The Privacy Act

1286 words, 6 pages

Intro Sample...


edu.au/privacy/Privacy_Act_1988/index-Schedule-3.html
Amendments to the Privacy Act 1988 contained in the Privacy Amendment (Private Sector) Act 2000, which commenced on 21 December 2001, contain new provisions that apply to agencies and their contractors in relation to the collection and handling of personal information.
Tax Office contracts contain provisions which require each contractor to acknowledge that it is a ‘contracted service provider’ within the meaning of section 6 of the Privacy Act and, among other things, agree in respect of the provision of services under such a contract:
1. not to do any act or engage in any practice that would breach an information privacy principle (IPP) contained in section 14 of the Privacy Act which if done or engaged in by the Commonwealth would amount to a breach, and
2. not to engage in an act or practice that would be a breach of a national privacy principle (NPP) contained in Schedule 3 of the Privacy Act where applicable (or an approved privacy code binding a party to this contract) and in particular NPPs 7 to 10, except where that act or pr View More »

Read More

Related Essays on The Privacy Act

  • Media Influences On Sport

    4185 words, 17 pages

    Media Influence On Sport When communication is spread not just between two individuals but rather between tens of millions of people it is known as mass media. Mass media is known as the central nervous system of society. "Mass media has many different purposes, such as providing information, entertaining, persuading and also by carrying a vague general function of culture to millions of people."(Frederick 18). In order for mass media to exist, there must be an audience. Today's society is very selective; each receiver reacts differently through his or her own experien

    View Document »

    Investigating Drug Testing’s Validity:

    2731 words, 11 pages

    In today’s modern society, businesses need to do everything that they can to ensure that they have a stable and productive workforce. One of the most common methods for producing a stable, productive workforce in recent years has been drug testing/screening. Many believe that drug testing is a valid and useful tool available to businesses to promote a workplace culture the business prefers. Others feel that drug testing is a violation of privacy and has no place at a business. Almost everyone knows of someone that has abused drugs before, during, or after work. Not many know of how drug abuse

    View Document »

    To Waht Extent Is Masculinity Associated With Evil And Violence In Macbeth?

    2428 words, 10 pages

    To what extent is masculinity associated with evil and violence in Macbeth? Evil is a theme widely explored by Shakespeare in his plays and “Macbeth” is no exception. This play demonstrates violence in relation to evil and evil in turn is a reflection of the desperation and anxieties of the characters in “Macbeth.” The question of whether masculinity is associated with evil and violence is easily answered as the main character in this horrific tragedy is Macbeth himself, who commits a range of heinous crimes from murder to dabbling with witchcraft. However, the extent to which masculinity i

    View Document »

    Hacking Team’s Morality: Good Or Bad?

    762 words, 4 pages

    Software, like any other tool, can be used for good and bad. The nature of the software itself can influence its use as well. In the case of Hacking Team, an IT company formed by David Vincenzetti and Valeriano Bedeschi, software that intrudes on privacy was produced. The company did not make sound moral decisions in creating its software. The company’s actions show that computer scientists should not create software without a moral compass. Hacking Team created a “comprehensive suite for man-in-the-middle attacks” (Jeffries). This software allowed users to control computers remotely by inse

    View Document »

    Humanyze And How Employers Take Your Privacy For Granted

    824 words, 4 pages

    It would be pretty scary if someone kept track of our daily life. Our habits, interactions, secrets, and anything in between would be known by this person. He or she may even know more about us then we know about ourselves. With the advent of new technology, employers have seemingly gained this ability of surveillance. Current and prospective employees are screened through public social media. Some workplaces use devices that keep track of location, speed, and even tone of voice. While some of these developments are worrying, they are actually beneficial to use as long as employees’ privacy i

    View Document »

    Mba500gapanalysisglobalcommunications

    1603 words, 7 pages

    Running head: GAP ANALYSIS: GLOBAL COMMUNICATIONS Gap Analysis: Global Communications MBA 500 University of Phoenix Gap Analysis: Global Communications When making decisions in business, questions of ethics, communication, and open minds, should always be considered. However, with so many decisions that are made from day-to-day, there is no surprise that the thought of what is considered ethical, usually ends up taking a back seat in major decisions, and that problems occur when two groups who are attempting to persuade and individual to see it their way will end up closing the

    View Document »

    Affordable Care Act

    4112 words, 17 pages

    In this paper, a proposal to amend the Affordable Care Act, Title IV, Subtitle B, Section 4101 was made. The amendment proposed is to allow the grant given to people and facilities to use that grant for health purposes rather than to have it focus solely on making the facility itself impressive looking, because it does not matter whether a facility looks good if the care it provides is horrible. The first topic mentioned is to allow and expand the Affordable Care Act to include the school-based system and allow these schools’ medical fields (i.e. nurse’s office) to provide better care. Then, t

    View Document »

    No Electronic Theft Act

    3474 words, 14 pages

    NO ELECTRONIC THEFT ACT (NET) Within the Internet culture of unlicensed use, theft of intellectual property is growing. Pirating works online is the same as shoplifting a video tape, book, or computer program from a department store. Through a loophole in the law, however, copyright infringers who intentionally pirate works, as long as they do not do so for profit, are outside the reach of our nation's law enforcement officials. In 1997 President Bill Clinton introduced the No Electronic Theft Act (NET), which allows criminal enforcement against people who have no profit motive in the infr

    View Document »

    Aligning Education Systems

    3962 words, 16 pages

    Since it’s implementation in 2002, the No Child Left Behind Act (NCLB) has been intended to boost student achievement and hold schools accountable for students’ progress. This act was met with sweeping support. The business ideals incorporated into the act in the form of accountability were thought to produce achievement in students just like in the business world. However, the act that was passed with flying colors was quickly met with concerns. One of the biggest flaws of NCLB was that it called for 100% proficiency on standardized tests nationwide by all students by the year 2014. The targe

    View Document »

    Business Regulation Simulation

    1866 words, 8 pages

    Business Regulation Simulation Alumina Inc. is an aluminum maker that operates in eight countries worldwide. Accounts in the United States make up 70% of the companies $4 billion worth. Located on Lake Dira, in the state of Erehwon, Alumina has business interests in automotive components, manufacturer of packaging materials, bauxite mining, aluminum refining, and aluminum smelting. Five years ago, Alumina was in violation of environmental discharge norms in a routine EPA compliance evaluation. PAH concentration in test samples was above the prescribed limit. A clean up was ordered, with which

    View Document »

More Popular Essays

Research help is just moments away!