In continuation to the series on the Australian Privacy Principles, we shall be reviewing Australian Privacy Principles 6-9. Australian Privacy Principle 6- Use or disclosure […]
Continue readingAuthor: Editor-EU/UK
Australia Privacy Principles-Part 1
The federal legislation on privacy in Australia (the Privacy Act, 1988) is based on 13 Australian Privacy Principles (APPs). These privacy principles are like rules […]
Continue readingAustralia Privacy Act, 1988
Introduction: Australia follows a federal form of government with a national government for the Commonwealth of Australia and separate state governments for the states of […]
Continue readingArticle 32-Security of processing
A controller and processor are entities that process large volumes of data in order to offer certain services to its customer base. Apart from being […]
Continue readingArticle 30- Records of processing activities
The GDPR is a regulation that advocates complete transparency towards the data subjects. The controller and processor cannot hide any fact that might be essential […]
Continue readingArticle 28-Processor
As per Article 4 of the GDPR, a processor is defined as “natural or legal person, public authority, agency or other body which processes personal […]
Continue readingArticle 27-Representatives of controllers or processors not established in the Union
As can be gauged from the title, Article 27 speaks about the presence of controllers or processors not geographically located in the European Union. It […]
Continue readingThe Fashion ID Case-Defining who a joint controller is
In the previous article, we read about Article 26 which defines who a joint controller is and the provisions relating to it. A precursor to […]
Continue readingArticle 26-Joint controllers
In the previous article, we read about the controller and their responsibility to uphold the various provisions of the GDPR. In this article, we shall […]
Continue readingArticle 25-Data protection by design and by default
Article 25 of the GDPR sets out two ways by which a controller can protect the data of the data subjects. One way is by […]
Continue reading