Presidian Legal Publications
  1. Companies
  2. Presidian Legal Publications
  3. Training
  4. Online Privacy Training for Staff ...

Online Privacy Training for Staff (2019)

SHARE

This online course provides privacy training for staff whose tasks involve the handling of personal information. It equips workers with a detailed awareness of privacy as a compliance issue, key obligations under the Privacy Act`s thirteen Australian Privacy Principles (APPs) and Data Breach Notification Scheme and core areas of risk relevant to day-to-day work functions. The course, delivered through state-of-the-art e-training software, is designed to ensure a high level of user engagement through graphics and interactivity balanced with high quality training content. It contains an e-trainer to guide users through the course, real-life case studies explained through characterised cartoons to demonstrate privacy issues in practice and quizzes to enable users to apply principles in practical scenarios.

Most popular related searches

The course contains a graded assessment (multiple-choice). Users who successfully pass the assessment can download a Certificate of Completion. User assessment reports are available to training managers. The course is current to 2019.

Learning outcomes

The course aims to equip staff with a detailed understanding of:

  • privacy and the need to protect personal information; 
  • key requirements under the APPs and how they apply in practice;
  • areas of risk in day-to-day work functions.

Course outline

1-Introduction
     Welcome
     Why is privacy important?
     Privacy Act and APPs
     Personal information
     Compliance frameworks
     Role of staff

2-Australian Privacy Principles
      Collection
          Necessary
          Sensitive information
          Fair
          Third parties
          Privacy collection notices
     Use & disclosure
          Use vs disclosure
          Permitted purposes
          Primary purpose
          Consent
          Related use
          Authorised by law
          Unauthorised staff access
          Unauthorised disclosures
     Data accuracy
          Requirements
          "Complete" records
     Data security
          Requirements
          Data security policies
          Common risks
      Privacy policy
          Contents
          Multiple policies
          Purpose
          Effect

3-Data Breach Notification Scheme
      Scheme requirements
          Breach assessment
          Review exemptions
          Notification
      Eligible data breach
          Meaning
          Serious harm
          Common causes
      Role of staff
          Reporting incidents
          Quizzes