Search Results

Search results for privacy.

2939 items matching your search terms

  1. EMPC Document bundle example [pdf, 125 KB]

    ...interfere with the Employee's employment duties or obligations, and must not be illegal or contrary to the interests of the Employer. The Employee shall also comply with all email and Internet policies issued by the Employer from time to time. 11.5 Privacy Obligations The Employer and the Employee shall comply with the obligations set out in the Privacy Act 1993. The Employee must not breach the privacy of any customer or client in the course of their employment. 7 12 R...

  2. MOJ Privacy Guidelines - IT self-assessment template [pdf, 401 KB]

    ...authentication15). All Some None N/A 25. Are email accounts within your organisation used for business purposes only? (i.e. not used to log into Facebook, Twitter, etc) All Some None N/A Section 4: Responding appropriately to a privacy or cyber security incident 15 Centralised certification is a single service to manage the sign-in process for multiple applications used within an organisation. 16 Remote wiping is the ability to delete all user data and informati...

  3. Strengthening the family justice system - EasyRead - Word version [docx, 10 MB]

    ...Court information [image: ] When you are answering these questions please do not: · share documents about your family court case · things about your case: Things like: · case numbers · court documents. [image: ]This is to protect the privacy of the people that are part of your case. It is important your submission does not say private information about you or others. [image: ]Private information is anything about a person that makes it easy to know who a person is....

  4. Disclosure Statement Criminal Cases Review Commission Bill [pdf, 300 KB]

    ...led the policy development of the Bill. The Ministry of Justice recognises the need for this new offence; the Commission will be dealing with inherently sensitive information, the kind of breach covered by this offence may not be captured by the Privacy Act, and the conduct is such that it is suited to the denunciatory effect of a criminal sanction. The Ministry is comfortable that the penalty level is reasonable and proportionate to the conduct and mens rea required to make out the of...

  5. NP v KT [2021] NZDT 1706 (12 October 2021) [pdf, 243 KB]

    ...with reasonable care and skill (section 28). The standard applying to this guarantee is that of an ordinary supplier supplying a service. 18. NP says KT cut the hedge too low and pruned her camellia too low, both of which have caused her to lose privacy. She says trees and shrubs were poorly shaped, particularly the maple and robinia behind her house, and that instead of shaping the trees and shrubs KT has cut the tops off and “lopped” them so that cut branches can be seen. She says...

  6. [2023] NZEmpC 198 Carrington Resort Jade LP v Knight [pdf, 251 KB]

    ...defendant’s mental health conditions, and medical recommendations/advice on being employed. [11] Ms Knight objected on the basis that: (a) disclosure would be injurious to the public interest because the documents would breach her right to privacy; (b) disclosure would be injurious to the public interest because the documents would breach the confidentiality of the doctor/patient relationship; and (c) the documents are not relevant to the challenge. Challenge to the obj...

  7. Criminal record check

    Criminal record check timeframes Requests for criminal record checks are managed in accordance with Schedule 4 of the Privacy Act 2020 (the Act). We endeavour to respond to all requests within 20 working days. Around 90% of requests are responded to in less than one week. However, some requests will need to be assessed by a staff member to ensure the privacy of the individual is protected. We may also need to contact you for more information in order to process your request. In these cases, it m...

  8. Hooker v Director-General of the Department of Conservation (2012) 38 Taitokerau MB 219 (38 TTK 219) [pdf, 179 KB]

    ...change of case manager. A remedies hearing as originally envisaged following my earlier judgment was then held at Auckland on 21 November 2011. 2 [4] In summary, the Applicant seeks: (a) general damages for interference with the Applicant’s privacy and quiet enjoyment of the land; (b) special damages in the form of ‘mesne profits’ for the period of the unlawful use of the land; (c) exemplary and/or aggravated damages to recognise the Respondent’s “continued inacti...

  9. Example fraud and corruption policy [pdf, 104 KB]

    ...official, employee, contractor, person seconded to, or any other party that has a business involvement with the Ministry to use his or her position in a way that is dishonest, biased or breaches public trust. Distinction from the Code and Conduct and Privacy breaches It is important to distinguish between the Fraud and Corruption Policy and other Ministry policies (e.g. Privacy) which involve or invoke the Ministry’s Disciplinary Process Policy. The difference is the element of dishon...

  10. [2020] NZSSAA 6 (28 April 2020) [pdf, 101 KB]

    ...to 30 September 2017. [25] We asked the appellant why this medical certificate was not issued to his father, as the patient, and why it made no reference to the medical reasons for his father’s illness. The appellant said that in Germany the privacy laws limit medical evidence. We do not accept this explanation in the absence of any documentary support; privacy law is intended to protect the privacy of an individual who may waive their right to privacy provided no other person i...