Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Stricter Penalties for Privacy Breaches In Australia

Published December 6, 2022
Author

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

This post is also available in: Brazilian Portuguese

According to the Office of the Australian Information Commissioner (OAIC), a whopping 24 data breaches were reported that impacted 5,000 or more Australians in the year 2022 in Australia.

The OAIC reported that more than half of the breaches occurred due to malicious or criminal cyber-attacks. Against this backdrop, on 28th November 2022, Australia passed the Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022 (“Amendment Bill’) and is now awaiting the Royal Assent.

The Amendment Bill prescribes harsh fines for organizations violating their privacy commitments in Australia as per the amended expanded scope of the Privacy Act 1988. This modification heralds a move toward stricter regulation and more severe penalties in an effort to discourage businesses from flouting the law and regulatory requirements. The Amendment Bill provides the following substantial changes to the Privacy Act 1988:

Enhanced Penalties

As per Section 13G of the Privacy Act, any act by an entity or person that causes “serious or even repeated interference” with an individual or a group of individuals' privacy is in contravention of the Privacy Act and is liable to a civil penalty.

Currently, the amount of civil penalty for “serious or repeated interferences with privacy” is AUD 2.22 million. However, now the Amendment Bill provides the following penalties for any serious or even repeated interference with privacy by a body corporate:

  • 50,000,000 AUD;
  • three times the value of any benefit obtained through the misuse of information; or
  • 30% of a company's adjusted turnover in the breach turnover period.

The ‘adjusted turnover’ is calculated by taking a sum of the values of all the supplies that the company has made, or is likely to make, during the breach period. The breach turnover period means any time period longer than the following:

  1. the period of 12 months ending at the end of the month in which the violation (contravention) ceased, or proceedings in relation to the contravention was instituted (whichever is earlier); or
  2. The period:
    1. starting at the beginning of the month in which the contravention occurred or began occurring; and
    2. ending at the same time as the period determined under (1).

For unincorporated entities, the Amendment Bill has prescribed the penalty from the current maximum of AUD 440,000 to AUD 2.5 million.

Stricter Enforcement Powers

The Amendment Bill also amends the Australian Information Commissioner Act 2010 to provide the Office of the Australian Information Commissioner (OAIC) with enhanced enforcement powers. The Amendment Bill enhanced the following Commissioner’s powers, among others:

  1. Expanded the types of declarations that the Commissioner can make in a determination at the conclusion of an investigation;
  2. Amended the extraterritorial jurisdiction of the Privacy Act to ensure foreign organizations that carry on a business in Australia must meet the obligations under the Privacy Act, even if they do not collect or hold Australians’ information directly from a source in Australia (organizations will no longer be required to collect or hold personal information within Australia in order for the Privacy Act to apply.); and
  3. Strengthened the Notifiable Data Breaches scheme to ensure the Commissioner has comprehensive knowledge of the information compromised in an eligible data breach to assess the particular risk of harm to individuals.

With regards to the last point, the Amendment Bill provides that the Commissioner may obtain information or documents in relation to actual or suspected eligible data breaches. The Commissioner can also retain, keep or make copies of the documents provided by the person or entity. With regards to the determination of conduct that interferes with the privacy of an individual or group of individuals, the Commissioner can now require the person or entity to prepare and publish, or communicate, a statement about such conduct.

Sharing of Information with other Relevant Authorities and Public

In addition to this, as per the Amendment Bill, the Commissioner can also share information and the documents received with other relevant authorities for the performance of functions and duties.

The relevant authorities include enforcement, alternative tribunal, or a state or public level authority. The Commissioner will also be able to disclose the information if it is essential to the public interest after determining the rights and interests of the complainants, and whether such disclosure would impact an ongoing investigation or any other enforcement-related activity, etc.

The Amendment Bill also amends the Australian Communications and Media Authority (ACMA) Act 2005 to provide ACMA with enhanced information-sharing powers.

How Securiti Can Help?

The Amendment Bill provides significant changes to the privacy framework in Australia by adding stricter penalties for data breaches. Businesses operating in Australia should consider the added obligations to ensure full compliance with the Privacy Act’s Notifiable Data Breaches scheme.

Securiti harnesses AI to deliver organizations with an automated breach management system that enables them to seamlessly gather incident reports, identify the scope of the incident, and optimize notification for risk mitigation and compliance with the Privacy Act.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
View More
Databricks AI Summit (DAIS) 2025 Wrap Up
5 New Developments in Databricks and How Securiti Customers Benefit Concerns over the risk of leaking sensitive data are currently the number one blocker...
Inside Echoleak View More
Inside Echoleak
How Indirect Prompt Injections Exploit the AI Layer and How to Secure Your Data What is Echoleak? Echoleak (CVE-2025-32711) is a vulnerability discovered in...
What is AI Security Posture Management (AI-SPM)? View More
What is AI Security Posture Management (AI-SPM)?
AI SPM stands for AI Security Posture Management. It represents a comprehensive approach to ensure the security and integrity of AI systems throughout the...
View More
Data Security & GDPR Compliance: What You Need to Know
Learn the importance of data security in ensuring GDPR compliance. Implement robust data security measures to prevent non-compliance with the GDPR.
Beyond DLP: Guide to Modern Data Protection with DSPM View More
Beyond DLP: Guide to Modern Data Protection with DSPM
Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.
Mastering Cookie Consent: Global Compliance & Customer Trust View More
Mastering Cookie Consent: Global Compliance & Customer Trust
Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.
Understanding Data Regulations in Australia’s Telecom Sector View More
Understanding Data Regulations in Australia’s Telecom Sector
Gain insights into the key data regulations in Australia’s telecommunication sector. Learn how Securiti helps ensure swift compliance.
Top 3 Key Predictions on GenAI's Transformational Impact in 2025 View More
Top 3 Key Predictions on GenAI’s Transformational Impact in 2025
Discover how a leading Chief Data Officer (CDO) breaks down top predictions for GenAI’s transformative impact on operations and innovation in 2025.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New