Explain the information privacy principles

Assignment Help Management Information Sys
Reference no: EM133208246

Assignment:

Question 1. According to the Privacy Act 1988 and the Information Privacy Principles (IPPs), a person is entitled to have personal information protected. Explain how the legislation and IPPs apply to the following:

a) Manner and purpose of collection of information

b) Collecting information directly from individuals

c) Collecting information generally

d) Storage and security

e) Information use

f) Access and amendment

g) Disclosure

Question 2. What are three types of reports you can be expected to write in a community services position and what should you refer for guidance on formatting these reports?

Question 3. Explain the process for and importance of gaining informed consent when planning assessment and disseminating information.

Question 4. Working with clients with co-existing needs requires you to understand the nature and impact of diverse and multi-faceted needs and issues affecting them. It is important to identify the potential interrelationships of issues for a more holistic assessment.

Enumerate and explain the potential interrelationships between the following groups of needs/issues that may co-exist for a client.

Undertake research and provide references as required.

Reference no: EM133208246

Questions Cloud

What is coors strategic analysis : Compare these strategic analysis with Coors from the past and Coors in the present.
What is meant by the term niche marketing : What is meant by the term niche marketing? What are four challenges a firm might face if using a niche marketing strategy?
Would the risk premium on a high-beta stock increase : If investor's aversion to risk increased, would the risk premium on a high-beta stock increase by more or less than that on a low-beta stock? Explain.
Analyze the non-market environment of firms : How this framework can help analyze the non-market environment of firms. Illustrate your answer with an example from Europe's business context.
Explain the information privacy principles : According to the Privacy Act 1988 and the Information Privacy Principles (IPPs), a person is entitled to have personal information protected.
How can you use feedback to improve assessment process : Why should you reflect on your own performance in the process of assessing someone's needs, and what is one method you can use to do this?
Develop the program planning to set up the gardens : What are two documents you may develop as part of the program planning to set up the gardens and recruit participants?
Difference between reliability and validity of an assessment : When planning an assessment, what are two practical aspects of assessment that should be considered to ensure reliability and validity of the assessment?
How would adhere to the information privacy principles : Provide two examples of how you would adhere to the Information Privacy principles (IPP) when undertaking a needs assessment for Bob?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Implementing new technology due to poor planning

What are some examples of where businesses have not been successful in implementing new technology due to poor planning

  Examine the major benefits for an organization to use ssds

Analyze the main classes of hardware and system software components in an enterprise context. Discuss common input / output technologies. Use technology and information resources to research issues in enterprise architecture.

  Identify the main functions of proposed information system

You've just left an all-hands meeting at your company*. The CEO was very upset at the rise of shadow IT projects - a major indicator that the company's.

  Research on the methodology that microsoft windows firewall

Do a bit of research on the methodologies that Microsoft Windows firewall uses. Consider the strengths and weaknesses of that approach.

  Describe a home network or small business network

Describe a home network or small business network that you very familiar with. Describe the communications devices in these networks. Are they wireless or wired? Are there routers, switches, or hubs? Describe your experiences, good and bad, with t..

  Describe virtual and augmented reality

Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure

  Discuss establishing risk sources and categories

How can you know when your team has identified all of the significant risks associated with an IT acquisition alternative?

  Which is position manages firewalls and antivirus

which is position manages firewalls and antivirus softwarethis managerial is position is responsible for managing such

  Structured approach to decision makingin no more than 1750

structured approach to decision makingin no more than 1750 words i would like a report ofa explain and analyze the 5

  Cross-functional systemthe clambake casethe clambake

cross-functional systemthe clambake casethe clambake company has been providing seafood to the northeast region of the

  Prepare a research paper on a strategic management

Conceiving to success of the business - methodology and prepare a research paper on a strategic management related topic

  How would you present the information and take action

Discuss the complexities of presenting highly technical findings (e.g., Wireshark) to non-technical management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd