Welcome to the Â鶹´å Policy Library.
If you are unable to find what you are looking for please use the 'search' function below.
Delegations of Authority Policy is the key document for who is responsible to exercise a delegation – Note: Policies and procedure documents may not reflect the current delegations. Please refer to the Delegations of Authority Policy to identify who the delegate is.

Either type in a key word(s) in the search bar (e.g. scholarship) or select ‘Exact Search’ to search for a specific phrase (e.g. Commonwealth Supported Places)
Privacy Policy
Purpose:
This Privacy Policy (Policy) outlines the personal information handling practices of the Â鶹´å of Canberra and describes the framework to protect the privacy of all personal information or other data collected by the Â鶹´å in compliance with relevant privacy laws.
Scope:
This Policy applies to all members of the Â鶹´å, including its staff and controlled entities, unless otherwise agreed by Council and the Vice-Chancellor of the Â鶹´å. A reference to the Â鶹´å in this Policy is a reference to all such entities of the Â鶹´å.

This Policy incorporates and is to be read in conjunction with the Â鶹´å’s Privacy Management and Data Breach Plan (Appendix 2) as well as the Data Classification Schedule (Appendix 3).

Definitions
Highly Sensitive means data subject to regulatory control, Â鶹´å Legal Advice, Personal Information about persons under age of 18, Tax File Numbers, Credit card details, campus safety data, personnel and/or payroll records, student records, commercial data belonging to a third party (contracts and commercial in confidence), patent information, personal health information and clinical trial data. It also includes data identified under the Australian government security classification system as confidential or higher (refer to www.protectivesecurity.gov.au).

Personal Information means information or an opinion about an identified individual, or an individual who is reasonably identifiable, whether the information or opinion is true or not; and whether the information or opinion is recorded in a material form or not. It does not include personal health information.

Personal health information is highly sensitive and means any Personal Information, whether or not recorded in a health record relating to the health, an illness or a disability of the individual; or collected by a health service provider in relation to the health, an illness or a disability of an individual.

Private information includes but is not limited to business unit process and procedure, unpublished intellectual property, ITC system design and configuration information, a limited range of Personal Information such as student numbers.

Sensitive information means in relation to an individual, information or an opinion about an individual’s racial or ethnic origin, immigration status, political opinions, memberships of political, professional and trade associations and unions, religious and philosophical beliefs, sexual orientation or practices, criminal history, health information, and genetic and biometric information. In relation to the Â鶹´å, it means organisational financial data, exam material and results, internal directories and organisational charts, internal planning documents, research data (containing Personal Information), and data considered commercial in confidence.
Principles:
The Â鶹´å will strive to create, promote and maintain a culture of respect for the privacy of all individuals.
Through the management of privacy and incorporating privacy requirements into processes, procedures and information systems, the Â鶹´å aims to foster and support a relationship of trust between the Â鶹´å and its staff, students and members of the community.

The Â鶹´å’s Approach
The Â鶹´å will only collect, hold, use and disclose Personal Information to enable the Â鶹´å to meet legal obligations and where it is reasonably necessary or related to one or more of the Â鶹´å’s functions or activities.

These include:
  • for students (includes past, current and future): to administer enquiries, admission, enrolment, academic progress, academic integrity, discipline, graduation, accommodation, access to Â鶹´å facilities and services, library loans, fees, visa, immigration, taxation and financial support purposes, and in relation to graduates, for alumni activities; and
  • for employees, affiliates, visitors and sub-contractors: to administer pay, entitlements, performance, teaching, research, access to Â鶹´å facilities and services, visa, immigration and taxation purposes, and in relation to work health and safety, or rehabilitation and compensation matters.
How the Â鶹´å collects and holds Personal Information
Personal Information is considered to be ‘held’ by the Â鶹´å if the Â鶹´å is in possession or control of the information, or the information is in the possession or control of a person employed or engaged by the Â鶹´å in the course of that employment or engagement.

The Â鶹´å collects and holds information in a number of ways including:
  • because it is required to provide a service which has been requested – for example, to implement a reasonable adjustment plan or if an individual becomes a client of the Medical and Counselling Centre or Faculty of Health Clinic;
  • because it has been provided to the Â鶹´å – for example, by applying for admission or employment, participating in mobility or exchange programs, participating in or commenting on online forums, registering to attend an event, asking the Â鶹´å a question or making a complaint or;
  • because of an individual’s previous or current relationship with the Â鶹´å – through the Â鶹´å’s advancement, alumni relations and philanthropy activities; and
  • because the Â鶹´å is required by law to collect it – for example, because of higher education and immigration laws or monitoring and logging of metadata from an individual’s use of IT and online services and facilities provided by the Â鶹´å.
Sometimes the Â鶹´å may use or disclose Personal Information in circumstances where it would be reasonably expected to use or disclose it.

The Â鶹´å will not collect, hold, use or disclose sensitive information or personal health information, unless with the individual’s consent or if an exemption exists or is authorised by law. However, the Â鶹´å may collect, use or disclose personal, health or sensitive information in situations where it may be impracticable to obtain an individual’s consent or give prior notice, if the Â鶹´å reasonably believes it is necessary to do so, such as:
  • to lessen or prevent a serious threat to life, health or safety;
  • to review CCTV cameras on Â鶹´å premises;
  • to take appropriate action in relation to suspected unlawful activity or misconduct;
  • for enforcement related activities conducted by, or on behalf of, an enforcement body; for example, to assist authorities to locate a person reported as missing; or
  • when establishing or defending a legal or equitable claim, or participating in a confidential dispute resolution process.
How the Â鶹´å discloses Personal Information
Common situations in which the Â鶹´å discloses Personal Information include, but are not limited to:
  • other higher education institutions, if a student is involved in a student mobility, exchange, cross-institutional or joint program, or if a student is transferring to another institution;
  • certain student administration matters;
  • the Â鶹´å of Canberra College;
  • accommodation service providers; for example, a Lodge, College or Hall of Residence; if a student’s accommodation is dependent on academic progress or affected by any Statutes, Rules, or policies of the Â鶹´å;
  • a returning officer or other appointed electoral body for conducting elections of representatives to official Â鶹´å panels, committees, boards and associations;
  • publications about some examination results and the award of some prizes and scholarships;
  • when requested, for example, when a person graduates from the Â鶹´å (the record of a person’s graduation from the Â鶹´å is a public document);
  • releasing information pursuant to the Â鶹´å’s Statutes, Rules, policies and procedures, or pursuant to a contractual obligation to which an individual has agreed to, such as Work Integrated Learning placements;
  • publications about research activities at or involving the Â鶹´å in which an individual has elected to be involved;
  • releasing statistical information to Australian Government Departments who are authorised to require it, the Tertiary Education Quality and Standards Agency (TEQSA), state and territory governments, Tertiary Admissions Centres (TACs), Higher Education providers for the purposes of the (‘HESA’) or the (‘ESOS’), and Universities Australia;
  • reporting to the Australian Tax Office about Commonwealth-supported fee liabilities or to facilitate income tax assessment;
  • reporting to Australian Government Departments with portfolio responsibility for social security and/or veterans’ entitlement matters about an individual’s income or a student’s attendance if the Â鶹´å is legally required to do so;
  • reporting to Australian Government Departments with portfolio responsibility for child support matters about an individual’s income if the Â鶹´å is legally required to do so;
  • if an individual is not an Australian citizen, reporting to Australian Government Departments with portfolio responsibility for migration and immigration, employment, higher education, research and technology, and related matters;
  • the Australian National Audit Office for auditing purposes; and
  • if the Â鶹´å is required by law to disclose the information.
The Â鶹´å may disclose Personal Information to an external review body if an individual seeks an external review of a Â鶹´å decision or makes a complaint to an external complaint handling body such as the ACT Ombudsman.
If an individual makes a complaint or report an incident to the Â鶹´å about another individual at the Â鶹´å, in some circumstances; the Â鶹´å may be required to disclose some Personal Information to the individual about whom a complaint has been made. It may be that sometimes the Â鶹´å is unable to act on a complaint or allegation unless consent is given to this kind of disclosure.

Engagement with Third Parties
The Â鶹´å does not disclose Personal Information about students to a student’s relatives or other relevant party without the student's consent. Students under 18 years of age and/or students who are registered with Inclusion and Engagement may consent to such disclosures of Personal Information in writing.

When the Â鶹´å engages third parties to perform services that involve handling any of the Personal Information held by the Â鶹´å, the Â鶹´å engages the third-party service provider in accordance with the obligations that apply to the Â鶹´å under the Privacy laws.

Social Media
If an individual chooses to communicate with the Â鶹´å or access information about the Â鶹´å through a social network service or app, the social network or app provider and its partners may collect, hold, use or disclose Personal Information, in Australia or overseas, for their own purposes and according to their own policies. This policy does not apply to those services.

Collecting through websites
Entry to some Â鶹´å web services is restricted by user log-in protocols. The Â鶹´å requires individuals to use their Â鶹´å ID to access these sites to help the Â鶹´å keep the information accessible through these sites secure from unauthorised alteration, use or disclosure, to resolve problems with the Â鶹´å’s IT systems, and to keep an auditable record of who has accessed this information.

The Â鶹´å has a public website. When the website is viewed, the server makes a record of the visit and logs some or all of the following information:
  • the viewer’s browser’s internet IP address;
  • the date and time of the visit to the site;
  • the pages accessed and documents downloaded;
  • the previous site visited;
  • the type of browser the viewer is using; and
  • the username entered if accessing a restricted site.
The Â鶹´å uses this information for statistical purposes, for system administration tasks to maintain this service and to personalise the user’s experience in future visits to the site. The Â鶹´å may use that information to identify and resolve problems with the Â鶹´å’s IT systems, and to keep an auditable record of who has accessed the Â鶹´å’s IT systems for security purposes. The Â鶹´å does not attempt to identify individuals unless prior consent is given. However, in the unlikely event of an investigation, the Â鶹´å, a law enforcement agency or other government agency may exercise its legal authority to inspect the Â鶹´å’s server’s logs or require reporting by the Â鶹´å.

Building access
If an individual enters any Â鶹´å building or room that requires the individual to swipe their Â鶹´å ID card to gain entry, the Â鶹´å may collect and use that information to keep an auditable record for safety and security purposes.

Library loans
If an individual borrows material from the Â鶹´å library, the Â鶹´å collects and uses Personal Information to manage priority course-based access to materials and to communicate with individual’s about their library loans. The Â鶹´å does not keep this information after borrowed library material is returned.

Email lists
The Â鶹´å collects individuals’ non-Â鶹´å of Canberra email address (and other contact details) when these are provided to the Â鶹´å. The Â鶹´å will only use this information to contact individuals for administrative purposes related to their engagement with the Â鶹´å. The Â鶹´å will use graduates email addresses to send information about Â鶹´å of Canberra alumni and philanthropy activities. Graduates can opt out of alumni related activities at any time by clicking on the unsubscribe link included in all such emails.

If an individual registers to attend an event, the Â鶹´å usually collects the contact details provided at registration to communicate with individuals about the event registered for. The Â鶹´å may also communicate with individuals about other events the Â鶹´å thinks individuals might be interested in. Individuals can opt out of receiving further emails at the time of registering for an event, by telling the sender by return email that they do not want to receive further emails, or the individual can unsubscribe from further events emails using the link in the email, according to how the event registration process is administered.

The Â鶹´å also collects individuals’ non-Â鶹´å of Canberra email address for purposes of sending student notifications and issuing passwords.

Anonymity
Where practicable and lawful, the Â鶹´å will allow individuals to interact with the Â鶹´å anonymously or using a pseudonym. However, for most of the Â鶹´å’s functions and activities the Â鶹´å usually needs an individual’s name and contact information or Â鶹´å ID number, and enough information about the particular matter to enable the Â鶹´å to respond to the inquiry, request, application, donation or complaint.

The Â鶹´å will also allow individuals to request the destruction of the Personal Information the Â鶹´å holds where practicable and lawful in line with the lawful principle of the ‘right to be forgotten’ under the European Union (EU) (GDPR). The GDPR, which took effect on 25 May 2018, replaces the previous European data protection legislation.

Collection from other people
In the course of the Â鶹´å’s day to day activities as an employer and a higher education provider, the Â鶹´å may collect Personal Information about individuals indirectly from publicly available sources, or from third parties. The Â鶹´å also collects Personal Information from publicly available sources to enable the Â鶹´å to identify and contact stakeholders who may be interested in the Â鶹´å’s endowment and philanthropy programs.

Overseas disclosure
In performing and managing its functions and activities, the Â鶹´å may need to make personal information available to third party services providers, including providers of cloud services and website hosts. These third parties may be located overseas. The Â鶹´å will take reasonable steps to ensure that any third parties located overseas whom the Â鶹´å engages to handle Personal Information are bound by substantially similar privacy standards and obligations as the Â鶹´å. Appendix 1 lists the overseas locations of providers where Â鶹´å data is held.
If a student is involved in a mobility, exchange, cross-institutional or joint program with an institution in another country, or if a student is transferring to another institution overseas, the Â鶹´å will disclose Personal Information to the student’s home or host institution overseas, including matters which impact on the student’s ability to participate in the program, such as misconduct.

Storage and security of Personal Information
Most of the information the Â鶹´å creates or handles is contained in, or forms part of, an Australian Capital Territory Record. The Â鶹´å takes reasonable steps to destroy or de-identify Personal Information in a secure manner when the Â鶹´å no longer needs it. The Â鶹´å is required to deal with most of its records in accordance with the and Disposal Authorities issued pursuant to that Act.

Access and correction of Personal Information
The Â鶹´å will make its best effort to ensure the Personal Information it holds is accurate and complete when collected and kept up to date for the period in which it is used.

An individual has a right to know what Personal Information is held about them and a right to access that information for review or correction where appropriate.

If requested, the Â鶹´å will give individuals access to their Personal Information, unless there is a law that allows or requires the Â鶹´å not to.

If the Â鶹´å makes a correction to the information it holds and discloses the incorrect information to others, an individual can request that the Â鶹´å informs the individual about the correction. The Â鶹´å will do so unless there is a valid reason not to. If the Â鶹´å refuses to correct Personal Information, an individual can ask the Â鶹´å to attach a statement to it stating that the individual believes the information is incorrect and why.

Privacy complaints
If an individual wishes to make a complaint about how the Â鶹´å has handled their Personal Information, this should be done in writing. For assistance in lodging a complaint, please contact: privacy@canberra.edu.au.
If the Â鶹´å receives a complaint about how Personal Information has been handled, the Â鶹´å will determine what (if any) action should be taken to resolve the complaint.

Privacy complaints will be referred for resolution to the relevant data and/or information system stewards in the first instance. The Â鶹´å will promptly indicate that the complaint has been received and will endeavor to respond to the complaint within 30 days.

If an individual is not satisfied with the Â鶹´å’s response, a review by a more senior officer within the Â鶹´å can be requested, or a complaint can be lodged at the .

Contacts
Telephone:  +61 2 6201 5569
TTY:  +61 2 6251 4601 (for hearing impaired callers)
Email:  privacy@canberra.edu.au 
Mail: Privacy Contact Officer
         Â鶹´å of Canberra
         BRUCE ACT 2601
         Australia

Related Documents
Charter of Conduct and Values
Â鶹´å of Canberra Compliance Register
Data Governance Framework
Delegations Policy Framework
Enterprise Agreement
Fraud and Corruption Control Plan

DITM and Records Management Policy Manual
 
Legislation:






 


Supporting Information:
APPENDIX 1
Locations of overseas recipients of Personal Information

United States of America
Canada
United Kingdom
European Union
Japan
Singapore
Hong Kong
India
Vietnam
China
 
APPENDIX 2
Privacy Management and Data Breach Plan

Purpose
The Privacy Policy is implemented by this Privacy Management and Data Breach Plan (Plan), which outlines the Â鶹´å of Canberra’s approach to the protection of information.

Principles
Personal information management and use
Personal Information will only be collected in line with the Plan and where:
  • collection is relevant and necessary in accordance with the Principles of this policy; and
  • a privacy notice and/or consent as relevant to the situation is included as part of the collection process.
Personal Information may only be used or disclosed in line with the Plan.

Data breach reporting
The Â鶹´å takes all reasonable steps to protect the security of the Personal Information it holds from both internal and external threats by regularly assessing the risk of misuse, interference, loss, and unauthorised access, modification or disclosure. Measures taken may be physical, electronic, or procedural. Â鶹´å staff, contractors, affiliates and students are advised to treat Personal Information with care, and in accordance with this Privacy Policy and other applicable laws.

All Â鶹´å staff have an obligation to implement the privacy principles established by the relevant privacy laws in their day to day practices by complying with such laws and their obligations under this Policy in the course of collecting, managing, using, disclosing and securing Personal Information and data.

Definitions
  1. Serious Breach includes where:
    1. multiple individuals are affected by the breach or suspected breach;
    2. there are, or there may be, a Real Risk of Serious Harm to the affected individual(s);
    3. the breach or suspected breach indicates a systemic problem in the Â鶹´å’s processes or procedures;
    4. there could be media or stakeholder attention as a result of the breach or suspected breach; or
    5. the risk rating is “Medium”, “High” or “Extreme” as identified in Annexure 3: Data Classification Assessment of this Response Plan;
  2. Data Breach means, for the purpose of this Plan, when Information is lost, stolen or subjected to unauthorised access, modification, disclosure, or other misuse or interference, whether accidentally or intentionally;
  3. Direct marketing means issuing marketing or promotional materials about the Â鶹´å or other parties directly to an individual (e.g. by post, email, SMS);
  4. Real Risk of Serious Harm includes risk of physical, psychological, emotional, reputational, economic or financial harm to an affected individual, for the avoidance of doubt this includes, but is not limited to, risk of identity theft, financial fraud, health fraud, embarrassment, discrimination or disadvantage and blackmail;
  5. Notifiable data breach means a data breach that is likely to result in serious harm, which must be notified to affected individuals and the Office of the Australian Information Commissioner (OAIC).
Responsibility for using Personal Information
Where the Â鶹´å discloses, transfers or stores Personal Information outside the Â鶹´å, it is the responsibility of the relevant data and/or information systems stewards to ensure (in line with the Privacy Policy) that:
  • all privacy impacts are assessed and addressed, including the disclosure, transfer or storage of Personal Information outside Australia or to a Commonwealth agency, and
  • all contractual obligations with relevant third parties are imposed through an enforceable contract, appropriately managed and monitored.
Personal Information may only be retained for as long as it may legally be used in line with the purpose for which it is collected and/or for which consent is received. Minimum legal retention requirements as outlined in Section 2.3 Records Management of the DITM and Records Management Policy Manual also apply.

Exemptions to privacy requirements may only be applied where appropriate in the circumstances and in line with the Plan and the Privacy laws.
 
  1. Privacy Management
The Â鶹´å is subject to the (the Privacy Act) and the . Through its Privacy Policy and this Plan the Â鶹´å describes how it will keep its practices consistent with the Australian Privacy Principles (the Principles), as well as providing guidance to Â鶹´å staff on the application of the Principles. This Plan also describes the application of the Principles and the Â鶹´å’s own policy to everyday decision making by Â鶹´å staff.

1.  Collection of Personal Information - [Privacy Policy principle 1.1, 1.3]
Information must be reasonably necessary or directly related to the Â鶹´å’s functions or activities.
In practice, this means Personal Information should not be collected ‘just in case' it may be useful in the future and must be collected by fair means.

Example: If an individual is compiling a mailing list of people who want to receive information about the Â鶹´å and only intends on sending that information by email, their home address or phone number should not be requested.
Example: Clinical placement hosts usually require students to have a working with vulnerable people card and a criminal history check. A school may ask to sight these documents, but it is not necessary for a school to retain copies however.

2.  Notifying individuals of collection - [Privacy Policy principle 1.5]
Where Personal Information is collected or solicited from forms or websites or in person, Â鶹´å staff must notify individuals. 

Example: A link to the Privacy Statement must be included in online or written forms.

3.  Sensitive information and Personal Health information - [Privacy Policy principle 1.3]
Generally Â鶹´å staff should only collect Sensitive Information with the individual’s consent and when the information is reasonably necessary for one or more of the Â鶹´å’s functions or activities.

However, staff may collect Sensitive Information without an individual’s consent in limited circumstances if staff reasonably believe it is necessary to do so and it would be impracticable to obtain consent or give prior notice.

Example: Police have attended Student Central. A staff member has been asked to provide information about a student’s course enrolment, social club membership, mobile phone number and last known residential address. The police state they are concerned the student is missing.

Example: The ‘gender’ field on forms should not be present or mandatory unless the Â鶹´å requires that information to provide specific services to the individual.

Â鶹´å staff should seek advice from the Legal office before relying on an exemption in order to disclose or collect Sensitive Information without an individual’s consent.

4.  Collection of information from a third party - [Privacy Policy principle 1.3, 1.5]
In accordance with the Privacy Policy, where Personal Information about an individual is collected from a third party source, even if the information is collected from a publicly available source, Â鶹´å staff must take reasonable steps to ensure that the individual is or has been made aware:
  1. that the Â鶹´å has collected the information and the circumstances of the collection; and
  2. of the Â鶹´å’s Privacy Statement.
Example: A researcher obtains names and addresses from the ACT electoral roll in order to survey persons in a specific electorate. The survey must explain where the researcher has obtained an individual’s details from, and include the Â鶹´å’s Privacy statement.

5.  Anonymity and use of a pseudonym - [Privacy Policy principle 1.7]
Wherever it is practicable and lawful, the Â鶹´å must provide individuals with the option of not identifying themselves, or of using a pseudonym.

Example: If UC Life hold a competition on a social media platform the Â鶹´å should provide options for anonymity or the use of a pseudonym.

Example: The ‘name’ field on survey forms should not be mandatory unless the Â鶹´å intends to make follow-up contact with the individual.

6.  USE AND DISCLOSURE - [Privacy Policy principle 2.1, 2.2]
What is the Purpose?
The Â鶹´å can only use or disclose personal information for the purpose for which it is collected. This is the ‘primary purpose’. To use the information for another purpose (a ‘secondary purpose’) the following must apply:
  • the individual would reasonably expect the Â鶹´å to use or disclose the Personal Information for the Secondary purpose;
  • the Secondary purpose is related to the Primary purpose (or in the case of Sensitive Information, directly related to the Primary purpose); or
  • another exemption exists at law.
For example, in order to administer enrolment of students and deliver welfare services, the Â鶹´å may need to share Personal information with the UC College. This information may also be required to coordinate student accommodation with UniLodge and CLV.

Disclosure is also permitted if it is unreasonable or impracticable to obtain the individual’s consent to the use or disclosure and the Â鶹´å reasonably believes that the use or disclosure is necessary to lessen or prevent a serious threat to the life, health or safety of any individual, or to public health or safety.

Examples of activities where disclosure is permitted:
  • A student applies to enrol in a program that is clearly advertised as being jointly delivered by the Â鶹´å with other universities and that applications will be considered by all collaborating universities.
  • An individual submits an entry to a Â鶹´å-run competition. The competition rules clearly state that entries will be judged by an independent panel.
  • The Â鶹´å is served with a subpoena to produce personnel records of a staff member or a student who is involved in a motor vehicle accident case.
  • The Vice-Chancellor’s office receives an email from Centrelink, acting under the , requesting that the Â鶹´å provides enrolment information about a student.
  • The Â鶹´å’s Student Life (pastoral care) team forms a reasonable belief that a student is at risk of self-harming. The Â鶹´å can notify the ACT Mental Health Crisis Team triage service and provide location and other sensitive information so that it can determine whether to take action to locate the student and provide intervention.
7.  Permitted disclosure to third parties [Privacy Policy principle 2.4] including Overseas recipients – [Privacy Policy principle 2.5, 2.6]
The Â鶹´å is permitted to disclose Personal Information to third parties in the manner described in the Privacy Policy. However, in order to protect the Personal Information of individuals, the Â鶹´å must ensure that there is a contract in place with the third party which contains obligations on that party to comply with the Australian Privacy Principles.

Examples of permitted third party disclosure include:
  • Providing government departments and agencies with Personal Information to satisfy reporting requirements.
  • Sharing date of birth, course information and reasonable adjustment plans with the Â鶹´å’s controlled entities or the Â鶹´å of Canberra College so that services can be provided to a student.
  • Sharing student names and email addresses with a Canadian software provider in order to establish user accounts to enable students to have access to the Â鶹´å’s internet-based education resources and assessment tools.
  • The Faculty of Health organises clinical placements for students and the placement provider requires police checks, names and emergency contact details of the attending students.
  • Sharing research data containing Personal Information with an overseas collaborating institution.
Examples where third party disclosures are not permitted include:
  • storing electronic files with Personal Information on a server located overseas where the Â鶹´å does not have a contract with this organisation; eg
    • downloading information to ‘Dropbox’,
    • storing research data on Google Drive
  • disclosing a student’s grades to a prospective employer
  • informing a parent about student class attendance or welfare
8.  Direct marketing - [Privacy Policy principle 2.7]
Direct marketing is not permitted under privacy laws, unless:
  • consent has been obtained from the individual via an opt in process;
  • the marketing is directly related to the purpose it was collected for; or
  • the individual would reasonably expect us to use or disclose the Personal Information for that purpose.
For example:
  • The Â鶹´å sends an email to all enrolled students to advertise a public event being held by the Â鶹´å of Canberra Union.
  • The Marketing team sends a tweet about new course offerings in the upcoming semester to all students.
Hardcopy direct marketing material must contain a contact point for the individual to opt out of receiving further direct marketing communications from that area of the Â鶹´å issuing the direct marketing communication. Direct marketing material requires an opt-out mechanism where it is sent by email and SMS to comply with the . Once an individual has made a request to opt out of receiving information from a particular area (e.g. advancement), the Â鶹´å must not issue any further direct marketing communications to the individual about those matters.
 
9.  ACCURACY OF INFORMATION - [Privacy Policy principle 3.1, 4.4, 4.5, 4.6]
In accordance with the Privacy Policy, Personal Information the Â鶹´å collects, uses or discloses is accurate, up-to-date, complete, relevant and not misleading.

To assist the Â鶹´å in meeting this obligation, the Â鶹´å’s online portals should allow employees, students and alumni to update Personal Information directly.

If staff become aware or are notified that Personal Information in the Â鶹´å’s possession is not accurate, the staff member must notify the area responsible for managing the Personal Information, and other areas that may have copies of the Personal Information, so that steps can be taken to correct the information.

For example: The Faculty of Education sends a letter to a student using the address within Callista which is returned to sender and marked “Not at this address”. Student Services should be notified so that the address can be removed and an email can be sent to the student reminding them to update their details.
 
10.  SECURITY OF PERSONAL INFORMATION - [Privacy Policy principle 3.1]
Storage
The Â鶹´å must take such steps as are reasonable in the circumstances to protect Personal Information in its possession from misuse, interference, loss, and unauthorised access, modification or disclosure. Personal Information must only be made accessible to, and must only be accessed by, those Â鶹´å Personnel who have a need to access it to perform their duties.

Example: Student files in TRIM should only be accessible by Â鶹´å Personnel within the security group established by Records Management Office.

Hardcopy records containing Sensitive Information should be stored in locked furniture when not in use. Hardcopy staff or student files should not be left on desks when offices are unattended, or in places where they are visible to students or members of the public.

Destruction - [Privacy Policy principle 3.1]
If the Personal Information is no longer needed for the purpose it was collected, and the Â鶹´å is not otherwise required to retain the information under any law, regulation or code, that information must be destroyed in a secure manner or de-identified (e.g. ; ). Staff should seek advice from the Legal Office if assistance with understanding applicable laws is required.
 
11.  DEALING WITH REQUESTS FOR ACCESS TO PERSONAL INFORMATION -  [Privacy Policy principle 4.1, 4.3]
Requests from Individuals
Individuals are entitled to request access to their own Personal Information in writing or email without the need for a formal application under the .

Requests from lawyers (other than the Â鶹´å’s lawyers)
Lawyers do not have a special right to access information held by the Â鶹´å. Personal Information must not be disclosed in response to a lawyer’s request unless it is accompanied by written consent of the person to whom the information relates, or if required by law or a court/tribunal order.

An example where records should not be released:
The Faculty of Arts and Design receives a letter from a law firm requesting attendance and academic records pertaining to a former student. The letter states the documents are urgently required for a hearing in the ACT Supreme Court.

A letter of this nature should be accompanied by a subpoena from the court or written consent from the student concerned. All Such Requests Should Be Forwarded to the Â鶹´å’s Legal Office.

The Â鶹´å may limit access
Documentation produced to third parties or individuals may be withheld or redacted if the Â鶹´å determines that access would not be appropriate. Permitted reasons include:
  • unreasonable impact on the privacy of other individuals (e.g. personally identifying information of referees on a staff appointment file)
  • the request for access is frivolous or vexatious
  • documents are subject to confidentiality obligations or legal professional privilege, granting access would compromise the Â鶹´å in anticipated legal proceedings or commercially sensitive decision-making processes
  • the release of the information may create serious risk of harm ().
12.  Responding to a data breach - [Privacy Policy principle 5.1]
If a Â鶹´å staff member becomes aware of or is alerted to a data breach, that staff member must immediately notify their line manager and the Privacy Officer. The Â鶹´å must take immediate action to contain the loss or unauthorised disclosure or access where possible (e.g. by stopping the unauthorised practice; recovering the records; advising persons who have received the information by mistake to destroy that information).

The breach will be entered on the Â鶹´å’s Compliance Register. The Privacy Officer will investigate as necessary and determine what further steps are necessary, having regard to the Data Breach Plan.

B. Data Breach Response Procedure
Loss or unauthorised disclosure of Personal Information or Confidential Information (“data breach”) may occur in a variety of ways. It may be inadvertent or deliberate or malicious, for example:
  • mistakenly emailing Personal Information to the wrong person
  • loss or theft of laptops, removable storage devices or physical files
  • hacking of the Â鶹´å’s DITM systems
  • staff accessing Personal Information outside the requirements of their employment.
Summary of Procedure
Data breaches have the potential to result in harm to the individuals affected and expose the Â鶹´å to legal, financial or reputational risk.

There is no single method of responding to a data breach. Data breaches must be dealt with on a case-by-case basis, by undertaking an assessment of the risks involved, and using that risk assessment to decide the appropriate course of action.

There are five key steps to consider when responding to a breach or suspected breach:
STEP 1: Contain the breach and do a preliminary assessment
STEP 2: Evaluate the risks associated with the breach and mitigate those risks
STEP 3: Notification to OAIC and affected individuals
STEP 4: Notification to Â鶹´å insurer Unimutual
STEP 5: Prevent future breaches
 
1.  Identification of a breach
An identified or suspected data breach must be responded to and reported to the Â鶹´å’s Privacy Officer (privacy@canberra.edu.au) and the relevant data and/or information system stewards, in line with the Data Breach Plan and the Â鶹´å’s data breach response procedures.

Where a serious data breach occurs these procedures, along with the Â鶹´å’s Business Continuity Plan, including the Critical Incident Management Team (CIMT) Plan are to be followed.

Where a data breach is a public interest disclosure, refer to the Fraud and Corruption Control Plan (incorporating the ).

Any immediate steps available to contain the breach must be identified and implemented in discussion with the Privacy Officer. Reducing the scale and impact of a data breach can prevent the need for notification to the OAIC. All known or suspected data breaches must still be notified internally to the Â鶹´å’s Privacy Officer.
 
2.  Assessment of a breach
Not all data breaches are serious, notifiable and/or place the Â鶹´å’s reputation, commercial or legal interests at risk. Identification of the classification of the data which has been compromised will inform the assessment of the breach [refer to the Data Classification Framework in Appendix 3.].

A breach which involves sensitive, personal health or commercial or legal information will usually be regarded as a serious breach.

The Â鶹´å’s Privacy Officer will seek information to assess the suspected breach. In assessing a suspected breach, the Privacy Officer may require assistance and information from other areas of the Â鶹´å depending on the circumstances.

Notifiable Breach
If, after an initial investigation, the Privacy Officer suspects a notifiable data breach may have occurred, a reasonable and expeditious assessment must be undertaken to determine if the data breach is likely to result in serious harm to any individual affected.

An assessment of a known or suspected breach must be conducted expeditiously and where possible should be completed within 30 days. The assessment must include:
  1. an evaluation of the scope and possible impact of the breach;
  2. determination if the breach is likely to be notifiable; and
  3. a plan of action to minimise harm including, if required, notification to the OAIC.
Actions must be documented and acted upon as soon as possible.

Commercial or Legal Information
These breaches are not notifiable unless the information also contains Personal Information. The Privacy Officer must assess this possibility as well as the risk to the Â鶹´å’s reputation and legal interests to determine if the breach is serious. The Business Continuity Plan, including the Critical Incident Management Team (CIMT) Plan are to be followed if that determination is made.

Notification to Insurer
If a breach comes within the criteria required by our insurer (see relevant Product Disclosure Statement Part 6 – Cyber Protection) notification to Unimutual must occur as stipulated in that policy.
 
3.  A notifiable breach
A breach which is assessed as likely to result in serious harm to individuals whose Personal Information is involved, is a notifiable data breach. Such data breaches must be notified to the affected individuals and the OAIC as soon as possible.

Notice must include information about the breach and the steps taken in response to the breach. Please note that notification to the OAIC and internally within the Â鶹´å is the responsibility of the Privacy Officer.

The risk of serious harm will be assessed by considering both the likelihood of the harm occurring and the consequences of the harm. Some of the factors that should be considered are:
Factors Considerations
The type of Personal Information involved in the data breach Some kinds of Personal Information are more sensitive than others and could lead to serious ramifications for individuals if accessed. Information about a person’s health, documents commonly used for identity fraud (e.g. Medicare card, driver’s licence, Tax File Number) or financial information are examples of information that could be misused if the information falls into the wrong hands.
Circumstances of the data breach The scale and size of the breach may be relevant in determining the likelihood of serious harm. The disclosure of information relating to a large number of individuals would normally lead to an overall increased risk of at least some of those people experiencing harm. The length of time that the information has been accessible is also relevant.
Consideration must be given to who may have gained unauthorised access to information, and what their intention was (if any) in obtaining such access. It may be that there was a specific intention to use the information in a negative or malicious way.
Nature of possible harm Consider the broad range of potential harm that could follow from a data breach including:
 
  • identity theft
  • financial loss
  • threat to a person’s safety
  • loss of business or employment opportunities and
  • damage to reputation (personal and professional).

Notifications will follow the format identified by the OAIC in .  

4. Prevention and Response team
The Critical Incident Management Team (CIMT) will be formed for a serious breach in accordance with the Â鶹´å’s Business Continuity Plan and related CIMT Plan.

The Deputy Vice Chancellor and Vice-President responsible for Data Security will be informed when a CIMT is established.
 
5.  Breaches that are not serious
Breaches that are not assessed as serious breaches must be reported to the Privacy Officer and may be handled by supervisors in consultation with the Â鶹´å’s Legal Office.
 
6.  Records
Information about data breaches and documentation will be stored in the Â鶹´å of Canberra Compliance Register for each suspected breach.

APPENDIX 3
Data Classification Schedule

Purpose
This Data Classification Schedule is the Â鶹´å of Canberra’s framework for assessing data sensitivity and the treatment of associated risks in the storage and uses of that data. It has been created to help the Â鶹´å’s community to effectively manage information on a daily basis.

1. System owner responsibilities
Physical and logical access to systems may be granted by the system owner if access is appropriately controlled, and formal procedures are implemented to permit access to the system.

The allocation and use of system privileges must be restricted and controlled. A formal review of user privileges must be conducted on a regular basis to ensure that these remain appropriate. Accounts that are no longer required or appropriate must be closed or disabled.

When users leave the Â鶹´å, Â鶹´å access must be removed. When users change roles, access rights on systems must be reviewed and adjusted appropriately.

2. User responsibilities
Portable computing devices owned by the Â鶹´å, or that contain non-public Â鶹´å information, must be physically secured when unattended by either; locked drawer or cabinet.

Users will:
•         Appropriately classify emails and documents sent externally
•         Store documents in locations appropriate to the data classification level (do not store Â鶹´å data in non-Â鶹´å systems, i.e Dropbox)
•         Adhere to the treatment of risk actions required by the data classification level.

3. Classifications and Levels of Protection
All Â鶹´å of Canberra Systems must include Access control and Asset management measures to classify data and mitigate risk of data breach. The minimum level of protection necessary when performing certain activities is based on the classification of the information being handled.

Most information does not need increased security and may be marked ‘Public’ or left unmarked. This should be the default position for newly created material, unless there is a specific need to protect the confidentiality of the information.

Â鶹´å employees, and other covered individuals, staff and affiliates are to determine in which circumstances security classifications are to be applied to its information. Review by the relevant supervisor, Data Owner or Data Steward may be appropriate.

Individuals are not entitled to access information merely because it would be convenient for them to know or because of their status, position, rank, or level of authorised access. Sensitive and Highly Sensitive classified information has special handling requirements, especially during electronic transmission or physical transfer. Further it is only to be used and stored in physical and electronic environments that provide a fitting level of protective security.  

Data Classification Assessment
Data Classification Description of Risk Examples Treatment of Data Risk
Highly Sensitive Data that if accessed without authority would have a high impact on the Â鶹´å’s activities and objectives.
 
 
  • Data subject to regulatory control
  • Legal Advice (subject to legal professional privilege)
  • Personal information about Persons under age of 18
  • Credit card details
  • Personal health records and clinical trial data
  • Campus security data
  • Personnel and/or payroll records
  • Student records
  • Data classified under the Australian government security classification system as confidential or higher (refer to www.protectivesecurity.gov.au)
  • Data belonging to a third party
  • Contracts and commercial in confidence
  • Patent information.
  • Dissemination is restricted on a need to know basis, and may only be accessed, transmitted, modified, or stored for legitimate academic, research or business purposes.
  • Hard copies must be stored in a locked drawer, cabinet, room or area where access is controlled or has sufficient access control measures.
  • Must be protected to prevent loss, theft, malicious activity, unauthorised access and/or unauthorised disclosure.
  • Electronic copies must be stored on a system that requires Â鶹´å of Canberra based user authentication.
  • Electronic copies must be encrypted when transferring to an external entity or recorded to an external data storage device.
  • Must not be stored on non-Â鶹´å of Canberra managed storage (that is storage which the Â鶹´å does not have a contract for) (includes Office 365 but excludes Dropbox, Google Drive).
  • When emailed must include classification and appropriate disclaimer.
Sensitive/ Private Data that if breached would have a low or medium impact on the Â鶹´å’s activities and objectives.
 
 
  • Sensitive or Personal Information about Students or Staff
  • Organisational financial data pre-Annual Report
  • Exam material and results
  • Internal planning documents
  • Research data (containing Personal Information)
  • Data considered commercial in confidence Business unit process and procedure
  • Unpublished intellectual property
  • ITC system design and configuration information
  • Limited range of Personal Information – e.g. student numbers
  • Dissemination of this data is based on strict academic, research or business need.
  • Encryption is required for the transmission of sensitive data.
  • Must be protected to prevent loss, theft, malicious activity, unauthorised access and/or unauthorised disclosure.
  • Must be protected by confidentiality agreements before access is permitted to third parties.
  • Hard copies of sensitive data must be stored in a closed container (filing cabinet, closed office, secure area etc.).
  • Sensitive data in electronic format must be stored on a system that requires user authentication.
  • When emailed must include classification and appropriate disclaimer.
  • Must not be stored on non-Â鶹´å of Canberra managed storage (that is storage which the Â鶹´å does not have a contract for) (includes Office 365 but excludes Dropbox, Google Drive).
Public (Unclassified) Data that if breached would have an insignificant or minor impact on the Â鶹´å’s activities and objectives.
  • Faculty and staff directory Information about Course listings or Unit outlines
  • Published research data
  • publicly posted press releases
  • published research data
  • marketing materials
  • job announcements
  • Public data is available to all members of the the Â鶹´å’s community and all individuals and outside entities.
  • Encryption is not required for the transmission.

3.     Alignment with Government Security Classification
The Â鶹´å of Canberra does not use dissemination limiting markers (DLMs) in its Data Classification. Alignment to the Australian Government and ACT Government security classification systems as follows:
Â鶹´å of Canberra Commonwealth ACT
Public Information not requiring
additional protection
Unclassified
    FOR OFFICIAL USE ONLY (OR FOUO)
Sensitive/Private CONFIDENTIAL SENSITIVE
    SENSITIVE:LEGAL
    SENSITIVE: PERSONAL
Highly Sensitive SECRET SENSITIVE: AUDITOR-GENERAL
NA TOP SECRET SENSITIVE: CABINET
 
Definitions:
Terms Definitions
Data Breach means, for the purpose of this Plan, when Information is lost, stolen or subjected to unauthorised access, modification, disclosure, or other misuse or interference, whether accidentally or intentionally.
Direct marketing means issuing marketing or promotional materials about the Â鶹´å or other parties directly to an individual (e.g. by post, email, SMS).
Highly Sensitive means data subject to regulatory control, Â鶹´å Legal Advice, Personal Information about persons under age of 18, Tax File Numbers, Credit card details, campus safety data, personnel and/or payroll records, student records, commercial data belonging to a third party (contracts and commercial in confidence), patent information, personal health information and clinical trial data. It also includes data identified under the Australian government security classification system as confidential or higher (refer to www.protectivesecurity.gov.au).
Notifiable data breach means a data breach that is likely to result in serious harm, which must be notified to affected individuals and the Office of the Australian Information Commissioner (OAIC).
Personal health information is highly sensitive and means any Personal Information, whether or not recorded in a health record relating to the health, an illness or a disability of the individual; or collected by a health service provider in relation to the health, an illness or a disability of an individual.
Personal Information means information or an opinion about an identified individual, or an individual who is reasonably identifiable, whether the information or opinion is true or not; and whether the information or opinion is recorded in a material form or not. It does not include personal health information.
Private information includes but is not limited to business unit process and procedure, unpublished intellectual property, ITC system design and configuration information, a limited range of Personal Information such as student numbers.
Real Risk of Serious Harm includes risk of physical, psychological, emotional, reputational, economic or financial harm to an affected individual, for the avoidance of doubt this includes, but is not limited to, risk of identity theft, financial fraud, health fraud, embarrassment, discrimination or disadvantage and blackmail.
Sensitive information means in relation to an individual, information or an opinion about an individual’s racial or ethnic origin, immigration status, political opinions, memberships of political, professional and trade associations and unions, religious and philosophical beliefs, sexual orientation or practices, criminal history, health information, and genetic and biometric information. In relation to the Â鶹´å, it means organisational financial data, exam material and results, internal directories and organisational charts, internal planning documents, research data (containing Personal Information), and data considered commercial in confidence.
Serious Breach includes where:
(i) multiple individuals are affected by the breach or suspected breach;
(ii) there are, or there may be, a Real Risk of Serious Harm to the affected individual(s);
(iii) the breach or suspected breach indicates a systemic problem in the Â鶹´å’s processes or procedures;
(iv) there could be media or stakeholder attention as a result of the breach or suspected breach; or
(v) the risk rating is “Medium”, “High” or “Extreme” as identified in Annexure 3: Data Classification Assessment of this Response Plan.