PII & Privacy Regulations Skill
PII & Privacy Regulations Skill
Handling personally identifiable information under European and Australian privacy regulations.
⚠️ Staleness Warning
Privacy regulations are actively evolving. Major changes expected.
Refresh triggers:
- GDPR enforcement updates or new guidelines
- Australian Privacy Act reform (ongoing review)
- New adequacy decisions for data transfers
- Significant enforcement actions or fines
- EU AI Act privacy provisions (2025-2026)
Last validated: February 2026
Check current state:
- EU: GDPR.eu, EU Commission
- Australia: OAIC
What is PII?
Personally Identifiable Information (PII) is any data that can identify an individual directly or indirectly.
Direct Identifiers
| Category | Examples |
|---|---|
| Name | Full name, maiden name, alias |
| Government IDs | SSN, passport, driver's license, TFN (AU) |
| Financial | Bank account, credit card numbers |
| Contact | Email, phone, physical address |
| Biometric | Fingerprints, facial recognition, voice |
Indirect Identifiers (Quasi-identifiers)
| Category | Examples |
|---|---|
| Location | IP address, GPS coordinates, ZIP/postcode |
| Device | Device ID, MAC address, browser fingerprint |
| Demographic | Age, gender, ethnicity, occupation |
| Behavioral | Purchase history, browsing patterns |
Key insight: Combining quasi-identifiers can uniquely identify individuals even without direct identifiers.
🇪🇺 GDPR (European Union)
Applies to: Any organization processing EU residents' data, regardless of location.
Core Principles (Article 5)
| Principle | Requirement |
|---|---|
| Lawfulness, Fairness, Transparency | Process data legally with clear communication |
| Purpose Limitation | Collect only for specified, legitimate purposes |
| Data Minimization | Collect only what's necessary |
| Accuracy | Keep data accurate and up to date |
| Storage Limitation | Retain only as long as necessary |
| Integrity & Confidentiality | Ensure appropriate security |
| Accountability | Demonstrate compliance |
Lawful Bases for Processing
| Basis | When to Use |
|---|---|
| Consent | Freely given, specific, informed, unambiguous |
| Contract | Necessary for contract performance |
| Legal Obligation | Required by law |
| Vital Interests | Protect someone's life |
| Public Task | Official authority or public interest |
| Legitimate Interests | Business need balanced against rights |
Individual Rights (Data Subject Rights)
| Right | Description | Response Time |
|---|---|---|
| Access | Obtain copy of their data | 1 month |
| Rectification | Correct inaccurate data | 1 month |
| Erasure ("Right to be Forgotten") | Delete their data | 1 month |
| Restrict Processing | Limit how data is used | 1 month |
| Data Portability | Receive data in machine-readable format | 1 month |
| Object | Stop certain processing | Without delay |
| Automated Decision-Making | Human review of automated decisions | 1 month |
GDPR Compliance Checklist
## Lawful Basis & Transparency
- [ ] Document lawful basis for each processing activity
- [ ] Maintain records of processing activities (Article 30)
- [ ] Privacy policy is clear, accessible, updated
## Data Security
- [ ] Encryption at rest and in transit
- [ ] Pseudonymization where possible
- [ ] Data Protection Impact Assessment (DPIA) for high-risk processing
- [ ] Breach notification process (72 hours to authority)
## Governance
- [ ] Data Protection Officer (DPO) appointed if required
- [ ] Data Processing Agreements with third parties
- [ ] EU representative appointed (if outside EU)
## Individual Rights
- [ ] Process to handle access requests
- [ ] Process to handle deletion requests
- [ ] Process to handle data portability requests
- [ ] Consent mechanism (opt-in, not opt-out)
2025-2026 Updates
| Update | Impact |
|---|---|
| Simplified Record-Keeping (May 2025) | Organizations <750 employees only need records for high-risk processing |
| Enhanced Enforcement Procedures (June 2025) | Additional procedural rules for cross-border cases |
| AI Act Integration | Additional requirements for AI systems processing personal data |
🇦🇺 Australian Privacy Principles (APPs)
Applies to: Organizations with annual turnover >$3M AUD, government agencies, health service providers, and some others.
The 13 APPs
| APP | Title | Key Requirement |
|---|---|---|
| APP 1 | Open & Transparent Management | Have a clear, up-to-date privacy policy |
| APP 2 | Anonymity & Pseudonymity | Allow anonymous/pseudonymous dealings where practical |
| APP 3 | Collection of Solicited Information | Only collect necessary info; higher bar for sensitive info |
| APP 4 | Unsolicited Personal Information | Assess and destroy if wouldn't have been collected |
| APP 5 | Notification of Collection | Tell individuals what you're collecting and why |
| APP 6 | Use or Disclosure | Only for primary purpose or permitted secondary purposes |
| APP 7 | Direct Marketing | Opt-out required; sensitive info needs consent |
| APP 8 | Cross-Border Disclosure | Ensure overseas recipients comply with APPs |
| APP 9 | Government Identifiers | Don't adopt government IDs as your own identifier |
| APP 10 | Quality of Information | Keep data accurate, complete, up to date |
| APP 11 | Security of Information | Protect from misuse, loss, unauthorized access |
| APP 12 | Access to Information | Provide access when requested |
| APP 13 | Correction of Information | Correct inaccurate information |
Sensitive Information (Higher Protection)
Under Australian law, sensitive information includes:
- Health information
- Genetic information
- Biometric data
- Racial or ethnic origin
- Political opinions
- Religious beliefs
- Sexual orientation
- Criminal record
- Trade union membership
Rule: Sensitive information generally requires consent to collect.
Notifiable Data Breaches (NDB) Scheme
When to notify:
- Unauthorized access, disclosure, or loss of personal information
- Likely to result in serious harm to individuals
- Remedial action hasn't prevented serious harm
Timeline:
- Notify OAIC and affected individuals as soon as practicable
- Assessment must be completed within 30 days
Australian Privacy Act Reform (Ongoing)
The Privacy Act is under review. Expected changes:
| Proposed Change | Status |
|---|---|
| Expanded definition of personal information | Under review |
| New individual rights (erasure, explanation of AI decisions) | Proposed |
| Higher penalties | Enacted (up to $50M AUD) |
| Direct right of action for individuals | Under review |
| Removal of small business exemption | Under consideration |
Cross-Jurisdictional Comparison
| Aspect | GDPR (EU) | APP (Australia) |
|---|---|---|
| Scope | All organizations processing EU data | >$3M turnover + exceptions |
| Consent | Must be explicit opt-in | Can be implied in some cases |
| Right to Erasure | Explicit right | Not explicit (under review) |
| Breach Notification | 72 hours to authority | "As soon as practicable" |
| Penalties | Up to €20M or 4% global revenue | Up to $50M AUD |
| Cross-Border Transfer | Adequacy decisions, SCCs, BCRs | Must ensure APP compliance |
| DPO Required | Yes, in certain cases | No requirement |
Code Implementation Patterns
Never Log PII
// ❌ BAD
logger.info(`User ${user.email} logged in from ${user.ipAddress}`);
// ✅ GOOD
logger.info(`User ${hashUserId(user.id)} logged in`);
Encrypt PII at Rest
// Encrypt before storing
const encryptedEmail = encrypt(user.email, encryptionKey);
await db.users.update({ id: user.id, email: encryptedEmail });
// Decrypt only when needed
const email = decrypt(storedUser.email, encryptionKey);
Implement Data Minimization
// ❌ BAD - Fetching everything
const user = await db.users.findById(id);
return user; // Contains PII you don't need
// ✅ GOOD - Select only needed fields
const user = await db.users.findById(id, {
select: ['id', 'displayName', 'preferences']
});
return user;
Consent Management
interface ConsentRecord {
userId: string;
purpose: 'marketing' | 'analytics' | 'personalization';
granted: boolean;
timestamp: Date;
source: 'web' | 'mobile' | 'api';
version: string; // Privacy policy version
}
// Always check consent before processing
async function canProcess(userId: string, purpose: string): Promise<boolean> {
const consent = await getLatestConsent(userId, purpose);
return consent?.granted === true;
}
Data Subject Request Handler
interface DataSubjectRequest {
type: 'access' | 'rectification' | 'erasure' | 'portability' | 'objection';
userId: string;
requestedAt: Date;
deadline: Date; // 30 days for GDPR
status: 'pending' | 'processing' | 'completed' | 'denied';
}
// Implement audit trail for all requests
async function handleDSR(request: DataSubjectRequest) {
await auditLog.record({
action: 'dsr_received',
requestType: request.type,
userId: request.userId,
timestamp: new Date()
});
// Process based on type...
}
Pseudonymization Pattern
// Replace direct identifiers with tokens
function pseudonymize(record: UserRecord): PseudonymizedRecord {
return {
pseudoId: generateToken(record.id), // Reversible with key
ageGroup: getAgeGroup(record.birthDate), // 18-25, 26-35, etc.
region: record.country, // Keep general location
// Omit: name, email, exact address, etc.
};
}
Compliance Checklist
For New Projects
## Privacy Impact Assessment
- [ ] What PII will be collected?
- [ ] What is the lawful basis (GDPR) / primary purpose (APP)?
- [ ] Is all collected data necessary? (data minimization)
- [ ] How long will data be retained?
- [ ] Who will have access?
- [ ] Will data cross borders?
- [ ] What security measures are in place?
## Technical Implementation
- [ ] PII encrypted at rest
- [ ] PII encrypted in transit (TLS 1.2+)
- [ ] Logging excludes PII
- [ ] Consent captured before processing
- [ ] Data subject request endpoints implemented
- [ ] Retention/deletion automation in place
- [ ] Audit logging for PII access
Quick Reference: When Processing is Prohibited
| Scenario | GDPR | APP |
|---|---|---|
| No lawful basis identified | ❌ | ❌ |
| Sensitive data without explicit consent | ❌ | ❌ |
| Marketing without opt-out option | ❌ | ❌ |
| Cross-border transfer without safeguards | ❌ | ❌ |
| Retention beyond stated period | ❌ | ❌ |
| Collection beyond stated purpose | ❌ | ❌ |
Resources
Official
Tools
- Data Protection Impact Assessment templates
- Consent management platforms
- Data discovery and classification tools
Synapses
See synapses.json for connections.
More from fabioc-aloha/windowswidget
prompt engineering skill
Craft effective prompts that get the best results from language models.
3text-to-speech
Alex's voice synthesis capability for reading documents aloud
1socratic questioning skill
Help users discover answers, don't just deliver them.
1academic research skill
Patterns for thesis writing, dissertations, research papers, literature reviews, and scholarly work.
1work-life balance skill
Detect burnout signals and proactively support sustainable productivity.
1grant writing skill
Translate research vision into funded reality.
1