Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Stricter Penalties for Privacy Breaches In Australia

Published December 6, 2022
Author

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

This post is also available in: Brazilian Portuguese

According to the Office of the Australian Information Commissioner (OAIC), a whopping 24 data breaches were reported that impacted 5,000 or more Australians in the year 2022 in Australia.

The OAIC reported that more than half of the breaches occurred due to malicious or criminal cyber-attacks. Against this backdrop, on 28th November 2022, Australia passed the Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022 (“Amendment Bill’) and is now awaiting the Royal Assent.

The Amendment Bill prescribes harsh fines for organizations violating their privacy commitments in Australia as per the amended expanded scope of the Privacy Act 1988. This modification heralds a move toward stricter regulation and more severe penalties in an effort to discourage businesses from flouting the law and regulatory requirements. The Amendment Bill provides the following substantial changes to the Privacy Act 1988:

Enhanced Penalties

As per Section 13G of the Privacy Act, any act by an entity or person that causes “serious or even repeated interference” with an individual or a group of individuals' privacy is in contravention of the Privacy Act and is liable to a civil penalty.

Currently, the amount of civil penalty for “serious or repeated interferences with privacy” is AUD 2.22 million. However, now the Amendment Bill provides the following penalties for any serious or even repeated interference with privacy by a body corporate:

  • 50,000,000 AUD;
  • three times the value of any benefit obtained through the misuse of information; or
  • 30% of a company's adjusted turnover in the breach turnover period.

The ‘adjusted turnover’ is calculated by taking a sum of the values of all the supplies that the company has made, or is likely to make, during the breach period. The breach turnover period means any time period longer than the following:

  1. the period of 12 months ending at the end of the month in which the violation (contravention) ceased, or proceedings in relation to the contravention was instituted (whichever is earlier); or
  2. The period:
    1. starting at the beginning of the month in which the contravention occurred or began occurring; and
    2. ending at the same time as the period determined under (1).

For unincorporated entities, the Amendment Bill has prescribed the penalty from the current maximum of AUD 440,000 to AUD 2.5 million.

Stricter Enforcement Powers

The Amendment Bill also amends the Australian Information Commissioner Act 2010 to provide the Office of the Australian Information Commissioner (OAIC) with enhanced enforcement powers. The Amendment Bill enhanced the following Commissioner’s powers, among others:

  1. Expanded the types of declarations that the Commissioner can make in a determination at the conclusion of an investigation;
  2. Amended the extraterritorial jurisdiction of the Privacy Act to ensure foreign organizations that carry on a business in Australia must meet the obligations under the Privacy Act, even if they do not collect or hold Australians’ information directly from a source in Australia (organizations will no longer be required to collect or hold personal information within Australia in order for the Privacy Act to apply.); and
  3. Strengthened the Notifiable Data Breaches scheme to ensure the Commissioner has comprehensive knowledge of the information compromised in an eligible data breach to assess the particular risk of harm to individuals.

With regards to the last point, the Amendment Bill provides that the Commissioner may obtain information or documents in relation to actual or suspected eligible data breaches. The Commissioner can also retain, keep or make copies of the documents provided by the person or entity. With regards to the determination of conduct that interferes with the privacy of an individual or group of individuals, the Commissioner can now require the person or entity to prepare and publish, or communicate, a statement about such conduct.

Sharing of Information with other Relevant Authorities and Public

In addition to this, as per the Amendment Bill, the Commissioner can also share information and the documents received with other relevant authorities for the performance of functions and duties.

The relevant authorities include enforcement, alternative tribunal, or a state or public level authority. The Commissioner will also be able to disclose the information if it is essential to the public interest after determining the rights and interests of the complainants, and whether such disclosure would impact an ongoing investigation or any other enforcement-related activity, etc.

The Amendment Bill also amends the Australian Communications and Media Authority (ACMA) Act 2005 to provide ACMA with enhanced information-sharing powers.

How Securiti Can Help?

The Amendment Bill provides significant changes to the privacy framework in Australia by adding stricter penalties for data breaches. Businesses operating in Australia should consider the added obligations to ensure full compliance with the Privacy Act’s Notifiable Data Breaches scheme.

Securiti harnesses AI to deliver organizations with an automated breach management system that enables them to seamlessly gather incident reports, identify the scope of the incident, and optimize notification for risk mitigation and compliance with the Privacy Act.

Request a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security for Financial Services: Turn Risk Into competitive Advantage
Financial services run on sensitive data. AI is now in fraud detection, underwriting, risk modelling, and customer service, raising both upside and risk. Institutions...
View More
Securiti and Databricks: Putting Sensitive Data Intelligence at the Heart of Modern Cybersecurity
Securiti is thrilled to partner with Databricks to extend Databricks Data Intelligence for Cybersecurity. This collaboration marks a pivotal moment for enterprise security, bringing...
View More
Navigating China’s AI Regulatory Landscape in 2025: What Businesses Need to Know
A 2025 guide to China’s AI rules - generative-AI measures, algorithm & deep-synthesis filings, PIPL data exports, CAC security reviews with a practical compliance...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
Retail Data & AI: A DSPM Playbook for Secure Innovation View More
Retail Data & AI: A DSPM Playbook for Secure Innovation
The resource guide discusses the data security challenges in the Retail sector, the real-world risk scenarios retail businesses face and how DSPM can play...
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New