Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Cookie Consent Requirements in Australia

Download: Consent Report Q2 2024
Contributors

Anas Baig

Product Marketing Manager at Securiti

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

This post is also available in: Brazilian Portuguese

Australia does not have any specific regulatory guidance on cookie consent requirements. However, the Australian Privacy Act of 1988 specifies certain notification and consent obligations that organizations should follow in order to deploy legally compliant cookie consent banners.

Let’s look into some of the requirements of the Privacy Act of 1988 that websites need to be mindful of while designing cookie consent banners and obtaining users’ consent for the use of cookies and similar tracking technologies.

1. When Notification to Data Subjects Should be Made

The Privacy Act includes 13 Australian Privacy Principles ('APPs'). The APP 1 mandates organizations subject to the APPs’ requirements to undertake such reasonable steps that ensure the entity’s compliance with the APPs.

The APP 5 requires organizations to take reasonable steps to either notify individuals or ensure that individuals are aware when their personal information is collected. The notification should be made at the time of or before the collection of personal information, provided where such is not practicable, the organization should deploy the notification as soon as practicable after the collection of data.

Personal information is defined as information or an opinion about an identified individual or an individual who is reasonably identifiable, whether the information or opinion is true or not and whether the information or opinion is recorded in a material form or not. Since cookies and similar tracking technologies can collect information about individuals, such technologies constitute personal information under the Privacy Act. In the Uber case, the Office of the Australian Information Commissioner (OAIC) held that the concept of the collection of personal information is broad and includes gathering, acquiring or obtaining personal information from any source and by any means, including from, individuals or other entities, or information associated with web browsing such as personal information collected through cookies.

Furthermore, the OAIC has made clear that where personal information is being collected through the use of a hidden radio-frequency identification tag (RFID tag), software (such as cookies), or biometric technology (such as voice or facial recognition), the data subjects must be adequately informed about the same.

Therefore, as a matter of best practice, organizations must display an adequate notification to website users before or at the time of the use of cookies and similar tracking technologies and the collection of personal information about data subjects with such technologies.

2. Content of the Notification

As per the APP 5, data subjects must be expressly informed of the following matters:

  • The covered entity’s identity and contact details,
  • The facts and circumstances of data collection where the data is collected from someone other than the individual or where the individual may not be aware that the covered entity has collected their personal information,
  • Whether the collection is required or authorized by a law or a court/tribunal order, and the name or details of the law or court/tribunal order,
  • The purposes of data collection (including the primary purpose which is the specific function for which the data is collected, and any secondary purpose - the specification of the latter will create a reasonable expectation for the data subject that their data will be used or disclosed for another purpose),
  • Any significant consequences that could result if personal information is not collected. For example, the individual must be informed if a different level of service will be provided if personal data is not provided to the organization. The individual must also be told if such consequences can be mitigated by providing some and not all personal information,
  • The entities to which such personal information is usually disclosed. Where it is impracticable to include a long list of entities, the type of entity should be described. For example, ‘health insurers,’ ‘state government motor vehicle licensing authorities,’ or ‘related bodies corporate,’
  • The availability of information in the organization’s privacy policy regarding access to the collected personal information, correction of such information if required, and complaint redressal mechanism for any breach of the Australian Privacy Principles or any applicable code,
  • Whether the entity is likely to disclose personal information to overseas recipients and, if practicable, the countries where they are located - otherwise, an organization may also specify a general region, such as, ‘EU countries.’

3. Format of the Notification

The notification to the data subject may be provided in layers with a full explanation to a brief refresher as individuals become more familiar with how the entity operates and how personal data is handled. Brief privacy notices on forms or signs may be supplemented by longer notices made available online or in brochures. In the case of the use of cookies, this can be achieved with the help of a cookie consent banner that provides essential information on the first information layer along with a link to the Cookie Preferences/Settings, which takes the user to the second information layer where more detailed information is provided to the data subject regarding the categories of cookies used, their purposes, storage periods, etc.

The OAIC has clarified that where it is not reasonable to notify the full range of matters in the notification, the organization should direct the data subject to specific sections of its privacy policy or any other document that contains relevant information and covers those matters sufficiently.

4. Re-Presentation of the Notice

The OAIC recommends that organizations re-present or re-show the notice to individuals if a long period has elapsed since the notice was shown to the data subject for the first time. This is so that the data subject is reminded of the collection and use of their personal information as well as their ability to consent or not. The notice must be re-presented to the data subject if there is any change in the circumstances as to how personal information is collected or the purposes of data collection.

Under the Privacy Act, the data subject’s consent can be express or implied. However, express consent is required for the use of sensitive personal information such as data related to health, race, criminal record or sexual orientation.

In any case, consent is considered valid if:

  • the individual is adequately informed, in plain English, of how their data shall be processed and the consequences of giving or not giving consent,
  • the individual provides consent voluntarily,
  • the consent is current (consent cannot be assumed indefinitely) and specific, and
  • the individual has the capacity to understand and communicate their consent - if a covered entity is not sure that an individual has the capacity to give consent, they should offer requisite support to such an individual, and if the support is insufficient, the entity may consider if someone can act on the individual’s behalf, provided the concerned individual is involved to the extent possible.

Consent may not be implied where an individual’s intention is ambiguous or there is any reasonable doubt regarding the individual's intention. Implied consent is considered valid only if most of the following conditions are met:

  • the individual is provided with a clear and prominent opt-out facility,
  • the opt-out option is freely and easily available to the data subject, and not bundled with other purposes,
  • the data subject is given information regarding what would happen if they do not opt-out, and such consequences are not serious,
  • it takes little effort for individuals to opt-out and the process is free or involves little cost,
  • it is likely that the individual received and read the information about the proposed collection, use or disclosure of their personal information, and the option to opt-out, and
  • if an individual opts-out at a later date, as far as practicable, they will be placed in the same position they would have been in if they had opted out earlier.

This means that for the use of cookies, websites can either obtain express consent with an opt-in banner having equally prominent accept and reject options, or implied consent with a prominent opt-out option whereby the user can reject the use of cookies.

Once consent is withdrawn by the data subject, the organization cannot rely on past consent for any future use or disclosure of personal information. An individual should be able to easily withdraw their consent at any time.

The OAIC recommends that covered entities should implement systems and procedures for obtaining and recording the consent of individuals.

6. Organization’s Privacy Policy

As per APP 1, a covered entity should maintain a clear and up-to-date privacy policy that specifies, amongst other things, the kind of personal information collected and maintained by the entity, how such information is collected and maintained, the purposes for which the information is collected, processed and disclosed, and whether the information is likely to be disclosed internationally. Therefore, as a matter of best practice, organizations must provide the link to their privacy policy on the cookie consent banner.

How Can Securiti Help?

In light of the above requirements, organizations are recommended to deploy a cookie consent banner for the use of cookies with an opt-out option, a link to the privacy policy of the company, and a link taking the data subjects to more detailed information regarding the use of cookies. Securiti’s Cookie Consent Management Solution enables you to achieve compliance with the help of the following features:

  • Scanning and auto-classification of cookies and similar tracking technologies,
  • Auto-blocking of non-essential cookies,
  • Legally compliant consent banner verbiage,
  • The ability to add the privacy policy URL on the cookie consent banner,
  • Compliance with leading industry frameworks such as GPC and IAB EU TCF, and
  • Updated and comprehensive consent records to help you demonstrate compliance.

Ask for a DEMO today to understand how Securiti can help you comply with the applicable legal requirements.


Key Takeaways:

  1. The content outlines the requirements and best practices for deploying cookie consent banners in Australia under the Privacy Act of 1988 and its Australian Privacy Principles (APPs).
    Here are the key takeaways:
  2. Notification Requirements Under the Privacy Act: Organizations must notify individuals when collecting personal information (which includes data collected via cookies and similar technologies) as per APP 1 and 5. The notification should occur at or before the data collection time, detailing how personal information is collected and used.
  3. Definition of Personal Information: The Privacy Act broadly defines personal information, including data collected through cookies. The OAIC's stance from the Uber case extends the definition to information gathered through web browsing and other digital tracking technologies.
  4. Content of Notification: Organizations must inform data subjects about various aspects of data collection, including the entity's identity, the purpose of data collection, the entities to which personal information is disclosed, and if the information will be disclosed internationally.
  5. Format and Re-presentation of the Notification: Notifications can be layered, with initial brief information supplemented by detailed disclosures in privacy policies or dedicated documents. Organizations are advised to re-present the notice periodically, especially when significant changes occur in data collection practices or purposes.
  6. Consent Requirements: The Privacy Act distinguishes between express and implied consent, emphasizing that consent must be informed, voluntary, specific, and current. For sensitive information, express consent is required. Conditions under which implied consent may be valid are outlined, focusing on the ease and freedom of opting out.
  7. Privacy Policy: Organizations must maintain an up-to-date privacy policy, detailing the kinds of personal information collected, the collection methods, purposes of collection, processing, and disclosure, including international disclosures.
  8. Securiti’s Cookie Consent Management Solution: Securiti offers a solution to help organizations comply with the Privacy Act's requirements for cookie consent. Features include scanning and auto-classification of cookies, auto-blocking of non-essential cookies, legally compliant consent banner wording, integration of privacy policy links, compliance with industry frameworks, and comprehensive consent records to demonstrate compliance.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

Pete Angstadt joins Securiti View More

Why I joined Securiti

I’m thrilled to be joining Securiti as they embark on their next phase of growth. Why did I decide to join? In short -...

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

Top Data Security Challenges & How to Solve Them View More

Top Data Security Challenges & How to Solve Them

Learn the top data security challenges organizations face today. Learn about the challenge and its solution. Enhance your data security posture today.

View More

How to Implement a Robust Data Security Framework

Data privacy regulations mandate strict data security measures. Learn how to implement a robust data security framework to ensure swift compliance.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

Why Data Access Is Your Weakest Link—And How DSPM Fixes It View More

Why Data Access Is Your Weakest Link—And How DSPM Fixes It

Learn how DSPM provides unified Data+AI Access governance, offering contextual data intelligence, automated controls, safe AI+data access, and consistent least-privilege enforcement.

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now View More

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now

Discover why shifting focus from AI risk to AI readiness is critical for enterprises. Learn how Data Security Posture Management (DSPM) empowers organizations to...

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New