Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Stricter Penalties for Privacy Breaches In Australia

Published December 6, 2022
Author

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

According to the Office of the Australian Information Commissioner (OAIC), a whopping 24 data breaches were reported that impacted 5,000 or more Australians in the year 2022 in Australia.

The OAIC reported that more than half of the breaches occurred due to malicious or criminal cyber-attacks. Against this backdrop, on 28th November 2022, Australia passed the Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022 (“Amendment Bill’) and is now awaiting the Royal Assent.

The Amendment Bill prescribes harsh fines for organizations violating their privacy commitments in Australia as per the amended expanded scope of the Privacy Act 1988. This modification heralds a move toward stricter regulation and more severe penalties in an effort to discourage businesses from flouting the law and regulatory requirements. The Amendment Bill provides the following substantial changes to the Privacy Act 1988:

Enhanced Penalties

As per Section 13G of the Privacy Act, any act by an entity or person that causes “serious or even repeated interference” with an individual or a group of individuals' privacy is in contravention of the Privacy Act and is liable to a civil penalty.

Currently, the amount of civil penalty for “serious or repeated interferences with privacy” is AUD 2.22 million. However, now the Amendment Bill provides the following penalties for any serious or even repeated interference with privacy by a body corporate:

  • 50,000,000 AUD;
  • three times the value of any benefit obtained through the misuse of information; or
  • 30% of a company's adjusted turnover in the breach turnover period.

The ‘adjusted turnover’ is calculated by taking a sum of the values of all the supplies that the company has made, or is likely to make, during the breach period. The breach turnover period means any time period longer than the following:

  1. the period of 12 months ending at the end of the month in which the violation (contravention) ceased, or proceedings in relation to the contravention was instituted (whichever is earlier); or
  2. The period:
    1. starting at the beginning of the month in which the contravention occurred or began occurring; and
    2. ending at the same time as the period determined under (1).

For unincorporated entities, the Amendment Bill has prescribed the penalty from the current maximum of AUD 440,000 to AUD 2.5 million.

Stricter Enforcement Powers

The Amendment Bill also amends the Australian Information Commissioner Act 2010 to provide the Office of the Australian Information Commissioner (OAIC) with enhanced enforcement powers. The Amendment Bill enhanced the following Commissioner’s powers, among others:

  1. Expanded the types of declarations that the Commissioner can make in a determination at the conclusion of an investigation;
  2. Amended the extraterritorial jurisdiction of the Privacy Act to ensure foreign organizations that carry on a business in Australia must meet the obligations under the Privacy Act, even if they do not collect or hold Australians’ information directly from a source in Australia (organizations will no longer be required to collect or hold personal information within Australia in order for the Privacy Act to apply.); and
  3. Strengthened the Notifiable Data Breaches scheme to ensure the Commissioner has comprehensive knowledge of the information compromised in an eligible data breach to assess the particular risk of harm to individuals.

With regards to the last point, the Amendment Bill provides that the Commissioner may obtain information or documents in relation to actual or suspected eligible data breaches. The Commissioner can also retain, keep or make copies of the documents provided by the person or entity. With regards to the determination of conduct that interferes with the privacy of an individual or group of individuals, the Commissioner can now require the person or entity to prepare and publish, or communicate, a statement about such conduct.

Sharing of Information with other Relevant Authorities and Public

In addition to this, as per the Amendment Bill, the Commissioner can also share information and the documents received with other relevant authorities for the performance of functions and duties.

The relevant authorities include enforcement, alternative tribunal, or a state or public level authority. The Commissioner will also be able to disclose the information if it is essential to the public interest after determining the rights and interests of the complainants, and whether such disclosure would impact an ongoing investigation or any other enforcement-related activity, etc.

The Amendment Bill also amends the Australian Communications and Media Authority (ACMA) Act 2005 to provide ACMA with enhanced information-sharing powers.

How Securiti Can Help?

The Amendment Bill provides significant changes to the privacy framework in Australia by adding stricter penalties for data breaches. Businesses operating in Australia should consider the added obligations to ensure full compliance with the Privacy Act’s Notifiable Data Breaches scheme.

Securiti harnesses AI to deliver organizations with an automated breach management system that enables them to seamlessly gather incident reports, identify the scope of the incident, and optimize notification for risk mitigation and compliance with the Privacy Act.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigation OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View
Spotlight 59:55

Building Safe
Enterprise AI

Watch Now View
Spotlight 55:55

Accelerate Microsoft 365 Copilot Adoption with Data Governance Controls

Jack Berkowitz
Watch Now View

Latest

Navigating the Evolving Data Security Landscape View More

Navigating the Evolving Data Security Landscape: Why Detection Alone Isn’t Enough

Proactive vs. Reactive: Why Threat Detection Alone Falls Short in Data Protection In an era where digital transformation and AI adoption are accelerating at...

Seven Tests Your Enterprise AI Must Pass View More

Seven Tests Your Enterprise AI Must Pass

AI and Generative AI (GenAI) are set to drive significant productivity and economic impact. IDC projects that they will contribute $19.9 trillion to the...

Copilot Readiness Assessment View More

Copilot Readiness Assessment: Preparing for AI-Powered Tools

Learn how a Copilot Readiness Assessment ensures your organization is prepared for AI integration, covering data governance, security, compliance, and copilot adoption strategies.

Understanding Microsoft Copilot Data Privacy Concerns View More

Understanding Microsoft Copilot Data Privacy Concerns

Learn about Microsoft Copilot data privacy concerns, including data handling, security risks, compliance challenges, and ways to ensure your organization's data remains safe.

Sensitive Personal Information (SPI) View More

Navigating Sensitive Personal Information (SPI) Under U.S. State Privacy Laws

Download the whitepaper to understand how U.S. state privacy laws define Sensitive Personal Information (SPI) and what governance requirements businesses must follow to ensure...

Navigating Data Regulations in the UAE Financial Services Industry View More

Navigating Data Regulations in the UAE Financial Services Industry

Download the whitepaper to explore key strategies and insights for navigating data regulations in the UAE's financial services industry. Learn about compliance with evolving...

View More

Navigating the New Hampshire’s Data Privacy Law (NHDPA): Key Details

Download the infographic to learn key details about New Hampshire's Data Privacy Law (NHDPA) and simplify your compliance journey with Securiti.

View More

Navigating the Kentucky Consumer Data Privacy Act (KCDPA): Key Details

Download the infographic to learn key details about Kentucky's Consumer Data Privacy Act (KCDPA) and simplify your compliance journey with Securiti.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New