Privacy and Confidentiality - Services and Programs Overview

All interactions with Rural Alive and Well (RAW) are confidential. By submitting information through this platform, you consent to RAW staff being able to contact you, gather information and where consulted, release specific information about you and your care is done to ensure the best possible service delivery.

The Privacy Act 1988 (Commonwealth) Other individuals or organizations may be required to comply with the Commonwealth Privacy Act 1988 in relation to collection, storage and sharing of personal information. Section 14 of the Privacy Act sets out the National Privacy Principles that relate to information sharing. Both the Personal Information Protection Principles (from the Tasmanian legislation) and the National Privacy Principles (from the Commonwealth legislation) allow information to be shared in certain circumstances. Importantly, information may be shared

• When there is consent of the person to whom the information relates, or

• There is impending danger (National Privacy Principles Principle 11 and Personal Information Protection Principles clause 2(1)(d)), or

• Disclosure is required or authorized by law (National Privacy Principles Principle 10 and Personal Information Protection Principles clause 2(1)(f)). This would include an authority or requirement to share information under the Children Young People Teens Family Act. What does the Children Young People Teens Family Act require? Keeping children safe and well is everyone’s business. Protecting the welfare and safety of Tasmania’s children should be paramount when working with families in need of support.

Privacy Policy - Web

The ability to control the information one reveals about oneself over the internet, and who can access that information, has become a growing concern. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can continue to track the websites that someone visited. Another concern is if websites one visited can collect, store, and possibly share personally identifiable information about users.

The advent of various search engines and the use of data mining created a capability for data about individuals to be collected and combined from a wide variety of sources very easily.[9][10][11] The FTC has provided a set of guidelines that represent widely accepted concepts concerning fair information practices in an electronic marketplace called the Fair Information Practice Principles.

To avoid giving away too much personal information, emails should be encrypted. Browsing of web pages as well as other online activities should be done trace-less via "anonymizers", in case those are not trusted, by open-source distributed anonymizers, so called mix nets, such as I2P or Tor – The Onion Router. VPNs (Virtual Private Networks) are another "anonymizer" that can be used to give someone more protection while online. This includes obfuscating and encrypting web traffic so that other groups cannot see or mine it.[12]

Email isn't the only internet content with privacy concerns. In an age where increasing amounts of information is online, social networking sites pose additional privacy challenges. People may be tagged in photos or have valuable information exposed about themselves either by choice or unexpectedly by others, referred to as participatory surveillance. Data about location can also be accidentally published, for example, when someone posts a picture with a store as a background. Caution should be exercised when posting information online, social networks vary in what they allow users to make private and what remains publicly accessible.[13] Without strong security settings in place and careful attention to what remains public, a person can be profiled by searching for and collecting disparate pieces of information, worst case leading to cases of cyberstalking[14] or reputation damage.[15]

Cookies are used in websites that users may allow the website to retrieve some information from user's internet which it usually does not mention what the data being retrieved is.[16] It is a common method used to monitor and track users' internet activity.[16] In 2018, the General Data Protection Regulation (GDPR) passed regulation that forces websites to visibly disclose to consumers their information privacy practices, referred to as cookie notices.[17] This was issued to give consumers the choice of what information about their behavior they consent to letting websites track, however its effectiveness is controversial.[17] Some websites may engage in deceptive practices such as placing the cookie notices in places on the page that are not visible, or only giving consumers notice that their information is being tracked, but not allowing them to change their privacy settings.