0% found this document useful (0 votes)
118 views

Privacy Policy Case

This document outlines three scenarios involving breaches of information privacy principles and asks how the principles were breached and how to address each situation. In the first scenario, a technician accessed a personal file without authorization. In the second, personal details about a misconduct hearing were disclosed to someone other than the individual without consent. In the third, an employee accessed a student's personal information without reason related to their role and sent a birthday card to their home address. The document provides principles of privacy policy and asks the reader to identify which were breached in each case and how to remedy the situations.

Uploaded by

Deepika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views

Privacy Policy Case

This document outlines three scenarios involving breaches of information privacy principles and asks how the principles were breached and how to address each situation. In the first scenario, a technician accessed a personal file without authorization. In the second, personal details about a misconduct hearing were disclosed to someone other than the individual without consent. In the third, an employee accessed a student's personal information without reason related to their role and sent a birthday card to their home address. The document provides principles of privacy policy and asks the reader to identify which were breached in each case and how to remedy the situations.

Uploaded by

Deepika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Practical applications of an Information Privacy Plan

By Group A Section 1

Submitted to

Prof. Gurudutt. S. Nayak

Group members:

Roll No Name
19F109 Angelina Rose Edgar
19F118 Deepika Kothari
19F121 Eranki Raghavendra Sai Praphul
19F146 Royston Franklin Dias
19F154 Sree Charan Reddy Talla
19F215 Damini Desur

October 20, 2020


Principles of Privacy policy given:

a. Personal information is collected and used only for a lawful purpose that is directly related to the
collector 's function.

b. Before the information is collected, the individual concerned should be made aware of the
purpose, whether it is required by law, and to whom the information will passed on.

c. Files containing personal information should be held securely and protected against loss;
unauthorized access, use, modification, or disclosure; or any other misuse.

d. Personal information can only be disclosed to another person or agency if the person concerned is
aware of it and has consented and the disclosure is authorized as required by law.

e. Personal information should not be used without taking reasonable steps to ensure that it is
accurate, up-to-date, and complete.

Scenario 1
Roger, a photocopier technician, has been asked to repair an office photocopier that just broke
down while someone was copying a grievance matter against an employee of the agency. The officer
who was copying the file takes the opportunity to grab a cup of coffee and leaves Roger in the
photocopy room while the photocopier cools down. While waiting, Roger flips through the file and
realizes that the person against whom the grievance was made lives on the same street as he does.

1. What information privacy principles (IPPs) have been breached:

c. Files containing personal information should be held securely and protected against loss;
unauthorized access, use, modification, or disclosure; or any other misuse.

2. How:

The file containing the personal information of the employees was not kept securely by the officer

The technician was not authorised to access the information

3. What you would do to address the situation:

Scenario 2
Tom telephones a student at home about attending a misconduct hearing. The student is not at
home; however, the student's partner, Christine, answers the phone. She states that she knows all
about the misconduct hearing but asks for clarification of the allegations When pressed, Tom
provides further details. Tom feels comfortable about providing this information to Christine
because she is the student's partner, and she has already told Tom that she knows all about her
partner's misconduct hearing.

1. What information privacy principles (IPPs) have been breached:

d. Personal information can only be disclosed to another person or agency if the person concerned is
aware of it and has consented and the disclosure is authorized as required by law.

2. How:

The person concerned was

3. What you would do to address the situation:

Scenario 3
Brad works in a student administration center, and Janet is a student. They know each other, as they
used to attend the same high school. Occasionally, they get together at the university to have coffee
and chat about mutual friends. Brad knows that Janet's birthday is coming up because Janet
happened to mention that she'll be another year older in the near future. Brad decides to access the
student information system to find out Janet's date of birth and home address. A few weeks later,
Janet receives a birthday card from Brad sent to her home address.

1. What information privacy principles (IPPs) have been breached:

a. Personal information is collected and used only for a lawful purpose that is directly related to the
collector 's function.

c. Files containing personal information should be held securely and protected against loss;
unauthorized access, use, modification, or disclosure; or any other misuse.

2. How:

3. What you would do to address the situation:

You might also like