Data breaches and the law
- 02 January, 2013 12:00
As a society, we’re sharing more information electronically and transacting more in the digital world than ever before. Personal information is being collected and stored in ways that was never previously possible, whether it’s Facebook photos shared by friends or medical records that are kept electronically. That information has the capacity to live on long after we die. Therefore, laws making it mandatory to report data security breaches are crucial to protecting confidential information in the 21st century.
In October, Attorney-General Nicola Roxon issued a discussion paper entitled Australian Privacy Breach Notification, which looks at the notification requirements that government agencies and large private-sector organisations should have in place when they suffer a data breach. The ICT industry has been calling for laws around mandatory data breach reporting for some time, and a conversation at government level is long overdue.
There are currently no mandatory requirements under Australian law to report data breaches. While companies are encouraged to disclose the details of a data breach, it’s not compulsory. Statistics tell us that many breaches go unreported and therefore unnoticed. This makes it easy for breached data to be misused. If reporting were mandatory, those whose data had been breached would have a better chance of taking steps to mitigate the effects of the breach. For example, by changing their password or cancelling their credit card if those details had been stolen.
However, there should be express exemptions to mandatory reporting if the breached data was adequately encrypted. If data is encrypted properly, using the right algorithm, then it really isn’t at risk if it is illegally accessed or used; it will be computationally infeasible to ‘break’ the encryption and all you need to do to destroy that data is to destroy the encryption key associated with it.
Experience in places like the US has shown that mandatory data breach disclosure laws that include an express exemption for encrypted data also spur on the ICT security industry and create a real incentive for organisations to invest in network and data security systems, dramatically reducing the overall impact of breaches. With some areas of the economy now softening, it makes sense for the government to enact laws which encourage growth in other areas, like the ICT sector.
While there are arguments both for and against mandatory reporting, the sheer amount of data that is stored electronically means that laws around data breaches are essential to ensure that organisations are accountable for protecting the data they hold.
The discussion paper has called for consultation and discussion on a number of key areas, including:
- Which privacy breaches should be reported? Should ‘minor breaches’ be exempted and, if so, how should a minor breach be measured?
- Who should decide on whether the breach should be disclosed – the affected organisation or the regulator?
- How soon should the breach be reported and what should the penalties be?
The paper has the potential to lead to the introduction of a regime ensuring responsible data management across Australia. Privacy is no doubt a major issue and we absolutely need laws which properly address it.
Hayden Delaney is a senior associate with law firm HopgoodGanim.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Managing Web Security in an Increasingly Challenging Threat Landscape
Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.
Building a Strategic Archive
For years, most companies have dealt with the evolving dynamics of data archiving by addressing an immediate need rather than building a long-term strategy. But over time, putting all information on costly storage is likely to be very expensive. This whitepaper explains why it’s time for organizations to start to strategically evaluate archive solutions for capabilities they need, both now and in the future. While no technology is future proof, an archiving solution can make you “future ready.”