Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Understanding Data Regulations in Australia’s Telecom Sector

Contributors

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Syeda Eimaan Gardezi

Associate Data Privacy Analyst at Securiti

Listen to the content

1. Introduction

Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast amounts of personal information. Consequently,  navigating the complex landscape of data regulations is essential to ensure compliance and maintain consumer trust.  In this regard, the Privacy Act 1988 (APA), the Telecommunications Act 1997 (Telecom Act) and the Telecommunications (Interception and Access) Act 1979 (TIA Act) are pivotal to establishing clear obligations for how telecom entities collect, use, store, and disclose personal information while upholding privacy and security standards across the industry.

2. Understanding the Regime

At the core of this framework are two key types of entities: carriers and carriage service providers. Carriers are licensed operators that own and maintain the infrastructure for delivering phone and internet services. These entities are registered with the Australian Communications and Media Authority (ACMA). Carriage service providers, on the other hand, deliver services directly to consumers using a carrier’s infrastructure and are usually the primary handlers of consumer data. Collectively, these entities can be referred to as “telecom entities”.

Privacy protections are primarily governed by the APA, supported by the Telecom Act and the TIA Act. These laws work together to ensure that personal information is handled in accordance with the Australian Privacy Principles (APPs). The APA applies to telecom entities handling personal or sensitive information. Moreover, the Telecom Act also includes strong safeguards to ensure that privacy protections under the APA are not undermined by changes in telecommunications practices. It states industry codes and standards cannot override the APA or any registered APP code. Additionally, industry bodies are allowed to develop voluntary codes, which may cover areas like telecommunications and telemarketing. These codes must be fair and not overly burdensome. Before registering any such code, the ACMA must consult the Office of the Australian Information Commissioner (OAIC) if data privacy is involved.

The OAIC plays a key oversight role when it comes to data privacy. It provides guidance on the data privacy aspects of industry codes and standards developed under the Telecom Act, advises on record-keeping obligations, and contributes to the development of authorisation formats for law enforcement access to telecommunications data. It also monitors how retained telecommunications data is managed, treating it as personal information under the APA.

3. Data Security in the Telecom Sector

A. Security Mechanisms

Under the Australian Privacy Act (APA), telecom entities are required to take "reasonable steps" to implement technical, physical, and organisational security measures to protect personal information.  For context, personal information means information or an opinion about an identified or reasonably identifiable individual, whether true or not, and whether recorded or not.

While the APA does not impose explicit obligations on third parties, its scope extends to any entity that 'holds' personal information—interpreted broadly to include not only those in physical possession of the data, such as outsourced service providers, but also those exercising control over it. As a result, third parties involved in processing personal information cannot evade accountability and are expected to adopt appropriate security safeguards in alignment with the APPs.

Securiti’s Data Security Posture Management empowers organizations to mitigate data breach risks, safeguard data sharing, and enhance compliance while minimizing the cost and complexity of implementing data controls.

B. Data Minimization

Although the APA does not include a standalone provision on data minimization, the principle is embedded within its broader framework. Under the APPs,  telecom entities are required to collect personal information only when it is reasonably necessary for one or more of their functions or activities, and the collection must be carried out by lawful and fair means. This effectively imposes a data minimization obligation, restricting excessive or unnecessary data collection.

Securiti’s Sensitive Data Intelligence module uses AI to identify and remove unnecessary data, reducing storage costs and ensuring compliance with retention policies​.

C. Data Breach

The Notifiable Data Breaches (NDB) Scheme under the APA imposes significant accountability on telecom entities when managing data breaches. The OAIC should be notified within 72 hours of discovering a data breach likely to create the risk of serious harm. Failure to meet this expectation may trigger regulatory scrutiny or enforcement action, particularly if delays appear unreasonable. Affected individuals must also be notified without undue delay, even if done in phases.

Beyond notification, the APA places a continuing obligation on telecom entities to implement and maintain effective systems and procedures for identifying, containing, and mitigating breaches. This underscores that compliance is not merely reactive but requires a proactive data breach response strategy, with direct implications for governance, risk management, and reputational integrity.

Securiti’s Breach Management solution automates breach notifications and compliance actions, providing incident response workflows that help organizations respond to privacy incidents promptly and effectively.

D. Impact Assessment

Under the APA, the OAIC holds the authority to direct agencies to conduct impact assessments where appropriate. While not mandatory for all organizations, conducting an impact assessment is strongly encouraged, particularly when initiating new projects or significantly altering existing data-handling practices. A well-executed impact assessment is not merely a procedural exercise; it serves as a strategic tool to:

  • identifying privacy risks;
  • assess compliance;
  • engage with affected parties to understand their privacy concerns and expectations; and
  • implement safeguards.

Failure to carry out impact assessments in high-risk scenarios can expose organizations to regulatory criticism, reputational harm, and increased legal vulnerability.

Securiti’s Assessment solution helps organizations evaluate their internal protocols, ensuring the necessary technical and organizational measures are in place to prevent human errors. 

E. Data Protection Officer (DPO)

The APA does not require the appointment of a DPO. However, appointing a dedicated privacy officer or function is considered best practice, particularly for organisations that handle large volumes of personal information or engage in high-risk processing activities. Doing so signals a proactive commitment to privacy governance and can enhance internal accountability, improve incident response capabilities, and support ongoing compliance with the APPs. In the absence of a legal obligation, the failure to assign clear privacy responsibilities may hinder an organisation’s ability to manage risks effectively and respond to regulatory scrutiny.

Securiti’s Data Mapping module can equip Data Protection Officers with tools to uphold stringent data security and governance protocols to catalog and map all data processing activities

F. Data Retention & Record of Processing Activities (ROPA)

While the APA does not impose a direct obligation to maintain a Record of Processing Activities (ROPA), it does require taking reasonable steps to destroy or de-identify personal information once it is no longer required for a lawful purpose. This principle implicitly encourages good data inventory and lifecycle management practices.

Moreover, as per the TIA,  telecom entities must retain certain types of data—such as call times, sender and recipient details, and location data—for a minimum of two years. Although this excludes the content of communications, its storage must comply with privacy and data protection requirements under the APA.

Additionally, certain records, such as those about warrants, authorisations, ministerial notices, and international production orders, must generally be retained for at least three years or until reviewed by the Ombudsman, reinforcing transparency and oversight in surveillance activities.

Furthermore, the ACMA has the power to prescribe specific record-keeping rules for carriers, including standards for how records are created, stored, and reported.

Securiti’s Sensitive Data Intelligence module uses AI to identify and remove unnecessary data, reducing storage costs and ensuring compliance with retention policies​. 

G. Data Disclosure

The Telecom Act and the APA work together to regulate the use and disclosure of telecommunications data in Australia. Generally, disclosure of information that is obtained during the supply of telecom services is not allowed under the Telecom Act, unless an exception applies. If information is disclosed due to an exception, then a  record must be maintained of disclosure and the OAIC is responsible for enforcing compliance with this obligation.

Moreover, disclosures to foreign authorities are permitted if an international agreement exists and the request complies with the APA. Before approving a disclosure, authorised officers must ensure it is justified and proportionate, considering factors such as the seriousness of the matter and the relevance of the data. This ensures consistent privacy protections while allowing necessary data sharing in limited and controlled circumstances.

Detailed guidance regarding disclosures for telecom entities has been given by the OAIC here.

Securiti’s Sensitive Data Intelligence module uses AI to identify and remove unnecessary data, reducing storage costs and ensuring compliance with retention policies​. 

4. Data Privacy in the Telecom Sector

A. Lawful basis of processing

Under the APA, telecom entities are permitted to collect personal information only when it is reasonably necessary for their functions or activities, and the collection must be carried out by lawful and fair means. This principle not only limits the scope of data collection but also reinforces the broader obligation of transparency and accountability in data handling.

Moreover, telecom entities are expected to implement open and transparent practices, such as privacy policies and collection notices, to inform individuals about how their data is being managed.

Securiti’s Data Privacy solution automates compliance with evolving global privacy regulations and principles.

As per the APA, consent is essential in certain situations—particularly when collecting sensitive information or using personal information for a secondary purpose. Consent must be voluntary, informed, current, and specific, and individuals must have the capacity to give it. Consent can be express (given clearly through words or actions), or implied (where it's reasonable to infer consent from circumstances). Importantly, individuals have the right to withdraw their consent at any time, and organisations must respect that withdrawal for all future uses.

The APA contains a more detailed list of information that would be categorized as sensitive. It includes  information or an opinion about an individual’s:

  • racial or ethnic origin;
  • political opinions, religious beliefs or affiliations;
  • philosophical beliefs;
  •  membership of a professional or trade association and unions;
  • sexual orientation or practices; criminal record;
  • health information;
  • genetic information;
  • biometric information used for automated biometric verification or biometric identification; or
  • biometric templates.

Beyond the APA, telecom entities must also comply with the Spam Act 2003, which makes consent a legal prerequisite for sending commercial electronic messages. If a telecom entity engages in sending commercial electronic messages, it must meet three key requirements:

  • obtain the recipient’s consent to send the message;
  • clearly identify the sender and provide accurate contact details; and
  • contain a functional unsubscribe facility, allowing recipients to opt out easily.

Securiti’s Consent Module automates consent tracking and management, simplifying the management of first-party and third-party consent and enabling organizations to obtain, record, track, and manage individuals' explicit consent.

C. DSR

The APA grants individuals key rights that include the right to access their personal information held by an organisation and to request corrections where the information is inaccurate, out-of-date, incomplete, irrelevant, or misleading. These rights impose active obligations to respond to access and correction requests in a timely and transparent manner. Failing to do so may not only breach the APPs, but also expose telecom entities to complaints and potential regulatory action. Ensuring accessible mechanisms for individuals to exercise these rights is therefore critical to maintaining legal compliance and public trust.

Securiti’s Data Subject Rights Management solution automates handling requests like access, deletion, and correction. It streamlines request tracking, identity verification, and secure data transfer, ensuring timely compliance and reducing administrative workload.

D. Privacy Policy

Under the APA, telecom entities—like all APP entities—are required to maintain a clearly expressed and up-to-date privacy policy that outlines how they manage personal information. This policy must be made freely available and presented in an accessible format suitable for the target audience. The policy must include:

  • the organization's name and contact details;
  • types of personal information collected;
  • collection and storage methods
  • reasons for data collection;
  • usage and disclosure of personal information;
  • access and correction procedures
  • complaint process for mishandling; and
  • potential overseas disclosures and, if possible, the countries involved.

An incomplete or inaccessible privacy policy not only increases legal risk but can also damage public trust and customer confidence.

Securiti’s Privacy Policy and Notice Management enables organizations to rapidly build and deploy privacy notices, automate updates, and easily manage hundreds of privacy and cookie policies and notices via a unified privacy dashboard.

E. Vendors

Telecom entities engaging contracted service providers are expected to include specific contractual clauses prohibiting the service provider from doing anything that would result in a breach of the APPs. This reflects a broader principle of privacy by contract, where written agreements become a central mechanism for ensuring third-party compliance and managing legal risk. The absence of such controls may expose entities to liability, particularly in cases of offshore outsourcing or cloud services where direct oversight is limited.

Securiti’s Vendor Risk Management solution automates vendor risk assessments, enabling organizations to assess third-party privacy risks, track subcontractor engagements, and provide automated alerts, supplier assessments, and security audits for ongoing third-party risk monitoring.

F. Cross-border data transfer

As per  the APA, data can be transferred to a third country. However, the recipient country must have a law or binding rules that protect personal information, similar to the safeguards employed by Australia.

Moreover, a telecom entity that discloses personal information to an overseas recipient remains accountable for any actions or practices of the recipient that would violate the APPs unless certain exceptions apply. Other legal grounds for data transfers include:

  • compliance with Australian laws or court orders;
  • explicit consent from the data subject, with acknowledgment of the lack of APP enforcement; or
  • transfers by Commonwealth Government agencies under international agreements or for enforcement activities.

Furthermore, disclosure is permitted in the following circumstances:

  • lessening or preventing a serious threat to life, health or safety;
  • taking appropriate action in relation to suspected unlawful activity or serious misconduct;
  • locating a person reported as missing;
  • necessary for a diplomatic or consular function or activity; and
  • necessary for certain defence force activities outside Australia.

Securiti’s Data Access Governance (DAG) tool allows organizations to oversee and manage access to personal data across different jurisdictions. 

5. Data Governance in the Telecom Sector

Data governance involves developing and maintaining robust frameworks to manage data quality, accountability, and compliance with regulatory requirements. Telecom entities are expected to establish internal governance structures that define data ownership, oversight responsibilities, and procedures for ensuring the accuracy, consistency, and lifecycle management of data. These frameworks must align with the APA, Telecom Act and the TIA Act, which impose obligations around personal information handling and data retention. Telecom entities are also required to build systems that support traceability and auditing, particularly for retained data and disclosures made under lawful requests. Developing such frameworks enables telecom entities to meet compliance obligations, strengthen operational transparency, and ensure readiness for regulatory review or security incidents.

Securiti’s Data Governance provides a unified approach to managing data assets, ensuring compliance, security, and data quality across the organization. It automates policies, access controls, and data lifecycle management, enabling transparent, accountable, and consistent data practices aligned with regulatory standards.

6. AI in the Telecom Sector

While Australia does not yet have a dedicated, comprehensive Artificial Intelligence (AI) law, regulatory attention is increasingly focused on the responsible use of AI across sectors—including telecommunications. For telecom entities deploying AI systems to manage networks, enhance customer service, or automate decision-making, existing laws such as the APA or Australian Consumer Law apply by default. Although voluntary, the AI Ethics Principles published by the government offer guidance on best practices for responsible AI use. The eight core principles are:

  1. Human, Social and Environmental Wellbeing: AI should benefit individuals and society, contributing positively to sustainability and human dignity.
  2. Human-Centred Values: AI should respect human rights, diversity, and autonomy.
  3. Fairness: AI systems must avoid bias, ensure equitable treatment, and support inclusive outcomes.
  4. Privacy Protection and Security: AI should uphold privacy rights and provide robust data governance.
  5. Reliability and Safety: Systems must perform reliably and safely throughout their lifecycle.
  6. Transparency and Explainability: Decisions made by AI should be understandable and traceable by humans.
  7. Contestability: Individuals should be able to challenge and seek remedies for adverse decisions made by AI.
  8. Accountability: There must be clear responsibility and governance frameworks to manage AI risks.

Moreover, Australia’s Voluntary AI Safety Standard outlines 10 non-binding guardrails for the safe use of high-risk AI systems, such as generative and foundation models. These include testing for harm, managing incidents, securing systems by design, and maintaining human accountability. It’s also important to ensure lawful use, protect children, disclose risks, and verify safety through independent evaluations. While not mandatory, these standards support best practices in sectors like telecom.

Looking ahead, the Department of Industry, Science and Resources has been engaging in public consultations on AI regulation. The telecom sector—given its data intensity and infrastructure role—is expected to face more defined regulatory obligations as Australia moves toward formalizing its AI regulatory framework. In the meantime, telecom entities must ensure AI use aligns with current privacy, consumer protection, and ethical standards.

Securiti's AI Security & Governance module protects AI systems by managing data security, privacy, and compliance, ensuring safe and ethical AI operations. 

7. Conclusion

Legacy methods of processing and securing user data are impractical for telecommunications providers owing to the sheer volume and variety of data they handle. Additionally, with recent developments in AI and privacy laws evolving at an accelerating rate, it makes both operational and regulatory sense to leverage automated tools to ensure swift compliance with regulatory updates.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data+AI. It provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Several of the world's most reputable corporations rely on Securiti's Data Command Center for their data security, privacy, governance, and compliance needs.

The Data Command Center comes equipped with several individual modules and solutions designed to ensure effective compliance with various obligations placed on them by data privacy regulations. These include privacy policy management, cookie consent management, breach management, data mapping, vendor management, universal consent, and DSR automation, among several others. Additionally, telecom operators can gain critical real-time insights into the state of their regulatory compliance with respect to all relevant provisions of each data privacy regulation they're subject to via a centralized dashboard that enables proactive adjustments.

Request a demo today and learn more about how Securiti can help telecommunications providers comply with any major existing and forthcoming data privacy and protection regulations.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New