Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) In the event a privacy security breach occurs with regard to personal information held by Victoria University (University), the University will take appropriate steps in response. (2) For the purpose of this Procedure, a privacy security breach occurs if personal information held by the University is lost or subjected to unauthorised access, modification, disclosure or other misuses. (3) HESF: Standard 7.3 Information Management. (4) Standards for Registered Training Organisations (RTOs) 2015: Standard 8. (5) This Procedure applies to all University staff, students, agents, contractors and individuals with whom the University interacts. (6) NDB Scheme means the Notifiable Data Breaches Scheme as defined in the Privacy Act 1988(Cth). (7) Eligible Data Breach under the NDB Scheme: is a breach that is deemed to be an eligible data breach according to the following: (8) Privacy Policy. (9) There is no single way the University will respond to a privacy security breach, as privacy security breaches can be caused or exacerbated by a number of factors. Each breach will be dealt with by the University on a case-by-case basis, with the University undertaking an assessment of the risks involved and using that risk assessment as the basis for deciding what actions to take in the circumstances. (10) As a guide, there are four key steps that the University will generally follow when responding to a privacy security breach or suspected privacy security breach: (11) If any person within the University discovers, suspects or is made aware of a privacy security breach, that person should escalate the matter immediately to the Director, ITS Security and Risk Assurance and/or the Privacy Officer so that the University can take necessary and practicable steps to address and contain the breach. (12) What steps are necessary to contain the privacy security breach will depend on the nature of the breach but may include: (13) The Director, ITS Security and Risk Assurance will be responsible for co-ordinating the University’s response to the privacy security breach. (14) The University will assess the risks associated with the privacy security breach. (15) In doing so, it may consider the following factors: (16) Some types of personal information are more likely to cause individual harm if compromised (for example, an individual’s academic information, financial information, or health or other sensitive information), whether that harm is physical, financial or psychological. (17) What parties may have gained unauthorised access to the affected information? (18) Have there been other breaches that could have a cumulative effect? (19) How could the personal information be used? (20) Is there a risk of ongoing breaches or further exposure of the personal information? (21) Is there evidence of theft? (22) Is the personal information adequately encrypted, anonymised or otherwise not easily accessible? (23) What was the source of the breach? (24) Has the personal information been recovered? (25) What steps have already been taken to mitigate the harm? (26) How many individuals are affected by the breach? (27) Examples of the types of harm to individuals that could result from a privacy security breach include: (28) Other possible harms associated with a breach of privacy security, including to the University include: (29) If the University suspects an eligible data breach has occurred, the University must make an assessment of the suspected eligible data breach under step 2 of this procedure with 30 days. (30) The University should take any remedial action during the assessment period that is appropriate given the circumstances of the suspected eligible data breach. (31) The University will consider the particular circumstances of a privacy security breach and decide whether to notify affected individuals; and, if so consider: (32) Notification may be an important mitigation strategy following a privacy security breach, however, the notification will not always be an appropriate response to a breach. Each incident will be considered on a case-by-case basis to determine whether breach notification is appropriate. (33) The key consideration the University will adopt is whether notification is necessary to avoid or mitigate serious harm to an affected individual. The University may consider the following factors when deciding whether notification is required: (34) If the University determines that notification is appropriate, the University will endeavour to notify affected individuals directly - by phone, letter, email or in person. The University will generally only adopt indirect notification methods, such as by website information, posted notices, media etc, where direct notification could cause further harm, is cost-prohibitive, or the contact information for affected individuals is not known. (35) If the University determines that notification is appropriate, the content of the notification will depend on the particular breach and the notification method. Notification may include the following types of information: (36) If the University determines that notification is appropriate, the University may also consider that there are third parties who should also be notified about the breach. Such third parties may include: (37) In addition to the above three steps, the University may take further steps to prevent future privacy security breaches,including:Privacy Security Breach Procedure
Section 1 - Summary
Section 2 - HESF/ASQA/ESOS Alignment
Section 3 - Scope
Section 4 - Definitions
Top of PageSection 5 - Policy/Regulation
Section 6 - Procedures
Part A - Summary of Roles and Responsibilities
Roles
Responsibilities
Associate Director of Cyber Security
Responsible for co-ordinating the University’s response to the privacy security breach.
Part B - Responding to Privacy Security Breaches: Four Key Steps
Step 1: Contain the Breach
Step 2: Evaluate the Risks Associated with the Breach
The type(s) of personal information involved
The context of the affected information and the breach
Establish the cause and extent of the breach
Assess the risk of harm to the affected individuals
Assess the risk of other harms
NDB Scheme
Step 3: Consider whether Notification is Appropriate and, if so, undertake a Notification Process
Deciding whether to notify affected individuals
Notification process
What will be included in the notification?
Who else should be notified?
Step 4: Prevent Future Breaches