legislation what we are covering today are only a limited number of laws and policies in the...

40
WORKPLACE POLICIES, LEGISLATION, AND CODES OF PRACTICE

Upload: gerald-fowler

Post on 21-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

WORKPLACE POLICIES,

LEGISLATION, AND CODES OF PRACTICE

Page 2: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Legislation

What we are covering today are only a limited number of laws and policies in the workplace relating to:OHSPrivacyInformation TechnologyEqual OpportunitySPAMCopyright

Page 3: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Introduction

Legislation exists to ensure people and organisations follow appropriate rules of society

Legislation is law enacted by parliament Australia is governed by:

Federal lawState lawLocal law

Page 4: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Policies

Policies are statements made by organisations as to how they will comply with legislation

They are a broad statements of intentions

Procedures are how those policies are implemented

Page 5: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Occupational Health & Safety

Page 6: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

OHS Legislation

Workplace safety is governed byOccupational Safety and Health Act 1984Occupational Safety and Health Regulations

1996, andCodes of Practice

In Western Australia it is managed by WorkSafe which is part of the Department of Commercehttp://www.commerce.wa.gov.au/worksafe/in

dex.htmhttp://www.safetyline.wa.gov.au/index.html

Page 7: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

OHS Legislation OHS is covered in

more detail in your other class

It is important to reiterate OHS is a dual responsibility between employers and employees

Employers Responsibility Provide a safe workplace

free from injury and discrimination

Provide training and support to ensure a safe workplace

Employees Responsibility Not to engage in activities

that are likely to endanger yourself or others

Follow safety instructions and procedures

Page 8: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Privacy

Page 9: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

The Privacy Act 1988 The Privacy Act 1988 is a Federal Act The Privacy Act relates to protection of an

individual’s personal information held by business and government (known as entities)

The Act includes 13 Australian Privacy PrinciplesAPPs set out standards, rights and obligations for

the management of personal information APP came into force in March 2014 and

replaced the National Privacy Principles

Page 10: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

The Privacy Act 1988 The Privacy Act allows you to:

Know why your personal information is being collected, how it will be used and who it will be disclosed to

Have the option of not identifying yourself, or of using a pseudonym in certain circumstances

Ask for access to your personal information (including your health information)

Stop receiving unwanted direct marketing

Ask for your personal information that is incorrect to be corrected

Make a complaint about an entity covered by the privacy act, if you consider that they have mishandled your personal information.

Page 11: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Australian Privacy Principles:The Categories

1. Consideration of personal information privacy

2. Collection of personal information

3. Dealing with personal information

4. Integrity of personal information

5. Access to, and correction of, personal information

Page 12: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 1: Consideration of personal information privacy1. Open and transparent management of personal information

2. Anonymity and pseudonymity

The objective of this principle is to ensure an organisation is open and transparent about the way it manages your information.

It must have an up to date Privacy Policy that includes information on

What information is collected How it collects it What it does with your information How you can access your

information Who it might disclose your

information to

Individuals have the right not to identify themselves when dealing with an APP entity.

Individuals can use a pseudonym in place of their actual identity.

Page 13: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 2: Collection of personal information3. Collection of solicited personal information

4. Dealing with unsolicited personal information

An entity must not collect personal information unless it is directly related to or required for the entity’s functions or activities

Sensitive information must not be collected without the individual’s consent

If an entity receives personal information they should determine if it could’ve been legally obtained under APP3 If Yes – they can store and use that

information If No – they must destroy it or di-identify

it

5. Notification of the collection of personal information At the time or before collection of information an entity must notify the

individual What information is required to be collected The reason for collection If someone else has provided the information they need to inform the individual what

information was collected and by whom

Page 14: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 3: Dealing with personal information6. Use or disclosure of personal information

7. Direct marketing

If an entity holds information about an individual they must only use that information for the purpose that is was collected for

Exceptions - the information can be used for a secondary purpose under certain conditions If it is directly related to the

primary purpose for collection Legal obligations

If an entity holds personal information about an individual it must not be used for the purpose of direct marketing

Exceptions The organisation collected that

information from the individual The individual would

reasonably expect it to be used for that purpose

Contractual arrangements

Page 15: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 3: Dealing with personal information8. Cross-border disclosure of personal information

9. Adoption, use or disclosure of government related identifiers

Before an entity can disclose personal information to an individual or entity outside of the Australian Legal Jurisdiction they must ensure that the overseas recipient does not breach any part of the APP

An organisation must not adopt or use an individual’s personal identifier as its own Centrelink Identifiers Student Numbers Medicare Numbers

Exception – Where it is required by law Verification of identification

Page 16: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 4: Integrity of personal information10. Quality of personal information

11. Security of personal information

An entity must take reasonable steps to ensure that information collected from individuals is accurate, up-to-date, and complete.

An entity must take reasonable steps to ensure that information is protected from Misuse or interference Unauthorised access or

disclosure

Page 17: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

APP Part 5: Access to, and correction of, personal information12. Access to personal information

13. Correction of personal information

If an entity holds personal information about an individual they must, when requested by that individual, provide access to the information

Exceptions Legal grounds Threats to life, health or public safety

Organisations must respond to requests within 30 days

Charges for provision of information can only by made by organisations and must not be excessive

An organisation must take reasonable steps to correct personal information when notified by the individual

Page 18: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Privacy Policies

The following websites have had their Privacy Policies updated to meet the new Australian Privacy Principles:Australia Post

○ http://auspost.com.au/privacy.htmlHays Recruitment

○ http://www.hays.com.au/general-content/privacy-policy-2365

Cancer Council○ http://www.cancer.org.au/privacy-policy.html

Page 19: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

SPAM & SCAMS

Page 20: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

SPAM Legislation SPAM Act (2003) provides legislation to

monitor and restrict unsolicited communications

This covers email, SMS, MMS, and iM The Act provides for 3 distinct requirements

1. Consent

2. Identify, and

3. Unsubscribe http://www.acma.gov.au/web/STANDARD//

pc%3DPC_2008

Page 21: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

SPAM: Penalties & Enforcement

ACMA has the responsibility for governing and enforcing penalties Infringement notices by the ACA Penalties imposed by courts under the legislation

Infringement notice penalties for sending spam are $440 per contravention for an individual (with a maximum

of $22,000 for all contraventions that occur on a single day) $2,200 per contravention for a body corporate (with a

maximum of $110,000 for all contraventions that occur on a single day).

Other rules apply, such as Not including an ‘Opt Out’ facility Not identifying yourself/organisation clearly

http://www.caslon.com.au/anzspamprofile2.htm

Page 22: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Scams Lottery SMS scam

Congratulations, you have just won $1M – all you have to do is transfer $1,000 into an account to access your winnings!!!

Mule spam Have I got a job for you??

Phishing spam We are your bank, but we don’t know your account details so

send them to us now! Nigerian scams

Send us all your money and we’ll give you a heap of money in return …

Scam Watch http://www.scamwatch.gov.au/

Page 23: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Buying Online: Consumer Protection Who’s laws apply?

In Australia we are protected by Australian Law and the Australian Competition and Consumer Commission (ACCC)

Australian Consumer Law makes it illegal for businesses to mislead consumers, either in the purchase price or claims in advertising

Is the seller/company legitimate? Do they have a physical address? Are they reputable? Do you know people who have purchased from them before?

Terms and conditions Are these readily available before you make your purchase Click to accept conditions must be made available and accepted

before the transaction is made for them to be legally binding Payment methods

Are they using secure encryption (https)? http://www.accc.gov.au/content/index.phtml/itemId/8135

Page 24: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

IT Policies

Page 25: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Information Technology Policies

Use of Information Technology presents some very challenging issuesPersonal use V Business use

Specifically we are going to look at:EmailInternet useComputer use

Policies should always be made available when you commence employment

May also be provided when you log on to a computer

Page 26: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

IT Policies: Email

In the workplace your use of email can be monitored by your employer

Organisations will have differing policies on the use of email for personal use

Email should always be considered insecure

Guidelines on Workplace Email:http://www.privacy.gov.au/materials/types/gu

idelines/view/6056

Page 27: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

IT Policies: EmailShould Not: Must Not:

Spend excessive time on personal emails

Use inappropriate language

Use significant system resources

And more …

Breach copyright Be offensive, violent, or

indecent Contain sexually explicit

material Incite criminal activities And more …

Page 28: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

IT Policies: Internet Use

As with email policies, Internet usage is often monitored in the workplace

May have policies on social media use Must not engage in illegal activities or

visit prohibited websites

Page 29: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

IT Policies: Computer Engage in illegal

activities Share logon and

passwords Use passwords that

are secure Copy and distribute

copyright information Industrial espionage

Sabotaging computers Viruses and malware

Page 30: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Equal Opportunity

Page 31: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Equal Opportunity

Age Breastfeeding Family Responsibility Family Status Gender History Impairment Marital Status Political Preferences

Pregnancy Race Racial Harassment Religion Gender Sexual Harassment Sexual Orientation Spent Conviction

Equal Opportunity Act 1984 sets out the grounds for discrimination as:

Page 32: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

EO in the workplace

Employers have an obligation to ensure all staff are treated fairly

Jobs are awarded based on merit Staff (Managers and workers) are aware

of their obligations Staff respect the rights of others May have policies on workplace bullying

Page 33: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Equal Opportunity

Equal Opportunity Commission of WAhttp://www.eoc.wa.gov.au/YourRights/EOFor

You.aspx National Anti-Discrimination Information

Gatewayhttp://www.antidiscrimination.gov.au/

Australian Human Rights Commissionhttp://www.hreoc.gov.au/

Page 34: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Copyright

Page 35: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Copyright

Copyright is law that protects the rights of a creator of an original work

Copyright coversWritten worksImages / photographsArtworksAudio (music etc)SoftwareArchitectureChoreography

Page 36: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Copyright Copyright is an implied law – you don’t need

to do anything to be covered by it Copyright gives the owner of the works

exclusive rights to itTo use copyrighted works you need to obtain the

owners permissionCopyright lasts until 70 years after the death of

the owner Fair dealing

Allows for limited use of copyrighted works under certain conditions

1 chapter or 9.99% for education purpose

Page 37: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Do I need to register for Copyright? There is NO registration system for copyright

in Australia

Copyright protection is free and applies

automatically when material is created

There is no formal process that must be

followed

Material is automatically protected by

copyright in Australia, under the Copyright

Act 1968

Page 38: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Acknowledging others’ work We must correctly acknowledge the

work done by others Source code and digital content are

protected under copyright law, and giving credit where credit is due is an important part of teamwork

When you use someone else’s work, or if they worked with you on a project, we must acknowledge their efforts

Page 39: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Copyright Links

Wikipediahttp://en.wikipedia.org/wiki/Copyright

Australian Copyright Councilhttp://www.copyright.org.au/

Page 40: Legislation  What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology

Online Infringement: Forum Discussion Online Piracy is it really a

victimless crime? Last year when the fourth

season of Game of Thrones was launched Australian's proved themselves to be one of the biggest offenders worldwide for infringing copyright.

Some people used the excuse that because it was only available on Foxtel and they could afford the subscription payments that it was ok to download it.

If creative arts developers lose money through illegal downloads will they still be able produce their art for consumers?

The Australian Government has launched a discussion paper seeking feedback on changes to the existing legislation to deter online copyright infringement.

The proposals relate to three things:1. the actions an internet service provider (ISP)

must take if its customers are infringing copyright (authorisation liability)

2. enabling content creators to get a court order requiring ISPs to block access to foreign websites that specialise in infringing content (site blocking)

3. extending the current ‘safe harbour’ provisions (which are intended to provide incentives to carriage service providers to curb infringements) to other online service providers such as Google, eBay and universities (safe harbour scheme)

The government wants to content creators and ISPs to work together to establish industry schemes or commercial arrangements that encourage legitimate use and sharing of content, and deter infringing uses. These proposals are intended to support that aim.

http://www.copyright.com.au/about-copyright/policy-and-research/online-infringement