Academic literature on the topic 'Australian Privacy Act'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Australian Privacy Act.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Australian Privacy Act"

1

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
2

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles-Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
3

Bomba, David, and George Hallit. "Will the new Australian Health Privacy Law provide adequate protection?" Australian Health Review 25, no. 3 (2002): 141. http://dx.doi.org/10.1071/ah020141a.

Full text
Abstract:
Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines(enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.
APA, Harvard, Vancouver, ISO, and other styles
4

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Full text
Abstract:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
APA, Harvard, Vancouver, ISO, and other styles
5

Hile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia." Journal of Telecommunications and the Digital Economy 9, no. 2 (June 29, 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.

Full text
Abstract:
The increasing prevalence of large-scale data breaches prompted Australia to strengthen the Privacy Act by enacting the Privacy Amendment (Notifiable Data Breaches) Act to regulate the behaviour of entities entrusted with personal data. However, this paper argues that these legislative instruments are ineffective when dealing with data breaches and their associated problems. In supporting this conclusion, this paper first develops a criterion for effective data breach law, and then evaluates the Australian framework against this criterion to determine its operational effectiveness. In addition, this paper analyses practical developments in the area of data-breach law to garner insights as to how the Australian framework can be made more effective. Ultimately, this paper concludes that the Australian framework is ineffective when dealing with large-scale data breaches, and recommends future legislative amendment as a means of bolstering its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
6

Wagner, J., and N. Witzleb. "Australia ∙ ‘Personal Information’ in the Australian Privacy Act and the Classification of IP Addresses." European Data Protection Law Review 3, no. 4 (2017): 528–33. http://dx.doi.org/10.21552/edpl/2017/4/17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berglund, Catherine A. "Australian standards for privacy and confidentiality of health records in research: implications of the Commonwealth Privacy Act." Medical Journal of Australia 152, no. 12 (June 1990): 664–69. http://dx.doi.org/10.5694/j.1326-5377.1990.tb125429.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nicol, Dianne, Meredith Hagger, Nola Ries, and Johnathon Liddicoat. "Time to Get Serious about Privacy Policies: The Special Case of Genetic Privacy." Federal Law Review 42, no. 1 (March 2014): 1–32. http://dx.doi.org/10.22145/flr.42.1.7.

Full text
Abstract:
Genetic information is widely recognised as being particularly sensitive personal information about an individual and his or her family. This article presents an analysis of the privacy policies of Australian companies that were offering direct-to-consumer genetic testing services in 2012–13. The results of this analysis indicate that many of these companies do not comply with the Privacy Act 1988 (Cth), and will need to significantly reassess their privacy policies now that significant new amendments to the Act have come into force. Whilst the Privacy Commissioner has increased powers under the new amendments, the extent to which these will mitigate the deficiencies of the current regime in relation to privacy practices of direct–to-consumer genetic testing companies remains unclear. Accordingly, it may be argued that a privacy code for the direct-to-consumer genetic testing industry would provide clearer standards. Alternatively it may be time to rethink whether a sui generis approach to protecting genetic information is warranted.
APA, Harvard, Vancouver, ISO, and other styles
9

Aljeraisy, Atheer, Masoud Barati, Omer Rana, and Charith Perera. "Privacy Laws and Privacy by Design Schemes for the Internet of Things." ACM Computing Surveys 54, no. 5 (June 2021): 1–38. http://dx.doi.org/10.1145/3450965.

Full text
Abstract:
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complying with regulations. One key reason is that, at times, regulations are vague and could be challenging to extract and enact such legal requirements. In this article, we have conducted a systematic analysis of the privacy and data protection laws that are used across different continents, namely (i) General Data Protection Regulations, (ii) the Personal Information Protection and Electronic Documents Act, (iii) the California Consumer Privacy Act, (iv) Australian Privacy Principles, and (v) New Zealand’s Privacy Act 1993. Then, we used framework analysis method to attain a comprehensive view of different privacy and data protection laws and highlighted the disparities to assist developers in adhering to the regulations across different regions, along with creating a Combined Privacy Law Framework (CPLF). After that, the key principles and individuals’ rights of the CPLF were mapped with Privacy by Design (PbD) schemes (e.g., privacy principles, strategies, guidelines, and patterns) developed previously by different researchers to investigate the gaps in existing schemes. Subsequently, we have demonstrated how to apply and map privacy patterns into IoT architectures at the design stage and have also highlighted the complexity of doing such mapping. Finally, we have identified the major challenges that should be addressed and potential research directions to take the burden off software developers when applying privacy-preserving techniques that comply with privacy and data protection laws. We have released a companion technical report [3] that comprises all definitions, detailed steps on how we developed the CPLF, and detailed mappings between CPLF and PbD schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Yuvaraj, Joshua. "How about me? The scope of personal information under the Australian Privacy Act 1988." Computer Law & Security Review 34, no. 1 (February 2018): 47–66. http://dx.doi.org/10.1016/j.clsr.2017.05.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Australian Privacy Act"

1

Williams, Elizabeth A., and n/a. "Regulating the Internet : privacy under the microscope." University of Canberra. Communication, 1997. http://erl.canberra.edu.au./public/adt-AUC20061114.094402.

Full text
Abstract:
This thesis is an exploration of privacy as it relates to the Internet in general, and e-mail communication in particular. It looks at the philosophy of privacy and tracks the privacy debate in both an academic and legal framework. It examines the Australian Privacy Act of 1988 and similar legislation overseas. Current government approaches to privacy and privacy regulation are also examined providing a legislative/political context for the research. The fieldwork component of the thesis attempts to unravel individual perceptions of privacy. It overlays those perceptions of privacy with an examination of the effects of Internet technology on a conceptual understanding of privacy. There is no doubt that the discussion of privacy and the electronic age is extensive but discussion with individuals about their place in the debate and, indeed, the legislation is yet to be tackled in an extensive manner. Until we mesh the views of individuals in the community about their place in the new communications technology and privacy debate, we will not reap the full benefits of advances in communications technology. Consumers will remain reluctant about and suspicious of breaches of their privacy via the Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Sukkar, Malak, and sukkarm@stvmph org au. "Executives' Decision Making in Australian Private Hospitals: Margin or Mission?" RMIT University. Graduate School of Business, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081031.162754.

Full text
Abstract:
This thesis examines decision making at executive level in Australian private hospitals as a social phenomenon, since individuals draw meaning from their own biographical and social environmental experiences. The researcher interpreted the constructed realities of the factors influencing executives' decisions within the context of private hospitals - a field that is rarely examined through the lens of social research. Using an Interpretivist research paradigm, the researcher conducted semi- structured and in-depth interviews with sixteen executive members who are experts in their field and represent both sectors of the private hospital industry: private for-profit and private not-for-profit. The data generated was transformed into technical accounts using an abductive research strategy and adopting Schütz's notion of first-order and second-order constructs. Using Giddens' Structuration Theory, that stressed the fundamental role of the human agent, the structure and their mutual dependence, the researcher moved beyond the interpretation of individuals' meanings, to incorporate the structure as an entity that can be formed and reformed. The researcher interpreted social actors' constructed meanings of these social phenomena in their work environment to form the elements of a two-dimensional decision making model at organisational level, incorporating the present with the future and the internal with the external factors. On an individual level, three different approaches to decision making were identified, based on whether executives perceived the decision making phenomenon as intuition, as a reasoned process or as an expected outcome. While being from a limited research sample, the findings of this study suggest that the paradox of mission / economic decisions restrained executives in the not-for-profit sector from strengthening their hospitals' financial performance, putting at risk, therefore, their ability to achieve social dividends as a way to proclaim their mission. On the other hand, in the for-profit sector, shareholders' dividends appeared to be a strong catalyst for attaining profit maximisation when making decisions. In both settings, the findings suggest that the role of stakeholder theory is questionable, particularly when executives remained hesitant to involve medical specialists, whom they considered to be major stakeholders and profit generators for private hospitals. This attitude appeared to be constant, despite the changes identified in executives' individual approaches to decision making. However, early signs of shifts towards adopting more commercially and socially accountable decisions were apparent in not-for-p rofit and for-profit sectors respectively. The thesis sets out recommendations to assist executives in managing the different factors that interplay to form executives' decisions. The importance of having a mission in business longevity and the integration, as opposed to alignment, of strategic goals with business operations when making executive decisions in private hospitals was highlighted. The implications for both sectors are described and recommendations for further research are suggested.
APA, Harvard, Vancouver, ISO, and other styles
3

Harding, Ian M., and n/a. "The introduction of privacy legislation to Australia as a case study in policy making." University of Canberra. Administrative Studies, 1998. http://erl.canberra.edu.au./public/adt-AUC20060720.124331.

Full text
Abstract:
The basis of this study was my belief that the introduction of the present privacy legislation had been done in such a "try and see" manner. To me, the whole process "begged" for a much closer look to try to understand the rationale behind successive governments' decisions on this policy initiative. I begin my look at the process from the 1960s as this is when general public concern for the security of personal information was high. I then move to the introduction of the proposed Australia Card and its demise and then to the present. Then, with reference to the "classic" policy analysis authors, I show that the implementation of federal privacy laws in Australia was an excellent example of how not to go about convincing the public the new laws would offer the protection they, the public, sought. I also explore the reasons behind negative lobbying by certain non-government sector interests to demonstrate how this sector has influenced government thinking. As an example of the study of a policy issue this thesis shows the effect a lack of planning, and a terrible lack of communication, can have on the introduction of any new legislation. Much of this is due to the fact that the real issue behind the introduction of privacy legislation was that of increasing taxation revenue and not the protection of individuals' privacy. The privacy legislation was the "sweetener" the government believed was needed to satisfy the general public's concerns so that the government could achieve the desired result for its taxation revenue policy.
APA, Harvard, Vancouver, ISO, and other styles
4

Sarre, Warick T., and n/a. "The law of private policing in Australia." University of Canberra. Law, 2002. http://erl.canberra.edu.au./public/adt-AUC20061107.164945.

Full text
Abstract:
Diversified, essentially privatised, policing options are expanding daily in modern societies. They have become available to, and are being accessed by, individuals, community groups and governments on a regular basis. While this dissertation examines the phenomenon of private policing in Australia generally, its task, more specifically, is to document and review the laws that govern, shape and make accountable private policing operations and activities. Chapter 1 reviews the origins and manifestations of contemporary shifts to privatised models of policing. Chapter 2 examines models of relationships between public and private personnel, and the various methods of accountability that may serve to govern the activities of the latter. Chapters 3 to 8 explore and explain the applicable laws that inform, shape and govern private policing generally. What this examination reveals is that "private police" are empowered by a multitude of common law and legislative principles, along with a mosaic of diverse and semi-structured rules not necessarily designed for this specific purpose. One quickly finds that the laws that permit, facilitate, regulate and manage private manifestations of policing do not fall within easily discernible legal parameters. Finally, Chapter 9 provides a summary of the dissertation, together with some general thoughts concerning the effectiveness and appropriateness of the law as a vehicle for bringing about the desired goals, namely effective policing that provides appropriate outcomes for victims, suspects, private personnel, public police and the general public alike.
APA, Harvard, Vancouver, ISO, and other styles
5

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
6

Rainger, Michele Barbara, and n/a. "An examination of the achievements of In-House Options within the Defence Commercial Support Program." University of Canberra. Business and Government, 2006. http://erl.canberra.edu.au./public/adt-AUC20070719.122229.

Full text
Abstract:
The public sector in Australia, as in other western countries, has been accused in recent times of being too costly, too rigid, inefficient and ineffective. What is apparently needed is a public sector that is smaller, less costly, more efficient and more effective. The search for alternative and better ways to organise and undertake work to meet these reform objectives is at the heart of the rapid expansion of Competitive Tendering and Contracting (CTC) within the public sector in the last two decades. But increased reliance on government contracting does not always lead to outsourcing. Some government agencies allow, indeed encourage, their current employees to also bid for the work on offer by including an In-House Option (IHO) within their CTC processes. In a number of cases these IHOs have been selected ahead of their commercial competitors. IHOs are effectively internal tenders that, if selected, must be implemented by work areas within the confines of the policies and practices of their parent organisation. The reasons commonly expressed in support of IHOs are to do with addressing the potentially problematic aspects of organisational review and possible outsourcing, and to assist the parent organisation achieve its reform intentions in the most effective and least disruptive manner possible. This research examined the achievements of six IHOs within the Australian Defence Organisation. It also asked what can be learned from their experiences? The findings show that IHOs can contribute to reform and enhance the effectiveness of CTC processes but that these achievements come at a price�borne primarily by the staff who work within selected IHOs. IHOs add to the competition of CTC exercises. They also act as an insurance policy against being caught with no reasonable bids and offer a benchmark against which to assess unknown bids. But competition can also focus bidders on doing what is necessary to win rather than what is best for an organisation or its staff. Having IHOs increases the uncertainty for staff about their future employment while at the same times raising expectations that if they can be successful they will be able to make changes and improve their work areas. This research has shown that this does not always occur and staff can find the whole experience frustrating and demoralising. Organisations that include IHOs within their CTC methodologies need to assist them if they are to have the best opportunity to propose new and innovative ways of working. And they must be prepared for the possibility that their IHOs could win. Selected IHOs need support to successfully implement changes, and as the IHOs examined here have shown, they can make significant improvements in work practices and more efficient use of resources if given the chance.
APA, Harvard, Vancouver, ISO, and other styles
7

Clarke, Roger Anthony, and Roger Clarke@xamax com au. "Data Surveillance: Theory, Practice & Policy." The Australian National University. Faculty of Engineering and Information Technology, 1997. http://thesis.anu.edu.au./public/adt-ANU20031112.124602.

Full text
Abstract:
Data surveillance is the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. This collection of papers was the basis for a supplication under Rule 28 of the ANU's Degree of Doctor of Philosophy Rules. The papers develop a body of theory that explains the nature, applications and impacts of the data processing technologies that support the investigation or monitoring of individuals and populations. Literature review and analysis is supplemented by reports of field work undertaken in both the United States and Australia, which tested the body of theory, and enabled it to be articulated. The research programme established a firm theoretical foundation for further work. It provided insights into appropriate research methods, and delivered not only empirically-based descriptive and explanatory data, but also evaluative information relevant to policy-decisions. The body of work as a whole provides a basis on which more mature research work is able to build.
APA, Harvard, Vancouver, ISO, and other styles
8

au, martinia@westnet com, and Angelita Martini. "Community participation in government and private sector planning: a case study of health and telecommunications planning for rural and remote Western Australia." Murdoch University, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20081002.100047.

Full text
Abstract:
This study was conducted in the context of health service planning in an environment of changing government strategies for regional, rural and remote area health care and telecommunications infrastructure planning in Western Australia. The study provides an account of the State Government of Western Australia’s planning for the implementation of a telecommunications network infrastructure, and specifically the Telehealth Project, conducted between 1998 and 2002. The purpose of this study was to examine influences on community participation in planning within the dynamic political, economic and social forces that impact on the development of regional, rural and remote area health services. Specifically, the study outlines the issues and barriers in providing for significant local participation in projects that are centrally initiated and controlled. It examines the influences in planning for projects that incorporate local community based beliefs and needs, the requirements of collaborating with multiple state and national government departments, and the private sector. This study was situated within the interpretive paradigm, and is conceptualised within Donabedian’s (1969) framework for assessing and assuring quality in health care. The methodological approach is bound within a case study and consists of a participatory action research approach. The research method uses the single case to undertake in-depth interviews, observations and a survey to collect data from community, government and industry members as a basis for reflection and action. The findings of the study clearly indicated that there was consensus between all rural, remote and metropolitan area participants that telecommunications did offer the opportunity to provide increased, improved or alternative health services. However, there were a number of obstacles to the success of the planning process, including a lack of local community inclusion in planning committees, poor communication within central government agencies, overuse of external consultants, a bias toward the medical view, a limited scope of invitation to contribute, and local information being overlooked in the final implementation plan. Analysis of planning for the Telehealth Project reveals the implications of organisational and political stakeholders making final decisions about outcomes; and provides a reminder of the importance of engaging communities authentically when planning for health and telecommunications services which involve the public and private sectors. The originality and significance of this study stems from understanding how technology can advance community health; through measures such as the use of community participation strategies, through authentic community based leadership, truly representative participants, decentralised decision making, a focus on community based health needs and change management strategies that include all of these. Consequently, the study advances knowledge of community participation in planning, and the evidence suggests implications for practice, education and further research.
APA, Harvard, Vancouver, ISO, and other styles
9

LEIPOLDT, Erik, and eleipoldt@upnaway com. "Good life in the balance: a cross-national study of Dutch and Australian disability perspectives on euthanasia and physician-assisted suicide." Edith Cowan University. Education And Arts: School Of, 2003. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0010.html.

Full text
Abstract:
This is a cross-national qualitative study with the purpose of obtaining perspectives held by people with quadriplegia and leading figures in disability movements in the Netherlands and Australia on the issues of euthanasia and physician-assisted suicide (EPAS). A disability voice is not prominent in public debate on EPAS in Australia or the Netherlands, even though people with disabilities are often thought to be vulnerable in relation to EPAS policies. Disability perspectives are potentially valuable in illuminating issues in relation to euthanasia and physician-assisted suicide, because issues of dependence, independence, and individual autonomy play important roles in relation to both EPAS and to living with disability. The study's methodology uses a phenomenological approach and incorporates aspects of heuristics and grounded theory. Its conceptual framework incorporates MacIntyre's (1999) theory of acknowledged dependency and vulnerability; Habermas' (1989) theory of knowledge; and Festinger's (1959) theory of cognitive dissonance. The main sample of twenty people with quadriplegia (the grassroots sample) was interviewed in the Netherlands and in Australia.
APA, Harvard, Vancouver, ISO, and other styles
10

Harkness, Christopher. "Partnerships : an opportunity to restore meaning to the 'human' in human services." University of Western Australia. Social Work and Social Policy Discipline Group, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0069.

Full text
Abstract:
This research study is about partnership working in the human services using community mental health as a context. The purpose of this type of research has relevance today as governments at all levels in Australia are adopting partnerships as social policy tools to address social problems. The rationale for these policies appears to be based on recognition that large social problems require holistic responses through the working together of multiple agencies. However despite the volumes of material about the programmatic means for enacting partnerships I found little which attended to the micro practices of partnership. The lack of guidelines on how to engage in partnership becomes problematic as partnerships in social service contexts have complexities and can be difficult to enact. Moreover actors may feel undermined when it is taken for granted that they have the necessary knowledge and skills to enact partnerships. A case study is conducted on how partnerships are enacted within Bethany Outreach Services, a pseudonym used to represent a psychosocial support service in the Perth metropolitan area. Semi-structured in-depth interviews are conducted with seven participants engaged in a partnership within community mental health. The literature is analysed for its contribution to the critical question of how to “do” partnership. Case examples are utilised to contextualise key principles of partnership. Key elements of theoretical perspectives are applied as a way to better understand how partnerships might work better. Narratives from the literature and the experiences of people as seen through this case study are examined to arrive at some key elements of partnership. Despite their complexities partnerships provide an opportunity for actors to engage their humanity and build relationships based on human qualities such as respect, communication and the sharing of resources. These qualities build social capital, which can be developed in new partnership contexts to address new problem domains. It is through these qualities that partnerships might give meaning to the 'Human' in Human Services.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Australian Privacy Act"

1

Radford, Ron. 19th-century Australian art: M.J.M. Carter Collection, Art Gallery of South Australia. Adelaide: Art Gallery Board of South Australia, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eagle, Mary. A story of Australian painting. Chippendale, Sydney: Macmillian Australia, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fine Arts Museums of San Francisco, ed. Spirit country: Contemporary Australian Aboriginal art. South Yarra, Vic: Hardie Grant, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Museum, Seattle Art. Ancestral modern: Australian aboriginal art : Kaplan & Levi collection. New Haven: Yale University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dirk, Bakker, and Kimbell Art Museum, eds. Island ancestors: Oceanic art from the Masco Collection. [Seattle?]: University of Washington Press in association with the Detroit Institute of Arts, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaus, David. Ernabella batiks: In the Hilliard Collection of the National Museum of Australia. Canberra, A.C.T: National Museum of Australia Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sheumack, Donald Robert. The D.R. Sheumack collection: Eighty years of Australian painting. Paddington, NSW: Sotheby's Australia, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Western Australian art: A selection of early works from the Robert Holmes à Court Collection. Perth, W.A: Heytesbury Holdings, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sherer, Scott A. The Lam collection of aboriginal art. Albany, Tex: Bright Sky Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Paolo, Maiullari, and Museo delle culture (Lugano, Switzerland), eds. Dhukarr: Arte aborigena contemporanea : la collezione Knoblauch = contemporary aboriginal art : the Knoblauch collection. Cinisello Balsamo, Milano: Silvana Editoriale, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Australian Privacy Act"

1

"‘Equitable damages’ or Lord Cairns’ Act damages." In Remedies in Australian Private Law, 347–66. Cambridge University Press, 2018. http://dx.doi.org/10.1017/9781108265188.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boutros, Andrew. "Investigations, Privacy and Data Security Issues." In From Baksheesh to Bribery, 593–604. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190232399.003.0022.

Full text
Abstract:
When conducting internal investigations, it is critical to understand and consider various U.S. and international privacy and data protection laws. Some of the key laws investigators must consider include the Electronic Communications Privacy Act, the Fair Credit Reporting Act, and the Health Insurance Portability and Accountability Act. In addition, Sarbanes-Oxley in the United States and privacy and data security regimes in other countries and regions, for example Australia and the European Union, contain critical data security provisions, of which internal investigators must be aware. This chapter also includes discussion of other laws pertaining to the subject, such as the Children’s Online Privacy Protection Act, the Communications Act, and the Driver’s Privacy Protection Act.
APA, Harvard, Vancouver, ISO, and other styles
3

Ervin, Karen. "Legal and Ethical Considerations in the Implementation of Electronic Health Records." In Healthcare Ethics and Training, 960–73. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2237-9.ch045.

Full text
Abstract:
This chapter examines the literature of healthcare in the United States during the transitioning to electronic records. Key government legislation, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH), which were part of the American Recovery and Reinvestment Act (ARRA) and the Affordable Health Care Act, are reviewed. The review concentrates on patient privacy issues, how they have been addressed in these acts, and what recommendations for improvement have been found in the literature. A comparison of the adoption of electronic health records on a nationwide scale in three countries is included. England, Australia, and the United States are all embarking in and are at different stages of implementing nationwide electronic health database systems. The resources used in locating relevant literature were PubMed, Medline, Highwire Press, State Library of Pennsylvania, and Google Scholar databases.
APA, Harvard, Vancouver, ISO, and other styles
4

Ervin, Karen. "Legal and Ethical Considerations in the Implementation of Electronic Health Records." In E-Health and Telemedicine, 1432–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8756-1.ch072.

Full text
Abstract:
This chapter examines the literature of healthcare in the United States during the transitioning to electronic records. Key government legislation, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH), which were part of the American Recovery and Reinvestment Act (ARRA) and the Affordable Health Care Act, are reviewed. The review concentrates on patient privacy issues, how they have been addressed in these acts, and what recommendations for improvement have been found in the literature. A comparison of the adoption of electronic health records on a nationwide scale in three countries is included. England, Australia, and the United States are all embarking in and are at different stages of implementing nationwide electronic health database systems. The resources used in locating relevant literature were PubMed, Medline, Highwire Press, State Library of Pennsylvania, and Google Scholar databases.
APA, Harvard, Vancouver, ISO, and other styles
5

Ervin, Karen. "Legal and Ethical Considerations in the Implementation of Electronic Health Records." In Cases on Electronic Records and Resource Management Implementation in Diverse Environments, 193–210. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4466-3.ch012.

Full text
Abstract:
This chapter examines the literature of healthcare in the United States during the transitioning to electronic records. Key government legislation, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH), which were part of the American Recovery and Reinvestment Act (ARRA) and the Affordable Health Care Act, are reviewed. The review concentrates on patient privacy issues, how they have been addressed in these acts, and what recommendations for improvement have been found in the literature. A comparison of the adoption of electronic health records on a nationwide scale in three countries is included. England, Australia, and the United States are all embarking in and are at different stages of implementing nationwide electronic health database systems. The resources used in locating relevant literature were PubMed, Medline, Highwire Press, State Library of Pennsylvania, and Google Scholar databases.
APA, Harvard, Vancouver, ISO, and other styles
6

Baines, Donna, and Doug Young. "Austerity, Personalized Funding and the Degradation of Care Work: Comparing Scotland’s Self-Directed Support Policy and Australia’s National Disability Insurance Scheme." In Working in the Context of Austerity, 171–92. Policy Press, 2020. http://dx.doi.org/10.1332/policypress/9781529208672.003.0009.

Full text
Abstract:
This chapter examines the employment impacts of two of the most significant pieces of social policy introduced in Scotland and Australia in the past decade, namely the Social Care (Self-Directed Support) (Scotland) Act 2013 and the National Disability Insurance Scheme Act in Australia. Launched in the era of austerity, both policies have been viewed as critical human rights-engaged legislation aimed at improving the social inclusion of marginalized and vulnerable populations. Drawing on qualitative interview data in Scotland and Australia, the chapter identifies a downward spiral in wages and conditions, and increased privatization, fragmentation, precarity, and insecurity, alongside serious concerns about quality of care. The analysis shows no winners, as may be characteristic of social policy introduced in the context of austerity and neoliberalism. Instead, the private-market focus and austere funding of these new policies places the human rights of service users in a zero-sum competition with the employment rights of care workers.
APA, Harvard, Vancouver, ISO, and other styles
7

Neale, Timothy. "Afterword." In Wild Articulations. University of Hawai'i Press, 2017. http://dx.doi.org/10.21313/hawaii/9780824873110.003.0008.

Full text
Abstract:
The afterword reflects on the events that followed the end of the controversy in 2012-2013, considering how these events retrospectively inform the issues addressed in this book. These events include, for example, the election of Tony Abbott as, in his own words, a ‘Prime Minister for Indigenous Affairs’ and the downturn in the mining sector in Australia. As this afterword shows, several of the major non-Indigenous figures that had campaigned against the Wild Rivers Act soon abandoned their promises to Indigenous people. Relations between Indigenous representatives, the state, and the private sector are characterised, this afterword suggests, by an instrumentality that undermines any potential for significant change.
APA, Harvard, Vancouver, ISO, and other styles
8

Calabresi, Steven Gow. "The Privy Council: The Umpire of the British Empire." In The History and Growth of Judicial Review, Volume 1, 35–96. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190075774.003.0004.

Full text
Abstract:
This chapter describes the history and workings of the Privy Council, which was the Supreme Court of both the First and Second British Empires from 1607 until the present day. The Judicial Committee of the Privy Council (JCPC), as it came to be called in 1833, provided vertical federalism judicial review in all British Imperial cases arising outside of England and Wales to ensure that English colonies were not adopting laws that were repugnant to English law. The British Empire from 1607 to the present day was and is a constitutional federal entity with centralized federalism judicial review vested in what is now called the JCPC. The JCPC, which still exists, does not have the power of horizontal judicial review, either over acts of the U.K. Parliament, or of the prime minister. The Privy Council between 1607 and 1776 reined in the thirteen North American British colonies when they enacted laws or decided cases in ways that were repugnant to the laws of England. The JCPC decided Canadian and Australian federalism and separation of powers case from 1867 on thereby habituating those countries to the practice of federalism and separation of powers judicial review, which both countries have followed since gaining independence.
APA, Harvard, Vancouver, ISO, and other styles
9

Shaikh, Fariha. "Emigrant Shipboard Newspapers: Provisional Settlement at Sea." In Nineteenth-Century Settler Emigration in British Literature and Art, 63–94. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474433693.003.0003.

Full text
Abstract:
Chapter Two takes up the concerns of the first chapter regarding the grey areas between public and private spheres and the binaries of manuscript and print in the context of two manuscript shipboard periodicals, the Alfred (1839) and the Open Sea (1868). These were periodicals that emigrants had made themselves during the voyage to Australia. Whereas success is the inevitable conclusion of printed emigrants’ letters (and other propaganda), shipboard periodicals remain distinct from these genres because of their ostensible lack of participation in these narratives. Manuscript shipboard periodicals aim to invest themselves with the qualities of printed, land-based periodicals through their mimicry of them. Thus, rather than focussing on the colony as a place of settlement, these periodicals produce a culture of settlement on board the ship. In constructing the voyage out as a preparatory stage to the actual task of settlement in the colonies, these periodicals participate in the colonial push to turn emigrants into successful settlers.
APA, Harvard, Vancouver, ISO, and other styles
10

Cento, Veljanovski. "1 Introduction." In Cartel Damages. Oxford University Press, 2020. http://dx.doi.org/10.1093/law-ocl/9780198855163.003.0001.

Full text
Abstract:
This introductory chapter provides an overview of cartel damages. The Damages Directive 2014/104/EU Article 2(14) defines a cartel as ‘an agreement or concerted practice between two or more competitors aimed at coordinating their competitive behaviour on the market or influencing the relevant parameters of competition’. Not only do cartels harm their customers and suppliers, they restrict and distort competition as well as markets, and retard economic growth, productivity, and product innovation. As such, a cartel is illegal under Article 101 TFEU and in the UK is a Chapter I Prohibition under the Competition Act 1998. Indeed, competition authorities around the world are cracking down on cartels. In the last two decades, the European Commission has focused on cartels, imposing heavy fines and encouraging those who have been harmed to sue for damages. The UK, Ireland, Australia, and other countries have followed the US by making price-fixing a criminal offence and have jailed and disqualified directors. This chapter then considers the implications of Brexit for competition law and private damages actions.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Australian Privacy Act"

1

Crompton, Malcolm. "The Privacy Act and the Australian Federal Privacy Commissioner's functions." In the tenth conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/332186.332273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Dongxi. "Servicization of Australian Privacy Act for Improving Business Compliance." In 2012 IEEE 19th International Conference on Web Services (ICWS). IEEE, 2012. http://dx.doi.org/10.1109/icws.2012.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography