Stay in the know
We’ll send you the latest insights and briefings tailored to your needs
From 22 February 2018, as part of their privacy compliance measures, Australian businesses and government agencies will need to be ready to report on their data breaches.
Like the rest of the world, Australian governments and businesses are increasingly collecting data about the people they interact with. This data is often incredibly valuable, as it records the who, what and why of personal and business transactions.
But significant data breaches are also becoming more frequent – and larger in scale. The data breach at Equifax in 2017, described in one report as “the most significant data breach in recent history”, exposed the financial information of around 145 million people, leaving them at risk of identity fraud. Australia’s largest data breach occurred in October 2016, when private information of more than half a million Australian blood donors – including their medical histories – was accidentally leaked from the Australian Red Cross Blood Service.
Australia’s new data breach notification law changes are designed to deal with data breaches like these. These changes will require regulated entities to report eligible data breaches to both the affected individuals and the Office of the Australian Information Commissioner (OAIC).
The purpose of these new laws is to improve transparency in the way organisations respond to data breaches – and to give individuals the opportunity to take steps to minimise the harm caused by a breach of their personal information.
The amendments apply to all entities that are currently subject to the Privacy Act 1988 (Cth) (Privacy Act). This includes private sector organisations with annual revenue of more than $3 million, and Federal government agencies. It also includes some organisations with less than $3 million revenue – for example, health service providers, credit reporting bodies or credit providers, or organisations that trade personal information.
If a regulated entity develops reasonable grounds to believe that there has been an “eligible data breach”, they must prepare a statement to individuals at risk of being affected by that breach. The statement must include:
Copies of this statement must be provided to the OAIC. The entity must also take reasonable steps to notify affected or at risk individuals of the contents of the statement. If direct notification is not practicable, the entity must publish the statement on its website and take reasonable steps to publicise its content.
Notification must be provided as soon as practicable.
The new laws only apply to “eligible data breaches” – which means:
Serious harm could include physical, psychological, emotional, economic, financial and reputational harm. In assessing whether serious harm is likely, the entity needs to consider such matters as the types of personal information affected, the circumstances of the data breach, and the nature of the harm that may result.
If a regulated entity suspects there has been an eligible data breach, it must carry out a reasonable and speedy assessment – usually within 30 days or less. If the suspected eligible breach is confirmed, the notification obligations described above will apply.
An entity can avoid the requirement for notification if it takes proper remedial action – and that action is such that serious harm is no longer likely to result from the breach. The remedial action required will depend on the type of data breach. For example, if information has been inadvertently disclosed, remedial action could include a full recovery of that information before it has been accessed or used. If the remedial action prevents the likelihood of harm to individuals, then the entity is not required to notify affected individuals or the OAIC.
Depending on how serious or repeated the data breach is, failures to report can give rise to civil penalties of up to $2.1 million.
If the Privacy Act applies to your organisation, then you should:
Organisations not subject to the Privacy Act may still seek to implement these measures – for example, to meet best practice, protect their brands, comply with contracts and meet other requirements to protect data security.
The contents of this publication are for reference purposes only and may not be current as at the date of accessing this publication. They do not constitute legal advice and should not be relied upon as such. Specific legal advice about your specific circumstances should always be sought separately before taking any action based on this publication.
© Herbert Smith Freehills 2025
We’ll send you the latest insights and briefings tailored to your needs