{"id":162,"date":"2023-08-01T16:25:25","date_gmt":"2023-08-01T06:55:25","guid":{"rendered":"http:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/?p=162"},"modified":"2025-11-20T13:12:54","modified_gmt":"2025-11-20T02:42:54","slug":"perspectives-2-the-obligation-to-protect-australian-law-and-the-requirements-to-protect-personal-information","status":"publish","type":"post","link":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/2023\/08\/01\/perspectives-2-the-obligation-to-protect-australian-law-and-the-requirements-to-protect-personal-information\/","title":{"rendered":"The Obligation to Protect: Australian law and the requirement to protect personal information"},"content":{"rendered":"<h3><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Data breaches are becoming increasingly frequent and can involve the information of millions of Australians. Does Australian law say enough about how information should be protected?<\/span><\/h3>\n<h4>Joel Lisk, Research Associate (Space &amp; Regulation), Jeff Bleich Centre<\/h4>\n<h5>Policy Perspectives #2,\u00a0July 2023 | <a href=\"https:\/\/fac.flinders.edu.au\/bitstreams\/f48270f0-62ba-447b-859f-8927bfc231a6\/download\">Download this Policy Perspective<\/a><\/h5>\n<p><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Data breaches have been increasing in frequency in recent years and Australians have not been immune. The last 12 months have seen massive data breaches involving Australian companies entrusted with personal information on hundreds of thousands to millions of individuals. Recent data breaches have brought the issue of data protection into common conversation. Medibank Private, a large private health insurer, suffered a breach in 2022 that has involved an estimated <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.theguardian.com\/australia-news\/2022\/dec\/01\/medibank-hackers-announce-case-closed-and-dump-huge-data-file-on-dark-web\" target=\"_blank\" rel=\"noopener noreferrer\">9.7 million current and former customers<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.abc.net.au\/news\/2022-10-01\/optus-data-hack-australians-waiting\/101486874\" target=\"_blank\" rel=\"noopener noreferrer\">Optus was victim of an attack that compromised the personal information on 9.4 million individuals (including drivers licences and passports)<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.theguardian.com\/australia-news\/2023\/mar\/27\/latitude-financial-cyber-data-breach-hack-14m-customer-records-stolen\" target=\"_blank\" rel=\"noopener noreferrer\">Latitude Financial announced that it had been the victim of a cyber attach in March 2023<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\"> that compromised the personal information of 14 million customers and saw the release of identity documents dating back to 2005. In April 2023, hackers targeted a different type of entity, <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.theguardian.com\/australia-news\/2023\/jun\/26\/hwl-ebsworth-hack-sensitive-information-from-dozens-of-government-agencies-may-be-compromised\" target=\"_blank\" rel=\"noopener noreferrer\">stealing 2.6TB of data \u2013 including personal information and sensitive client documents \u2013 from large law firm, HWL Ebsworth.<\/a><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">These recent and large-scale data breaches are not isolated. The Australian Cyber Security Centre <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/acsc-annual-cyber-threat-report-july-2021-june-2022\" target=\"_blank\" rel=\"noopener noreferrer\">reported that it received 76,000 cybercrime notifications in the 2021-2022 Financial Year<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. These statistics, along with the recent large scale data breaches, has led to serious questions being asked about the measures that businesses employ to protect the personal information they collect, hold and process, but what does the law say? And should it say more?<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><strong><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Privacy Law<\/span><\/strong><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">There is no broad, economy wide requirement on businesses to protect the personal information they hold. Saying this, there are some requirements in the <\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Privacy Act<\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. The <\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Privacy Act<\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">, originally introduced in 1988 and amended over time, sets out the legal obligations of a range of entities \u2013 primarily businesses in Australia \u2013 with respect to personal information. It is important to recognise, personal information is not any and all information related to an individual, it is information about an identified or reasonably <\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">identifiable individual. This means that there are substantial volumes of data that are not directly regulated or are subject to narrower regulation (like the protection of information in the <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.legislation.gov.au\/Latest\/C2021C00475\" target=\"_blank\" rel=\"noopener noreferrer\">My Health Records system<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">).<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">The <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/read-the-australian-privacy-principles#australian-privacy-principle-11-security-of-personal-information\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Act requires that businesses take reasonable steps in the circumstances<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\"> to prevent personal information from being misused, interfered with, lost or from being the subject of unauthorised access, modification or disclosure. This obligation applies to personal information irrespective of its form \u2013 so both digital and hard copy information must be protected.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><strong><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">So, how should information be protected?<\/span><\/strong><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">While the Privacy Act\u2019s requirement to protect personal information is important, it is far from specific and this intentional. The vague paraphrasing allows those that hold personal information to decide the measures they deem to be reasonable in their circumstances. This means that a small family retail business that only sells from their physical shop front can employ different data protection mechanisms to that of their bank with millions of customers. In practice, the regulator, <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/australian-privacy-principles-guidelines\/chapter-11-app-11-security-of-personal-information\" target=\"_blank\" rel=\"noopener noreferrer\">the Office of the Australian Information Commissioner, recommends<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\"> that businesses consider the nature of information they hold and implement appropriate organisational, technical and physical measures. Again, this is not overly specific, but does suggest that businesses should create a culture that protects personal information, use technology to protect personal information and physically secure personal information when necessary.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><strong><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Is vague enough?<\/span><\/strong><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Understandably, in the context of the recent large scale data breaches, the Privacy Act has been subject to a degree of scrutiny with the prevailing question being \u2013 is the law doing enough?<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Internationally, data protection is an important issue. Some would know that the European Union\u2019s General Data Protection Regulation is renowned for containing strong protections for individuals. Recent laws in other countries including New Zealand, the United Kingdom and several US States have also started to put greater emphasis on protecting the individual.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">At the time of writing, the Privacy Act is under review and the <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.ag.gov.au\/rights-and-protections\/publications\/privacy-act-review-report\" target=\"_blank\" rel=\"noopener noreferrer\">generality of the information protection requirements has been recognised<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. This has included the suggestion that the text of the law make specific reference to technical and organisational measures and that retaining a non-specific law protects the flexibility of the law. At the same time, there have been calls for the law to also include a set of \u2018baseline\u2019 outcomes, much like the European Union\u2019s approach that lists out <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/gdpr-info.eu\/art-32-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u2018appropriate\u2019 measures that can be used<\/a><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. The risk with this approach is that once \u2018minimum\u2019 measures are specified, they might become the only measures a business employs to protect personal information.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Relevant to the discussion on whether Australia&#8217;s law currently does enough is the broader landscape. As noted earlier, the Privacy Act is not the only instrument that regulates consumer information in Australia. In 2019, the Australian Government introduced a regime known broadly as the &#8216;<a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.cdr.gov.au\/what-is-cdr\" target=\"_blank\" rel=\"noopener noreferrer\">Consumer Data Right<\/a>&#8216;. The purpose of this regime was to increase data portability and ensure individuals had greater access to the personal information that exists about them. The Consumer Data Right is far from ubiquitous though and only applies to the banking and energy sectors at the time of writing. The framework for the Consumer Data Right is dense and prescriptive. While there is a vague top level obligation to protect information falling within the four corners of the Consumer Data Right regime, the statutory rules that govern the operation of the scheme are far more prescriptive. These rules include obligations around the design and implementation of governance frameworks for Consumer Data Right information, minimum information security control standards (which <\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">includes requirements to use multi-factor authentication, encryption and system vulnerability management, amongst other things). The specificity of this regime when it comes to protection obligations is extremely far from the general obligation contained within the <\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Privacy Act<\/span><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">. In many respects, this reflects the specific and sensitive nature of the information falling within the Consumer Data Right regime, but does suggest that the Australian Government is willing and capable of imposing stricter standards on the holders of personal information in the right circumstances.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Whatever the ultimate decision of the best approach is, any change in obligation will impact millions of Australians in an increasingly precarious technological landscape where information is valuable.<\/span><\/p>\n<p><a href=\"https:\/\/fac.flinders.edu.au\/bitstreams\/f48270f0-62ba-447b-859f-8927bfc231a6\/download\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-164 size-medium\" src=\"http:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-content\/uploads\/sites\/99\/2023\/07\/Download-This-Policy-Perspective-300x112.png\" alt=\"\" width=\"300\" height=\"112\" srcset=\"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-content\/uploads\/sites\/99\/2023\/07\/Download-This-Policy-Perspective-300x112.png 300w, https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-content\/uploads\/sites\/99\/2023\/07\/Download-This-Policy-Perspective-768x288.png 768w, https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-content\/uploads\/sites\/99\/2023\/07\/Download-This-Policy-Perspective.png 945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><strong><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Further Reading<\/span><\/strong><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">For further analysis of Australia data protection laws, please see Joel Lisk, &#8216;Data Security in Australia: The Obligation to Protect&#8217; (2023) 97 (10)\u00a0<em>Australian Law Journal\u00a0<\/em>749.<\/span><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Australian Cyber Security Centre, Annual Cyber Threat Report: July 2023 to June 2022, Australian Signals Directorate (4 November 2022) <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/acsc-annual-cyber-threat-report-july-2021-june-2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/acsc-annual-cyber-threat-report-july-2021-june-2022<\/a><\/p>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Attorney-General\u2019s Department, Privacy Act Review: Report 2022, Australian Government (16 February 2023) <\/span><a class=\"WdYUQQ text-decoration-underline text-strikethrough-none\" href=\"https:\/\/www.ag.gov.au\/rights-and-protections\/publications\/privacy-act-review-report\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ag.gov.au\/rights-and-protections\/publications\/privacy-act-review-report<\/a><\/p>\n<hr \/>\n<h3 class=\"_04xlpA direction-ltr align-center para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">Joel Lisk is a Research Associate with the Jeff Bleich Centre.<\/span><\/h3>\n<p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"WdYUQQ text-decoration-none text-strikethrough-none\">His research focuses on the ways that nations approach the regulation of technology, with a focus on digital technology and outer space. Joel writes on topics in areas such as space regulation, competition and consumer protection law and data protection.<\/span><\/p>\n<p><a href=\"https:\/\/www.flinders.edu.au\/people\/joel.lisk\">Researcher Profile<\/a> | <a href=\"mailto:joel.lisk@flinders.edu.au\">Email<\/a> | <a href=\"http:\/\/twitter.com\/JoelLisk\">Twitter<\/a> | <a href=\"http:\/\/linkedin.com\/in\/joellisk\/\">LinkedIn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches are becoming increasingly frequent and can involve the information of millions of Australians. Does Australian law say enough about how information should be protected? [&hellip;]<\/p>\n","protected":false},"author":5005,"featured_media":163,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[624,621,453],"tags":[452],"class_list":["post-162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defence-security-space","category-disruptive-technologies","category-policy-perspectives","tag-policy-perspectives"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/posts\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/users\/5005"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/comments?post=162"}],"version-history":[{"count":0,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/posts\/162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/media\/163"}],"wp:attachment":[{"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/media?parent=162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/categories?post=162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.flinders.edu.au\/jeff-bleich-centre\/wp-json\/wp\/v2\/tags?post=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}