment-in-2017\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[743],"tags":[],"class_list":["post-1565","post","type-post","status-publish","format-standard","hentry","category-sample-questions"],"_links":{"self":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/1565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/comments?post=1565"}],"version-history":[{"count":2,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/1565\/revisions"}],"predecessor-version":[{"id":1567,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/1565\/revisions\/1567"}],"wp:attachment":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/media?parent=1565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/categories?post=1565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/tags?post=1565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}