7 Tips to Comply with Data Privacy Laws in Your Medical Practice

When you’re running a medical practice, you’re likely juggling countless, competing priorities – patient care, treatment plans, staffing, safety. But what about data privacy? The consequences of a data breach can be severe, from loss of patient trust and legal penalties, to devastating long-term damage to your reputation. Are you confident your practice isn’t unintentionally exposing itself to serious risk?  

For medical practices, data privacy cannot be an afterthought – it’s mission critical for protecting patient confidence, supporting compliance and keeping sensitive information secure. And it’s more than implementing the right policies. It’s about ensuring policies and best practices are understood, followed and prioritised by all team members.  

Australian healthcare providers are responsible for complying with the Privacy Act 1988 and My Health Record regulations for protection of sensitive information and digital health records, yet many practices unknowingly put patient data at risk.  

Let’s explore key challenges and gaps that can lead to serious breaches, and essential tips for  reducing regulatory risks.  

The Most Common Data Privacy Mistakes for Medical Practices  

Without proper guidance, it’s understandable many medical practices struggle with data privacy – typically due to a lack of training, understanding and best practices.  

1. Improper Training 

Unfortunately, data privacy tends to be overlooked when training takes a back seat. Let’s consider first, that the people responsible for handling sensitive data, such as practice managers and receptionists, typically don’t receive training in this area.  

2. Missed Processes

If your medical practice has a retention policy that includes information about data collection storage, cleaning, retention, disposal, backup and archiving – that’s a great first step. But without staff awareness and clear procedures, these practices can easily be overlooked.   

3. Inappropriate Data Handling 

There are a few ways staff members may be handling data incorrectly. First, considering email breaches are one of the top attack vectors for cybercriminals, it’s alarming how often medical practices email patient records. Even if you utilise a secure platform, sending data to incorrect email addresses is a significant issue (though authentication measures can help mitigate this risk).  

As another example, many medical staff don’t realise images (of patients) are just as sensitive as personal health data. In Australia, while there isn’t a specific law making it illegal to take photos of patients (for instance, during surgery), it’s crucial to obtain informed consent beforehand.  

Consider, for instance, a situation where a doctor takes a photo of a patient during a procedure, using a personal mobile device. Without realising the privacy risks, the image may automatically upload to a personal cloud account, which often lacks the necessary security or data protections. Without proper patient consent and security controls in place, even well-meaning actions can result in serious breaches of sensitive health information. 

4. Lack of Data Inventory 

Without data inventory, knowing where and how your data is stored, it’s impossible to secure it. Even if you’ve put robust protections around your medical software, vulnerabilities can arise elsewhere. For example, if patient data is being emailed or stored in shared accounts without multi-factor authentication (MFA), all your security layers are rendered useless. Tracking and securing all data, across all touchpoints, is essential to preventing potential breaches. 

The good news: many medical practices are starting to take data privacy more seriously. While this positive mindset shift is slowly starting to ripple throughout the industry, there’s more you can do to fully embrace a proactive approach to privacy in your practice 

Essential Tips to Support Compliance for Your Medical Practice  

To stay on the right path towards compliance, here are our best practice recommendations for building a stronger privacy framework. 

1. Develop a Comprehensive Privacy Policy

Create a clear, concise policy that outlines your practices for data collection, use, disclosure and storage. Be sure to obtain explicit patient consent for data collection and use. Most importantly, ensure that your privacy policy is easily accessible and understandable to your patients. 

2. Implement Strong Security Measures (Physical, Technical & Administrative) 

To protect sensitive data, establish strong security measures across three key areas.  

Physical Security:  

  • Ensure any physical patient records are stored securely in locked cabinets with restricted access. 
  • Does your practice have visitor staff or contractors? Maintain proper documentation to avoid unauthorised access (e.g. swipe cards, controlled access to sensitive areas, visitor ID badges). Vet visitors thoroughly and ensure they’re always accompanied by authorised personnel. You may also like to consider implementing CCTV to monitor sensitive areas. 

Technical Security: 

  • Use strong access controls, including strong passwords and multi-factor authentication (MFA). 
  • Encrypt all electronic patient data and maintain regular backups. 
  • Implement firewalls and antivirus software to protect against cyber threats. 

Administrative Security: 

  • Conduct regular risk assessments and security audits to identify vulnerabilities. 
  • Train all staff on data privacy policies and procedures (more on this to follow). 
  • Establish clear data handling protocols, including a data breach response plan for all of your employees. 

Feeling unsure about how to implement these practices? Find out more about how IT services can help with compliance in your medical practice.  

3. Prioritise Staff Training 

Given we touched on challenges surrounding lack of training, providing training (from administrative staff to medical practitioners alike) is incredibly worthwhile. Empower your team with knowledge, awareness, skills and confidence to protect patient data. Ensure every member of your team understand your practice’s privacy policies, how to handle data properly and why it needs to be a priority.   

4. Respect Patient Rights

Of course, patient trust and care are at the heart of what you do. So it’s important to extend this care to data privacy matters too. Ensure your patients can easily access and correct their medical records. Respect their requests to limit the use or disclosure of their information. 

Supporting compliance is most effective when you keep the human element in mind! Discover how to put people first with Privacy Act compliance.  

An important note on pseudonyms: Patients have the right to use pseudonyms under the Privacy Act. Be sure you have processes in place to verify the identity of individuals (such as through health identifiers) requesting access to medical records, including those using a pseudonym.  

5. Maintain Accurate, Up-to-Date Records

Similar to the above, keep patient information accurate, complete and current. What’s the best way to do this? Consider standardising your data entry processes, such as through templates and prefilled forms to reduce errors. Implement a review or quality assurance system to double-check records and establish clear procedures for correcting errors. You may even benefit from utilising software that flags discrepancies.  

Patient portals, for instance, are a great way to enable patients to update their information directly and keep their records up to date. 

6. Obtain and Document Informed Consent

Ensure patients are fully informed about how their data will be used and disclosed, particularly when they first join your practice. Going forward, continue to obtain and record consent if new uses arise (for example, sharing data with third parties).

As new technologies such as Artificial Intelligence (AI) are introduced into healthcare practices — for example, AI transcription services or diagnostic support tools — it is crucial to be transparent with patients about how their data is being used. General consent to collect and store information may not automatically cover secondary uses involving AI. Ensure you obtain specific, informed consent for any AI processes that collect, process, or generate patient data. This includes informing patients about the purpose, risks, and safeguards in place. Clear communication helps patients make informed choices and supports compliance with your obligations under the Privacy Act. 

7. Minimise Data Collection

Understandably, medical practices want to gather as much information as possible to make accurate health decisions – but what’s truly necessary? Collecting extraneous or sensitive information (such as religion or personal preferences, unrelated to care), may not be needed and can put unnecessary information at risk in the event of a breach.  

Beyond minimising the amount of information collected, it’s equally important to regularly review the data you already hold. Retaining unnecessary personal information can expose your practice to increased risks in the event of a breach. Establish clear data retention policies that specify how long different types of patient information should be kept, in line with legal and regulatory requirements. Once data is no longer required, ensure it is securely destroyed or de-identified, according to your documented policies. Proper de-identification helps reduce privacy risks while maintaining compliance, and supports an overall data minimisation strategy by ensuring your practice only holds what is absolutely necessary.  

Strive for continuous improvement by regularly revalidating your processes and systems. 

The benefits of prioritising data privacy go far beyond ticking boxes. It’s a powerful strategy for strengthening patient trust, organisational security and the overall success of your practice. By implementing these best practices, you’re also being more proactive in supporting compliance. The time to act is now. It’s never too late to start strengthening your privacy measures.  

Want to take the stress out of data privacy for your practice? Find out more and enquire about our cyber security services.  

Putting People First with Privacy Act Compliance

New statistics from the OAIC reveal the number of data breaches reported in the first half of last year were the highest they’ve ever been in 3.5 years. This alarming volume of breaches represents a major threat to Australians’ privacy, and an increased need for businesses to shore up vulnerabilities and be more vigilant.   

The thing is, many businesses are unknowingly or unintentionally violating an essential data privacy regulation – one that’s mandatory for most Australian organisations: the Privacy Act 1988. And the potential legal, financial, and reputational consequences for putting sensitive information at risk can be severe.  

One property investment company, for instance, landed in hot water after breaching data privacy laws in Australia, sharing the names and addresses of people experiencing financial distress. MediBank suffered a whopping $1.8B loss after a data hack. Customers spoke out about the hidden financial and emotional cost of the breach, as well as genuine concerns for their safety.  

These cases make it clear how privacy breaches can have damaging personal consequences for individuals, while also exposing businesses to significant legal and reputational risks. 

Key Areas of Non-Compliance 

Many organisations assume they’re meeting the requirements outlined in the Privacy Act 1988, yet gaps in their data practices put them at risk. From consent failures to poor data handling, here are the most common compliance blind spots businesses need to address. 

1. Data Collection  

For many businesses, certain data collection practices can increase compliance risks and security vulnerabilities. This includes:  

  • Unnecessary collection – if your business gathers data “just in case” rather than for an intended purpose or specific, immediate need, you may be in breach of the Privacy Act 1988 requirements. 
  • Sensitive information risks – the higher the risk of unauthorised access or activity involving the personal information (and/or potential harm to the person that information is about), the more robust your security controls need to be. This means implementing stringent measures (encryption methods, regular audits, access controls, etc.) to ensure that sensitive information is protected from breaches and misuse.  
  • Lack of transparency – individuals must be informed about how their data is collected, used, and disclosed. If your privacy policy is vague, buried in legal jargon, or not easily accessible, you may not be meeting the Privacy Act compliance standards. 

By limiting data collection to what is strictly necessary and clearly communicating its use, businesses can reduce risk and build greater trust with customers. Plus, the less data you collect, the less you need to protect!  

2. Data Use and Disclosure 

Is your organisation handling personal data responsibly, using it only for its intended purpose? When gaps in data use and disclosure go unnoticed, it can put you at risk of non-compliance, for example:  

  • Using data beyond intended purposes – other than what has been stated at the time of collection, without obtaining proper consent. 
  • Unauthorised disclosure – sharing personal information with third parties without proper authorisation or legal basis. 
  • Data breaches – failing to implement adequate security measures to protect personal information from unauthorised access, use, disclosure, or destruction. 

Consider, for instance, businesses introducing personal information to train an AI model. Without explicit disclosure and express consent at the time of collection, repurposing individuals’ data in this way could breach the Privacy Act compliance obligations. 

3. Data Quality 

One thing many organisations overlook is how easily poor data quality can lead to compliance risks. This includes maintaining inaccurate, incomplete, or outdated personal information, and obstructing individuals’ rights to access and correct their personal information. Failing to update records not only undermines trust but can also lead to incorrect decisions based on flawed data.  

Does your organisation give people access or opportunities to correct their personal information? Difficult processes, such as outdated systems, unclear policies, or unnecessary administrative barriers doesn’t meet the mark.  

Additionally, does your organisation have a data retention policy, and act on it? For example, a medical practice is legally required to retain data for at least 7 years or more, depending on the type of facility and the state in which it operates, but often keeps patient records for decades. While policies are important, procedures are necessary to back them up. 

4. Individual Rights 

Many organisations don’t realise ignoring, delaying, or denying individual’s requests to access, correct or delete their personal information can put them at risk of non-compliance. Not honouring these requests can lead to complaints and penalties.  

The same risks apply if your privacy policy is filled with legal jargon, or doesn’t include clear, concise information about individual’s privacy rights. Having a poorly expressed, out-of-date or inadequate Privacy Policy – could lead to an infringement notice for up to $330,000 under the new Tranche 1 Privacy and Other Legislative Amendments (POLA) laws coming into effect. This is where transparency and responsiveness need to be front and centre. While the process for handling requests can vary from business to business, you may like to consider appointing a privacy officer, or including this as a core responsibility for a team member, to support accountability.  

The Consequences of Non-Compliance 

When Privacy Act compliance slips through the cracks, the fallout can be swift and severe. Businesses may face hefty fines, which can reach into the millions, as well as potential civil lawsuits from affected individuals. The Tranche 1 POLA law now includes a “Tort for serious invasions of privacy”. This new cause of action empowers an individual to sue another person where that person has invaded the individual’s privacy by intruding upon their seclusion or misusing information relating to them. Under this tort, any individual or organisation can be sued. 

Beyond legal penalties, reputational damage and losing customer trust can be just as costly. Since customers expect their personal information to be handled with care, privacy breaches can quickly erode this trust and leave your business at a competitive disadvantage.  

Prioritising data privacy and supporting compliance means protecting your business’s future.  

Top Tips for Supporting Compliance 

Meeting Privacy Act standards involves more than ticking boxes. It requires an ongoing commitment to safeguarding personal information and using it appropriately. By taking proactive steps, businesses can reduce risk, build trust, and stay ahead in an evolving digital landscape. Here are some tactics for strengthening your approach to compliance. 

Conduct a Privacy Audit 

Start by assessing your current data handling practices against the Privacy Act. Identify gaps in how personal information is collected, stored, and shared. A thorough audit helps uncover risks before they become compliance issues. ADITS’ exclusive assessment focuses on APP11, and provides a comprehensive evaluation of over 200 controls across 17 practice areas. 

Develop a Comprehensive Privacy Policy 

A well-defined privacy policy includes transparency and accountability. Clearly outline how your organisation collects, uses, and discloses personal information, as well as individual’s rights about their data. 

A comprehensive privacy policy includes:  

  • Data collection – the types of personal information as well as how and why it is collected (included if this information is via referral or a third party). Organisations should only be collecting the personal information that is necessary for the purposes for which it is processed, ensuring that excessive or irrelevant data is not gathered.  
  • Data use – specific information about how it will be used (including primary and secondary purposes)  
  • Data protection – how this information is secured (such as through encryption, utilising Australian storage, securing paper records, and access controls), and prove that your organisation has taken all of the reasonable steps possible to protect data.  
  • Data retention – policies about what happens to information when it is no longer required.  
  • Processes – for data breaches or complaints.  

Ensure Effective Data Governance 

Effective data governance is crucial to ensure that your organisation manages its data properly and securely. Begin by identifying the types of personal and sensitive data your organisation handles. This includes determining where this data is stored, processed, and transmitted. 

Next, classify your data based on its sensitivity and importance. This helps in applying appropriate security controls and ensuring that sensitive data receives the highest level of protection. 

Unstructured data, such as emails and documents, can often be challenging to manage. Implement tools and processes to organize, store, and secure this type of data effectively. 

Know where your personally identifiable (PI) and sensitive data resides within your organisation. Ensure that it is stored in approved systems that comply with security and privacy regulations. 

Implement Strong Security Measures 

In protecting data privacy, robust security measures are essential. Consider measures such as strong passwords and MFA (multi-factor authentication), access controls, firewalls, anti-malware software and employee training to protect sensitive information from unauthorised access and breaches. 

Provide Your Team with Adequate Training  

Even the best policies don’t work if your team members don’t follow them, or are uncertain about how to put them into practice. Regular privacy training can help your people understand their obligations, recognise risks, and apply best practices to prevent Privacy Act compliance violations. Incorporate privacy training within your cyber security awareness training. ADITS, for instance, does so through our cyber security training program. The OAIC also offers privacy training video modules. 

Regularly Review and Update Practices 

As privacy law and risks continue to evolve, so should your approach to compliance. Stay informed about changes to Australian privacy laws, review your policies regularly, and adjust your data practices accordingly to keep up with new legal and security expectations. 

On one hand, supporting Privacy Act compliance is a legal requirement. On the other, it’s an opportunity to develop trust with your customers. Taking smart measures, such as prioritising transparency, handling data properly, and providing your team members with ongoing training can help put your organisation on the front foot. As privacy laws in Australia change, being proactive is a great way to develop your business’s reputation and relationships, protect individuals from data breaches, and reduce risk. 

For more information about how we can protect your data, check out our CyberShield solution.  

The Growing Importance of Data Privacy for Queensland NFPs

Every hour, 10 cyber-crime reports are received by the Australian Cyber Security Centre (ACSC) – and nonprofits are not exempted from these attacks:

  • Over 70 charities were affected by last year’s data breach on Pareto Phone, a firm that collects donations from nonprofit supporters. Credit card and other personal information of at least 50,000 individuals were published on the dark web.
  • Attackers targeted children’s charity The Smith Family, exposing around 80,000 details – including names, addresses, phone numbers, email addresses, donation records, and the first and last four digits of credit or debit cards.
  • A cyber incident also happened at the not-for-profit (NFP) provider of health and aged care services, St. Vincent’s Health Australia, with 4.3 gigabytes of data reportedly stolen from their network.

 

Why Cyber-Attacks on NFPs are Rising

At least three reasons are behind the increasing cyber incidents experienced by NFPs:

  1. More and more nonprofits are embracing digitisation and automation. This trend is expected to increase their exposure to cyber risk.
  2. NFPs are easy targets because cyber criminals assume that they lack sufficient cyber security resources and expertise.
  3. Many nonprofit organisations handle sensitive information, which are attractive to cybercriminals.

Donor data and client records represent goodwill and trust. For donors, it’s a testament to their belief in the mission of the NFP. For clients, these records represent their personal journeys, often shared in confidence. As data custodians, nonprofits must keep fortifying their digital defences.

 

Data Privacy Regulations

The Australian Charities and Not-for-profits Commission (ACNC) emphasises the legal obligation for nonprofits to comply with requirements concerning people’s information and data, as outlined in the Privacy Act 1988.

The Privacy Act 1988

Nonprofits in Queensland may be subject to the Privacy Act 1988 if they collect and store people’s information and data, or their annual turnover exceeds $3 million, or if a nonprofit opts in, or in certain other circumstances as described in our article Understanding the Privacy Act Review: Its Impact on Nonprofits, Medical, and Education Sectors.

Here’s how they are to comply:

  • Develop a Privacy Policy that outlines how the organisation collects, stores, and uses people’s information and data
  • Manage information and data in accordance with all legal and ethical responsibilities
  • Implement security measures for storing personal information
  • Obtain consent when collecting sensitive and health information
  • Inform individuals about the collection of their personal information and its purpose

A good rule of thumb is to consider that all privacy laws apply to your organisation, especially following the recent updates. Data privacy compliance can also:

  • Build trust with donors, supporters, and members
  • Ensure that a nonprofit meets their legal obligations
  • Improve the reputation and community support to an NFP

Health Services Act 1991 (Qld)

For nonprofits in the health sector, the Health Services Act 1991 (Qld) provides the framework for the organisation, management, and delivery of health services in Queensland.

The Act prohibits health staff from disclosing confidential information about a person who is receiving, or who has received, a public sector health service if the person could be identified from the information.

It’s important for health organisations to understand these provisions and ensure they are complying with them. Non-compliance could lead to legal consequences and damage to the organisation’s reputation, so it is best to consult with a compliance professional and stay updated with any changes to the Act.

 

Data Breach Risks Faced by Nonprofits

Data breaches are a constant threat to nonprofit organisations with consequences potentially undermining their mission. They’re facing digital risks as well as personal, financial, and reputational.

Immediate Risks

When sensitive information is compromised, it can lead to identity theft, financial loss, and fraud. For instance, the Pareto Phone breach highlights the vulnerability of nonprofits to cyber-attacks and the importance of strong cyber security measures.

Damaged Trust

The ramifications are not limited to the immediate financial impact. They can erode the hard-earned trust between nonprofits and their supporters, potentially leading to a decline in donations and volunteer engagement.

Harm to Reputation

The reputational damage can be long-lasting and more costly than the initial data loss. The risks also include legal consequences, especially with the mandatory data breach notification schemes in Queensland.

Far-reaching Impact

A breach on one organisation can affect individuals, but it can also lead to a loss of confidence in the nonprofit sector. NFPs thus need more stringent data protection and compliance practices.

 

What NFPs can Do for Data Protection

Just like any other sector, Nonprofits must invest in cyber security, educate their staff and volunteers about cyber threats, and establish clear protocols for data management and breach response.

Here are some best practices for data security and privacy you can quickly implement:

  • Multi-factor authentication (MFA), as a barrier against unauthorised access
  • Regularly updating your systems, which is a key to cyber resilience
  • Maintaining backups, which can be your lifeline in case of a disaster

It can be critical for nonprofit organisations to implement data management protocols and prepare for potential breaches with clear response strategies. Every NFP must have clear procedures for a rapid breach response, transparent communication, remediation steps, and an IT disaster recovery plan.

 

The Importance of NFP-specific Cyber Security Expertise

NFPs have to level up their cyber security expertise, now more than ever before. One way to do it is via a cyber security services provider with significant experience in the Not-For-Profit sector.

ADITS have been supporting NFPs for a number of years as we align with your values of community impact and positive change. We are committed to empowering your organisation to advance your mission with technology operating seamlessly behind the scenes.

Why is it important to have IT and cyber security services that are specially designed for nonprofits?

  • Customised Solutions: Nonprofits have distinct needs and missions. When IT services are customised and technology aligned with their specific goals, NFPs are enabled to create a stronger impact efficiently.
  • Proactive Monitoring: With dedicated monitoring of systems and software, potential issues in the sector can be detected early, minimising disruptions, and maintaining operational continuity for nonprofits.
  • Cyber Security: Protecting sensitive data should be a top priority for any NFP. Tailored cyber security measures will safeguard your mission against increasing cyber threats, ensuring trust, and compliance.
  • Strategic Support: Access to experienced IT professionals who understand the nonprofit sector can simplify technology management and reduce costs, allowing organisations to focus on their core mission without tech-related distractions.

In essence, specialised IT and cyber security services will empower you to navigate the complexities of technology with confidence, ensuring donor data security for non-profits and that you remain focused on making the world a better place.

Did you know ADITS can help you with your application for discounted Microsoft licences too? Simply book a consultation and we’ll guide you through the process.

 

Cyber Security and Data Privacy for the NFP Sector

Board members have an obligation to protect donor and volunteer data, but we understand that not everyone on the board needs to be tech-savvy. Staying up-to-date with the state of cyber security in Australia, understanding your liabilities, and distinguishing between security and compliance can feel overwhelming. At ADITS, we’re here to support organisations in Brisbane, Townsville, and across Queensland with tailored guidance to navigate these complexities confidently.

As it is your role as a board member to instil a cyber security and data privacy culture from the top throughout your organisation, enquire about our tailored cyber security training to receive the knowledge that will make you confidently lead your organisation:

Understanding the Privacy Act Review: Its Impact on Nonprofits, Medical, and Education Sectors

In February 2023, the Privacy Act Review Report was released after two years of extensive consultation and review of the Privacy Act 1988 (Cth). It included proposed reforms aimed at strengthening the protection of personal information and the control individuals have over their information.

But what does this actually mean for you?

Building on our previous discussion in the ‘Essential 8 vs. Privacy Act article’, we explore the nuances of the Privacy Act Review and its implications, particularly for the nonprofit, medical, and education sectors.

In This Article

 

What is the Privacy Act?

The Privacy Act review, initiated in Australia, was designed to update privacy laws in light of technological advancements. It focuses on data handling, individual rights, organisational accountability, and regulatory enforcement, ensuring that privacy laws stay relevant.

 

Report Definitions: “Agreed” vs “Agreed in Principle”

“Agreed” Proposals

When the government agrees to a proposal, it means that they have committed to developing legislative provisions for these measures. This agreement is more definitive, indicating a clear intention to enact the proposed changes.

“Agreed in Principle”

This indicates a provisional agreement subject to further engagement and analysis. It means that while the government supports the idea behind the proposal, it requires more detailed examination, impact analysis, and consultation with regulated entities. This is to ensure a balanced approach, considering both privacy benefits and the potential economic and regulatory impacts on entities.

 

Timeline and Next Steps

The review process involved evaluating the pros, cons, and costs of various proposals. This led to the modification of some proposals, the discontinuation of others, and the introduction of new ones. Some proposals haven’t been subject to stakeholder feedback yet and will need further discussions before they can be implemented. Considering the comprehensive steps of consultation, impact assessment, and legislative development, it’s anticipated that the actual implementation of these changes might not take place until late 2024 or later.

 

How the Privacy Act Review Affects Non-Profits

Here is a collection of principles that could impact non-profits and potential use cases:

Agreed In Full Agreed In Principle
Protection of De-identified Information (Proposal 21.4): A domestic violence support centre safeguards de-identified client data.

New Tiers of Civil Penalty Provisions (Proposal 25.1 & 25.2): A mental health service provider could face penalties for mishandling client data.

Consent for Geolocation Tracking Data (Proposal 4.10): An app by a homeless support organisation gets explicit consent for tracking location data.

Standard Contractual Clauses for Overseas Data Transfer (Proposal 23.3): Organisations ensure the protection of sensitive data when sharing with international partners.

Sensitive Information: Support services dealing with genetic disorders must ensure robust consent processes and secure data handling.

Fair and Reasonable Information Handling: Charities must ensure the fair use of personal stories and data in campaigns.

Vulnerability Protections: Services supporting vulnerable groups like domestic violence survivors must handle data with additional care.

Organisational Accountability: A privacy officer is needed to ensure data protection and handle privacy inquiries or complaints.

 

How the Privacy Act Review Affects the Medical Industry

Here is a collection of principles that could impact medical and healthcare organisations and potential use cases:

Agreed In Full Agreed In Principle
Purpose Identification for Consent (Proposals 14.2 & 14.3): A clinic must transparently state why it’s collecting patient data, such as for treatment, billing, or sharing with specialists.

Amendment to Objects of the Act (Proposals 3.1 & 3.2): Healthcare providers must balance patient care with the individual’s right to privacy.

Protection of De-identified Information (Proposal 21.4): Hospitals protect de-identified patient data from potential misuse or re-identification.

Enhanced OAIC Guidance for Data Destruction and De-identification (Proposal 21.5): Medical practices follow detailed guidelines for destroying or de-identifying patient health records.

New Tiers of Civil Penalty Provisions (Proposal 25.1 & 25.2): Clinics could face penalties for improper handling of patient data or administrative breaches.

Consent for Geolocation Tracking Data (Proposal 4.10): Healthcare apps require explicit consent from users before tracking their precise location data.

Emergency Declarations and Information Disclosure (Proposal 5.4 & 5.5): In health crises, hospitals may need to disclose patient information to state authorities under emergency declarations.

Standard Contractual Clauses for Overseas Data Transfer (Proposal 23.3): Medical research institutes use standard contractual clauses when sharing patient data overseas.

Requirement for Redress in Privacy Breaches (Proposal 25.5 & 25.6): Healthcare facilities must provide redress for harm caused by data breaches, including mitigating any potential damage.

Clarification of Personal Information: Hospitals must consider data like IP addresses from online consultations as personal information.

Sensitive Information: Genetic testing labs must implement heightened security measures, like encryption and strict access controls, for genomic data.

Small Business Exemption Removal: Small clinics will now need comprehensive privacy policies and data protection practices.

Fair and Reasonable Information Handling: Patient data used for research must be transparent and within ethical guidelines.

Enhanced Data Breach Obligations: Hospitals must report breaches within 72 hours to authorities and affected patients.

Organisational Accountability: A privacy officer in a healthcare provider must oversee data handling and staff training on privacy policies.

High Privacy Risk Activities: New patient data systems require Privacy Impact Assessments before use.

Automated Decision-Making (ADM) Policies: Telehealth apps using ADM must clearly disclose how decisions impact patient care.

Direct Marketing, Targeting, and Trading: Pharmaceutical companies must comply with strict rules for marketing based on healthcare professionals’ data.

Children’s Privacy: Paediatric services must ensure digital platforms comply with new rules on children’s data.

Vulnerability Protections: Hospitals need extra data protection measures for patients with mental health issues eg: encryption

Simplification of Terms and Obligations: Healthcare IT providers need clear distinctions in their roles as data processors or controllers.

Overseas Data Flow Regulations: Research firms must use standard contractual clauses for international data sharing.

Expanded Individual Rights: Patients can ask hospitals to delete or explain the use of their medical records.

 

How the Privacy Act Review Affects the Education Sector

Here is a collection of principles that could impact the education sector and potential use cases:

Agreed In Full Agreed In Principle
Purpose Identification for Consent (Proposals 14.2 & 14.3): A high school clearly states why it’s collecting personal information, like health records or educational support services.

Amendment to Objects of the Act (Proposals 3.1 & 3.2): A primary school ensures the protection of student and parent information, aligning educational needs with privacy rights.

Enhanced OAIC Guidance for Data Destruction and De-identification (Proposal 21.5): Schools adhere to guidelines on securely destroying or de-identifying records, such as counselling notes.

Emergency Declarations and Information Disclosure (Proposal 5.4 & 5.5): Schools may disclose student information to authorities in emergencies under specific conditions.

Requirement for Redress in Privacy Breaches (Proposal 25.5 & 25.6): Schools are required to identify, mitigate, and provide remedies for any harm caused by a data breach.

Clarification of Personal Information: Schools handling online learning data must treat technical details, such as login information, as personal information.

Small Business Exemption Removal: Small tutoring services must ensure compliance with the Privacy Act, including data protection and breach notification.

Enhanced Data Breach Obligations: Schools must rapidly inform parents and authorities of any data breaches, adhering to the 72-hour notification rule.

High Privacy Risk Activities: Schools implementing student tracking systems must evaluate privacy risks beforehand.

Automated Decision-Making (ADM) Policies: Learning platforms using ADM for student paths need transparent data use policies.

Direct Marketing, Targeting, and Trading: Educational apps must adhere to new regulations on targeted advertising to students.

Children’s Privacy: Schools need to safeguard children’s data on educational platforms, avoiding improper collection or use.

Simplification of Terms and Obligations: Educational software companies must understand their data handling roles when providing services to schools.

Overseas Data Flow Regulations: Universities collaborating internationally must ensure appropriate data transfer agreements.

Expanded Individual Rights: Parents and students can request schools to delete or detail the use of their personal data.

 

Where to from here?

Understanding these changes and preparing for their implementation is crucial for non-profits, healthcare providers, and educational institutions. The Privacy Act also plays a vital role in cyber security, but it’s not often discussed as part of a robust cyber security strategy,

Unlike others who solely focus on the Australian Cyber Security Centre’s Essential 8 framework, our cyber security solution, CyberShield, goes above and beyond that framework. CyberShield is a unique offering focused on compliance and governance measures, coupled with robust security tools and managed IT Services. The solution is also tailored according to your industry requirements.

Discuss your industry requirements with our experts and book a consultation with the ADITS team today. Whether you’re in Brisbane, Townsville, or anywhere across Queensland, we’re here to provide tailored IT and cyber security solutions to meet your unique needs. Let’s work together to secure your organisation’s future.

CONTACT US

 

C-Suite & Board Training: Because it all starts at the top!

Take your first step towards a stronger, more secure and compliant business by registering your interest for our half-day certified C-Suite & Board training. We’ll cover:

  • Data security and privacy compliance
  • Potential risks to your business and how to address them
  • Personal liabilities
  • Reporting
  • Crisis management recommendations
  • Best practices for policies and procedures
  • And more!

 

Register Your Interest

Navigating Cyber Security Compliance and Regulations: Essential 8 vs. Privacy Act

The ASD Cyber Threat Report 2022-2023 released mid-November 2023 highlights alarming results. It reveals that:

  • The number of cybercrime reports has increased by 23%
  • The average cybercrime cost per report is up 14%

Cybercriminals were described as adversaries who show “persistence and tenacity” and “constantly test vulnerabilities in Australia’s cyber ecosystem and employ a range of techniques to evade Australia’s cyber defences.”

As an authorised Australian Government framework, the Essential Eight were of course among the measures suggested in the report to be implemented. We’ll start off by reviewing the Essential Eight and then delve into a framework that is less talked about but is actually mandatory for most Australian organisations – the Privacy Act.

 

The Essential 8 is a Good Foundation (But Not the Finish Line)

The Essential Eight is a set of controls prescribed by the Australian Cyber Security Centre (ACSC) to protect organisations from cyber threats and attempts to compromise the personal information of their customers and stakeholders.

The eight strategies are:

  • Application control – restricting the use of unapproved software
  • Patching applications – updating software to fix vulnerabilities
  • Configuring Microsoft Office macro settings – disabling/limiting macros from running malicious code
  • User application hardening – disabling exploitable features (e.g., web browser plug-ins)
  • Restricting administrative privileges – limiting the number of users who can perform high-risk actions
  • Patching operating systems – updating the system software to fix security vulnerabilities
  • Multi-factor authentication – requiring an additional security layer to verify a user’s identity
  • Daily backups – creating copies of important data and storing them securely

The ACSC has developed a security model from 0 to 3 for each of these strategies. An organisation with a maturity level 0 has not achieved any of the requirements. A level 3 means the organisation has achieved a high level of maturity. A common misconception is that organisations must achieve level 3 to be compliant. On the contrary, organisations can adopt the maturity level they need, depending on their vulnerabilities to cyber threats.

The Essential Eight cyber security risk mitigation are baseline strategies, and implementing them is the minimum expected from organisations. They are foundational and highly recommended, but your cyber security efforts should not stop there.

 

The Privacy Act: Mandatory for Data Protection

In its latest report, the Australian Signals Directorate (ASD) urges businesses to ensure resistance to cyber threats and go beyond the Essential Eight.

Say hello to the Privacy Act 1988.

Whilst the Essential Eight is one of the most well-known frameworks in Australia, its strategies are actually not mandatory. In contrary, the Privacy Act is less mentioned but most Australian organisations handling personal information must comply with it.

The organisations covered by the Privacy Act have an annual turnover greater than $3 million* OR are:

  • An Australian Government agency;
  • Private sector health service providers including private hospitals, therapists, gyms and child care centres;
  • Not-for-profit organisations;
  • Businesses that sell or purchase personal information;
  • A credit reporting body;
  • A contracted service provider for an Australian Government contract;
  • A business that holds accreditation under the Consumer Data Right System; and
  • A business that is related to a business that is covered by the Privacy Act.

*Note: Following the Privacy Act review in September 2023, one of the ‘Agreed in Principle’ proposals was the abolishment of the small business ($3m) exemption. Find out more.

 

The Privacy Principles

The Privacy Act includes 13 Australian Privacy Principles (APPs) that organisations must comply with, so you should be careful of the financial risks if you were to be assessed by the government. Meanwhile, whilst the Essential Eight are not mandatory, being non-compliant with some of those steps could lead to legal actions under the Privacy Act.

In short, the Essential Eight and the Privacy Act are both vital to IT security and data protection – but let’s look at the Privacy Act in more detail. The law regulates how personal information is handled by organisations and agencies. Below is an overview of the APPs which set the standards, rights, and obligations for collecting, using, disclosing, storing, securing, and accessing personal information.

Principle Title Summary
APP 1 Open & Transparent Management of Personal Information APP entities must have a privacy policy and handle personal information lawfully and fairly.
APP 2 Anonymity & Pseudonymity Individuals must have the option to not identify themselves or use a pseudonym when dealing with APP entities, unless impracticable or unlawful.
APP 3 Collection of Solicited Personal Information APP entities must only collect personal information that is reasonably necessary or directly related to their functions or activities and do so by lawful and fair means.
APP 4 Dealing With Unsolicited Personal Information APP entities must determine whether they could have collected the personal information under APP 3 and, if not, destroy or de-identify it as soon as practicable.
APP 5 Notification of the Collection of Personal Information An APP entity that collects personal information must tell an individual about certain matters under certain circumstances.
APP 6 Use or Disclosure of Personal Information APP entities must only use or disclose personal information for the purpose for which it was collected unless the individual consents or an exception applies.
APP 7 Direct Marketing An organisation may only use or disclose personal information for direct marketing purposes if certain conditions are met.
APP 8 Cross-Border Disclosure of Personal Information Outlines what an APP entity must do to protect personal information before it is disclosed overseas.
APP 9 Adoption, Use or Disclosure of Government Related Identifiers APP entities must not adopt, use or disclose a government-related identifier of an individual, unless the identifier is prescribed by law, or an exception applies.
APP 10 Quality of Personal Information An APP entity must take reasonable steps to ensure that the personal information they collect, use, or disclose is accurate, up-to-date, complete, and relevant.
APP 11 Security of Personal Information APP entities must take reasonable steps to protect personal information from misuse, interference, loss, unauthorised access, modification or disclosure, and to destroy or de-identify personal information when it is no longer needed.
APP 12 Access to Personal Information An APP entity must give individuals access to their personal information on request, unless an exception applies, such as when giving access would pose a serious threat to someone’s life or health.
APP 13 Correction of Personal Information Outlines the reasonable steps an APP entity must follow to correct personal information that is inaccurate, out-of-date, incomplete, irrelevant or misleading, either on their own initiative or at the request of the individual.

Over the last few years, we’ve seen an influx of cybercrime which prompted a lengthy review of the Privacy Act. In September 2023, a report was released over 100 new principles and while some were agreed in full, there were many only “agreed in principle”. One in particular was the proposal to remove the exemption for small businesses.

 

Discover How This Impacts Your Organisation

How the Privacy Act Review Affects Non-Profits

How the Privacy Act Review Affects the Medical Industry

How the Privacy Act Review Affects the Education Sector

See Privacy Act Report

 

The Essential 8 and The Privacy Act: Parallel Paths to Protection

The frameworks of the Essential Eight and The Privacy Act both aim to enhance the cyber resilience and privacy protection of Australian entities. Here’s how they compare:

The Essential 8 The Privacy Act
What is it? A recommended set of eight strategies to mitigate cyber security threats and incidents. A comprehensive law that regulates the handling of personal information.
What’s the purpose? To help organisations prevent or minimise the damage caused by cyberattacks. To help organisations comply with their legal obligations and ethical responsibilities when handling personal information.
How do organisations benefit from it? Reduction of cyber-attack risk and protection of sensitive data. Prevention of data breaches and improvement in customer trust.
What are the consequences of non-compliance? No penalties but can increase the risk of threats and compromise sensitive data. Companies:

1. AU$50 million, or;

2. Three times the value of benefits obtained or attributable to the breach (if quantifiable) or;

3. 30% of the corporation’s ‘adjusted turnover’ during the ‘breach turnover period’ (if the court cannot determine the value of the benefit obtained)

Individuals:

Was $440,000 but was increased to $2.5 million on December 13th 2022.

What’s involved? Assessing an organisation’s current level of compliance, based on a four-tier maturity model, then implementing the strategies and moving toward optimal protection at maturity level 3. Understanding an organisation’s obligations under the APPs, then implementing privacy policies and practices, guided by resources and tools from the OAIC.
Who’s covered? Recommended for all organisations, but not mandatory for Australian businesses. Mandatory for organisations with an annual turnover of more than $3 million*. Some small businesses are also covered if they store person identifiable information and meet other criteria.

*This is expected to change following the Privacy Act Review.

Is it mandatory? Not mandatory for Australian businesses, but highly recommended.

 

Mandatory for Australian businesses that meet the criteria of APP entities.

 

 

What Your Cyber Security Strategy Should Look Like

In the end, your organisation should aim for the level of cyber protection that is best suited and ensure full compliance with laws and regulations. You can approach it with a combination of the 8 mitigation strategies and the 13 principles.

ADITS CyberShield solution takes cyber protection to a whole new level where security is at the core of everything we do. Our offering includes managed services and compliance & governance measures as well as security measures and monitoring to ensure your business is industry compliant. Whether you’re based in Brisbane, Townsville, or elsewhere, ADITS has you covered with tailored solutions to safeguard your organisation.

 

Your Cyber Security Journey

Compliance does not automatically translate to strong cyber security. Likewise, cyber security is not “set and forget”. It is a continuing process that needs your attention and effort if you want to ensure that your systems and data are always protected.

Understanding the Essential Eight and the Privacy Act is important. Since cyber security is complex and ever-evolving, it’s also vital to keep up-to-date with cyber security solutions, trends, and best practices. Though cyber security may seem mostly technical, it is in fact a business matter.

Executives and board members are personally liable in the event of a breach so instilling a cyber security culture throughout the organisation should be a priority.

With this in mind, ADITS is launching a half-day certified C-Suite training workshop where we’ll go through:

  • Data security and privacy compliance
  • Potential risks to your business and how to address them
  • Personal liabilities
  • Reporting
  • Crisis management recommendations
  • Best practices for policies and procedures

Register Your Interest For Our C-Suite & Board Training