• Login
  • Register
  • PRO
    • PRO Compliance plan
    • PRO Compliance
    • PRO subscription plans
    • Curated articles
    • In-depth
    • Market intelligence
    • Practice guides
    • PRO Reports New
    • Lexology GTDT
    • Ask Lexy
  • PRO
  • Latest
  • GTDT
  • Research
  • Learn
  • Experts
  • Store
  • Blog
  • Events
  • Popular
  • Influencers
  • About
  • Explore
  • Legal Research
  • Primary SourcesBeta
  • PRO Compliance

Introducing PRO Compliance
The essential resource for in-house professionals

  • Compare
  • Topics
  • Interviews
  • Guides
Getting The Deal Through joins Lexology
GTDT and Lexology Navigator have merged

CONTENT DEVELOPMENT

Become your target audience’s go-to resource for today’s hottest topics.

  • Trending Topics New
  • Discover Content
  • Horizons Beta
  • Ideation

CLIENT INTELLIGENCE

Understand your clients’ strategies and the most pressing issues they are facing.

  • Track Sectors
  • Track Clients
  • Mandates New
  • Discover Companies
  • Reports Centre New

COMPETITOR INTELLIGENCE

Keep a step ahead of your key competitors and benchmark against them.

  • Benchmarking
  • Competitor Mandates New

Lexology PRO

Power up your legal research with modern workflow tools, AI conceptual search and premium content sets that leverage Lexology's archive of 900,000+ articles contributed by the world's leading law firms. 

PRO Compliance plan
PRO subscription plans

Premium content

  • Curated articles
  • In-depth
  • Market intelligence
  • Practice guides
  • PRO Reports New

Analysis tools

  • Lexology GTDT
  • Ask Lexy
Explore all PRO content PRO Compliance
  • Find experts
  • About
  • Firms
Introducing Instruct Counsel
The next generation search tool for finding the right lawyer for you.
Back Forward
  • Save & file
  • View original
  • Forward
  • Share
    • Facebook
    • Twitter
    • Linked In
  • Follow
    Please login to follow content.
  • Like
  • Instruct

add to folder:

  • My saved (default)
  • Read later
Folders shared with you

Register now for your free, tailored, daily legal newsfeed service.

Questions? Please contact [email protected]

Register

Consultation opens on Serious Data Breach Notification Bill

Baker McKenzie

To view this article you need a PDF viewer such as Adobe Reader. Download Adobe Acrobat Reader

If you can't read this PDF, you can view its text here. Go back to the PDF .

Australia December 22 2015

Baker & McKenzie Alert Client Alert December 2015 Download Forward Contact Us Visit Our Website Consultation opens on Serious Data Breach Notification Bill Australia is one step closer to a mandatory data breach notification scheme. If implemented the new law will require businesses and Federal Government bodies to notify serious data breaches to the Australian Information Commissioner (the Commissioner) and affected individuals. The Government has released for public consultation an exposure of the Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 (the Bill) and related documents (available here). The Bill is substantively identical to the Privacy Amendment (Privacy Alerts) Bill first introduced by Labor in 2013. Submissions on the Bill can be made until 4 March 2016. This alert summarises the notification requirements under the Bill and explains their practical impact (if enacted). Notification requirement 1. Who would the notification requirements apply to? The mandatory notification provisions apply to any entity bound by the Privacy Act 1988 (Cth). This includes Federal Government agencies (but not State and Territory Government agencies or local councils), most private sector organisations with an annual turnover of more than A$3 million and foreign companies that carry on business in Australia. If an entity subject to the Privacy Act discloses personal information to an overseas recipient and Australian Privacy Principle 8.1 applies to the disclosure, the entity will be responsible for complying with the notification provisions in the event of a breach by the overseas recipient. 2. Trigger for notification The Bill requires entities to comply with the notification provisions where there are "reasonable grounds to believe" that a "serious data breach" has occurred. A serious data breach occurs when there is unauthorised access to, unauthorised disclosure of, or loss of, personal information, credit reporting or credit eligibility information or tax file numbers which results in a real risk of serious harm to the individual to whom the information relates. The real risk of serious harm standard reflects the existing voluntary data breach guidelines. The Bill sets out a variety of factors that will be taken into account in assessing whether there is a real risk of serious harm, including the sensitivity of the information, whether it is in an intelligible form and who may have accessed or could access it. Further practical guidance from the OAIC is foreshadowed in the explanatory memorandum. Harm in this context includes physical, psychological, emotional, reputational, economic and financial harm to the affected individual. The trigger of real risk of serious harm is very similar to the trigger of “real risk of significant harm to an individual” recently enacted (but yet to come into effect) in Canada. But on a global scale, the proposed notification threshold is quite high. For example, in California (which is famed for initiating mandatory breach notification requirements), notice is required for any "breach of the security of the system", which is defined as the "unauthorised acquisition of computerized data that compromises the security, confidentiality or integrity of personal information maintained by the agency". Likewise, under the incoming European General Data Protection Regulation, any data breach will need to be notified to authorities unless it is unlikely to result in a risk for the rights and freedoms of individuals. For more information to assist you in analysing the severity of a data breach, see our detailed guidelines and checklist in the recently released Baker & McKenzie Cybersecurity Counter-offensive Guide. If the provisions of the exposure become law, we will update the Guide to reflect the new obligations 3. When would I have to notify? An entity is required to notify both the Commissioner and the individuals to whom the information relates, as soon as practicable after the entity becomes aware, or ought reasonably to have been aware, that there are reasonable grounds to believe that there has been a serious data breach. Where an entity suspects a serious data breach may have occurred but is not sure, it has 30 days to conduct an assessment of whether notification is required. In comparison, notification in California and most other U.S. States must occur "in the most expedient manner possible and without unreasonable delay". The Canadian laws require notification "as soon as feasible" after it is determined that a breach occurred. 4. Are there any exceptions? There are exceptions: • for law enforcement purposes; • where secrecy provisions in other legislation apply; • if the breach falls under the existing eHealth data breach notification scheme under the My Health Records Act; or • on public interest grounds, such as where a breach notification would prejudice ongoing investigations. Under the "secrecy provisions" exemption, telecommunications companies could be restricted from notifying breaches if notification would, to any extent, be inconsistent with a provision of a law of the Commonwealth (other than a provision of the Privacy Act) that prohibits or regulates the disclosure of information. 5. What would I have to include in the notification? The notification must include the identity and contact details of the entity, a description of the data breach, the kind of information involved, and recommendations about the steps that individuals should take in response to the breach. 6. Would I have to notify affected individuals? The entity must take such steps as are reasonable in the circumstances to notify the individuals involved. If it is not practicable to do so, the entity must publish a copy of the notification statement on its website and otherwise take reasonable steps to publicise the contents of the statement. 7. Additional powers of the Commissioner In circumstances where the Commissioner believes that a serious data breach has occurred and no notification has been given, the Commissioner has the power to require the entity to provide information on the data breach. The Commissioner may also require additional information in some circumstances. 8. What are the penalties for non-compliance? Failure to notify as required triggers the Commissioner’s usual powers to investigate, make determinations, seek enforceable undertakings and provide remedies for non-compliance. If the failure amounts to a serious or repeated interference of privacy, penalties may be imposed of up to A$360,000 for individuals and A$1.8 million for corporates. Potential Impact The impact of the notification requirements on Australian businesses and foreign entities conducting business in Australia is likely to be far-reaching. Businesses should ensure they have the systems and processes in place to be able to comply with the requirements once enacted. The mandatory data breach scheme will become effective 12 months after the Bill receives royal assent. Business will need to implement an incident response plan, if they have not already done so. Even without a mandatory data breach notification scheme, it is important for businesses to have an incident response plan both from a compliance and risk management perspective. This plan should outline the processes and procedures for dealing with suspected data breaches, such as to: • assess: ◦ the nature of the incident (e.g., whether it was the result of a hacking, lost device or internal theft); ◦ what data and data subjects have been affected (type, location and number); and ◦ the likelihood and seriousness of the risk of harm to the affected individuals (particularly whether it would be likely to reach the real risk of serious harm threshold for notification under the Bill); • determine who is aware of the incident internally and externally and set up a response team (including public relations personnel); • inform the board and senior management; • promptly take steps to protect the security of the system while avoiding destruction of critical electronic evidence; • engage a reputable forensics firm to assist with reviewing and assessing the incident and collecting and preserving critical evidence; • in suitable cases, take steps to recover or secure the information lost; and • consider any other data breach reporting obligations that may apply globally. Download Alert Follow us For more information Patrick Fair Partner +61 2 8922 5534 patrick.fair @bakermckenzie.com Anne-Marie Allgrove Partner +61 2 8922 5274 anne-marie.allgrove @bakermckenzie.com Adrian Lawrence Partner +61 2 8922 5204 adrian.lawrence @bakermckenzie.com Toby Patten Special Counsel +61 3 9617 4456 toby.patten @bakermckenzie.com Disclaimer This communication has been prepared for the general information of clients and professional associates of Baker & McKenzie. You should not rely on the contents. It is not legal advice and should not be regarded as a substitute for legal advice. To the fullest extent allowed by law, Baker & McKenzie excludes all liability (whether arising in contract, negligence or otherwise) in respect of all and each part of this communication, including without limitation, any errors or omissions. This may qualify as "Attorney Advertising" requiring notice in some jurisdictions. Prior results do not guarantee a similar outcome. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a "partner" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an "office" means an office of any such law firm. This email is sent by Baker & McKenzie (ABN 32 266 778 912), an Australian partnership and member of Baker & McKenzie International, a Swiss Verein. The contents may contain copyright. Personal information contained in communications with Baker & McKenzie is subject to our Privacy Policy and the obligations of the Privacy Act. Emails sent to Baker & McKenzie are subject to automated email filtering. Should you receive this email in error, please telephone us on +61 2 9225 0200 or email our Helpdesk.

Baker McKenzie - Patrick Fair, Anne-Marie Allgrove, Adrian J. Lawrence and Toby Patten
Back Forward
  • Save & file
  • View original
  • Forward
  • Share
    • Facebook
    • Twitter
    • Linked In
  • Follow
    Please login to follow content.
  • Like
  • Instruct

add to folder:

  • My saved (default)
  • Read later
Folders shared with you

Filed under

  • Australia
  • IT & Data Protection
  • Baker McKenzie

Tagged with

  • Information privacy

If you would like to learn how Lexology can drive your content marketing strategy forward, please email [email protected].

Powered by Lexology
loading...

Related topic hubs

  1. Australia
  2. IT & Data Protection

Related Australia articles

  1. Telecommunications Regulatory Update - November 2015 *
  2. Cybersecurity counter-offensive *
  3. Australian government releases mandatory data breach notification bill for consultation *

Related international articles

  1. 2016 Global Data Breach Notification Guide * - USA
  2. Baker & McKenzie’s Global Privacy Handbook - 2016 Edition * - Global
  3. Five lessons from recent cyber attacks to protect your organisation from risk of data breach in 2016 * - Hong Kong
Gee Yung Loong
Senior Director
McAfee Inc
What our clients say

"I think it is a great service, continue the good work."

Back to Top
  • Terms of use
  • Cookies
  • Disclaimer
  • Privacy policy
  • GDPR compliance
  • RSS feeds
  • Contact
  • Submissions
  • About
  • Login
  • Register
  • Follow on Twitter
  • Search
Law Business Research

© Copyright 2006 - 2021 Law Business Research