Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.

We respect your Do Not Track preference.

Found 214 results for "email"

Displaying page 5 of 22

  1. Frivolous, vexatious or trivial

    Section 53(h) allows an organisation to withhold personal information from the individual concerned if the request is frivolous or vexatious, or the information requested is trivial.

    Frivolous or vexatiousIt is not common for organisations to be able to withhold information on this ground. However,…

  2. Breach Case 1: Name your documents clearly

    It is so easy to send the wrong attachment with an email, especially if the documents you are selecting to attach are not clearly and distinctly named. We see this type of breach fairly regularly so we thought we’d highlight it in this post.

    Of the 33 data breach notifications we received in 2015-1…

  3. AskUs

    The AskUs knowledge base provides general guidance about privacy issues, not legal advice.

    For requests about your specific circumstances, or about a complaint you have lodged with us, please contact us directly.

  4. NotifyUs - For organisations to report privacy breaches

    NotifyUs is for organisations and businesses to work out if privacy breaches are notifiable and report them to us.

    If you are an individual with a privacy complaint involving your own or another person's personal information do not use NotifyUs, please go here.

    If you are an organisation and have …

  5. Me and AboutMe

    I recently received a bill from a local authority relating to work carried out on my property before I bought it. I was not responsible for the bill and I had challenged it successfully on three previous occasions. But it kept coming back. 

    Four years on after my first contact with the local author…

  6. Principle 13 - Unique identifiers

    Principle 13 sets restrictions on assigning identifying numbers and other unique identifiers to individuals. The principle states that an organisation can only assign unique identifiers to people when it is necessary for its functions.

    Unique identifiers are individual numbers, references, or other…

  7. Breach case notes

    We create anonymised case notes based on past privacy breach notifications and investigations to give you an idea of how you can respond to a breach. We look at each breach and complaint on a case-by-case basis, and their outcomes depend on their own facts and circumstances.

    Disposing of personal i…

  8. $18,000 damages for disclosing private letter

    The Human Rights Review Tribunal says a former Massey University extramural student society president suffered humiliation and significant injury to her feelings after a private letter addressed to her was leaked to a student magazine.

    The woman was also subjected to sustained harassment from the r…

  9. Contact us

    Report privacy breaches or complaints
    • Organisations or businesses should report privacy breaches via NotifyUs. Our online tool will help you decide if your privacy breach is notifiable, then report it to us if it is.

    • Individuals can complain about privacy breaches involving their own or other p…

  10. Privacy in the workplace

    Privacy Commissioner John Edwards was asked about workplace surveillance, settling employment disputes, job references and other topics at a Privacy and Employment Law seminar for employers and human resources managers in Wellington on 3 September 2018.

    In the hour-long breakfast seminar, he discus…