by Adrian Chotar, James Patto and Annie Zhang
Although it is only the start of the storm, 2022 will be remembered as the year the devastating impacts of cybercrime really hit home for Australians.
With state actors and cybercriminals using data to commit extortion, espionage, and fraud in Australia - with no sign of abating - it is inevitable significant changes are afoot for both the public and private sectors. What we have seen to date is just the tip of the iceberg for what the future holds for the Australian private and public sector alike. In the last financial year, the Australian Cyber Security Centre (ACSC) received more than 76,000 cybercrime reports (one report every 7 minutes), which reflects an increase of nearly 13 per cent from the previous year.
Ransomware remains the most damaging tool used by threat actors when combined with the exfiltration and publication of personal and sensitive data. In fact, according to the ACSC, every sector of the Australian economy was impacted by ransomware this year. And as the Ransomware-as-a-Service (RaaS) business model continues to gather pace, all a threat actor needs is a way inside to deploy increasingly obtainable ransomware code into the target's systems. Further, with an average increase in cybercrime reporting costs up 14%, criminals have clearly clued into the prosperity of the Australian economy and the vulnerability of personal, business and government digital assets.
A spate of recent high-profile cyber attacks on prominent Australian-based businesses has pushed the dial to overdrive, kicking the Federal Government’s overhaul of the Australian privacy law into high gear. There have been several parallel proposals, reforms and review processes taking place in relation to privacy, data protection and cyber security regulation across the economy. With complex technology comes complex regulation and navigating the changing landscape is essential for business to remain secure not only in the present but to plan for the future. Set out below is a summary of the current state of play for cyber security laws and regulations in Australia.
The Attorney-General’s Department is in the process of undertaking a comprehensive review of the Privacy Act 1988 (Cth) with recommendations expected to be released prior to the end of 2022 and the resulting reforms likely to be implemented in 2023. In October 2021, following feedback and early consultation, a Discussion Paper was prepared to elicit further feedback on the proposals to reform the Privacy Act.
The reforms canvassed in the Discussion Paper are wide-ranging and significant, and signal a desire to strengthen the Privacy Act to align more closely with a GDPR-style regime.
Image: Key themes extrapolated by PwC from the Privacy Act Review Discussion Paper (October 2021)
Key highlights included:
In mid-January when speaking about the Privacy Act reforms, the Attorney-General described changes being considered as a range of 'modernisations'- which seemingly is signalling a move towards the European GDPR style model - with increased rights for individuals a centerpiece. Two key areas mentioned by the Attorney-General were:
It is evident from the Discussion Paper that the Australian Government is attempting to address the holes in the legislation as a result of burgeoning changes in the digital age. However, the Government cannot combat cyber threat actors alone – industry participants from corporate Australia must provide their firsthand experience to dealing with these criminals to help inform the development of legislation so that it remains realistic and achievable.
The Attorney-General is clearly looking at individuals rights as a key component of the Privacy Act Reforms.
In terms of the right to forget, whilst this seems simple, organisations will need to build relevant functionality into their systems and processes to receive and action these requests to delete the relevant personal information across all of their systems. In large diversified organisations with group-wide data sharing arrangements this can be a difficult task.
Similarly, guaranteeing deletion of information in complex IT environments where there are regular and diverse archives and backups is not straightforward. There is a risk that an organisation will not have actually 'forgotten' an individual if backups or archives still contain the personal information. This creates a conundrum where organisations are faced with the difficult decision of choosing between constantly amending archives and backups to remove data on request, or consider not backing up personal information holdings. This obviously in itself creates risk where organisations have obligations to protect personal information against loss of that information.
In terms of a right for individuals to take action for breach of privacy, organisations need to ask themselves, when (not if) they happen to be the victim of a cyber attack - are they taking 'reasonable measures' to protect personal information holdings? What are 'reasonable measures' in their circumstances? Is the organisation across how personal information is collected and stored in your organisation? Many organisations make the mistake of thinking that because they are across cyber security they are across privacy. Whilst cyber security is an important part of the privacy equation, privacy and data management goes well beyond cyber security.
With enhanced fines and these changes (and likely more on the way), organisations should seriously consider analysing their personal information management all the way from collection to destruction.
The Australian Prudential Regulation Authority (APRA) has its own set of Prudential Standards for the governance and management of cyber security risk, including:
Commencing on 12 October, the Telecommunications Amendment (Disclosure of Information for the Purpose of Cyber Security) Regulations 2022 (the Amendment) introduces further measures to protect consumers who are victims of a significant data breach, including giving the right for telco companies, under certain circumstances, to temporarily share sensitive data (e.g. government-related identifiers like driver’s licences, passport numbers) with financial institutions for up to 12 months following a data breach. This will allow financial institutions to implement enhanced monitoring and safeguarding of customers whose accounts may be susceptible to fraud, scam activity or identity theft.
The financial institutions wishing to receive this data must be APRA-regulated and must also satisfy robust information security requirements. The financial institutions must also make undertakings to the Australian Competition and Consumer Commission (ACCC) to honour their obligations under the Privacy Act, and that the information being sought must be necessary and proportionate, and will be destroyed when no longer required.
As showcased through the numerous sector-specific legislative requirements on cybersecurity, there is significant complexity in the Australian regulatory regime. The Australian Institute of Company Directors (AICD) demonstrates this in its Cyber Security Governance Principles, where it states that “depending on the industry these [regulatory requirements and standards] can be overlapping.” Organisations need to keep abreast of the notification requirements to each of relevant regulatory and reporting body, e.g. OAIC, APRA and ACSC (and Home Affairs) in the event of a cyber incident. Failure to report may result in significant penalties.
The TSSR amended the Telecommunications Act 1997 (Cth) in the following manner:
The Telecommunications (Carrier Licence Conditions—Security Information) Declaration 2022 was registered on 5 July 2022, and requires carriers and eligible CSPs to:
These requirements overlap with similar obligations contained in the Security of Critical Infrastructure Act 2018 (Cth) (SOCI Act).
Organisations need to be hyper aware of sector-specific cyber security obligations that coexist alongside the Privacy Act. Unfortunately, Australia’s patchwork of privacy laws means that cyber security requirements may overlap and create confusion. Alignment should be a key goal to ensure organisations can bolster cyber security compliance without confusion. Duplication of regulation results in organisations expending funds to effect “compliance for compliance’s sake”, rather than spending that money on effective protection measures.
The Australian government is, once again, playing catch up to the European Parliament, which recently approved the directive on measures for a high common level of cybersecurity across the Union (“NIS2 Directive”). The NIS2 Directive provides legal clarity and ensures coherence between the directive and sector-specific legislation.
The Coalition Bill was reintroduced to federal Parliament by the Shadow Minister for Home Affairs, Karen Andrews, as a private member's bill following its lapsing in April 2022 as a result of the dissolution of parliament due to the federal election. The Bill is intended to target perpetrators of ransomware attacks.
It would introduce:
The Labor Government could look to enact the Labor Bill which was introduced by then-Shadow Assistant Minister for Cyber Security, Tim Watts, as a private member’s bill in 2021 when in opposition.
Importantly, the Labor Bill proposed:
There has been a significant push from the Coalition to introduce tougher penalties for ransomware gangs to deter future cyberattacks. The new Labor government has not indicated a desire to adopt the Coalition Bill despite the Minister for Cyber Security highlighting an “urgent need to address the conditions that have allowed the two largest cyber attacks in our history to occur within the space of two months”. Interestingly, Labor was supportive of the intentions behind the Coalition Bill when it was in Opposition.
With ransomware assessed by the ACSC as the “most destructive cybercrime threat” facing the country, we expect the Albanese Government to swiftly address this gap in Australia legislation – perhaps as part of reforms arising out of its Privacy Act Review. There is ongoing debate around how government can look to disrupt the ransomware business model, including through making payment of ransom illegal. However there is substantial opposition to this as a proposed approach, as it is seen as further punishing the victim of criminal behaviour and would likely disproportionately impact small and medium sized business. It will be interesting to see how this debate evolves and whether this is something the government entertains as part of the reform process.
The Enforcement Act, which was passed by both houses of parliament on 28 November 2022 and came into effect on 13 December 2022, increased maximum penalties that can be applied under the Privacy Act 1988 for serious or repeated privacy breaches from the current $2.22 million penalty to whichever is the greater of:
The Enforcement Act also:
If the extraordinary changes to the Privacy Act laid out by the Enforcement Act (and enacted with such speed) is any indication of what’s to come from the Attorney-General’s Department, then the Australian privacy landscape may be in for a remarkable makeover. However, without a significant increase to OAIC funding, its ability to pursue such pecuniary penalties may be limited. It remains to be seen whether the financial threat will be viewed as a genuine deterrent by organisations.
In any event, it is clear that the recent data breaches have awoken the metaphorical bear and provoked the Government to take a harder stance than previously discussed during the Privacy Act reform process. However, industry bodies have warned against disproportionately severe penalties. There have been calls to introduce “safe harbour” provisions so that businesses that report in a timely way and act “in good faith” and “with due diligence” are exempt from penalties.
The original 2018 SOCI Act was focused on mitigating national security risks arising from foreign involvement, control or influence over Australia’s critical infrastructure. Over time, these risks have evolved and become more complex, with increased cyber connectivity and greater participation in, and reliance on, global supply chains (including with many services being outsourced or offshored).
In response to this, the Australian Government introduced various amendments to the SOCI Act in effort to enhance the existing framework. These reforms introduced a raft of new obligations, including obligations to:
Importantly, the reforms also extended the scope of the SOCI Act to now apply to 11 critical infrastructure sectors (from the original 4 critical infrastructure sectors (water, electricity, gas and ports)) and 22 critical infrastructure asset classes. Certain critical infrastructure assets can also be nominated by the Minister to be “Systems of National Significance”, which subjects the responsible entity of that asset to enhanced cyber security obligations.
In light of scope expansion, a greater number of organisations are now subject to the SOCI Act obligations than was previously the case, either directly or as part of a supply chain that has been impacted by these reforms.
It will be intriguing to see the first explicit public exercise of ‘step-in’ powers under the SOCI Act and the effect of a government agency’s input into a corporation’s operations. It is possible that ‘too many cooks in the kitchen’ could actually compromise an organisation’s ability to effectively and efficiently respond to a critical incident.
Against the backdrop of an increasingly complex and diversifying cybercrime ecosystem, it is critical that Australia’s regulatory framework surrounding privacy and cyber security operates efficiently and effectively, is fit-for-purpose and remains streamlined to avoid “compliance for compliance sake”. Duplication and complexity need to be minimised to avoid unnecessary red tape, which only results in diverting funds away from actual security-related activities that will uplift the ability for organisations to prevent these intrusions into their systems. Recent attacks on regulated entities serves as a reminder to organisations that due consideration must be had to all parts of Australia’s patchwork of privacy and cyber security laws – particularly given commentary from APRA that executive pay should be impacted when incidents of this nature occur.
Overall, the reforms, both proposed and enacted, reflect the Australian Government’s increasing efforts to enhance protections for personal information and risk resilience of Australian businesses as the economy looks to respond to new challenges in the digital era. With Home Affairs Minister Clare O’Neil recently announcing a program to develop a new cyber security strategy in Australia, it will be interesting to see if any accompanying legislative changes will emerge with, or as a result of, the new strategy. However, meaningful engagement from businesses who are in the process of dealing with cyber threats and adequate investment in regulators who are tasked with the mammoth job of working with industry to implement and enforce these regimes, will be essential for these reforms to be able to meet the government’s objectives.
1Financial services and markets; Communications; Data storage and processing; Defence; Food and grocery; Higher education and research; Health care and medical; Transport; Energy; Space technology; Aviation; Maritime transport; and Water and sewerage.
2Critical telecommunications asset; critical broadcasting asset; critical domain name system; critical data storage or processing asset; critical banking asset; critical superannuation asset; critical insurance asset; critical financial market infrastructure asset; critical water asset; critical electricity asset; critical gas asset; critical energy market operator asset; critical liquid fuel asset; critical hospital; critical education asset; critical food and grocery asset; critical port; critical freight infrastructure asset; critical freight services asset; critical public transport asset; critical aviation asset; a critical defence industry asset; an asset declared under section 5te of the SOCI Act to be a critical infrastructure asset; an asset prescribed by the rules.
The information contained in this article is general in nature, and is not intended to be a substitute for legal advice. Readers should obtain independent legal advice as to their specific circumstances.
James Patto