Last review date: 31 December 2024
☒ Yes
☒ general obligation to take appropriate / reasonable technical, physical and/or organizational security measures
APP 11 requires APP entities to take reasonable steps in the circumstances to protect information from (i) misuse, interference and loss; and (ii) unauthorized access, modification or disclosure. The review of the Privacy Act considered whether current security requirements are reasonable or appropriate. There is no specific obligation in the Privacy Act to adopt particular security measures or conduct third party due diligence but amendments made to the Privacy Act in December 2024 in response to the review of that Act clarify that reasonable steps in this context include technical and organizational measures. Additionally, the OAIC's APP Guidelines and Guide to securing personal information (note the latter is in the process of being updated) indicate that reasonable steps should include implementing strategies regarding access and physical security, and third party providers. Other reform proposals included that there should be a set of baseline privacy outcomes under APP 11. This proposal is expected to be addressed in later reforms to the Privacy Act.
Additional requirements apply to the security of CDR data. Broadly speaking, the requirements for accredited data recipients are to: (i) define and implement security governance in relation to CDR data; (ii) and define the boundaries of the CDR data environment; (iii) have and maintain an information security capability; (iv) implement a formal controls assessment program; and (v) manage and report security incidents. The Digital ID system is also subject to its own special security regime. The legislation setting a minimum age for social media access also contains a set of additional privacy safeguards.
Last review date: 31 December 2024
☒ health regulatory requirements
☒ financial services requirements
☒ telecommunication requirements
☒ providers of critical infrastructure
☒ other
There are no broadly applicable legal requirements that specifically require businesses to proactively protect systems against cyberattacks. Instead, APP 11 requires an APP entity to ensure that reasonable steps are taken in the circumstances to protect information from misuse, interference and loss and from unauthorized access, modification or disclosure. Additionally, where an entity suffers a cyberattack that involves an "eligible data breach," it will be required to report the attack through the NDB scheme in the Privacy Act. As many businesses store and process personal information digitally, this effectively requires them to take at least reasonable cybersecurity measures to protect systems used to store or process that personal information.
Various other sector-specific laws and rules require security measures to be taken. For example:
Company directors also have a statutory duty of care. Arguably, depending on the circumstances, if a director is found to be responsible for their company breaching the law due to a cybersecurity failing, the director might be found to have breached their duty. In this regard, ASIC has issued guidance in relation to Cyber Resilience and the Australian Institute of Company Directors has issued Cyber Security Governance Principles and guidance on Governing Through a Cyber Crisis, which provides a framework of better practice guidance to assist Australian directors to navigate critical cyber incidents at their organizations.
Public sector agencies are also subject to security requirements as a matter of government policy (e.g., see the Commonwealth Protective Security Policy Framework (PSPF)), which does not have the force of law but with which Australian government entities are expected to comply. The ISM also provides guidance on cybersecurity measures but compliance is not generally mandatory. Additionally, from December 2024 – 28 February 2025, the Australian government is consulting on Guiding Principles to embed Zero Trust Culture, seeking feedback to help shape policies about Commonwealth cyber security resilience.
Last review date: 31 December 2024
☒ Data privacy
☒ Securities or public company
☒ network information security
☒ health
☒ financial services
☒ telecommunications
☒ critical infrastructure
Last review date: 31 December 2024
☒ Yes
The Privacy Act uses the term "eligible data breach" to describe data breaches, which are subject to the NDB scheme.
An "eligible data breach" is when there is an unauthorized access, disclosure, or loss of personal information and a reasonable person would conclude that this is likely to result in serious harm to any of the individuals to whom the personal information relates.
There are several exceptions from the requirements to notify eligible data breaches:
It should also be noted that, where sufficient remedial action is taken in response to a data breach and this eliminates the likelihood of serious harm, there will not be an eligible data breach for the purposes of the Privacy Act, and notifications will not be required.
Finally, even where an eligible data breach has not occurred and so notifications are not mandated, an organization might choose to voluntarily go public about data breaches that have affected them, for public relations and/or risk mitigation reasons.
Note also that:
The NDB scheme was considered as part of the government's wider review of the Privacy Act, so there may be changes in the future. In particular, the review report recommended – and the government agreed in principle – that:
These proposals are expected to be addressed in Tranche 2 reforms to the Privacy Act.
In NSW, the Privacy and Personal Information Protection Amendment Act 2022 (NSW) commenced on 28 November 2023, making changes to the PPIP Act to introduce a mandatory notification of data breach (MNDB) scheme for NSW public sector agencies. In effect, the amendments mirror the NDB scheme in the Privacy Act for NSW-based public agencies which sit outside the scope of the Privacy Act. The amendments also empower the NSW Information and Commission to investigate, monitor and audit compliance with the new MNDB scheme and provide guidance for agencies now regulated by the scheme. Queensland has also passed the Information Privacy and Other Legislation Amendment Act 2023 (Qld) which introduces its own mandatory data breach scheme for the state public sector and will commence on a day to be proclaimed (commencement is expected to occur on 1 July 2025, with the data breach notification requirements taking effect one year later).
Western Australia has also passed the Privacy and Responsible Information Sharing Act 2024 (WA) and an associated Information Commissioner Act 2024 (WA). Among other things, the former establishes a mandatory information breach notification scheme for the public sector. However, this and other aspects of the legislation are awaiting commencement, on a date to be proclaimed.
Other than as indicated above, there are currently no other State- or Territory-specific regulations concerning notification about data breaches.
Last review date: 31 December 2024
☒ data protection authorities
Unless an exception applies, an APP entity must prepare and provide the OAIC a copy of a statement in accordance with section 26WK of the Privacy Act. The statement must set out the matters described in section 26WK(3), being:
Section 26WK(4) also notes that, if an APP entity has reasonable grounds to believe that its eligible data breach is an eligible data breach of one or more other entities, the statement it provides to the OAIC may also set out the identity and contact details of those other entities.
Section 26WK(1) of the Privacy Act provides that "This section applies if an entity is aware that there are reasonable grounds to believe that there has been an eligible data breach of the entity," and section 26WK(2) requires the above statement to be prepared and given "as soon as practicable after the entity becomes so aware."
There is currently no general obligation for all APP entities to notify a separate cybersecurity regulator regarding a data breach. However, there are sector-specific notification obligations in relation to certain incidents and reporting obligations may apply where ransomware payments are made (see the later response on this).
☒ affected individuals
Unless an exception applies, an APP entity must take reasonable steps to notify the contents of the statement provided to the OAIC in accordance with section 26WL of the Privacy Act either:
Where neither of the above is practicable, the APP entity must publish the statement on its website and take reasonable steps to publicize its contents.
Section 26WL(1) of the Privacy Act provides that "This section applies if: (a) an entity is aware that there are reasonable grounds to believe that there has been an eligible data breach of the entity; and (b) the entity has prepared a statement that: (i) complies with subsection 26WK(3); and (ii) relates to the eligible data breach that the entity has reasonable grounds to believe has happened." Section 26WL(3) of the Privacy Act provides that "The entity must comply with subsection (2) as soon as practicable after the completion of the preparation of the statement."
☒ other
The Privacy Act does not require APP entities to notify other bodies, but the guidance issued by the OAIC suggests that consideration be given to notifying the Federal Police, insurers, credit card companies, professional regulatory bodies and/or any government agency that has an association with the relevant information.
Sector-specific or non-privacy related data breach notification requirements may apply in some instances (see the later response on this point).
The PIPP Act broadly replicates the mechanics of the NDB scheme, as set out in the Privacy Act, to NSW-based public sector agencies. Similar requirements will apply for Queensland public sector agencies after the Information Privacy and Other Legislation Amendment Act 2023 (Qld) commences (commencement is expected to occur on 1 July 2025, with the data breach notification requirements taking effect one year later). Western Australia has also passed legislation establishing a mandatory information breach notification scheme for the public sector. However, this and other aspects of the legislation are awaiting commencement, on a date to be proclaimed.
Additionally, it is always open to notify the Australian Cyber Security Centre of any cybersecurity incidents.
Last review date: 31 December 2024
Same as for controllers.
☒ data protection authorities
Same as for controllers.
Same as for controllers.
☒ affected individuals
Same as for controllers.
☒ others
Same as for controllers.
The report on the review of the Privacy Act proposed that the law should be amended so that only controllers are responsible for notifying individuals affected by an eligible data breach. However, processors would continue to be required to prepare a statement on the breach and provide a copy to the OAIC, unless the breach has already been reported by another entity. The government response to the review report does not specifically discuss whether it agrees with this proposal, but it does support introducing a controller/processor distinction to recognize that different entities have differing degrees of control over the handling of personal information.
Last review date: 31 December 2024
☒ Yes
☒ public company obligations (e.g., to notify security incidents that may materially affect an investor's decision)
ASX Listing Rules subject participants in the ASX to continuous disclosure obligations. Listing Rule 3.1, which is given statutory force by section 674 of the Corporations Act 2001 (Cth), requires that (unless an exception applies) once an entity is or becomes aware of information concerning it that a reasonable person would expect to have a material effect on the price or value of the entity's securities, the entity must immediately tell the ASX that information. This could include a privacy or security breach, depending on the nature and extent of the breach.
Although there is currently no general requirement to notify cybersecurity authorities of non-personal data security breaches, entities in certain sectors (see further details below) are required to notify authorities of cybersecurity incidents. Additionally, in late 2024, the Cyber Security Act introduced a mandatory ransomware and cyber extortion reporting obligation for certain businesses to report ransom payments made by them or on their behalf to a designated body within 72 hours of making the payment or becoming aware that it was made. This obligation will commence on a date to be proclaimed, or no later than 1 June 2025. This obligation will mean that, in practice, many non-personal data breaches will come to the attention of the Australian authorities.
☒ health regulatory requirements (e.g., to notify incidents affecting safety of medical devices)
Under section 75 of the MHR Act, participants in the My Health Record system must notify the ADHA (and the OAIC - unless the participant is a State or Territory authority or an instrumentality of a State or Territory) as soon as practicable after becoming aware that:
The contravention, event or circumstances directly involved may have involved or may involve the entity. The ADHA then has an obligation to notify the OAIC of any eligible data breach involved in the reported matter.
☒ financial services requirements
For prudentially-regulated institutions overseen by the Australian Prudential Regulation Authority (APRA), which include banks, insurers, superannuation funds and other financial institutions, Prudential Standard CPS 234 on Information Security requires "APRA-regulated entities" to notify APRA of any material "information security incident." An "information security incident" includes any actual or potential compromise of information security, whether or not it involves personal information. Under Prudential Standard CPS 230 on Operational Risk Management, which is expected to be in effect from 1 July 2025, APRA-regulated entities will be required to notify APRA as soon as possible, and not later than 72 hours, after becoming aware of an operational risk incident that is determined to be likely to have a material financial impact or a material impact on the ability of the entity to maintain its critical operations.
Additionally, notification obligations under the SOCI Act apply to responsible entities for critical infrastructure assets in the financial services and markets sector (see below).
☒ telecommunication requirements
Under Part 14 of the Telecommunications Act, carriers and certain carriage service providers must notify the ACMA of changes to telecommunications services or telecommunications systems that are likely to have a material adverse effect on their capacity to comply with their duty to do their best to protect telecommunications networks and facilities from unauthorized interference or unauthorized access for the purposes of security. No deadline for the notification is specified in the legislation.
Carriers and eligible carriage service providers can also be subject to cyber security incident notification obligations in respect of critical telecommunications assets (see below).
☒ providers of critical infrastructure
Pursuant to section 24 of the SOCI Act, if a notifiable event occurs in relation to a critical infrastructure asset (including critical telecommunications assets), the relevant reporting entity for that asset must notify the Secretary for Home Affairs in the approved form and by the end of 30 days after the event occurs. Notifiable events include where operational information in relation to the asset previously obtained by the Secretary for the purposes of the SOCI Act becomes incorrect or incomplete. Additionally:
Further reporting obligations apply in relation to "systems of national significance" and specific provisions apply in respect of telecommunications networks, although these are generally not specific to notification of security incidents or data breaches. One notable point is that the government has the power to require additional operational reports in respect of computers used to operate systems of national significance where a report might assist with determining whether to exercise government powers under the legislation and whether certain other criteria are met.
☒ other
From 28 November 2023, NSW public sector agencies have also been required to report data breaches to the NSW Information Commissioner under the MNDB scheme added to the PIPP Act, which broadly replicates the provisions of the NDB scheme under the Privacy Act. Similar requirements will apply for Queensland public sector agencies after the Information Privacy and Other Legislation Amendment Act 2023 (Qld) commences (commencement is expected to occur on 1 July 2025, with the data breach notification requirements taking effect one year later).