Briefing Paper Handling PII

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Briefing Paper: Handling Personally

Identifiable Information (PII)


Introduction
This briefing paper provides essential guidelines for companies on handling Personally
Identifiable Information (PII). It is designed to be easy to understand and implement,
ensuring compliance with relevant privacy laws and regulations, such as the Australian
Privacy Principles (APPs). Proper handling of PII is crucial for maintaining trust and
avoiding legal repercussions.

What is Personally Identifiable Information (PII)?


PII refers to any information that can be used to identify an individual. This includes, but is
not limited to, names, addresses, email addresses, phone numbers, and financial
information. Sensitive PII, such as health records and biometric data, requires additional
protection.

Collection of PII
1. Only collect PII that is necessary for your business operations.
2. Inform individuals about the purpose of collecting their PII and how it will be used.
3. Obtain consent before collecting sensitive PII.

Storage and Security of PII


1. Implement robust security measures to protect PII from unauthorized access,
modification, or disclosure.
2. Regularly review and update security practices to address emerging threats.
3. Limit access to PII to authorized personnel only.

Use and Disclosure of PII


1. Use PII only for the purpose for which it was collected, unless additional consent is
obtained.
2. Do not disclose PII to third parties without the individual's consent, unless required by
law.
3. Ensure third parties who handle PII on your behalf comply with the same security
standards.
Access to PII
1. Provide individuals with access to their PII upon request.
2. Allow individuals to correct any inaccuracies in their PII.
3. Respond to access and correction requests within a reasonable timeframe.

Destruction of PII
1. Destroy or de-identify PII that is no longer needed for business purposes.
2. Ensure secure destruction methods are used to prevent unauthorized access.
3. Regularly review PII holdings and dispose of unnecessary information.

Data Breaches
1. Implement a data breach response plan to address potential breaches.
2. Notify affected individuals and relevant authorities in the event of a data breach.
3. Take immediate action to mitigate the impact of a data breach and prevent future
occurrences.

Conclusion
Handling PII responsibly is critical for maintaining trust and compliance with legal
requirements. By following these guidelines, your company can protect individuals' privacy
and reduce the risk of data breaches. For further information and resources, refer to the
Australian Privacy Principles and the Office of the Australian Information Commissioner.

You might also like