Data breaches and the law
- 02 January, 2013 12:00
As a society, we’re sharing more information electronically and transacting more in the digital world than ever before. Personal information is being collected and stored in ways that was never previously possible, whether it’s Facebook photos shared by friends or medical records that are kept electronically. That information has the capacity to live on long after we die. Therefore, laws making it mandatory to report data security breaches are crucial to protecting confidential information in the 21st century.
In October, Attorney-General Nicola Roxon issued a discussion paper entitled Australian Privacy Breach Notification, which looks at the notification requirements that government agencies and large private-sector organisations should have in place when they suffer a data breach. The ICT industry has been calling for laws around mandatory data breach reporting for some time, and a conversation at government level is long overdue.
There are currently no mandatory requirements under Australian law to report data breaches. While companies are encouraged to disclose the details of a data breach, it’s not compulsory. Statistics tell us that many breaches go unreported and therefore unnoticed. This makes it easy for breached data to be misused. If reporting were mandatory, those whose data had been breached would have a better chance of taking steps to mitigate the effects of the breach. For example, by changing their password or cancelling their credit card if those details had been stolen.
However, there should be express exemptions to mandatory reporting if the breached data was adequately encrypted. If data is encrypted properly, using the right algorithm, then it really isn’t at risk if it is illegally accessed or used; it will be computationally infeasible to ‘break’ the encryption and all you need to do to destroy that data is to destroy the encryption key associated with it.
Experience in places like the US has shown that mandatory data breach disclosure laws that include an express exemption for encrypted data also spur on the ICT security industry and create a real incentive for organisations to invest in network and data security systems, dramatically reducing the overall impact of breaches. With some areas of the economy now softening, it makes sense for the government to enact laws which encourage growth in other areas, like the ICT sector.
While there are arguments both for and against mandatory reporting, the sheer amount of data that is stored electronically means that laws around data breaches are essential to ensure that organisations are accountable for protecting the data they hold.
The discussion paper has called for consultation and discussion on a number of key areas, including:
- Which privacy breaches should be reported? Should ‘minor breaches’ be exempted and, if so, how should a minor breach be measured?
- Who should decide on whether the breach should be disclosed – the affected organisation or the regulator?
- How soon should the breach be reported and what should the penalties be?
The paper has the potential to lead to the introduction of a regime ensuring responsible data management across Australia. Privacy is no doubt a major issue and we absolutely need laws which properly address it.
Hayden Delaney is a senior associate with law firm HopgoodGanim.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
Traversing Energy Markets
For a number of industries, there is room for delays caused by poor performance of IT infrastructure, and the importance of a solid monitoring system has never been greater. Read about how the Midcontinent Independent System Operator was able to tackle this challenge and effectively administer one of the world’s largest energy markets.
Taking Managed Security Services to the Next Level
In this white paper, we will outline the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.