Data Protection Policy

Purpose

The purpose of this document is to demonstrate the management team’s commitment to the protection of personal and sensitive information.

Policy Overview

Colton Computer Technologies located at 156 Moulder St Orange NSW operates primarily in business of Managed IT Services.
We are committed to preserving the confidentiality, integrity and availability of all the physical and electronic information and information-related assets relevant to meet the purpose and goals of the organisation. This includes the handling of personal information or “Personally Identifiable Information” (PII).

Furthermore, we are committed to ensuring compliance with the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APP), and any other data protection legislation or regulation relevant to our business operations.

In complying with the above-mentioned legislation and regulation, the organisation makes commitments to implement policies and processes related to that compliance and to make staff and relevant third parties aware of their responsibilities when handling personal information.

More detailed policies and processes support this policy, including our Information Security Policy. A European Union General Data Protection Regulation (GDPR) compliance workspace is also maintained in line with Information Commissioner Office recommendations. These are located and managed within the ISMS.online platform.

This policy will be reviewed regularly to respond to any changes in the law, the business, its risk assessment, or risk treatment plan, at least annually.

Scope

All employees and relevant interested parties associated with the organisation’s handling of personal information must comply with this policy.
Appropriate training and materials to support it are available.

Definitions

The key definitions of terms used within or referred to by this policy are based upon those in the APP or other recognised documentation and are contained in Annex A.

Organisational Responsibilities

Our Privacy Officer has overall responsibility for the day-to-day implementation of this policy.
This policy will be reviewed regularly to respond to any changes in the business, it’s risk assessment or risk treatment plan, at least annually.

Specific Responsibilities:

Senior Information Risk Owner (SIRO)
  • Assumes full accountability for the information controlled and processed by the organisation including PII
  • Is the face and figurehead of the organisation to the Interested Parties. Holds a significant position in the organisation (C Level or one below), thus giving confidence to those parties that the organisation takes data protection and information security seriously.
Privacy Office (PO)
  • Keeping the Management team updated about data protection responsibilities, risks and issues
  • Reviewing all data protection procedures and policies on a regular basis
  • Arranging data protection training and advice for all staff members and this included in this policy
  • Answering questions on data protections from staff, management team and other stakeholders
  • Responding to individuals such as clients and employees who wish to know what data is being held on them by Colton Computer Technologies
  • Checking and approving with third parties that handle the company’s data any contracts or agreement regarding data processing.
Information Security Manager (ISM)
  • Ensure that information security risks have been identified and assessed, taking into account any special requirements for personal information.
  • Supporting and advising other responsible managers and individuals about information security requirements, policies & controls
IT Manager
  • Ensure all systems, services, software and equipment meet acceptable security standards.
  • Checking and scanning security hardware and software regularly to ensure it is functioning properly.
  • Researching third-party services, such as cloud services the company is considering using to store or process data
Marketing Manager (Currently outsourced)
  • Approving data protection statements attached to emails and other marketing collateral.
  • Addressing data protection queries from clients, target audiences or media outlets.
  • Coordinating with the Privacy Officer to ensure all marketing initiatives adhere to data protection laws and the company’s Data Protection Policy.
  • Complying with other legislation and regulation relevant to data protection in marketing activities.

Staff data protection training

All staff will receive training on this policy. New recruits will receive training as part of their induction. Further training will be provided at least every two years or whenever there is a substantial change in the law or our policy and procedure.

Training is provided on a regular basis and when specific trigger events occur e.g. threats or incidents affecting all or part of the organisation, its supply chain or other Interested Parties that might impact the organisation financially or reputationally.

It will cover:

  • The law relating to data protection.
  • Our data protection and related policies and procedures.

Completion of this training is mandatory and where appropriate will be evidenced by task completion in the ISMS.online platform.

Privacy Notice – transparency of data protection

Being transparent and providing accessible information to individuals about how we will use their personal information is important for our organisation and is required under the Australian Privacy Principles (APP). Whenever personal information is being collected we will document and provide a Privacy Notice in line with the requirements of APP 5.

A template privacy notice is located within the ISMS.online platform.

Conditions for processing

We will ensure any use of personal information is justified using at least one of the conditions for use (described further below) and this will be specifically documented in the ISMS.online platform. All staff who are responsible for the use of personal information will be aware of the conditions of use. The conditions of use will be available to individuals in the for a privacy notice.

Justification for personal information

We will process information in compliance with all 13 Australian Privacy Principles.

We will document the additional justification for the processing of sensitive data, and will ensure any biometric and genetic data is considered sensitive.

Sensitive Information

In most cases where we collect and use sensitive information we will require the individual’s explicit consent to do this unless exceptional circumstances apply, or we are required to do this by law (e.g. to comply with legal obligations to ensure health and safety at work). Any such consent will need to identify clearly what the relevant data is, why it is being processed and to whom it will be disclosed.

Fair and lawful processing

We must process personal information in accordance with the APP.

Under APP 8, this means that we cannot disclose or use personal information unless:

  • The individual has consented to the use or disclosure of the personal information;
  • The individual would reasonably expect us to use or disclose the personal information if:

    • Where the information is sensitive information, the use is directly related to the primary purpose for which we collected the data; and
    • Where the information is personal information, the use is related to the primary purpose for which it was collected.
  • We are required to use or disclose the information by or under an Australian law or a court/tribunal order; or
  • A permitted general situation exists (as referred to in section 16A of the Privacy Act), for example, it is impracticable to obtain the person’s consent and it is reasonably necessary for public health or safety or to prevent a threat to the life of an individual;
  • A permitted health situation exists (as referred to in 16B of the Privacy Act); or
  • We consider that the use or disclosure of the information is necessary for enforcement related activities conducted by an enforcement body.

Our Terms of Business and website contains a Privacy Notice to clients on data protection.

The notice:

  • Sets out the purposes for which we hold personal information on clients and employees
  • Highlights that our work may require us to give information to third parties such as expert witnesses and other professional advisers
  • Provides that clients have a right of access to the personal information that we hold about them

Consent

The data that we collect is subject to implied consent by the individual. This consent can be revoked at any time.

Accuracy and relevance

We will ensure that any personal information we process is accurate, adequate, relevant and not excessive, given the purpose for which it was obtained. Individuals may ask that we correct personal information relating to them. If you believe that information is inaccurate, you should record the fact that the accuracy of the information is in dispute and inform the Privacy Officer.

Data Portability

Upon request, an individual should have the right to receive a copy of their data in a structured format. Note that there are exceptions to this, including where we believe the provision of this information would pose a serios threat to the life, health or safety of an individual, the request would have an unreasonable impact on the privacy of other individuals, or the request is frivolous or vexatious. These requests should be processed within one month, provided there is no undue burden.

An individual may also request that their data is transferred directly to another system.

Right anonymity and pseudonymity

We must give the individuals the option of not identifying themselves or of using a pseudonym, if it is practical.

Privacy by design and default

Privacy by design is an approach to projects that promote privacy and data protection compliance from the start. The Privacy Officer will be responsible for conducting Privacy Impact Assessments (PIA) and ensuring that all IT and other relevant projects commence with a privacy plan. ISMS.online provides a PIA framework that is used for managing the process and documenting the approach.

When relevant, and when it does not have a negative impact on the individual, privacy settings will be set to the most private by default.

International data transfers

No data may be transferred outside of the Australia without first discussing it with the data Privacy Officer. Specific consent from the individual must be obtained prior to transferring their data outside Australia.

Data security

We must keep personal information secure against loss, interference or misuse. Where other organisations process personal information as a service on our behalf, the Privacy Officer will establish what, if any, additional specific data security arrangements need to be implemented in contracts with those third party organisations.

The organisation has a documented “Information Security Policy” and a set of subordinate security policies and controls relating to our management of data and information security. These are held within the ISMS.online platform.

Data retention

We must not retain personal information for longer than is necessary. What is “necessary” will depend on the circumstances of each case, taking into account the reasons that the personal information was obtained, but should be determined in a manner consistent with our data retention guidelines.

Data retention schedules will be maintained showing the minimum and maximum periods of retention for each data set. We must destroy the information or ensure that the information is de-identified when we no longer need the information for any purpose for which it was obtained and we are not required to retain it under any laws.

Data audit and register

Regular data audits to manage and mitigate risks will inform the data register. This contains information on what data is held, where it is stored, how it is used, who is responsible and any further regulations or retention timescales that may be relevant.

Staff Responsibilities

All individual staff members are responsible for playing their part in maintaining the confidentiality, integrity and availability of personal information in compliance with the APP and Privacy Act 1988 (Cth) as well as organisational policies, standards and procedures.

You must familiarise yourself with the requirements contained in this policy and any other relevant security policy and comply with any requirements relating to the proper handling and security of personal information.

Your personal information

You must take reasonable steps to ensure that personal information we hold about you is accurate and updated as required. For example, if your personal circumstances change, please inform the Privacy Officer or the HR Department so that they can update your records.

Handling others’ personal information

You must familiarise yourself with the organisational responsibilities detailed above and ensure that you comply with these whenever you are handling personal information. Special care and attention must be given when handling sensitive information.

Processing data in accordance with the individual’s rights

You must abide by any request from an individual not to use their personal information for direct marketing purposes. Notify the Privacy Officer about any such request if it falls outside of the normal processes or you have any reason to be unsure about the appropriate practice.

Contact the Privacy Officer for advice on direct marketing before starting any new marketing activity to ensure compliance with all relevant data protection and other legislation.

Reporting breaches

All members of staff have an obligation to report actual or potential data protection weaknesses, events and incidents where compliance may be breached. This allows us to:

  • Investigate the failure and take remedial steps if necessary.
  • Maintain a register of compliance failures.
  • Notify the Information Commissioner of any compliance failures that are material either in their own right or as part of a pattern of failures; and
  • Otherwise comply with our obligations under the Privacy Act relating to data breaches.

The reporting of such weaknesses, events and incidents will be managed through our Information Security Incident Management Processes.

Monitoring

Everyone must observe this policy this policy. The Privacy Officer has overall responsibility for this policy. They will monitor it regularly to make sure it is being adhered to.

Annex A – Key Definitions

APP Entity

Means an agency or organisation

Australian Privacy Principle

has the meaning given by section 14 of the Privacy Act 1988

Individual

“Individual” means an individual who is the subject of personal information or sensitive information;

Personal Information

Personal Information means information or an opinion about an identified individual, or an individual who is reasonably identifiable:

  1. whether the information or opinion is true or not; and
  2. whether the information or opinion is recorded in a material form or not. [source Privacy Act]

Sensitive information

Sensitive Information means:

  1. information or an opinion about an individual’s
    1. racial or ethnic origin; or
    2. political opinions; or
    3. membership of a political association; or
    4. religious beliefs or affiliations; or
    5. philosophical beliefs; or
    6. membership of a professional or trade association; or
    7. membership of a trade union; or
    8. sexual orientation or practices; or
    9. criminal record;
      1. that is also personal information; or
      2. health information about an individual; or
      3. genetic information about an individual that is not otherwise health information; or
      4. biometric information that is to be used for the purpose of automated biometric verification or biometric identification; or
      5. biometric templates. [source Privacy Act]

Processing

“Processing” means any operation or set of operations which is performed on personal information or on sets of personal information, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. [source GDPR]

Consent

Means express consent or implied consent [source Privacy Act 1988]

Are you already completely sick of IT? Let Us help!