NIT2201

Table of Content


Article 1: “In Google We Trust”

Question 1: Basic Details and Key Persons

Key People:

  • Kerry O’Brien - Four Corners presenter
  • John Ostler - Data marketer explaining consumer profiling
  • Scott Ludlam - Greens Senator advocating for legal reform
  • Danny O’Brien - Privacy advocate warning about government surveillance

Main Topic: Digital surveillance of Australian families by government and private organizations

Question 2: Major Privacy Concerns

  • Data collected without explicit consent from users
  • Government agencies secretly monitor citizens without warrants
  • Personal data sold on open markets for profit
  • Cross-referencing of loyalty cards with bank data
  • Lack of transparency about data use and recipients
  • No legal oversight for government data access
  • Physical tracking through cars and shopping centers
  • Companies like Google and Facebook know more about people than their families do

Question 3: Information Types

Public Record:

  • Court case data usage

Public Information:

  • General consumer trends
  • Aggregated traffic data

Private Information:

  • Search histories and app usage
  • Location tracking data
  • Purchase patterns
  • Health information searches
  • Cross-referenced loyalty/banking data
  • Personal photos and communications

Article 2: AAPT Hacking Case Study

Question 4: Major Privacy Concerns

  • Outdated security: 7-year-old Cold Fusion software with known vulnerabilities
  • Poor contracts: Inadequate security provisions with third-party provider WebCentral
  • Lack of oversight: AAPT unaware of what data was stored or security measures
  • Training failures: Staff not following existing privacy policies
  • Data retention: Failed to destroy unnecessary personal information
  • Third-party risks: Unclear responsibility when using external servers

Question 5: Key Lessons

  • Ongoing liability: Organizations remain responsible for data security even with third-party storage
  • Security requirements: Need regular updates, vulnerability scans, and clear responsibility allocation
  • Policy implementation: Having policies isn’t enough - must train staff and ensure compliance
  • Enhanced penalties: New laws allow up to $1.7 million fines
  • Proactive management: Require regular audits, data classification, and robust contracts with providers
  • Own motion investigations: Privacy Commissioner can investigate without complaints

Article 3: Retail Reward Programs

Question 6: Price of Loyalty Programs

What consumers pay:

  • Personal shopping data and behavioral patterns
  • Location and timing of purchases
  • Detailed consumer profiles that can predict future behavior
  • Privacy in exchange for small discounts and rewards

What businesses get:

  • Valuable consumer behavior data worth more than rewards given
  • Ability to predict and influence purchasing decisions
  • Data to sell to third parties or use for targeted marketing
  • Competitive advantage through customer insights

Question 7: Personal Information Protection

Personal Information: Any information that can identify an individual, including name, address, purchase history, location data, and behavioral patterns.

Ten Tips to Protect Privacy:

Based on the search results, here are the Ten Tips to Protect Privacy from OAIC:

  1. Know your rights - Learn about the Australian Privacy Principles (APPs)
  2. Read privacy policies - Understand how organizations handle your personal information
  3. Question data collection - Ask why organizations need specific information
  4. Use strong security - Install anti-virus, firewalls, and keep software updated
  5. Be careful on social media - Adjust privacy settings and think before posting
  6. Destroy personal documents - Shred papers and destroy expired cards before disposal
  7. Shop safely online - Use secure websites and strong passwords
  8. Protect mobile devices - Use passwords and be cautious with apps
  9. Stay informed - Keep up with privacy laws and your rights
  10. Ask questions - If you don’t understand policies, request explanations

How to protect personal information:

  • Use strong, unique passwords for different accounts
  • Enable multi-factor authentication
  • Keep software and security tools updated
  • Be selective about what personal information you share
  • Use privacy settings on social media and devices
  • Avoid unsecured Wi-Fi for sensitive transactions
  • Regularly monitor your digital footprint and credit reports