Mandatory Data Breach Reporting and Planning

Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on facebook
Facebook

Failing to plan is planning to fail when it comes to data security and breach responses. In this post, we examine the regulatory obligations of entities under the notifiable data breach (NDB) scheme. Specially, we examine when reporting is mandatory and what the features of a broader effective response plan are.

When is reporting mandatory?

The NDB scheme is found in Part IIIC of the Privacy Act and requires certain businesses to notify affected individuals and the Privacy Commissioner of certain data breaches.

The reporting obligation kicks in where there is an ‘eligible data breach,’ which is a data breach where:

  • there is unauthorised access to or disclosure of personal information held by an entity (or information is lost in circumstances where unauthorised access or disclosure is likely to occur);
  • this is likely to result in serious harm to any of the individuals to whom the information relates; and
  • the entity has been unable to prevent the likely risk of serious harm with remedial action.

The policy rationale for the NDB is to ensure that individuals affected by a data breach can take action to reduce the risk of loss- steps such as updating passwords and securing other accounts.

From a practical perspective, organisations that have had a data breach often need to examine if serious harm is likely. ‘Serious harm’ is not defined in the Privacy Act. Whether there is a risk of serious harm is determined objectively- from the perspective of a ‘reasonable person.’

 Examples of serious harm provided by the Office of the Australian Information Commissioner include:

  • identity theft, which can affect an individual’s finances and credit report;
  • financial loss through fraud;
  • a likely risk of physical harm, such as by an abusive ex-partner;
  • serious psychological harm; and
  • serious harm to an individual’s reputation.

Ultimately, it will be for individual organisations to undertake that assessment with the assistance of suitably experienced legal and compliance professionals. The key to ensuring that the process is conducted efficiently and effectively is a business’s data breach plan- a plan that should be in place before a breach occurs.

What is an effective plan?

All organisations should seek to plan to respond effectively to data breaches. An effective response is one that stops the loss of data, that minimises the impact of the breach, and resolves any underlying deficiencies in a business’s data collection, storage, and disclosure processes and systems.

An effective response was described by Mr Timothy Pilgrim PSM (Australian Information Commissioner) as a ‘response that successfully reduces or removes the risk of harm to individuals, and which aligns with legislative requirements and community expectations.’[1]

A data breach response plan should, clearly, be implemented before a breach occurs. It should be regularly reviewed and updated, and all staff should be trained on it and understand their respective roles within it.

Compliance with the Australian Privacy Principles (APPs) will, in itself, reduce the likelihood of a data breach. APP 11 requires that entities take reasonable steps to protect the personal information they hold from misuse, interference and loss, and from unauthorised access, modification or disclosure.

What is reasonable for an entity depends on the characteristics of the entity, the types of information held and the risks of unauthorised access, loss or disclosure. To comply with APP 11, entities should conduct risk assessments to determine whether their controls are reasonable or if additional measures should be implemented.

The best mitigation against a data breach is to not have data to be lost or stolen in the first place. Business should consider whether they actually need to collect the personal information they are collecting and whether they are able to then destroy or de-identify personal information.

Many businesses are under the misapprehension that they need to keep all data for seven years for ‘audit purposes.’ Most times, this is simply not the case.

The Office of the Australian Information Commissioner has some fantastic resources available for businesses who are establishing or reviewing their data breach plan.  


[1] Office of the Australian Information Commissioner, Data breach preparation and response – A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth)- July 2019

More to explorer

notes on board

How to Manage Multiple Compliance Deadlines: A Case Study

Compliance managers in the energy sector are constantly juggling a large work load with competing deadlines. Managing time effectively is a core skill for compliance managers. In this article, we will present a hypothetical case study of a compliance manager in an energy retailer who has to juggle multiple compliance tasks and deadlines, and how they can use some strategies and tools to manage their workload and prioritise effectively. We will also share some insights and tips from Compliance Quarter,

laptop on table top

How to Avoid Compliance Risks by Effective Communication: A Case Study

Compliance managers in the energy sector face many challenges in ensuring that their businesses comply with the regulatory framework. One of the most common and frustrating situations is when their advice is ignored or overridden by senior management or other stakeholders, exposing the business to potential compliance risks and penalties. In this article, we will present a hypothetical case study of a compliance manager in an energy retailer who faced this scenario and how it affected the business outcomes. We

Contemporary design of multifamily living houses. Modern luxury apartments buildings.

Modernising Electricity Regulation: The AES Framework and Embedded Networks in Western Australia

Background The existing licensing framework overseeing the sale and supply of electricity in Western Australia (WA) has struggled to adapt to the rapid expansion of emerging and atypical electricity business models in recent years. To address this, in 2019, the then Minister for Energy commissioned Energy Policy WA to assess the regulatory framework in Western Australia. In 2020, Energy Policy WA initiated consultations on a proposed regulatory framework for various categories of ‘alternative electricity services’ called the Alternative Electricity Services

Leave a Reply

Your email address will not be published. Required fields are marked *