Discussion Paper. Australian Privacy Breach Notification. Commonwealth of Australia. October 2012

Size: px
Start display at page:

Download "Discussion Paper. Australian Privacy Breach Notification. Commonwealth of Australia. October 2012"

Transcription

1 Discussion Paper Australian Privacy Breach Notification Commonwealth of Australia Attorney- October 2012

2 ISBN Commonwealth of Australia 2012 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia licence ( For the avoidance of doubt, this means this licence only applies to material as set out in this document. The details of the relevant licence conditions are available on the Creative Commons website as is the full legal code for the CC BY 3.0 AU licence ( Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the It's an Honour website ( Contact us Enquiries regarding the licence and any use of this document are welcome at: Business and Information Law Branch Attorney- 4 National Circuit BARTON ACT 2600 Telephone: copyright@ag.gov.au

3 Foreword by the Australian Attorney- General The Australian Government is committed to ensuring that our privacy laws continue to protect the personal information of Australians in the digital era. Rapid advances in technology have changed the way we work, bank and shop, the way people engage with government, never even met. We are providing more personal information that ever before to government agencies and companies, both in Australia and overseas and this information is susceptible to hackers and other types of security breaches. It is therefore timely to consider whether our existing privacy framework is adequate in encouraging entities to take the right steps in the event of a data breach, and in allowing individuals to mitigate the adverse effects of such a breach. In May 2008, the Australian Law Reform Commission (ARLC) concluded a 28- month inquiry into the effectiveness of the Privacy Act 1988 and related laws as a framework for the protection of privacy in Australia. In its report, the ALRC made 295 recommendations for reform in a range of areas, including creating unified privacy principles, updating our credit reporting system, and strengthening the powers of the Privacy Commissioner. The Government has responded to the majority of their recommendations through the introduction of the Privacy Amendment (Enhancing Privacy Protection) Bill in Parliament in May other recommendations was that a mandatory data breach notification scheme be introduced. In responding to this recommendation, the threshold question that must be asked is whether the introduction of such a scheme is warranted. For example, it may be the case that the existing voluntary guidelines issued by the Office of the Australian Information Commissioner are working effectively enough. If there is to be a mandatory data breach notification scheme, how do we make sure it gets the balance right between the public interest in mitigating the adverse effects of data breaches while ensuring we do not create an overly burdensome compliance requirement on entities that make their business from collecting, storing and using personal information? The Australian Government has prepared this Discussion Paper for public consideration of these important questions. I encourage everyone with an interest to visit and provide views on this important issue. The Hon Nicola Roxon MP Attorney- General and Minister for Emergency Management

4 Discussion Paper Australian Privacy Breach Notification Contents Foreword by the Australian Attorney- General... ii Introduction... 2 Current position... 3 Factors in favour of the current position... 3 Rationale for mandatory data breach notification laws... 4 A. Mitigation of consequences of breach... 4 B. Deterrence/incentive to improve data security... 4 C. Tracking of incidents and provision of information in the public interest... 5 D. Maintaining community confidence in legislative privacy protections... 5 Data breach notification models and legislation... 5 ALRC recommendation Legislative and voluntary models in foreign and state jurisdictions... 7 Key questions for consultation / determination by Government (1) Should Australia introduce a mandatory data breach notification law? Questions: (2) Which breaches should be reported? Triggers for notification Questions: (3) Who should decide on whether to notify? Questions: (4) What should be reported (content and method of notification), and in what time frame? Questions: (5) What should be the penalty for failing to notify when required to do so? Questions: (6) Who should be subject to a mandatory data breach notification law? Questions: (7) Should there be an exception for law enforcement activities? Questions: Public consultation

5 Introduction Mandatory data breach notification refers to a legal requirement imposed upon particular entities to provide notice to affected persons and the relevant regulator where certain types of personal information are accessed, obtained, used, disclosed to, copied, or modified by unauthorised persons. Such unauthorised access may occur following a malicious breach of the secure storage and handling of that information (eg, a hacker attack), an accidental loss (most commonly of IT equipment or hard copy documents), a negligent or improper disclosure of information, or otherwise. In its report, For Your Information: Australian Privacy Law and Practice, the Australian Law Reform Commission ALRC) noted that, with advances in technology, entities were increasingly holding larger amounts of identifying information in electronic form, raising the risk that a breach of this information could result in another individual using the information for identity theft and identity fraud 1. A notification requirement on entities that suffer data breaches would allow individuals whose personal information had been compromised by the breach to take remedial steps to lessen the adverse impact that might arise from the breach. Recently, there is anecdotal evidence that breaches of data security are increasing in frequency and scope. 2 Some recent US reports have found that up to 88 per cent of organisations surveyed have had at least one data breach during the course of a year 3. These reports also indicate that the cost of notification and rectification is also increasing, with a cost range of $174 to $268 per information record breached in the US, depending on how quickly a company responded to the data breach 4. In addition, the Office of the Australian Information Commissioner (OAIC) was notified of 56 data breaches in the 2010/2011 financial year, equivalent to a data breach a week. This is up from 44 in the previous year, an increase of 27 per cent. The Privacy Commissioner also opened 59 investigations in to breaches of which there was no notification to the OAIC 5. Some of these breaches have occasioned significant publicity both here in Australia and internationally. Both government and private sector entities have recently suffered data breaches, at a national, state, and international level. For example, notable recent breaches have been suffered by Sony (2011), St George Bank (2010), Medicare Australia (2008), TJX Companies Inc (2007, 45.6 million credit and debit card numbers), and the UK Revenue and Customs (2007, 25 million records of child benefit claimants). The scale and impact of these data breaches in terms of both numbers of persons affected and flow- on economic and social harms caused have likewise been significant. Data breaches have caused considerable public concern. For example, a number of concerns were raised Cyber White Paper. 6 The ALRC recommended that the Privacy Act 1988 (Cth) (Privacy Act) be amended to require that such notification be given 7. otification would be provided to those whose privacy had been infringed where data breaches occurred. Notification would be compulsory unless it would impact upon a law enforcement investigation or was determined by the regulator to be contrary to the public interest. Failure to notify would attract a civil penalty. 1 ALRC Report 108: For Your Information: Australian Privacy Law and Practice (2008) at pp warned- to- be- ready.html 6 See cyberwhitepaper.dpmc.gov.au 7 Chapter 51, recommendation 51-1, For Your Information: Australian Privacy Law and Practice (2008). 2

6 The Government has responded to. Most of these will be implemented with the passage of the Privacy Amendment (Enhancing Privacy Protection) Bill 2012, which includes the new Australian Privacy Principles, credit reporting reforms and creates powers and functions for the Australian Information Commissioner. on mandatory data breach notification report. This paper considers the policy questions and models by which the Government could respond to the recommendation. It considers implementation options and sketches next steps required should the Government decide to proceed to introduce a mandatory data breach notification scheme in Australia. Current position Under the Privacy Act, agencies and organisations are subject to requirements to provide adequate security protection to personal information in their possession 8. This will be reflected in proposed Australian Privacy Principle 11, which has been included in the Privacy Amendment (Enhancing Privacy Protection) Bill There is no requirement under the Privacy Act to notify the OAIC or any other individual in the event of a data breach. These data security requirements are aimed at encouraging entities to provide sufficiently high levels of security to minimise the possibility that personal information could become compromised. Under these provisions, an entity could suffer a data breach involving large amounts of personal information but not be in breach of their data security obligations 9. Therefore, the rationale underpinning a mandatory data breach notification requirement is based on separate objectives. These are addressed below under the heading Specific Commonwealth laws The Personally Controlled Electronic Health Records (PCEHR) system contains a mandatory data breach notification requirement regarding PCEHR information 10. Factors in favour of the current position There are a number of arguments in favour of retaining the existing position and not implementing mandatory data breach notification laws. These include: the additional costs of compliance for entities would be too onerous; there are sufficient commercial incentives for entities (eg reputation) to have high standards of data security and to voluntarily notify the OAIC where appropriate; the voluntary OAIC guidelines are operating effectively, and more entities are using them after voluntarily contacting the OAIC; many organisations do not have the capability of detecting whether data loss has occurred, and whether there has been a significant impact or harm caused by such data loss; 8 Information Privacy Principle 4 and National Privacy Principle 4. 9 into Sony PlayStation Network / Qriocity: 10 Section 75 of the Personally Controlled Electronic Health Records Act See at: 3

7 some organisations already voluntarily report certain categories of incident to law enforcement agencies and CERT Australia; the connection between data breaches and identity theft has been criticised as being overstated 11 ; and data breach disclosure laws have marginal effect on the incidences of identity thefts 12. Rationale for mandatory data breach notification laws There are essentially four broad goals sought to be achieved by requiring data breach notification. A. Mitigation of consequences of breach First, by providing advice to those who have had their privacy infringed, that person will have an opportunity This could be called the mitigation. 13 For example, to change passwords where those passwords have been hacked or to cancel credit cards if their details have been stolen. The ALRC considered this to be the primary goal to be achieved. However, such a rationale shifts the onus away from the organisation that has suffered the breach and onto a person who may be ill- equipped or unable to correct the consequences of the breach. been accidentally uploaded to the internet, it may not be possible to rectify the breach even if it has been subsequently taken down. B. Deterrence/incentive to improve data security Secondly, requiring notification may act as an incentive to the holders of personal information to adequately secure or dispose of that information. In other words, the adverse publicity occasioned by a notification may deter poor handling of such information, and increase the likelihood that adequate and reasonable measures are taken to secure it. deterrent. The ALRC viewed this as more of a secondary objective, although it has been part of the rationale for data breach notification laws in many other jurisdictions. With respect to agencies, this objective is consistent with guidelines issued by the Government under the Protective Security Policy Framework 14. These guidelines highlight the need for agencies to understand and address their responsibility to minimise the risk to the public when transacting online with the Australian Government. The failure by an agency to adequately notify the public of a data breach could place the public at risk. A mandatory data breach notification requirement would ensure all agencies take action to minimise the risk of harm to the public. 11 F Cate, M Abrams, P Bruening and O Swindle (Centre for Information Policy Leadership, 2009) at p 2. See at: 12 S Romanosky, R Telang, A Acquisti, Do Data Breach Disclosure Laws Reduce Identity Theft? (Social Science Research Network, 2008) at p 1. See at: 13 See further ALRC report (2008), para

8 C. Tracking of incidents and provision of information in the public interest A third goal would be to provide better information to government and the public on the scope and frequency of data breaches. This informational is essentially a correction of the market failure by which organisations have insufficient incentives to disclose incidents of data loss, even though such losses may cause harm to others. D. Maintaining community confidence in legislative privacy protections individuals is minimal, there is a chance individuals will feel deceived or disempowered in the absence of notification. Mandatory data breach notification may bolster public confidence that the Government is taking individual privacy rights seriously. Data breach notification models and legislation This section considers the range of data breach notification laws that have been proposed or legislated both here in Australia and in other jurisdictions. It commences with the recommendation of the ALRC in its 2008 report. The ALRC noted that data breach notification is a topical issue in privacy regulation around the world. It noted that IPPs and the NPPs in the Privacy Act do not impose an obligation on agencies and organisations to notify individuals whose personal information has been compromised, although there is an obligation to take reasonable steps to maintain the security of the personal information they hold. The ALRC considered the rationale for data breach notification laws in other countries and various models that have been implemented strong support for the introduction of a requirement that data users notify individuals of a breach to their personal information where that breach may give rise to real harm to an individual. As a consequence, the ALRC recommended that the Privacy Act should provide for notification by agencies and organisations to individuals affected by a data breach. ALRC recommendation 51-1 The Privacy Act should be amended to include a new Part on data breach notification, to provide as follows: (a) An agency or organisation is required to notify the Privacy Commissioner and affected individuals when specified personal information has been, or is reasonably believed to have been, acquired by an unauthorised person and the agency, organisation or Privacy Commissioner believes that the unauthorised acquisition may give rise to a real risk of serious harm to any affected individual. (b) with a unique identifier, such as a Medicare or account number. (c) In determining whether the acquisition may give rise to a real risk of serious harm to any affected individual, the following factors should be taken into account: (i) whether the personal information was encrypted adequately;; and (ii) whether the personal information was acquired in good faith by an employee or agent of the agency or organisation where the agency or organisation was otherwise acting for a purpose permitted by the Privacy Act (provided that the personal information is not used or subject to further unauthorised disclosure). 5

9 (d) An agency or organisation is not required to notify an affected individual where the Privacy Commissioner considers that notification would not be in the public interest or in the interests of the affected individual. (e) Failure to notify the Privacy Commissioner of a data breach as required by the Act may attract a civil penalty. Commentators have made a number of points about this recommendation 15. First, it is arguable that para (a) is internally inconsistent or may raise confusion in that it bundles up notification to the Commissioner with notification to affected individuals. Secondly, c para (b)) may complicate the definitional aspects of the reform. Other jurisdictions have been far more specific about what combinations of information, when accessed by unauthorised persons, require data breach notification. Further, the civil penalty recommendation (para (e)) is duplicative with the broader civil penalty, undertakings and other enforcement provisions recommended by the ALRC (see, eg, rec 49-6 and ch 50) and which have been included in the Privacy Amendment (Enhancing Privacy Protection) Bill The 16 Data Breach Notification: A Guide to Handling Personal Information Security The OAIC currently has in place a voluntary guide for entities giving advice on how to handle a data breach. The Guide was developed in August 2008 and revised in late The Guide is cast at a fairly high level, and pivots upon: Existing Information Privacy Principle 4 and National Privacy Principle 4 (both concerned with data security); and certain language to be found in the recommendations of the ALRC (eg, possible triggers for notification). The Guide describes practical steps an organisation in the midst of handling a breach should take. Those include: breach containment; risk evaluation; possible notification (following an assessment of whether there is a real risk of serious harm); incident review; and prevention of recurrence. The Guide also includes useful definitions of data breach and tries to describe examples which illuminate the - 1). 15 Eg, See New South Wales Law Reform Commission Report 127 (2010) - Protecting Privacy in New South Wales: paras See NSWLRC, Report 127 (2010), Protecting Privacy in New South Wales, the NSWLRC meant that the more general enforcement and penalty provisions of the NSW Act would be a more flexible and appropriate means by which to ensure compliance with its proposed DBN rules; and, concomitantly, that no specific DBN penalties were required in the DBN part of the Act. See at: 6

10 Much is expres- by- case In these respects, similar guidelines exist or have previously existed in at least some European countries, Canada, NZ, the US and Ireland, though in some of those jurisdictions tighter, stronger codes or legislative provisions have also been proposed or enacted. The Guide does not, and indeed cannot: require notification; impose particular data breach notification penalties; legally define real risk of serious harm; or prescribe particular timeframes or modalities for the notification. One option for the development of a data breach notification law is that it be consistent with a formalisation. Even if a mandatory data breach notification law is introduced, the OAIC could still issue guidelines that outline steps that an entity should take to address aspects of the breach (eg remedial action). For example, once an organisation reports that it has experienced a data breach, it could be given assistance or advice about implementing remediation measures necessary to make it unlikely that the responsible parties do not use the same metholines could still play an important role in promoting safety and security of personal information. Legislative and voluntary models in foreign and state jurisdictions There have been a number of international developments where foreign jurisdictions have identified that there is a problem that needs to be addressed, and have implemented, or are considering, legislative options for addressing the problem. Some of these jurisdictions also have voluntary notification arrangements in place. These are discussed more in detail below. United States President Obama presented model legislation to Congress in May 2011, after significant media attention and pressure upon the Administration to simplify corporate compliance burdens caused by the proliferation of state legislation 17. It has the following features: obligations to notify are applied only to business entities; a trigger based on the number of individuals whose data has been acquired in a 12 month period by the entity (eg 10,000 per year) and applying to special combinations of information only (which are identifiable information requires notification without unreasonable delay, but no later than 60 days after the breach; has differential requirements for notification to the regulator vs to the public; that no reasonable risk of harm to individuals has eventuated; allows the regulator to use all its powers and functions to compel compliance; includes a special civil penalty provision (max US$1m) but specifically excludes any private causes of action; and 17 See fact sheet at: administration_cybersecurity_legislative_proposal.pdf 7

11 would operate to the exclusion of the 49 state and territory laws that are currently in place in the US. In February 2012, the Obama administration released a whitepaper, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy 18. The variations in existing state laws create significant compliance issues for companies. In June 2011, two Senators introduced draft legislation on data breach notification the Data Security and Breach Notification Act (S 1207) which was referred to the Senate Committee on Commerce, Science and Transportation. In addition to requiring notification in cases of breach, the bill contains an entitlement for affected consumers to two years worth of consumer credit reports or credit monitoring services. In July 2011, alternative legislation the Secure and Fortify Electronic (SAFE) Data Act (HR 2577) was referred to the House Energy and Commerce Subcommittee on Commerce, Manufacturing and Trade. The bill also seeks to establish uniform national standards for data breach notification. It would impose a requirement that companies notify consumers of a breach within 48 hours of identifying the specific information affected, unless the breach would be unlikely to result in any harm. It would also give the US Federal Trade Commission the power to impose civil penalties for non- compliance, including jurisdiction over non- profit organisations for the purposes of the Act. Forty seven US states, several territories and the District of Columbia have enacted some form of data breach notification legislation, the most well- 19. These laws define data, breach, and notification in a multiplicity of different ways. Most of the state codes have particular timeframes and create penalties where notification is not met. They also include a variety of carve- outs and exemptions for different types of entities. European Union The EU has recently (through Directive 2009/136/EC) amended its Directive on privacy and electronic communications (Directive 2002/58/EC) to include data breach notification provisions. The new provisions will: apply only to electronic communications providers (ie. telecommunications firms: the Commission and Council rejected EU Parliament proposals to have the law apply to businesses that operate online, such as shops and banks); require notification to the competent national authority (ie. the national regulator) in all cases, and to individual; mandate that the notification include a description of the breach, contact points, and measures that can be taken to correct it; additionally require that providers describe the consequences of the breach to the regulator, which adverse effects of require the Commission to consult on the best available technical and economic means of implementing the requirements of the directive; include an exemption if the data was encrypted; and require providers to maintain an inventory of data breaches and make it accessible to regulators. These provisions were required to be transposed into national legislation by the 27 Member States of the EU by May See at: final.pdf 19 For California see Cal. Civ. Code and ; For Massachusetts see Mass. Gen. Laws 93H- 1 et seq. 8

12 In June 2011, EU Justice Commissioner Viviane Reding announced her intention to propose mandatory data breach notification which would extend to all sectors, rather than only the telecommunications sector. The EC proposal was released in January 2012 and contains a requirement for companies and organisations to notify their relevant national authority of serious data breaches. Notification should occur within 24 hours if feasible, but otherwise as individual should also be notified, unless the data was rendered unintelligible by technological protection measures. The proposal also requires that EU rules apply if companies are active in the EU market and offer services to EU citizens but handle their personal data abroad. National data protection authorities will be given stronger powers to enforce EU data protection rules, including the imposition of fin United Kingdom In May 2011, the UK approved new regulations implementing the provisions of the EC directive noted above. where a telecommunications service provider fails to comply with the requirement to notify. It is not clear, and given the newness of the regulations does not appear to have been tested, whether or not the penalty applies per breach incident or per failure to notify an individual. 20 Ireland While no legislation presently exists in Ireland, on 7 July 2010, the Irish Data Protection Commissioner, Billy Hughes, approved a mandatory Personal Data Security Breach Code of Practice covering non- government organisations. Under the code of practice: organisations would be required to notify the Commissioner, but only where more than 100 nature; initial notification must be made within 48 hours of the organisation becoming aware of the breach; the Office of the Data Protection Commissioner can then request a more detailed report, which must include information about: a. the amount and nature of the personal data that has been compromised; b. what action is being taken to secure and / or recover the personal data that has been compromised; c. what actions are being taken to inform those affected by the incident or reasons for the decision not to do so; d. what actions (if any) are being taken to limit damage or distress to those affected by the incident; e. a chronology of the events leading up to the disclosure; and f. what measures are being taken to prevent repetition of the incident. 20 See Privacy and Electronic Communications (EC Directive) (Amendment) Regulations 2011 (UK) at 9

13 In July 2011, Ireland also implemented, through regulations, the provisions of the EC directive in relation to telecoms service providers. 21 Those regulations require providers to notify the ODPC of any breach, including information about any proposed measures to address the breach. The organisation is also required to notify any individual who may be adversely affected, unless the Office of the Data Protection Commissioner is satisfied that the data was sufficiently secured to make it unintelligible to third parties. Failure to comply with notification obligations can result in criminal prosecution, with fines up to 5,000, and on indictment, 250,000 per offence. New Zealand New Zealand does not have a mandatory reporting requirement. In February 2008, the New Zealand Privacy Commissioner published Key Steps for Agencies in Responding to Privacy Breaches and a Privacy Breach Checklist help agencies complete an analysis of the breach 22 Canada The Canadian Privacy Commissioner has also issued guidelines on data breach notification, which are similar to the Australian guidelines 23. In mid- 2010, Bill C29 was introduced by the Canadian Government which would amend the Personal Information Protection and Electronic Documents Act to create a data breach notification rule for the first time. The Canadian proposal requires: Organisations to report to the Privacy Commissioner on material breach of security safeguards o In determining whether a breach is material, businesses must consider the sensitivity of the information and whether the cause of the breach indicates a systemic issue. Notification to affected individuals if it is reasonable in the circumstances to believe that the breach real risk of significant harm o o includes bodily harm, humiliation, damage to reputation or relationships, loss of employment, business or professional opportunities, financial loss, identity theft, negative effects on a credit record and damage to or loss of property. Factors relevant to determining whether there is a real risk of significant harm include the sensitivity of the information and the probability of its misuse. s business card), is excluded. The Canadian Bill includes no penalty provisions, and at least the initial assessment of whether the trigger has been met is left in the hands of the entity. 21 See European Communities (Electronic Communications Networks and Services) (Privacy and Electronic Communications) Regulations 2011 (Ireland) at breach- guidelines- 2/?highlight=data breach

14 Australian States and Territories Unlike in the US, no data breach notification laws presently exist in Australian states or territories. Various For example, the New South Wales Law Reform Commission supported the ALRC recommendation in principle but departed from it in relation to the type information that the provisions should apply to, and the penalty to be imposed (eg the NSWLRC did not support civil penalties). Key questions for consultation / determination by Government The Government introduced in Australia and, if such a law were introduced, how it should be framed. The threshold question is whether there should be a mandatory data breach notification scheme. In 2011, the Department of the Prime Minister and Cabinet released the Connecting with Confidence discussion paper, in preparation for development of its Cyber White Paper 24. The discussion paper included consideration of data breach notification, and requested views on how the reporting of data breaches could be improved and encouraged in Australia. Of the responses which considered mandatory data breach notification legislation, a majority supported its implementation. Key elements in the design of the scheme may include: the types of breaches that should be reported (including the types of data), to whom they should be reported, in what manner, the appropriate penalties that should be imposed, and the entities that should be subject to the scheme. This section identifies those issues, grouped into six decisions need to be made so as to inform any legislative amendment. (1) Should Australia introduce a mandatory data breach notification law? Questions: 1.1 Are the current voluntary data breach notification arrangements sufficient? 1.2 Should the Government introduce a mandatory data breach notification law? (2) Which breaches should be reported? Triggers for notification A key issue is which breaches should be reported and how the class of reportable breaches may be defined. This is sometimes described as t The challenge here is to ensure that remedial action can be taken quickly to mitigate actual and possible adverse effects of the breach, while ensuring that notification is only required in relation to appropriately serious breaches. There may be breaches or losses of data that are minor, unnoticed, or unimportant to some persons whose privacy may have been impacted. It may not be desirable for minor breaches to be notified because of the administrative burden that may place on entities, the risk of notification fatigue on the part of individuals, and the lack of utility where notification does not facilitate mitigation. However, especially where there are a large number of persons affected, the breach may affect people in different ways. In some cases, the harms may be concentrated in particular populations or types of persons. If, for example, those with serious or sensitive medical conditions may be a small subset of the whole population, but each of them may suffer great harm due to the breach paper 11

15 Organisations may not often be in a good position to determine harm caused by a breach. Harm will depend and many other factors. The notion of harm may not be an appropriate trigger element because it raises the risk that organisations will always assess a breach as not raising any harm unless it involves something such as a credit card breach. In that example, the monetary harm would be to the bank (with potential short- term inconvenience for the individuals affected), so International jurisdictions have tended to take two broad approaches to this question: on the one hand (i), a cover- all test has been used or, on the other (ii), triggers have been spelt out specifically. (i) The ALRC recommended a catch alltest be used to determine the trigger point. The following catch all tests could be considered consistently with the ALRC approach but varying in degree. They are ordered here from most demanding to most broad: a. a real risk of serious harm (the ALRC test, adopted also in the OAIC Guide); b. a real risk of significant harm (the proposed Canadian test for notification to individuals); c. a risk of harm; d. a material breach of data security safeguards (the proposed Canadian test for notification to the regulator); e. dual (the UK f. disclosure has test); g. disclosure to unauthorised persons has occurred or is reasonably suspected to have occurred (see eg Privacy (Data Security Breach Notification) Amendment Bill 2007 Private Members Bill of Senator Stott- Despoja)); or h. risk of unauthorised disclosure (the Ireland Code of Practice requires consideration of notification at this point). (ii) If, on the other hand, the triggers for notification were described more exhaustively, some of the following options may be attractive. Notification could, for example, be required where: a. more than 1000 records, have been breached - person- plus materiality test); and/or b. the entity has acquired more than say 10,000 records in the past year (see, eg, US proposal); and/or c. sensitive information has been breached., option (i) above, is that it would not require detailed permutations or combinations of personal information to be expressly included (see, eg, laws in most US states and in the Obama proposal). This is because it would not be the type of information that triggered the notice requirement but rather the harm. Certain exemptions would not need to be so exhaustively spelt out, which would simplify drafting, but would likely mean a greater level of guidance was required from the OAIC. 12

16 Questions: 2.1 What should be the appropriate test to determine the trigger for notification? What specific elements should be included in the notification trigger? (3) Who should decide on whether to notify? Notification could be provided to: a. the Commissioner; or b. affected persons; or c. the Commissioner and affected persons (either sequentially or simultaneously). Information could also be provided to: d. those who can help correct or investigate the breach (eg, the police, financial institutions, CERT Australia etc). 25 If information is also to be provided to these bodies, timeliness is again a major factor to consider. There exists a significant challenge in determining who should be responsible for deciding whether or not notification to affected persons is required. Options include: a. the organisation/agency; or b. the Commissioner (ie, the Commissioner may direct notification); or c. the organisation/agency in consultation with the Commissioner. It would be impractical to require the Commissioner to determine whether or not notification is required in every case reported to him or her due to resource constraints and timing issues, and because the Commissioner may not be as well placed as the organisation to consider the ramifications of the breach. On the other hand, allowing organisations themselves to decide alone may present issues as to conflicts of interest or lack of understanding of the relevant law. The subsidiary question of whether the Commissioner should have, or already has sufficient, power to compel notification arises depending on the regulatory model that is pursued. The ALRC did not reach a clear conclusion on this issue, making the entity the primary decision- maker while suggesting that notice of the most serious breaches should always be provided to the Commissioner, and encouraging early notice to and consultation with the Commissioner in marginal cases. Questions: 3.1 Who should be notified about the breach? 3.2 Which of the below should decide whether to notify? (i) the organisation or agency; 25 See, Personal Data Security Breach Code of Practice, para 3. See at: _Data_Security_Breach_Code_of_Practice/1082.htm 13

17 (ii) the Commissioner; or (iii) the organisation/agency in consultation with the Commissioner. (4) What should be reported (content and method of notification), and in what time frame? Form/medium The form or medium in which the data breach notification should be provided (eg, by , or by phone, etc) is a question most jurisdictions resolve by simply requiring notice that is: a. appropriate, or b. in the form in which the organisation usually communicates with the affected person (eg, in writing). The notification would be provided by the entity who normally communicates with or has the pre- existing relationship with the person. complex tests), general rules of the type above provide more flexibility to organisations to be able to quickly notify affected individuals. Advice from the OAIC may provide some guidance on this question. Timing Timely notification is important, especially if the primary objective is to allow affected persons a real and timely opportunity to take corrective action (eg, resetting security measures such as changing passwords before harm occurs). Allowing organisations a significant amount of time to report the breach is highly likely to lead to stolen data being misused by criminals (eg stolen credit cards). It is also the experience of CERT Australia that many organisations do not know they have lost data until advised by CERT Australia. CERT Australia has an active work program which identifies caches of compromised data taken from organisations, and returns it to the business owner for appropriate action (e.g. compromised passwords for secure login or credit card credentials). It can be assumed that those who compromise data take copies of the information. Unless an organisation has a very good understanding about cyber security and processes to identify breaches, and the hacker is very inexperienced, organisations often will not know that any information has been removed and will not be in a position to report it. Various jurisdictions have resolved this question differently. Options include: a. before a particular deadline (eg, no later than 60 days from becoming aware of the breach: as for ); b. as soon as possible once the entity becomes aware of the breach (eg, Irish Code of Practice); c. immediately following an initial investigation by the entity that suffers the breach; d. the proposed US law and the Californian law); or e. as soon as Canadian proposed law: Bill C29) practicable in the. 14

18 There is some evidence that the faster an organisation decides to react and respond, the higher the cost of the response. 26 Content of a notice The content required to be provided in the notification is often, in jurisdictions which have legislated on this issue, listed out in some detail. Generally, it would include: a description of the breach; a listing of the types of information lost; contact details or suggestions for follow up; and Some specificity must be provided if a penalty may be applied for non- compliance. However, given the high- level principles- based nature of privacy regulation, which aims to provide flexibility to agencies and organisation in interpreting their obligations based on their own functions and activities, it may be argued that creating another privacy obligation with such specificity could be counterproductive. Questions: 4.1 What should be the form or medium in which the data breach notification is provided? 4.2 Should there be a set time limit for notification or a test based on notifying as soon as is practicable or reasonable? 4.3 What should be the content of the notification? (5) What should be the penalty for failing to notify when required to do so? Finally, and importantly to many stakeholders, the Act must provide for an enforcement and compliance mechanism to encourage entities to comply with their obligations to notify. It is important to note that the penalty would be to encourage the notification, not to penalise the organisation for the breach itself (or for the insufficiency of its data security measures). The Privacy Act already has remedies to address that type of activity. For example, an individual can make a complaint about, or the Commissioner could investigate, an agency or organisation where it has failed to implement adequate security standards to protect the personal information of that individual. While the ALRC suggested a civil penalty should apply, it did not discuss specific elements of a proposed penalty. If a penalty scheme is introduced to underpin the notification requirement, the Government will need to consider: a. the type of penalty (eg civil penalties, administrative penalties, name/shame); b. the elements of the offence (eg, would it include intention, recklessness, etc); c. the maximum quantum of any civil penalty; and d. whether other regulatory responses such as seeking to conciliate before imposing a penalty should be spelt out in this section or left to the more general Parts of the Act

19 The US proposal includes a penalty of US$1000 per day per lost record up to a maximum of US$1m per breach, and the UK regulations while other regimes are less specific as to quantum. If civil penalties are to apply, one option would be to set the maximum civil penalties by reference to similar provisions agreed by the Government for the credit reporting provisions: ie, at 200, 500, 1000 or 2000 penalty units, varying depending on the level of intent and so on associated with the failure to notify. Other options could include criminal penalties, administrative penalties and the capacity to name and shame entities that fail to meet their obligations. The penalties available and the circumstances in which they could be applied would need to be detailed in the legislation (either in the data breach notification Part or in the broader compliance provisions or in some combination of both) to provide liable entities with sufficient clarity and protection from arbitrary exercise of power. The appropriate penalty would also need to be weighed up against other sanctions that might arise out of the same event (eg imposed for a breach of the data security requirements under the Privacy Act). An entity may also be obliged (eg by way of a Commissioner determination under the Privacy Act) to take other remedial measures to lessen the impact of the breach on the privacy of individuals. Questions: 5.1 Should there be a penalty or sanction for failing to comply with a legislative requirement to notify? 5.2 If so, what should be the penalty or sanction, and the appropriate level of that penalty or sanction? (6) Who should be subject to a mandatory data breach notification law? all entities currently regulated by the Privacy Act. That is, Commonwealth Government agencies and large privacy sector organisations. regulation applying to the private and public sectors. Internationally, there are different approaches to this question. Under the President Obama proposal presented to Congress in May 2011, obligations to notify would apply only to business entities. Under the existing EU directive on privacy and electronic communications, the mandatory data breach requirements apply only to electronic communications providers. However, the proposed EU would extend it to all of the private, rather than only the telecommunications sector. Some European countries extend their data breach notification requirements to the public sector (eg Austria and Germany) 27. Questions: 6.1 Who should be subject to a mandatory data breach notification law? 6.2 Should the scope of a mandatory data breach notification law be the same as the existing scope of the Privacy Act? (7) Should there be an exception for law enforcement activities? In some cases, notification of a data breach by an agency could compromise its law enforcement activities. ALRC Recommendation 51(1) provides that individuals should not be notified of data breaches if notification is contrary to the public interest or the interest of the affected individual. Arguably, such a broad public interest 27 See at

20 test would obviate the need for more a more specific law enforcement exemption. Moreover, a public interest test would encourage the public interest in favour of disclosure to be taken into account when considering whether to apply an exception to mandatory notification. On the other hand, a law enforcement exception would provide clarity and thus reduce compliance burdens for law enforcement agencies. Questions: 7.1 Should there be an exception for law enforcement activities? c interest exception? Public consultation Submissions on the issues raised in this paper are sought by 30 November Discussion questions in this paper are intended as a guide. Respondents are also welcome to make more general comments on the issues. Unless submissions are marked confidential they may be published. Submissions will be treated as non- confidential unless the respondent specifically requests otherwise. disclaimers will not be considered sufficient. Submitters of material marked as confidential must do so on the understanding that submissions may be released where authorised or required by law or for the purpose of parliamentary processes. The department will strive to consult submitters of confidential information before that information is provided to another body or agency. The department cannot guarantee the confidentiality of information released through these or other legal means. The department will treat the personal information you provide in accordance with its privacy statement (see Enquiries about this paper may be directed by to Privacy.Consultation@ag.gov.au Submissions can be lodged in the following ways: Privacy.Consultation@ag.gov.au Please only attach files in a standard document format or a standard image format. Post: Mr Richard Glenn Assistant Secretary Business and Information Law Branch Attorney- 4 National Circuit BARTON ACT

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation

More information

Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department

Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department Data Breach Notifications Submission by the Australian Communications Consumer Action Network to the Attorney General s Department November 2012 About ACCAN The Australian Communications Consumer Action

More information

Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement

Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement Regulation Impact Statement i Contents Background... 1 Australian Law Reform Commission Report on Privacy...

More information

2013-2014-2015 THE PARLIAMENT OF THE COMMONWEALTH OF AUSTRALIA HOUSE OF REPRESENTATIVES/THE SENATE

2013-2014-2015 THE PARLIAMENT OF THE COMMONWEALTH OF AUSTRALIA HOUSE OF REPRESENTATIVES/THE SENATE 2013-2014-2015 THE PARLIAMENT OF THE COMMONWEALTH OF AUSTRALIA HOUSE OF REPRESENTATIVES/THE SENATE PRIVACY AMENDMENT (NOTIFICATION OF SERIOUS DATA BREACHES) BILL 2015 EXPLANATORY MEMORANDUM (Circulated

More information

Supplementary Policy on Data Breach Notification Legislation

Supplementary Policy on Data Breach Notification Legislation http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 4 May 2013 Supplementary Policy on Data Breach Notification Legislation Introduction It has been reported

More information

Dealing with data breaches in Europe and beyond

Dealing with data breaches in Europe and beyond Dealing with data breaches in Europe and beyond Karin Retzer and Joanna Łopatowska Morrison & Foerster LLP www.practicallaw.com/6-505-9638 The use of increasingly advanced technology means that the ways

More information

Mandatory data breach notification in the ehealth record system

Mandatory data breach notification in the ehealth record system Mandatory data breach notification in the ehealth record system Draft September 2012 A guide to mandatory data breach notification under the personally controlled electronic health record system Contents

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: utilities.commission@nt.gov.au Website:

More information

AUSTRALIA S NEW PRIVACY LAWS - WHAT LAWYERS NEED TO KNOW ABOUT THEIR OWN PRACTICES

AUSTRALIA S NEW PRIVACY LAWS - WHAT LAWYERS NEED TO KNOW ABOUT THEIR OWN PRACTICES AUSTRALIA S NEW PRIVACY LAWS - WHAT LAWYERS NEED TO KNOW ABOUT THEIR OWN PRACTICES http://www.lawcouncil.asn.au The Privacy Commissioner has welcomed the Law Council s initiative in producing this overview.

More information

Recovering Your Identity. Advice for victims of identity crime

Recovering Your Identity. Advice for victims of identity crime Recovering Your Identity Advice for victims of identity crime How will you know your identity has been stolen? Identity crime is unfortunately very common. Around 1 in 5 Australians have been a victim

More information

Data breach notification

Data breach notification Data breach notification April 2012 A guide to handling personal information security breaches The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by the Australian

More information

Data breach notification guide: A guide to handling personal information security breaches

Data breach notification guide: A guide to handling personal information security breaches Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by

More information

Applying the legislation

Applying the legislation Applying the legislation GUIDELINE Information Privacy Act 2009 Privacy breach management and notification A privacy breach occurs when there is a failure to comply with one or more of the privacy principles

More information

The era of hacks and cyber regulation

The era of hacks and cyber regulation 6 February 2014 The era of hacks and cyber regulation We trust that you are well versed with the details of the various cyber-attacks that made the headlines towards the end of 2014, and early this year,

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015 Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 4 of the the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S

More information

2015 No. 1945 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Credit Information) Regulations 2015

2015 No. 1945 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Credit Information) Regulations 2015 S T A T U T O R Y I N S T R U M E N T S 2015 No. 1945 FINANCIAL SERVICES AND MARKETS The Small and Medium Sized Business (Credit Information) Regulations 2015 Made - - - - 26th November 2015 Coming into

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

Data breach notification guide: A guide to handling personal information security breaches

Data breach notification guide: A guide to handling personal information security breaches Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by

More information

Chapter 2. Key issues and committee view

Chapter 2. Key issues and committee view Chapter 2 Key issues and committee view 2.1 The submissions received by the inquiry overwhelmingly supported the establishment of the ASBFE Ombudsman position, and its proposed role of supporting small

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

EXTENDING UNFAIR CONTRACT TERM PROTECTIONS TO SMALL BUSINESS EXPOSURE DRAFT LEGISLATION

EXTENDING UNFAIR CONTRACT TERM PROTECTIONS TO SMALL BUSINESS EXPOSURE DRAFT LEGISLATION Ms Shakira Jones Consumer Policy Framework Unit Small Business Competition and Consumer Policy Division The Treasury Langton Crescent PARKES ACT 2600 Email: AustralianConsumerLaw@treasury.gov.au 14 May

More information

Plumbing and Drainage Regulation 2012

Plumbing and Drainage Regulation 2012 Regulatory Impact Statement Subordinate Legislation Act 1989 Plumbing and Drainage Regulation 2012 A regulation under the Plumbing and Drainage Act 2011 April 2012 Enquiries to: NSW Fair Trading Policy

More information

NATIONAL COMPLIANCE AND ENFORCEMENT POLICY

NATIONAL COMPLIANCE AND ENFORCEMENT POLICY 1. Introduction NATIONAL COMPLIANCE AND ENFORCEMENT POLICY The Commonwealth, state and territory governments have agreed to harmonised work health and safety laws to improve work health and safety, provide

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

Cyber-safety for Senior Australians. Inquiry Submission

Cyber-safety for Senior Australians. Inquiry Submission SUBMISSION NO. 32 Cyber-safety for Senior Australians Inquiry Submission The AISA Response to the Parliament s Joint Select Committee s call for submissions Date 23 March 2012 Page 1 Executive Summary:

More information

COMMISSION REGULATION (EU) No /.. of XXX

COMMISSION REGULATION (EU) No /.. of XXX EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy

More information

Overview of the Impact of the Privacy Reforms on Credit Reporting

Overview of the Impact of the Privacy Reforms on Credit Reporting Overview of the Impact of the Privacy Reforms on Credit Reporting June 2012 Andrew Galvin, Partner 1 OVERVIEW 1.1 Credit Reporting Reform - Background When initially passed, the Privacy Act 1988 essentially

More information

Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner

Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner Submission of the Office of the Data Protection Commissioner (DPC) on the data-sharing and Governance Bill: - Policy Proposals (dated the 1 st of August 2014) Public Consultation regarding Data Sharing

More information

Queensland Taxi Security Camera Program Changes

Queensland Taxi Security Camera Program Changes Queensland Taxi Security Camera Program Changes Frequently Asked Questions GENERAL INFORMATION 1. What is the taxi security camera program? It is a program administered by the Department of Transport and

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Finance Platforms) Regulations 2015

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Finance Platforms) Regulations 2015 Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 5 of the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S T R

More information

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate Privacy, Data Security & Information Use September 16, 2010 Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate by John L. Nicholson and Meighan E. O'Reardon Effective

More information

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 AUSTRALIAN HUMAN RIGHTS COMMISSION SUBMISSION TO THE PARLIAMENTARY JOINT COMMITTEE ON INTELLIGENCE AND

More information

ATO Submission Inquiry into penalties for white collar crime

ATO Submission Inquiry into penalties for white collar crime ATO Submission Inquiry into penalties for white collar crime Senate Economics References Committee 1 April 2016 EXTERNAL UNCLASSIFIED Table of Contents Introduction... 3 Executive summary... 3 The scope

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

Unfair Dismissal Overview Definitions What is a dismissal? Constructive Dismissal not What is unfair dismissal? unfairly dismissed

Unfair Dismissal Overview Definitions What is a dismissal? Constructive Dismissal not What is unfair dismissal? unfairly dismissed Unfair Dismissal Overview This module contains information on the new unfair dismissal laws and covers off the following matters: Definitions surrounding unfair dismissal The Small Business Fair Dismissal

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

Personally controlled electronic health record (ehealth record) system

Personally controlled electronic health record (ehealth record) system Personally controlled electronic health record (ehealth record) system ehealth record System Operator Audit report Information Privacy Principles audit Section 27(1)(h) Privacy Act 1988 Audit undertaken:

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this

More information

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00 Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,

More information

NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH

NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH Council of Australian Governments An agreement between the Commonwealth of Australia and the States and Territories, being: The State of New South Wales The State

More information

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation

More information

E-PRIVACY DIRECTIVE: Personal Data Breach Notification

E-PRIVACY DIRECTIVE: Personal Data Breach Notification E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou digital@beuc.eu Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification

More information

Data Protection Working Group. Final Report on the Draft Data Protection Bill

Data Protection Working Group. Final Report on the Draft Data Protection Bill Data Protection Working Group Final Report on the Draft Data Protection Bill Background In August 2009, upon a request from the Hon. Attorney General, the Governor-in-Cabinet established a Data Protection

More information

Data Security Breach Management - A Guide

Data Security Breach Management - A Guide DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information

Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations

Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:

More information

Disciplinary and Dismissals Policy

Disciplinary and Dismissals Policy Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary

More information

Privacy business resource 3

Privacy business resource 3 Privacy business resource 3 June 2013 Credit reporting what has changed As part of the reforms to the Privacy Act 1988 (Privacy Act), credit reporting in Australia is regulated by a new Part IIIA. 1 The

More information

DATA BREACH NOTIFICATION IN AUSTRALIA

DATA BREACH NOTIFICATION IN AUSTRALIA DATA BREACH NOTIFICATION IN AUSTRALIA Introduction The first data breach notification law (DBNL) was introduced in California in 2002 (and enacted in 2003). Since that time, similar laws have been introduced

More information

www.corrs.com.au OFFSHORING Data the new privacy laws

www.corrs.com.au OFFSHORING Data the new privacy laws www.corrs.com.au OFFSHORING Data the new privacy laws OFFSHORING DATA THE NEW PRIVACY LAWS Transfer of data by Australian organisations to other jurisdictions is increasingly common. This is a result of

More information

AISA Position Statement: Mandatory Data Breach Notification in Australia

AISA Position Statement: Mandatory Data Breach Notification in Australia AISA Position Statement: Mandatory Data Breach Notification in Australia Overview Although AISA members are broadly in support of mandatory data breach notification in Australia they have a number of concerns

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

FACS Community Complaints Guidelines for Ageing and Disability Direct Services

FACS Community Complaints Guidelines for Ageing and Disability Direct Services FACS Community Complaints Guidelines for Ageing and Disability Direct Services Summary: This is designed to guide FACS staff when handling community complaints and is an extension of the FACS Community

More information

Identity Cards Act 2006

Identity Cards Act 2006 Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration

More information

PERSONAL INJURIES PROCEEDINGS BILL 2002

PERSONAL INJURIES PROCEEDINGS BILL 2002 1 PERSONAL INJURIES PROCEEDINGS BILL 2002 EXPLANATORY NOTES General Outline Purpose of legislation The main purpose of this Act is to facilitate the ongoing affordability of insurance through appropriate

More information

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

Financial Services (Banking Reform) Act 2013

Financial Services (Banking Reform) Act 2013 Financial Services (Banking Reform) Act 2013 CHAPTER 33 26.75 Financial Services (Banking Reform) Act 2013 CHAPTER 33 CONTENTS PART 1 RING-FENCING Ring-fencing 1 Objectives of Prudential Regulation Authority

More information

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31 THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control

More information

Issue #5 July 9, 2015

Issue #5 July 9, 2015 Issue #5 July 9, 2015 Breach Response Plans by Lyndsay A. Wasser, CIPP/C, Co-Chair Privacy Privacy breaches can occur despite an organization s best efforts to prevent them. When such incidents arise,

More information

Financial Adviser Regulations Discretionary Investment Management Services and Custody

Financial Adviser Regulations Discretionary Investment Management Services and Custody Financial Adviser Regulations Discretionary Investment Management Services and Custody MBIE-MAKO-6101733 ISBN 978-0-478-41375-5 Crown Copyright First Published July 2013 Corporate Law Labour and Commercial

More information

Data Protection in Ireland

Data Protection in Ireland Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair

More information

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014 Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date

More information

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber

More information

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.

More information

FINANCIAL ADVISERS REGULATION: VOLUNTARY AUTHORISATION

FINANCIAL ADVISERS REGULATION: VOLUNTARY AUTHORISATION OFFICE OF THE MINISTER OF COMMERCE The Chair CABINET ECONOMIC GROWTH AND INFRASTRUCTURE COMMITTEE FINANCIAL ADVISERS REGULATION: VOLUNTARY AUTHORISATION PROPOSAL 1 I propose that regulations be promulgated

More information

The Regulatory Framework Gene Technology Act 2000 (Cth) and the Gene Technology Bill 2001 (WA)

The Regulatory Framework Gene Technology Act 2000 (Cth) and the Gene Technology Bill 2001 (WA) For Who s Benefit? - Evaluating Genetically Modified Organisms in Western Australia from a Different Perspective Conference held by Conservation Council WA 10 October 2002 The Regulatory Framework Gene

More information

SECOND READING SPEECH

SECOND READING SPEECH SECOND READING SPEECH Ambulance Service Amendment Bill 2013 Mr Speaker The purpose of this Bill is to amend the Ambulance Service Act 1982 to better reflect contemporary ambulance practice and to provide

More information

Opinion Statement of the CFE. on the proposed Directive. on the fight against fraud to the EU s financial interests. by means of criminal law

Opinion Statement of the CFE. on the proposed Directive. on the fight against fraud to the EU s financial interests. by means of criminal law Opinion Statement of the CFE on the proposed Directive on the fight against fraud to the EU s financial interests by means of criminal law COM(2012)363 Prepared by the CFE Fiscal Committee Submitted to

More information

Securing safe, clean drinking water for all

Securing safe, clean drinking water for all Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament

More information

Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002

Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002 Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002 Act No. 24 of 2002 Queensland PERSONAL INJURIES PROCEEDINGS ACT 2002 TABLE OF PROVISIONS Section Page CHAPTER 1 PRELIMINARY PART 1 INTRODUCTION 1 Short

More information

CONSULTATION PAPER NO 2. 2004

CONSULTATION PAPER NO 2. 2004 CONSULTATION PAPER NO 2. 2004 REGULATION OF GENERAL INSURANCE MEDIATION BUSINESS This consultation paper explains the need for the Island to regulate general insurance mediation business and examines the

More information

APRA S FIT AND PROPER REQUIREMENTS

APRA S FIT AND PROPER REQUIREMENTS APRA S FIT AND PROPER REQUIREMENTS Consultation Paper Australian Prudential Regulation Authority PREAMBLE APRA was created out of the Government s financial sector reforms that were implemented as a result

More information

Public Consultation: Expanded use of automated processes by IP Australia

Public Consultation: Expanded use of automated processes by IP Australia Public Consultation: Expanded use of automated processes by IP Australia June 2015 Copyright All content in this publication is provided under a Creative Commons Attribution 4.0 International (CC BY 4.0)

More information

Insurance Law Reforms and Requirements for Direct Offshore Foreign Insurers ("DOFIs")

Insurance Law Reforms and Requirements for Direct Offshore Foreign Insurers (DOFIs) Insurance Law Reforms and Requirements for Direct Offshore Foreign Insurers ("DOFIs") The Clayton Utz contact for this document is Fred Hawke, Partner Clayton Utz Lawyers Level 18 333 Collins Street Melbourne

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Submission by AFA Pty Ltd on the development of new Terms of Reference for the Financial Ombudsman Service

Submission by AFA Pty Ltd on the development of new Terms of Reference for the Financial Ombudsman Service Submission by AFA Pty Ltd on the development of new Terms of Reference for the Financial Ombudsman Service Preamble AFA Pty Ltd does not operate as an insurer in its own right, but offers its products

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection

More information

Helpful Tips. Privacy Breach Guidelines. September 2010

Helpful Tips. Privacy Breach Guidelines. September 2010 Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information

More information

Response to Insurance Contracts Amendment Bill 2013. December 2012. Submission on behalf of Legal Aid NSW. Consumer Action Law Centre,

Response to Insurance Contracts Amendment Bill 2013. December 2012. Submission on behalf of Legal Aid NSW. Consumer Action Law Centre, Response to Insurance Contracts Amendment Bill 2013 December 2012 Submission on behalf of Legal Aid NSW Consumer Action Law Centre, Insurance Law Service & Consumer Representatives to Treasury Introduction

More information

Information security management guidelines

Information security management guidelines Information security management guidelines Agency cyber security responsibilities when transacting online with the public Version 2.1 Approved July 2014 Amended April 2015 Commonwealth of Australia 2013

More information

FINANCIAL SERVICE PROVIDERS (REGISTRATION) REGULATIONS

FINANCIAL SERVICE PROVIDERS (REGISTRATION) REGULATIONS 1 OFFICE OF THE MINISTER OF COMMERCE The Chair CABINET ECONOMIC GROWTH AND INFRASTRUCTURE COMMITTEE FINANCIAL SERVICE PROVIDERS (REGISTRATION) REGULATIONS PROPOSAL 1 This paper seeks Cabinet approval for

More information

Data Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014

Data Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014 Data Protection Avoiding Information Commissioner Fines Caroline Egan 5 June 2014 Why is data protection a hot topic in pensions? Pension schemes hold large amounts of personal data Individuals more aware

More information

ANZ Expense Manager TERMS AND CONDITIONS 03.10

ANZ Expense Manager TERMS AND CONDITIONS 03.10 ANZ Expense Manager TERMS AND CONDITIONS 03.10 Contents 1 Introduction 4 2 Defined Terms 4 2.1 Interpretation 7 2.2 Customer More Than One Person 8 3 Provision of ANZ Expense Manager 8 4 ANZ Expense Manager

More information

International money transfers public interest determination applications. Consultation paper

International money transfers public interest determination applications. Consultation paper International money transfers public interest determination applications Consultation paper Closing date for comment 4 August 2014 Purpose of consultation paper The Office of the Australian Information

More information

Whistleblowing. Some Relevant Considerations

Whistleblowing. Some Relevant Considerations Whistleblowing Some Relevant Considerations Contents Whistleblowing: some ethical and legal considerations 2 What is whistleblowing? 3 Whistleblowing duty 4 Whistleblowing in the Accounting Professional

More information

Fitness industry guide to the code of practice

Fitness industry guide to the code of practice Government of Western Australia Department of Commerce Fitness industry guide to the code of practice An overview for the fitness industry Acknowledgements The fitness industry code of practice was developed

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

CSR Breach Reporting Service Frequently Asked Questions

CSR Breach Reporting Service Frequently Asked Questions CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could

More information