Legal aspects of design
Presented by Karen Keogh, Partner, HWL Ebsworth Lawyers Wednesday, 11 April 2018
Legal aspects of design Presented by Karen Keogh, Partner, HWL - - PowerPoint PPT Presentation
Legal aspects of design Presented by Karen Keogh, Partner, HWL Ebsworth Lawyers Wednesday, 11 April 2018 Introduction Privacy by Design Security by Design Risk Management by Design 2 Is it really an issue? 3 Privacy Law The
Presented by Karen Keogh, Partner, HWL Ebsworth Lawyers Wednesday, 11 April 2018
2
3
– Regulates how personal information is handled in Australia – Applies to private businesses:
turnover than $3,000,000, or
and hold health information, or
provider for a Commonwealth contract (whether or not a party to the contract).
Open and Transparent Anonymity / Pseudonymity Collection Unsolicited information Notification Use or Disclosure Direct Marketing Cross-Border disclosure Government identifiers Quality Security Access Correction
4
(It’s Time to Make our Privacy Tools Easier to Find 28.03.18)
(APP 1)
5
– Proactive – Privacy as default – Embed privacy to design – Retain full functionality – Ensure end to end security – Maintain visibility and transparency – Respect user privacy
6
– UK ICO reports health incidents ↑ 22%
– Data breach notifications
7
Red Cross failed to implement contractual requirements Employee of contractor saved data to part of the web server which was publicly available Information retained at backend where part
publicly accessible OAIC was satisfied steps were taken to appropriately rectify the data breach Red Cross retained effective ownership although it did not physically hold the personal information A data breach is not necessarily a breach of
Donate Blood Website
– Valuable commodity
– De identification
– Privacy Impact Assessment
(www.oaic.gov.au/agencies-and-organisations/training-resources/)
9
(Robert Mueller, former Director, FBI)
10
To avoid: (a) Statutory liability (Company/Personal) (b) Regulatory liability (c) Third party claims must implement measures to protect personal data (both technical and
Data Breach
Insurance
Training
security breaches Response Plan Ad blocking; Anti-virus software; Back up
– Information security policy framework – Direction on the responsibilities of all parties – Controls on information assets managed by related /third parties – Evaluate design and operating effectiveness of related /third party – Information security incident plan Notify APRA of an information security incident no later than 24 hours
12
– Note: State based health records legislation
13
– Better availability and access to prescriptions and medicines information – A workforce confidently using digital health technologies to deliver health and care
– Minimise medication errors (Providers) – Amend regulatory framework (States) – Participate in training & education (Providers) – Support & evaluate, education & training (States)
14
– Did the introduction of the TrakCare electronic medical record system to Macquarie University Hospital cause or contribute to the death
– Whilst TrakCare did not cause … death, the initial prescription error was made easier due to a function of TrakCare of great utility – the ability to open and close different patient records from a single terminal. Prior to the introduction of electronic medical records, it was much more difficult to chart medication on the wrong patient file
15
– The main reason for the failure … the persistent failure to critical thinking by those involved in the care and treatment of …
– Working party to consider lessons learnt and to include IT representatives, anaesthetists, nursing staff, pharmacy, patient safety & quality manager
16
17
Karen Keogh Partner P +61 2 9334 8884 E kkeogh@hwle.com.au
18
Adelaide | Brisbane | Canberra | Darwin | Hobart | Melbourne | Norwest | Perth | Sydney