Privacy guidelines not enough to prevent data breaches: Law lecturer
- 08 August, 2011 12:45
To prevent online privacy breaches Australia needs a privacy watchdog rather than merely guidelines, a law lecturer has argued.
In an article at Thecoversation.edu.au University of Canberra law lecturer, Bruce Arnold, argues the high number of data leaks happening in Australia and overseas shows that the government must step up and move beyond privacy guidelines.
“Australia needs a privacy watchdog that is quick to act, a watchdog that, like its overseas counterparts in the UK and US, is equipped with the sort of financial penalties that get the attention of executives,” Arnold wrote.
“Shaming is not enough: where there is improper sharing we need real punishment to stop future problems.”
Using the example of the South Australia-based paternity and drug-testing laboratory, Medvet which last month experienced an online software error that caused the details of 800 patients’ delivery addresses to be visible online, Arnold claimed such organisations must take their privacy responsibilities more seriously.
“The incident shows we need stronger privacy law and meaningful enforcement,” Arnold wrote. “We also need a cultural change, whereby institutions regard themselves as data custodians rather than data owners and therefore take their responsibilities more seriously.”
Arnold agreed with Clearswift’s Phil Vasic that the Sony hacks showed the need for data breach laws needing to be changed.
“Medvet has been unfortunate but there is no reason to believe that such a breach is exceptional,” Arnold wrote. “Other organisations – including universities, government agencies and multinational corporations with the very best information technology money can buy – have experienced unwanted exposure of “their” data, i.e. information about you, me and the people next door.”
Follow Lisa Banks on Twitter: @CapricaStar
Follow Computerworld Australia on Twitter: @ComputerworldAu
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions
Security in a Faster Forward World
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.
Finding Common Ground for Collaboration in Virtual Organisations
Whilst offices are still one of our most powerful collaboration tools available, global collaboration requires us to communicate wherever we happen to be using a host of other tools. In this whitepaper, we look at the future of business collaboration technologies and strategic orientation that leads to best practice.