MacBook Pro

Free Resources

Essential links for natural therapists on data privacy and security in Australia.

Take this 1-minute quiz to find your compliance level.

Not 100%, now what? ...

There are 8 categories for data privacy and security.

Review each category below and the corresponding free resources.

Feeling overwhelmed and unsure?

Let's connect and see how I can help you.

8 Compliance Categories

Review the categories below and the free resources to support you.
black click pen on white paper
black click pen on white paper
girl wearing grey long-sleeved shirt using MacBook Pro on brown wooden table
girl wearing grey long-sleeved shirt using MacBook Pro on brown wooden table
black iphone 5 beside brown framed eyeglasses and black iphone 5 c
black iphone 5 beside brown framed eyeglasses and black iphone 5 c
Understanding your Obligations

I understand my obligations regarding the Australian Privacy Principles.

I have a privacy policy in place and I provide it to my clients when requested.

I obtain explicit consent before collecting, storing, or using sensitive client information.

Data Handling & Storage

My clients information is stored securely using encrypted digital storage or locked filing cabinets.

My practice uses role-based access control (RBAC) so only authorised staff can access sensitive data.

I regularly review and update data retention policies to remove unnecessary data.

Password Control

I use strong passwords with a mix of letters, numbers, and symbols for all accounts.

I have implemented Multi-Factor Authentication (MFA) for emails, booking systems, and cloud storage.

I regularly update passwords and do not reuse old ones.

MacBook Pro turned on
MacBook Pro turned on
man in black and white hoodie
man in black and white hoodie
macbook pro on black textile
macbook pro on black textile
Cybersecurity & Network Protection

I update all software (including operating systems, antivirus, and apps) to the latest versions.

I have an Incident Response Plan.

My practice backs up data regularly and uses encrypted backups.

Data Breach Response

I have a data breach response plan in place.

I know how to identify a data breach (e.g., hacking, phishing, lost devices).

I conduct regular security audits to check for vulnerabilities.

Client Communication

My appointment booking system is APP-compliant with security protections.

I do not include personal health details in emails or text messages.

I obtain opt-in consent before sending marketing emails (compliant with the Spam Act 2003).

macbook pro displaying group of people
macbook pro displaying group of people
white ceramic mug on wooden surface
white ceramic mug on wooden surface
selective focus photography of woman holding yellow petaled flowers
selective focus photography of woman holding yellow petaled flowers
Training & Awareness

My staff receive regular training on data privacy and security best practices.

My team understands phishing attacks and how to identify fraudulent emails.

I have clear procedures for handling client data securely.

Risk Management

I have cyber liability insurance to protect my practice against data breaches.

I conduct regular risk assessments to identify potential security threats.

I keep up to date with new privacy laws and cybersecurity threats.

Unsure? Overwhelmed?

Reach out for assistance with data privacy and security resources. We have many options to suit all needs and budgets.

Our mission is to support all Natural Therapists with their data privacy & security.

Contact us today and see how we can help you

Resource Links

Unsure? Overwhelmed?

Reach out for assistance with data privacy and security resources. We have many options to suit all needs and budgets.

Our mission is to support all Natural Therapists with their data privacy & security.

Contact us today and see how we can help you.