1.4.2 Privacy & confidentiality | Family Assistance Guide (2024)

The Guides to Social Policy Law is a collection of publications designed to assist decision makers administering social policy law. Theinformation contained in this publication is intended only as a guide to relevant legislation/policy. The information is accurate as at the date listed at the bottom of the page, but may be subject to change. To discuss individual circ*mstances please contact Services Australia.

Introduction

This topic explains the differences between confidentiality and privacy.

Confidentiality under FA law

The FA(Admin)Act sets out the circ*mstances in which protected information (1.1.P.140) can be obtained, recorded, disclosed and otherwise used. Services Australia staff can only deal with protected information in a manner consistent with the law.

'Protected information' is defined in the FA(Admin)Act to include information about a person that is or was held in the records of Services Australia.

Protected information can be obtained, recorded, used and disclosed for certain purposes as authorised under FA law.

It is a criminal offence to disclose protected information without authorisation. A breach of protected information is punishable by a maximum of 2 years imprisonment.

Explanation: Confidentiality provisions govern the actions of all people accessing or using information covered by the FA(Admin)Act, including Services Australia staff.

Act reference: FA(Admin)Act Part 6 Division 2—Confidentiality

Policy reference: FA Guide 5.1.3 Protection of Information

Privacy law

The Privacy Act 1988 (Privacy Act) governs the manner in which 'personal information' is handled by Commonwealth agencies and businesses. It also provides safeguards for the collection and use of TFNs.

Personal information is defined in the Privacy Act to mean information or an opinion, whether true or not, and whether recorded in a material form or not, about an identified individual, or an individual who is reasonably identifiable.

Services Australia is required to comply with the 13 Australian Privacy Principles (APPs) contained in Schedule 1 of the Privacy Act, including those relating to the collection, storage, access, use and disclosure of personal information. The APPs are grouped as follows:

  • consideration of personal information privacy (APPs 1 and 2)
  • collection of personal information (APPs 3, 4 and 5)
  • dealing with personal information (APPs 6, 7, 8 and 9)
  • integrity of personal information (APPs 10 and 11), and
  • access to, and correction of, personal information (APPs 12 and 13).

Services Australia staff must comply with the APPs when dealing with personal information. Unauthorised collection, access, use or disclosure of personal information is a breach of the Privacy Act.

Explanation: Privacy provisions govern the practices of Government agencies and businesses.

Privacy (Tax File Number Rule) 2015

The Privacy (Tax File Number) Rule 2015 (TFN Rule), made under the Privacy Act section 17, regulates the collection, storage, use, disclosure, security and disposal of individuals' TFN information.

A breach of the TFN Rule is an interference with privacy under the Privacy Act. Individuals who consider their TFN information has been mishandled may make a complaint to the Information Commissioner. Where a breach is very serious, the Information Commissioner may seek to impose a civil penalty.

As well as constituting a breach of the TFN Rule, unauthorised use or disclosure of TFNs can be an offence under the Taxation Administration Act 1953 and attract penalties including imprisonment and monetary fines.

Services Australia is an authorised recipient of TFN information for the purposes set out in the FAAct and the FA(Admin)Act.

More information about privacy and the TFN Rule is available at the OAIC's website, and TFN queries or enquiries can be directed to the DSS Feedback and Complaints team using the following contact details:

  • Email: complaints@dss.gov.au
  • Telephone: 1800 634 035
  • Post: DSS Feedback, GPO Box 9820, Canberra ACT 2601
  • Online: Online Complaints Form

Act reference: Privacy Act 1988 section 17 Rules relating to tax file number information

Taxation Administration Act 1953 section 8WA Unauthorised requirement etc. that tax file number be quoted, section 8WB Unauthorised recording etc. of tax file number

1.4.2 Privacy & confidentiality | Family Assistance Guide (2024)

FAQs

What are the 7 exceptions to confidentiality? ›

Which Situations Obligate Therapists To Break Confidentiality?
  • Detailed planning of future suicide attempts.
  • Other concrete signs of suicidal intent.
  • Planned violence towards others.
  • Planned future child abuse.
  • Formerly committed child abuse.
  • Experiencing child abuse.
  • Expecting to experience future child abuse.
Jan 15, 2019

What are the four working practices to maintain confidentiality? ›

MAINTAINING CONFIDENTIALITY: FOUR TIPS TO HELP YOU HANDLE SENSITIVE INFORMATION
  • Keep yourself informed of all laws and regulations regarding the handling of personal information. ...
  • Don't share information with people who don't need it. ...
  • Keep written information in a safe place. ...
  • Don't Gossip.

What are appropriate exceptions to patient confidentiality? ›

They may need to share information with law enforcement. A doctor may (or in some cases, must) break the doctor-patient confidentiality law when there's evidence of: A crime or intention to commit a crime. Child abuse or neglect.

How can you protect client privacy and confidentiality? ›

5 Best Practices For Maintaining Client Confidentiality
  1. Communicate And Share Files On A Secure Platform. ...
  2. Keep All Client Data In A Secure Place. ...
  3. Set Permissions And Secure Login. ...
  4. Implement Security Training And Proper Screening For Staff. ...
  5. Make The Most Of Security Technology.
Feb 10, 2023

What can I not tell my therapist? ›

Takeaway
  • Lying to your therapist or telling half-truths; always try to be honest with your therapist.
  • Discussing the facts of a situation without delving into your related emotions.
  • Asking for prescription medication without any prior knowledge.
  • Believing your therapist can and will “cure” you.
Apr 15, 2024

What is the golden rule of confidentiality? ›

The golden rule of data handling and privacy emphasizes treating data with the same care and respect that one would expect for their own information. Principles of data handling include data minimization, accuracy, storage limitation, integrity, and confidentiality.

What information should be kept confidential? ›

Other examples of confidential information include medical records, personal history, personal goals, and private correspondence between people. While confidential information needs to remain private, there are situations where breaking confidentiality is permissible; If the disclosing party is subpoenaed.

What employee information is considered confidential? ›

The Dimensions of Employee-HR Confidentiality

Similarly, social security numbers, birth dates, home addresses and spousal information also must remain confidential within employee personnel files.

How to keep data confidential? ›

Here are some of the 7 effective ways to ensure data confidentiality in your organization.
  1. Restrict access to data. ...
  2. Encrypt your data. ...
  3. Implement a confidentiality policy. ...
  4. Implement a data retention policy. ...
  5. Develop and implement a cybersecurity program. ...
  6. Take physical security measures. ...
  7. Non-disclosure agreements.

What are some examples of violation of patient confidentiality? ›

Leaving confidential information unattended in a non-secure area. Disclosing confidential information without proper authorization. Discussing confidential information in the presence of individuals who do not have the "need to know' to perform assigned duties. Improper disposal of confidential information.

What are the two limits to confidentiality? ›

The law in the State of California mandates that information may be appropriately shared when the following conditions exist: If you present an imminent threat of harm to yourself or others. When there is an indication of abuse of a child, dependent adult or elderly adult.

Is everything you tell your doctor confidential? ›

The legal and ethical principle of doctor-patient confidentiality applies to all communications and information within a genuine doctor-patient relationship.

How to maintain privacy and dignity to a patient? ›

For example, by:
  1. having curtains round the bed for examinations, or intimate care.
  2. having discussions about our symptoms or our future, held discreetly – not within the hearing of the entire ward.
  3. avoiding 'accidental exposure' – from flapping hospital gowns, or rumpled sheets.

What is the difference between privacy and confidentiality? ›

Although confidentiality and privacy are often used interchangeably, they are legally different. Confidentiality is an ethical duty that prevents certain people from sharing information with third parties. Privacy is the right to freedom from intrusion into one's personal matters or information.

What is an example of confidential information for a client? ›

Confidential client information can include various types of data, such as: Personal information: This includes the client's name, address, contact details, Social Security number, date of birth, and other personally identifiable information (PII).

What are the two exceptions to the confidentiality rule? ›

1. You are a danger to yourself and threaten to harm yourself (e.g., suicidal). 2. You threaten to harm another specific person (e.g., assault, kill).

What are the exceptions to 42 CFR confidentiality? ›

There are a few limited exceptions when providers can make disclosures without a patient's written consent, including: Internal communications. Medical emergencies. Reports of alleged child abuse or neglect (if required by state law)

What are five examples of breach of confidentiality? ›

Breaches of Confidentiality
  • Lost or stolen laptops storing participant information.
  • Lost or stolen USB/thumb drives with unencrypted participant information.
  • Accessing PHI without a business need to know.
  • Any unencrypted PHI sent outside of the Health Sciences Center.
Aug 23, 2023

Top Articles
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 6562

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.