Monday, August 11, 2014

Privacy

The Australian Privacy Commissioner has released a revised guide to "reasonable steps" to protect personal information.

Comments due 27 August.

"Effective ICT security requires protecting both computer hardware (the physical devices that make up a computer system) as well as the data (including personal information) that the computer hardware holds from misuse, interference, loss, unauthorised access, modification and disclosure. However, ICT security measures should also ensure that the hardware and the information stored on it remain accessible and useful to legitimate users."


However, absolute security is not only impossible but undesirable.  See for example, here and here

No comments: