
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.
September 13, 2024 - Blog

Privacy laws are used to help people and organizations through enabling better services and safer systems, but they can also be exploited (through identity theft, financial fraud, surveillance, and discrimination).
A “Privacy Act” is typically the foundation of a country’s privacy framework by setting rules for how organizations collect, use, store, share, and protect personal information, and defining individuals’ rights over their data.
In practice, privacy laws influence what customers will share with you, what regulators will tolerate, what insurers expect to see, and how expensive a security incident becomes when personal data is involved.
Most privacy acts regulate “personal information” (or “personal data”): information about an identifiable individual. That can include obvious fields like name, address, and government ID numbers, but also “digital identity” signals such as device identifiers, location data, online account information, and sometimes behavioral data.
Many frameworks also treat certain categories as sensitive (like health data, biometrics, financial data, or information about children) requiring stronger safeguards and stricter conditions for processing.
Across countries, privacy requirements tend to follow a familiar set of principles:
Purpose and necessity: collect only what you need for legitimate, stated purposes.
Consent and transparency: tell people what you’re doing and why; get consent when required.
Use limitation: don’t reuse data for unrelated purposes without a lawful basis.
Security safeguards: protect information with appropriate technical and organizational controls.
Retention limits: keep data only as long as needed; dispose of it securely.
Individual rights: allow people to access and correct their information (and sometimes request deletion or restriction).
Accountability: organizations are responsible for compliance and must be able to demonstrate it.
Canada’s private-sector law PIPEDA, for example, is built on widely recognized “fair information principles” such as accountability, consent, limiting collection, safeguards, openness, and individual access.
Privacy acts vary from country to country. Below are just some examples of commonly enacted privacy acts:
In Canada, the term “Privacy Act” most commonly refers to the federal law governing how the federal government handles personal information.
For private-sector organizations in commercial activities, the main federal privacy law is PIPEDA, which sets the rules for how businesses collect, use, and disclose personal information.
Australia’s privacy framework is anchored in the Privacy Act 1988, and the Australian Privacy Principles (APPs) serve as the core operational rules for entities covered by the Act.
The APPs cover the full lifecycle of personal information: governance, collection, use and disclosure, direct marketing, cross-border disclosure, data quality, security, access, and correction.
In the UK, privacy obligations are primarily implemented through the Data Protection Act 2018 and the UK GDPR framework. Government guidance summarizes that UK data protection legislation controls how personal information is used by organizations, including businesses and government departments.
In other words, the UK’s “privacy act equivalent” is a combined regime: the DPA 2018 plus the UK GDPR rules it sits alongside.
Lastly, New Zealand’s Privacy Act 2020 sets out privacy rights and obligations through 13 Information Privacy Principles, which govern how agencies collect, store, use, and share personal information.
Map your data and minimize it: You can’t protect what you can’t see. Inventory where personal information lives (systems, SaaS tools, endpoints, cloud storage), map data flows, and reduce collection to what’s necessary.
Build privacy into onboarding, vendor management, and product delivery: Privacy obligations frequently extend to third parties. Contractually require vendor security controls (encryption, logging, breach notification timelines), and assess exposed integrations.
Apply strong security safeguards (privacy depends on security): Privacy laws consistently require “reasonable” safeguards. Practically, that means least-privilege access controls and MFA; encryption in transit/at rest; secure configuration of cloud and SaaS; and the monitoring, logging, and incident response readiness
Many frameworks empower regulators to investigate, and individuals to complain. Being able to demonstrate your governance (namely policies, training, access controls, retention rules, and incident handling) reduces regulatory and reputational fallout when something goes wrong.
Privacy Acts are not just legal checklists. They formalize a trade: organizations gain the ability to use personal information, and in return must handle it transparently, minimally, securely, and accountably. Companies that treat privacy as a core operating principle—supported by real security controls—reduce breach impact, improve customer trust, and build resilience in a world where data handling is scrutinized more than ever.
Speak with an Account Executive