Tuya Compliance with the Australian Privacy Act

Prepared and Administered by Tuya Compliance Team

July 2024

Table of Contents

1. Privacy Law and Australian Privacy Principles

1.1. Overview of the Australian Privacy Act

The Privacy Act 1988 (Cth), hereinafter referred to as the Privacy Act, is the primary legislation for protecting personal information. It covers the collection, use, storage, and disclosure of personal information by federal public sector and private sector organizations. The Privacy Act was amended in December 2022. These amendments increased the maximum penalties stipulated by the Privacy Act and granted the Office of the Australian Information Commissioner (OAIC) stronger enforcement and information-sharing powers.

The Privacy Act stipulates 13 Australian Privacy Principles (APPs). These APPs apply to government agencies and private sector organizations with an annual turnover of AUD 3 million or more. The Australian Privacy Principles (APPs) are principle-based, aiming to protect privacy without imposing rigid regulatory burdens on agencies and organizations. These privacy principles:

The Office of the Australian Information Commissioner (OAIC) is responsible for investigating breaches of the Australian Privacy Principles (APPs). OAIC's powers include:

For more detailed information about the Privacy Act, you can visit the official website: Privacy Act Official Website. Customers are responsible for ensuring they comply with the obligations stipulated by the Privacy Act (including the Australian Privacy Principles).

1.2. Privacy Protection Certifications and Audits

As of now, Tuya has obtained numerous global or industry-specific security compliance authoritative certifications, fully ensuring the security and compliance of customer deployment businesses. Tuya's industry-leading third-party audits and certifications, documents, and legal commitments help support Privacy Act compliance and meet industry privacy standards. View certificates and audit reports.

Certification/AttestationDescription
CCPA Verification ReportThe California Consumer Privacy Act (CCPA) is a law protecting the personal information of California residents. Tuya has completed CCPA compliance audits.
GDPR Verification ReportThe EU General Data Protection Regulation (GDPR) aims to protect the fundamental privacy rights and personal data security of EU data subjects, comprehensively raising the standards for personal data privacy protection. Tuya has completed GDPR verification and optimized internal data security protection and compliance requirements.
ISO/IEC 27001:2022An international standard for information security management systems, centered on risk management, ensuring the continuous and effective operation of the information security management system.
ISO/IEC 27017:2015An international certification for information security in cloud computing, providing guidance on the implementation of security controls for cloud service providers.
ISO/IEC 27701:2019An internationally authoritative certification for privacy information management systems. Tuya's achievement of this certification demonstrates its robust system for personal data protection.
CSA STARCSA STAR certification, jointly launched by BSI and CSA, is an authoritative international certification for cloud security levels, aimed at addressing cloud security issues and helping cloud service providers demonstrate their service maturity.
ISO 9001:2015ISO 9001 is a systematic guideline and normative framework for ensuring the quality and operation of a company's products, ensuring compliance with customer and relevant legal requirements.
SOC 2 Type II & SOC 3SOC audit reports are independent audit reports issued by third parties according to the American Institute of Certified Public Accountants (AICPA) standards. They aim to examine the services provided by service organizations, enabling end-users to evaluate and address risks related to outsourced services. Tuya has passed SOC 2 audits and obtained SOC 2 and SOC 3 reports, demonstrating its key compliance control measures.

1.3. Shared Responsibility Model

Tuya is responsible for the security management and operation of services and data interactions on its provided software SDKs, Apps, modules, and cloud platforms. Tuya bears corresponding responsibility for the security of its cloud service platform and infrastructure.

When customers use Tuya's services, they are responsible for developing, managing, and maintaining their Apps connected to Tuya Cloud or their embedded software (including using SDKs), and ensuring the security and compliance of their applications and data, including hardware and App security compliance. Customers are solely responsible for the security of their developed applications and should take appropriate security measures to protect their applications and data from unauthorized access, use, disclosure, destruction, or interference.

Tuya will provide necessary technical support and security guidance to customers to help them ensure the security and compliance of their applications and data. However, customers are ultimately responsible for the final security and compliance of their applications and data, and Tuya assumes no liability for any resulting losses or responsibilities.

Customers and Tuya should cooperate to ensure the security and compliance of the services provided by Tuya. If any security vulnerabilities or compliance issues are discovered, customers and Tuya should notify each other immediately and work together to resolve the issues.

The following diagram illustrates the shared responsibility model for information security among basic cloud service providers, Tuya, and customers:

Diagram Description: The diagram depicts a shared responsibility model for IoT data security. It shows three layers: Third-Party Cloud Provider (e.g., AWS, Azure, Tencent Cloud), Tuya Cloud (covering Tuya App/OEM App, Module/SDK, SDK, and Tuya's cloud services like security operations, device control, data services, storage, etc.), and Third-Party Client (customer's end-user applications and devices). Responsibilities are divided across infrastructure, Tuya's cloud platform, and the customer's client-side, emphasizing shared accountability.

2. Tuya's Security Compliance Strategy

As a technology-driven company focused on AI+IoT, Tuya places a high priority on security and compliance from top to bottom. Tuya's security compliance strategy encompasses technical and management measures, aiming to ensure its products and services meet the security and compliance standards and requirements of various regions as much as possible.

Security Compliance Team

Tuya has a professional security compliance team whose members have previously worked at internet companies like Alibaba, Ant Financial, and Baidu, as well as traditional security vendors such as NSFOCUS, Venustech, and NSFOCUS. This team supports Tuya Cloud's security quality assurance, security assessment, and security operations. Additionally, the team engages external professional privacy and security consulting agencies and law firms specializing in cybersecurity and privacy protection globally and regionally for expert advice. The compliance team works closely with Tuya's legal team to ensure more refined and reliable control over the security and reliability of Tuya's products and services.

Security Risk Assessment and Management

Tuya's security team is responsible for vulnerability management and discovery, capable of identifying, tracking, tracing, and fixing security vulnerabilities. Before business code goes live, they conduct security penetration testing and regularly perform black-box testing on live businesses. Annually, Tuya collaborates with third-party security agencies to conduct penetration testing on cloud services, mobile clients, hardware products, and the company's IT infrastructure. Tuya supports external white-hat hackers in submitting vulnerabilities via Tuya SRC (https://src.tuya.com/) or a security email, offering rewards of up to $100,000 USD for high-quality, high-risk vulnerabilities.

Access Control

Tuya uniformly manages system permissions, server permissions, and data permissions for its IT systems, implementing a zero-trust privilege management model. It achieves simplified privilege control based on user identity, application identity, and application function type.

Supplier Security

Service Supplier Risk Assessment

Tuya has established screening and regular evaluation mechanisms for platform software suppliers. In addition to security indicators for hardware products and security standards for software services, Tuya also needs to gain a deep understanding of the practices of various service providers in information security assessment and privacy compliance. Information security assessments involve security penetration testing and supplier security capability assessments.

Service Supplier Monitoring

Real-time monitoring of service quality, focusing on third-party security management. Tuya can respond quickly when abnormalities occur.

Security Awareness and Training

To enhance company-wide cybersecurity awareness, Tuya Smart has published the "Tuya Smart Employee Information Security Handbook" and regularly conducts cybersecurity awareness education and privacy protection training for employees. Employees are required to continuously learn cybersecurity knowledge, understand the policies and procedures in the handbook, remember acceptable and unacceptable behaviors, realize they are responsible for their actions even without subjective intent, and commit to acting as required.

3. Customer Control Over Their Data

Data is the customer's data, not Tuya's data. Tuya processes their data solely according to the agreements signed with the customer. Tuya provides customers with the ability to control and access their data, as well as security configuration capabilities to help customers comply with their organization's consistent security policies. Customer data stored and managed on the Tuya platform is used only to provide services to the customer as per the contract and is not used for any other purpose. Customers have full control over their content data during their use of Tuya services:

Customer decides data storage region

Tuya currently has data centers in multiple regions globally, including Europe, the Americas, and Asia. Each regional data center is physically isolated. If customers have specific regional requirements, they can choose different regions according to their needs. Tuya will not transfer customer content data to other regions without the customer's explicit consent or other legal obligations.

Customer decides data protection policies

Through Tuya platform's security and privacy protection configurations, customers can use different Tuya services to decide whether to enable multi-factor authentication, what user password policies to use, and customize session durations, among other settings. Customers should consider how to manage and protect personal data security, prevent personal data leakage, and in case of a leakage incident, promptly notify the Office of the Australian Information Commissioner (OAIC) according to relevant laws and regulations.

Customer decides Tuya's access to their data

Unless explicitly authorized by the customer, Tuya will not access any of the customer's data. Tuya commits not to use customer data for purposes other than those stipulated in the contract and declared in the privacy policy.

Government Access

If Tuya receives a request from a government entity for customer data, Tuya's policy is to inform the government to request this data directly from the customer. Tuya has a professional team that reviews and evaluates every request received based on Tuya's policies and laws. Tuya commits not to provide "backdoor" access to any government agency, nor to allow any government agency illegal access to your data.

4. How Tuya Complies with the Australian Privacy Act

4.1. Tuya's Preparations for Privacy Act Compliance

Tuya's compliance and data security experts have been working with customers worldwide to address their issues and help them prepare for running IoT services in the cloud after the Privacy Act takes effect. These experts also review Tuya's operations and responsibilities against the requirements of the Privacy Act to ensure that Tuya's services comply with the Privacy Act's provisions once the law is in effect.

4.2. How Tuya Complies with Australian Privacy Principles

Tuya is committed to partnering with its customers, leveraging Tuya's compliance capabilities to help customers comply with the Australian Privacy Principles. Tuya explains its data protection features, how they meet the requirements of the APPs, and how Tuya shares compliance responsibilities with customers. Tuya also commits to not using customer data beyond providing services, thereby supporting customer compliance with the Australian Privacy Principles.

Data Protection ObligationHow Tuya Supports APP RequirementsCustomer Focus
APP 1 — Open and Transparent Management of Personal InformationTuya's Practice:
For customer personal data: Tuya clearly informs customers about the purposes, methods, and scope of personal data processing through its Privacy Policy. Tuya commits to accessing or using your data only for the purposes stipulated in the contract or declared in the privacy policy to complete the products and services you have ordered.
For end-user personal data: Customers are responsible for notification obligations. Tuya provides assistance by offering information from the Tuya official website or by contacting the Tuya Privacy Protection Office.
Customer Focus:
a. Requires APP entities to manage personal information in an open and transparent manner.
b. Entities must have a clearly expressed and up-to-date privacy policy describing how you collect, use, and share personal information.
c. The privacy policy must be made available free of charge in an easily accessible manner.
APP 2 — Anonymity and PseudonymityTuya's Practice:
Tuya provides a nickname feature, allowing users to enter pseudonyms that do not reveal their identity.
Customer Focus:
Individuals have the right to choose not to state their identity or to use a pseudonym.
APP 3 — Collection of Solicited Personal InformationTuya's Practice:
Tuya adheres to the principle of minimal necessary collection, gathering only data essential for functionality. For sensitive data, Tuya obtains prior consent from the data subject. For end-user data, customers ensure the reasonableness of collection and obtain consent from the data subject.
Customer Focus:
a. Entities must only collect personal information if it is reasonably necessary for one or more of the entity's functions or activities.
b. Sensitive information must only be collected with consent, and if it is necessary for one or more functions or activities.
c. Entities must collect personal information by lawful and fair means.
APP 4 — Dealing with Unsolicited Personal InformationTuya's Practice:
As a commissioned processor, Tuya strictly processes customer data according to data processing agreements and contractual terms. When a customer requests the deletion of specific data, Tuya executes it promptly to assist the customer in complying with APPs.
Customer Focus:
When an entity receives unsolicited personal information, the entity must, within a reasonable period, determine if it solicited this information and if it complies with APP 3.
If it complies with APP 3, the personal information may be used or disclosed.
If it is determined that the information cannot be collected, or is not included in federal records, it should be deleted or anonymized.
APP 5 — Notification of the Collection of Personal InformationTuya's Practice:
Tuya processes personal data according to data processing agreements and contractual terms. Tuya receives and executes customer instructions for processing personal information. Tuya does not use customer data for any other purpose.
Customer Focus:
When an entity collects personal information, or before it does (in principle), it should inform the individual about:
a) The entity's identity and contact details.
b) The fact that the entity has obtained personal information from someone other than the individual.
c) If the collection is required by law or court order, the fact of collection should be stated.
d) The purpose for collecting the personal information.
e) The consequences for the individual if all or part of the information is not collected.
f) Any other entities, bodies, or persons involved.
g) How the individual can exercise their right to access and correct information.
h) Complaint channels and how the entity handles complaints.
i) Whether personal information is likely to be disclosed overseas.
j) Which countries overseas personal information is disclosed to.
APP 6 — Use or Disclosure of Personal InformationTuya's Practice:
After obtaining customer consent to collect personal data necessary for providing services, Tuya processes customer personal data solely for the purposes stipulated in the contract and declared in the privacy policy. Tuya will not use your data for any other purpose.
Customer Focus:
In general, information may be used or disclosed for the primary purpose for which it was collected. If used or disclosed for a secondary purpose related to the primary purpose (or directly related in the case of sensitive personal information) that the individual could reasonably expect, personal information may be used or disclosed without consent.
For customer personal data, Tuya adheres to the principle of minimal necessary collection, gathering only data essential for functionality. When collecting sensitive data, Tuya obtains prior consent from the data subject.
For end-user data, customers ensure the reasonableness of collection and obtain consent from the data subject.
APP 7 — Direct MarketingTuya's Practice:
Tuya does not use customer data for direct marketing.
Customer Focus:
Personal information may be used for direct marketing if:
a. The personal information was collected by the entity from the individual; and
b. The individual could reasonably expect their personal information to be used for direct marketing; and
c. The entity provides an easy means for the individual to refuse to receive direct marketing.
Sensitive information must be consented to before being used for direct marketing.
APP 8 — Cross-border Disclosure of Personal InformationTuya's Practice:
Tuya stores and processes customer data only in the data centers chosen by the customer and does not move customer data without customer consent, unless required by law. If customers choose to store data in multiple regions, this is their choice. Regardless of where data is stored and processed, customers have absolute control over their data.
Customer Focus:
Entities must take reasonable steps to ensure that an overseas recipient does not breach the Australian Privacy Principles (APPs) before disclosing personal information to an overseas recipient.
Customers should establish data cross-border transfer assessment mechanisms, fully understand data cross-border regulatory requirements, select appropriate data storage solutions, and transparently inform individual users about international data transfers, for example, in their privacy statements.
Customers can choose the data center where their data is stored. By default, data originating from Australia will be stored in AWS Frankfurt nodes. Customers can change this at any time. Tuya's IoT platform is designed so that customers can effectively control their data regardless of which data center they choose for storage.
Customers should consider whether they need to disclose the location where they store or process personal information to individuals and obtain any necessary consent from the relevant individuals if required.
Customers' compliance with APP 8 obligations stems from "disclosing" personal information to an overseas recipient. Guidance from the Office of the Australian Information Commissioner (OAIC) suggests that if a customer does not release the processing of personal information from their effective control, it may be considered "use" rather than "disclosure" under the Privacy Act. Therefore, customer use of the Tuya cloud platform does not constitute "disclosure" of personal information, as the customer retains effective control over any personal information uploaded, with Tuya acting as a data processor according to the customer's instructions.
APP 9 — Use or Disclosure of Government Related IdentifiersTuya's Practice:
Tuya's products and services do not collect government-related identifiers by default.
Customer Focus:
An entity must not adopt a government-related identifier of an individual as its own identifier of the individual.
Unless it is reasonably necessary for the entity to verify the identity of the individual for the purposes of the entity carrying out its functions or activities, an entity must not use or disclose a government-related identifier of an individual.
APP 10 — Quality of Personal InformationTuya's Practice:
Tuya's products and services provide end-users (data subjects) with the ability to access, correct, delete, and export data. Tuya assists customers in responding to individual requests.
Customer Focus:
An entity must take reasonable steps to ensure that the personal information it collects is accurate, up-to-date, complete, and relevant.
Customers have full control over their data and direct contact with personal information subjects, and should ensure personal information is accurate, up-to-date, and complete.
APP 11 — Security of Personal InformationTuya's Practice:
Tuya provides comprehensive protection for the personal data lifecycle:
a. Minimal processing and strict account authentication mechanisms during data collection.
b. Dual encryption of transmission channels and content during transmission.
c. AES 256 encryption for personal data during storage, with unique keys for each user. Irreversible algorithms are used for highly sensitive data, with keys managed and distributed uniformly via a Key Management System (KMS).
For sensitive data like images or videos, Tuya generates unique keys for specific users and devices to encrypt the data.
d. Logical isolation for individuals during the usage phase; de-identification during the display phase.
e. During destruction, all personal data will be automatically zero-value overwritten.
Tuya provides detailed information. Customers can learn more about our security practices via the following links:
• Our Security and Privacy Protection Certification Qualifications
• Our Security Compliance White Paper
Customer Focus:
An entity must take reasonable steps to protect the personal information it holds from misuse, interference, and loss, and from unauthorized access, modification, or disclosure. In certain circumstances, an entity has an obligation to destroy or de-identify personal information.
Customers have full control over their data and should establish personal data protection policies to safeguard personal data. They should perform security configuration work based on business and personal data protection needs, such as setting appropriate access control and password policies. Customers should promptly delete information that is no longer needed.
APP 12 — Access to Personal InformationTuya's Practice:
Tuya assists customers in responding to data subject requests for access and correction of their personal data. Tuya provides dedicated channels (see Tuya Privacy Policy) to receive and respond to customer requests.
Customer Focus:
When an individual requests access to personal information held by an entity, the entity should provide it within a reasonable period. If access is denied due to trade secrets, privacy of others, etc., the individual should be notified in writing.
APP 13 — Correction of Personal InformationTuya's Practice:
Tuya provides features for end-users (data subjects) to access, correct, delete, and export data. Tuya assists customers in responding to individual requests.
Customer Focus:
An entity must provide individuals with a means to correct their personal information and respond to individual correction requests free of charge within a reasonable period.

5. Key Definitions

Personal Information: Refers to a broad range of information or opinions that can identify an individual, depending on whether the individual can be identified or is reasonably identifiable in the circumstances. Personal information includes:

Sensitive Personal Data: Similar to GDPR, the definition of sensitive personal data is almost identical, referring to "sensitive personal data relating to race or ethnic origin, religious beliefs, political opinions, membership of a trade union or religious, philosophical or political organization, data relating to health or sex life, genetic or biometric data, when relating to a natural person."

Data Controller: Unlike European law, there is no concept of "data controller" in Australia's Privacy Act. Each APP entity that obtains/receives personal information (even if it might be considered a "data processor" under GDPR) is effectively considered a data controller under Australian law and bears its own primary and separate privacy obligations under the Privacy Act/APPs.

Data Processor: Same as above.

6. Conclusion

Tuya is committed to providing customers with consistent, reliable, secure, and compliant IoT access services, effectively ensuring the availability, confidentiality, and integrity of customer and their users' data. Tuya is committed to data protection as its core, with cloud security capabilities as its foundation. Leveraging Tuya's unique IoT solutions, Tuya builds industry-leading competitiveness, constructs a comprehensive cloud platform security assurance system, and consistently makes information security assurance a key development strategy for Tuya Cloud.

To ensure that businesses operating in various regions comply with local privacy protection regulations, Tuya continuously monitors updates to relevant laws and regulations, translates new regulatory requirements into Tuya's internal policies, and optimizes internal processes to guarantee that Tuya's various activities comply with legal and regulatory requirements. Tuya continuously evolves and launches privacy protection-related services and solutions based on updated legal and regulatory requirements to help customers meet new privacy protection legal and regulatory requirements.

Adhering to privacy protection legal and regulatory requirements is a long-term and multi-faceted activity. Tuya is willing to continuously enhance its capabilities in the future to meet relevant legal and regulatory requirements and build a secure and trustworthy cloud platform for its customers.

Tuya customers need to evaluate their personal data processing practices and determine if the requirements of the Privacy Act apply to them. It is recommended to consult legal experts for guidance on the specific requirements of the Privacy Act applicable to your organization, as this document does not constitute legal advice.

PDF preview unavailable. Download the PDF instead.

8c118b00-7be2-11ef-b0cc-e3c2773225b9-1727339841456 ?tyName=涂鸦澳大利亚Privacy Act遵从性说明-中文 WPS 文字 macOS 版本11.4(版号20F71) Quartz PDFContext

Related Documents

Preview Tuya's Compliance with India's Digital Personal Data Protection Act (DPDPA)
This white paper details Tuya Inc.'s commitment to complying with India's Digital Personal Data Protection Act (DPDPA). It outlines Tuya's security and privacy strategies, how customers maintain control over their data, and the shared responsibility model for data protection.
Preview Tuya Korea PIPA Compliance Statement
This document outlines Tuya Inc.'s commitment to complying with South Korea's Personal Information Protection Act (PIPA), detailing its data protection measures, shared responsibility model, and customer data control rights.
Preview Tuya Thailand PDPA Compliance Explained
An overview of Tuya Inc.'s compliance with Thailand's Personal Data Protection Act (PDPA), detailing security measures, international standards, and data protection practices for its AIoT platform.
Preview Tuya APPI Compliance White Paper
A white paper detailing Tuya's compliance with Japan's Act on the Protection of Personal Information (APPI), outlining data protection measures, shared responsibility models, and customer control over data.
Preview Tuya UK GDPR Compliance Guide
This document details Tuya's commitment and practices for complying with the UK General Data Protection Regulation (UK GDPR), covering data protection, security, and shared responsibilities.
Preview 涂鸦越南个人数据保护法令(PDPD)遵从性说明指南
本指南详细介绍了涂鸦科技如何遵守越南个人数据保护法令(PDPD),包括其数据保护策略、安全合规战略以及与客户共同承担的责任模型,旨在帮助客户理解并实现合规。
Preview Tuya Inc. GDPR Compliance Whitepaper
A comprehensive whitepaper from Tuya Inc. detailing their approach to General Data Protection Regulation (GDPR) compliance. It covers GDPR obligations, Tuya's role as a data controller and processor, data subject rights, international data transfers, data protection principles, and security measures.
Preview TUYA Strategic Priorities Assessment: PIPEDA and Quebec Law 25 Compliance Report
TrustArc's findings report on TUYA's compliance with Canada's PIPEDA and Quebec Law 25, detailing privacy program assessment, identified gaps, and recommendations for data protection.