Entities should handle personal information openly and honestly. This includes a policy that describes how your personal information is managed.
Individuals should be allowed to remain anonymous if they so desire, and use pseudonyms for personal data when possible.
Organisations must demonstrate that it needs personal data for its functions or activities.
Organisations must prove that if personal information is solicited it could be collected according to Principle 3.
An entity collecting personal information should notify the individual from whom the data is collected.
Entities should only use personal data that is relevant to the original purpose for which the information was collected. If the individual explicitly allows use of their data for another purpose, or if the entity could reasonably expect such use, they may collect other data.
Organisations may not use private information for marketing unless individuals can reasonably expect such use of their information or individuals have provided their consent and have a clear way to opt out.
When an entity shares personal data with someone outside Australia, the recipient must comply with the Australian Privacy Principles via contractual obligation. This is unless the entity sharing the data believes the recipient maintains a similar privacy regulation to the APP in their location, or the individual consented to sharing of their data with overseas parties and understands the entity does not take responsibility over the privacy practices of the recipient.
An entity may not use a government-related identifier as their own, or disclose an identifier of a person, unless the entity is authorised to do so by laws, or the identifier is needed to verify the identity of the individual.
All information received by the entity must be accurate, complete and up to date, and the organisation may only disclose and use information if it verifies this.
Entities are required to implement measures specifically designed for the protection of stored personal information from data interference, loss, misuse and modification, as well as unauthorised access and disclosure.
Entities must give the individual access to their personal information on request.
Entities must collect accurate and complete information, update personal information, collect only relevant, non-misleading information, notify affected entities when any corrections are made while collecting personal data.
Physical: Actual hardware sits at this layer. It transmits signals over media.
Data link: Translates binary/bits into signals and allows upper layers to access media.
Network: This layer determines how data is sent to the receiving device. It’s responsible for packet forwarding, routing, and addressing.
Transport: This layer coordinates data transfer between system and hosts, including error-checking and data recovery.
Session: This layer establishes and terminates connections between devices. It also determines which packets belong to which text and image files.
Presentation: This layer converts data to and from the Application layer. In other words, it translates application formatting to network formatting and vice versa. This allows the different layers to understand each other.
Application: Most of what the user actually interacts with is at this layer. Web browsers and other internet-connected applications (like Skype or Outlook) use Layer 7 application protocols.
data storage security policies (CIA)
access control
encryption
data loss prevention
strong network security
strong endpoint security
redundancy
backup and recovery