logo

Investigation Data Privacy and Security Australia Report 2022

   

Added on  2022-10-14

24 Pages6742 Words9 Views
Theoretical Computer ScienceData Science and Big DataNutrition and WellnessPolitical Science
 | 
 | 
 | 
Running head: INVESTIGATING DATA PRIVACY AND SECURITY
Investigating data privacy and security
(Department of Administrative Services)
Name of the student:
Name of the university:
Author Note
Investigation Data Privacy and Security Australia Report 2022_1

1
INVESTIGATING DATA PRIVACY AND SECURITY
Executive summary
The DAS is an Australian government sector. Their cloud first strategy allows the business ti save
the expense on platforms, software and infratsurtcure. Because of the alterations in the government
policy, DAS is seen to be moving towards shared measure of service. Their steps indicates that DAS
is able to centralize different services for the entire government. Instead of developing distinct tech
stack, they can subscribe to servive providers to deliver the premium services at minimum cost. In
this report, the privacy strategy for Department of Administrative Service or DAS is suggested.
Further, distinct controls of privacy are sugegested in the study. Next, the personal strategy of data
protection are analyzed here. At last, the measures of protecting personal data are investigated in this
analysis.
Investigation Data Privacy and Security Australia Report 2022_2

2
INVESTIGATING DATA PRIVACY AND SECURITY
Table of Contents
Introduction:..........................................................................................................................................4
1. Development of privacy strategy proposal:.......................................................................................4
a. Management of personal information:...........................................................................................5
b. Collection and management of different types of solicited personal data:....................................6
c. Using and disclosing of personal information:..............................................................................6
d. Usage and security of digital identities:.........................................................................................7
e. Security of personal information:..................................................................................................7
f. Accessing personal information:....................................................................................................8
g. Quality and correction of personal information:...........................................................................9
2. Recommended controls:....................................................................................................................9
a. Mitigating the already identified privacy risks:.............................................................................9
b. Implement the privacy strategy:..................................................................................................10
3. Development of the strategy of personal data protection proposal for Department of
Administrative Service:.......................................................................................................................11
a. Protection of personal information:.............................................................................................11
b. Authorised access and disclosure of personal data:.....................................................................12
c. Use of personal digital identities:................................................................................................13
4. The recommended controls:............................................................................................................15
a. Mitigating the previously determined risks of data security:.......................................................15
b. Implementation of streategy regarding personal data protection:...............................................16
Investigation Data Privacy and Security Australia Report 2022_3

3
INVESTIGATING DATA PRIVACY AND SECURITY
Conclusion:..........................................................................................................................................17
References:..........................................................................................................................................19
Investigation Data Privacy and Security Australia Report 2022_4

4
INVESTIGATING DATA PRIVACY AND SECURITY
Introduction:
The Department of Administrative Service or DAS is the Australian government department.
This was the fourth one in the Commonwealth department. This department is the Australian public
service sector that is employed by the officials liable for the minister for the administrative services.
The Shared service is the consolidation of the business tasks utilized by various sections of a similar
company. They are cost-effective since that can centralize the operations at back-office utilize by
numerous divisions of similar business and eradicate the redundancy. Due to the changes in the
policy of the government, DAS is found to be moving to shared service measure. This process will
indicate that DAS can centralize various services for the overall WofG or whole of Government. On
the other hand, the “cloud-first” strategy permits the organizations to save their cost on
infrastructure, platforms and software. Rather than creating the individual tech stack, they are able to
subscribe to service provider providing premium services at low expense. Again, another
government policy is found to be mandating the “cloud-first” approach to the measure of upgrading
and achieving the services and software. Furthermore, DAS is found to be buying a persona
management application and HR from one company at US providing the SaaS application. This
application is intended to provide an HR suite providing overall HR suite including performance
management. The following study demonstrates the proposal for privacy strategy for DAS. Next,
different privacy controls are recommended. Then, the personal data protection strategies are
evaluated. Lastly, the controls of personal data protection are analyzed in the study.
1. Development of privacy strategy proposal:
The purpose is to deliver guidance for the development process for the agency of DAS. This
must articulate the privacy obligations and then support the sharing of information and protecting
information and protect the informant and privacy of the quality interests. Here, the primary
Investigation Data Privacy and Security Australia Report 2022_5

5
INVESTIGATING DATA PRIVACY AND SECURITY
information and guidance must be provided at every stage of the process of privacy development
having the list of resources along with the web links. This is towards the in-detailed data on
particular areas.
a. Management of personal information:
The good practice guidelines must be detailed in principle, providing support towards DAS
on how smartly they can manage the personal data. This must detail when and how the personal data
should be gathered and the way it is collected to be utilized and then disclosed. This must be
involving the security and storage of sensitive data along with paper and electronic data. Here,
effective principles of practices must detail the way individuals can access the data and correct that
as that is wrong and the ways DAS assure the transparent managing of personal data. This has been
defined within the Privacy Act 1988 (Terzi, Terz and Sagiroglu 2015). This states the data or opinion
that involves the data and the opinions forming the element of the database. Irrespective of the fact it
is true or not, recorded in material format or not, the individual identity is been apparent and is
reasonably ascertained coming from the opinion or information. Firstly, the personal information is
to be collected needed for service delivery. Further, the correction, access and accuracy are to be
checked. Here, the personal data gathered, utilized and been disclosed must be current and accurate
(Yu et al. 2016). Besides, the people must be permitted with reasonable access to the personal data
along with DAS considering reasonable steps for making requested deletions and corrections.
Regarding security and storage the personal data must be secured from any sort of misuse, data loss
ad any sort of inappropriate accessing the disclosure. Next, storage and security are to be considered.
Here, the personal data must be protected from any kind of misuse, inappropriate access loss and
disclose. Further, personal data must be used for the main reason that it has been collected apart
from specifically defined situations. DAS must assure that the personal data is supplied to the
providers of third party services and is protected from any kind of improper use (Kaaniche and
Laurent 2017). Moreover, the personal data must be disclosed to any individual and DAS apart from
Investigation Data Privacy and Security Australia Report 2022_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Privacy Policy
|25
|7029
|142

Cloud Computing Report 2022
|24
|7085
|19

ITC 568 - Cloud Security and Privacy Report
|34
|10001
|50

Cloud Privacy and Security : Assignment
|18
|4804
|105

Data Protection | Assessment Report1
|17
|4103
|27

2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary
|19
|4535
|120