Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.
We respect your Do Not Track preference.
Keeping information secure isn’t just about having encrypted databases, it also includes physical security, operational security, security during transmission and during destruction.
The guidance below covers some of the most common practices that can lead to data and privacy breaches if not appropriately monitored and managed within your organisation.
The controls available to you in these scenarios can be categorised as:
Often, you will need to use a combination of controls from all three categories to ensure you have a robust security system in place to reduce the likelihood of breaches.
What steps are appropriate will depend entirely on the context of your organisation, including:
Organisations have an obligation to store personal information securely. System errors, scams, and employee browsing can all lead to a security failure.
A secure IT network will help protect the personal information your organisation works with from hacks, viruses, and malware. CERT NZ(external link) has produced cybersecurity guidance that will help you keep personal information safe in your network.
If your organisation holds or shares personal information digitally, you should have multi-factor authentication (MFA) enabled. MFA requires more than just a password to verify access to systems and accounts. Some examples include phone authentication via text message, authenticator apps, or security questions. This is designed to allow you safer access to your systems and provides an additional step of verification and greater security.
CERT’s Multi-factor authentication and verification guidance has more advice(external link).
Organisations must not keep personal information for longer than they need it. If your organisation doesn’t have a specific legitimate purpose for keeping the personal information, it must be disposed of securely, whether it is in physical or digital form.
Public sector organisations have obligations to preserve records under the Public Records Act. You can find guidance on this at Manage information – Archives New Zealand(external link).
Your organisation is responsible for working out when personal information is no longer needed, as well as a practical solution for disposing of physical documents containing personal information. For example, shredding can be an effective way to dispose of paper records and photographs.
You should also securely delete personal information before you reuse or dispose of any electronic equipment such as computers and laptops, smartphones, tablets, hard drives, USB sticks, photocopiers, and cameras.
You can read more about retention and disposal in the Know your Personal Information pou.
Remember, organisational controls are only effective if staff are reminded of their existence.
We’ve included some use cases based on fictional organisations to demonstrate each of the pou in practice. Read more of the background on our Organisation Examples page.
Fern Leaf has a well-established IT team. The privacy team recognises the IT team’s expertise in this area and so have jointly worked on implementing physical, technical, and organisational controls. As part of its work, the IT team sends out phishing exercises to ensure employees remain aware of these types of attacks.
Prior to using software, the IT team ensure that they carry out due diligence on third parties including checking what security credentials they hold.
Senior leadership have zero tolerance for employee browsing and trust that their employees will not go snooping, as their customers don’t want to be ringing up and not receive help due to access being too restrictive. They send out regular communications on this and have noticed a reduction in employee browsing cases. They actively carry out random checks to ensure those who are accessing customer profiles have a legitimate business purpose. Their zero-tolerance approach is reflected in their code of conduct and forms part of staff inductions. There have been repercussions for staff who have been found to be inappropriately accessing customer profiles.
Reach High does not have an internal IT security resource, and so it relies strongly on service providers to deliver its security capability. It addresses this in the following ways, noting that it has already identified that it has a high privacy risk profile:
Security of customer information is crucial to Swiftstart NZ’s success as a company. While it doesn’t have a dedicated security or IT function, as a tech-savvy digital organisation, all staff have some responsibility for managing security risk. Staff have received training on this and are covered by contracts which clearly set out their responsibilities. In particular, there is a clear expectation on staff around when and how they are permitted to access client customer information, and they know that any inappropriate access will be considered serious misconduct and is grounds for dismissal.
Swiftstart NZ has designed its platform to meet best practice from the outset; it uses encryption to protect the data in transit and at rest, firewalls to prevent unauthorized network access, access controls to limit who can view or modify the data, backups to restore the data in case of disaster, audits to check the compliance and effectiveness of the security measures, and monitoring to detect and respond to any security incidents.