May 8, 2025
Children’s privacy is a strong focus of privacy regulators. The COPPA Rules have been in place for some time and do provide protection for use of children’s data and privacy online. They are quite effective in protecting children’s online privacy and have been relied on in taking action against companies who collect children’s data. In Australia there is no fit for purpose regulation dealing with the protection of children’s privacy. While the e Safety Commissioner has peripheral responsibility, dealing with the sharing of images, the Privacy Commissioner has primary responsibility through the Privacy Act 1988. Last year the Australian Parliament amended the Privacy Act to provide for a Children’s Online Privacy Code which will come into effect on 10 December 2026. Australia is definitely behind the regulatory best practice when protecting children’s data. To emphasise that point the US Government has updated the COPPA rules, which will take effect on 23 June 2025.
While the Australian Children’s Code will have its own focus and emphasis and operate within the strictures of the Privacy Act it is worth being across COPPA Rules. Australian Codes are drafted in very broad and general terms.
Features of the updated COPPA Read the rest of this entry »
Posted in Privacy
|
Post a comment »
May 1, 2025
Another week, another attack on Australian companies. The latest trend is attack on bank related log ins. The latest is the theft of almost 100 staff log ins of staff at the Big Four Banks. Again the means of theft was via the infostealer malware which was on the staff’s personal devices.
The article provides:
Cybercriminals have stolen almost 100 staff logins from workers at Australia’s biggest banks, putting those businesses at higher risk of mass data theft and ransomware attacks, according to cyber security researchers.
The most serious risks arise from the fact that attackers could ultimately use those leaked logins to gain access to the banks’ corporate networks, they warned. Read the rest of this entry »
Posted in Privacy
|
1 Comment »
April 29, 2025
There has been another big data breach involvng 14,000 Commbank customers 7,000 ANZ customers. 5,000 NAB customers and 4,000 Westpac customers according to the ABC’s Banking passwords stolen from Australians are being traded online by cybercriminals. The passwords were stolen from users personal devices through the “infostealer” malware.
The article provides:
More than 31,000 passwords belonging to Australian customers of the Big Four banks are being shared amongst cyber criminals online, often for free, the ABC can reveal.
Despite the anti-fraud protections in place at those banks, cybersecurity experts warn victims could “definitely” lose money as a result. Read the rest of this entry »
Posted in Privacy
|
Post a comment »
April 23, 2025
The list of data breaches in Australia continues to grow. It is not extraordinary compared to similar countries like the United States, Canada and the United Kingdom. The exposure to regulatory action is greater now that the Privacy Act has been amended. Whether that comes to pass is the question. With the statutory tort of interference with privacy coming into effect on 10 June 2025 there may be exposure if the actions or omissions giving rise to the data breach were reckless.
The breaches, or at least those that we know Read the rest of this entry »
Posted in Privacy
|
Post a comment »
The EDPB has released a report titled AI Privacy Risks & Mitigations Large Language Models (LLMs). A dry title on an important issue.
The AI Privacy Risks & Mitigations Large Language Models (LLMs) report sets out a comprehensive risk management methodology for LLM systems and, importantly, mitigation measures for common privacy risks in LLM systems.
LLMs is another important advance in artificial intelligence. They process and generate human-like language trained on extensive datasets.
It is a long and very technical document but one that privacy practitioners should Read the rest of this entry »
Posted in Privacy
|
Post a comment »
April 17, 2025
Law firms are a prime target for data breaches. They hold significant personal information and sensitive information of corporations and government agencies. The UK Information Commissioner’s Office has imposed a very hefty fine of 60,000 pounds on the Merseyside-based DPP Law Ltd following a cyber attack in June 2022 which resulted in the loss of 32GB of data. The firm only became aware of this loss when it was contacted by the National Crime Agency which advised it that the data had been posted on the dark web. DPP Ltd had poor cyber security with a brute force attack being sufficient to gain access to an administrator’s account and then having the ability to move laterally across its network. That bespeaks a very rudimentary system. Then after being notified of the breach it regarded the loss of personal information as not constituing a personal data breach. It waited 43 days before notifying the ICO. It is a case study of what not to do. Which in fact the ICO has done in publicising the litany of errors committed.
The ICO media release provides:
We have fined Merseyside-based DPP Law Ltd (DPP) £60,000, following a cyber attack that led to highly sensitive and confidential personal information being published on the dark web.
We found DPP failed to put appropriate measures in place to ensure the security of personal information held electronically. This failure enabled cyber hackers to gain access to DPP’s network, via an infrequently used administrator account which lacked multi-factor authentication (MFA), and steal large volumes of data.
DPP specialises in law relating to crime, military, family fraud, sexual offences, and actions against the police. The very nature of this work means it is responsible for both highly sensitive and special category data, including legally privileged information. As the information stolen by the attackers revealed private details about identifiable individuals, DPP has a responsibility under the law to ensure it is properly protected.
Andy Curry, Director of Enforcement and Investigations (Interim), said:
“Our investigation revealed lapses in DPP’s security practices that left information vulnerable to unauthorised access.
“In publicising the errors which led to this cyber attack, we are once again highlighting the need for all organisations to continually assess their cybersecurity frameworks and act responsibly in putting in place robust measures to prevent similar incidents.
“Our investigation demonstrates we will hold organisations to account for a failure to notify where there was a clear obligation to do so at the time of the underlying incident.
“Data protection is not optional. It is a legal obligation, and this penalty should serve as a clear message: failure to protect the information people entrust to you carries serious monetary and reputational consequences.”
Cyber attack details
In June 2022, DPP suffered a cyber attack which affected access to the firm’s IT systems for over a week. A third-party consulting firm established that a brute force attempt gained access to an administrator account that was used to access a legacy case management system. This enabled cyber attackers to move laterally across DPP’s network and take over 32GB of data, a fact DPP only became aware of when the National Crime Agency contacted the firm to advise information relating to their clients had been posted on the dark web. DPP did not consider that the loss of access to personal information constituted a personal data breach, so did not report the incident to us until 43 days after they became aware of it.
You can read the full details of the incident in our monetary penalty notice.
Legal requirements and our guidance
The law requires organisations to take continual and proactive steps to protect themselves against cyber attack. This includes ensuring all IT systems have MFA or equivalent protection, regularly scanning for vulnerabilities and installing the latest security patches without delay.
We have detailed guidance to help organisations understand their security obligations, including the duty for all organisations to report personal data breaches.
Last year we published a cyber report, Learning from the mistakes of others, providing insights for people responsible for compliance with data protection legislation and cyber security at their organisation.
Australian firms have been hit with significant and damaging data breaches recently. The HWL Ebsworth data breach via a cyber attack in April 2023. resulted in approximately 2.2 million documents being affected. The Information Commissioner opened an investigation in February 2024, 14 months ago. There has been no public resolution of that investigation. It is the subject of a class action, with the National Justice Project is now representing 12 National Disability Insurance Scheme (NDIS) participants in a class action against HWL Ebsworth. In March cyberdaily reports in Brydens Lawyers suffers alleged 600GB data breach following ransomware attack that the firm had suffered a significant data breach in February 2025. Also in February 2025 Slater and Gordon suffered a humiliating data breach by Read the rest of this entry »
Posted in Privacy, UK Information Commissioner's Office
|
Post a comment »
April 11, 2025
The co ordinated attack on Australian Super Funds was always going to generate a lot of press. But despite what some cynics might suggest, the press need something to write a story. Unfortunately the handling of the data breach has been, at best, pedestrian. The first problem is the lag between discovering the breach and notifyng any authority. It is not mandatory to notify the police and under the mandatory data breach notification laws an affected organisation has up to 30 days (rather than the more rigorous 72 hours in the GDPR). That said the optics in Australia seems to be that prompt notification gives organisations some cover. According to the Australian
story Tony Burke goes soft on Big Super as cyber attack sinks into farce the organisations are confused as to what they did and when they did. The AFP was notified 5 days after the attack and says that the Victoria Police would lead the investigation. The Victoria Police is yet to formally investigate. The bigger concern is the evidence appearing that suggests that there were repeated warnings for the funds to strengthen their online security and nothing was done about it. Those warnings did not just come from agencies and organisations but also from customers who wanted multi factor authorisation and were fobbed off. Multiple regulators have Read the rest of this entry »
Posted in Privacy
|
Post a comment »
April 10, 2025
The statutory tort of interference with privacy comes into effect on 10 June 2025; 2 calendar months away.
The tort will be prospective only in effect and the limitations period is 1 year. It is the first time that individuals will have a stand alone right to take action in the Federal Magistrates Court for interference with their privacy; either or both intrusion upon seclusion or misuse of personal information. The actions in equity and negligence which may deal with privacy breaches remain in existence, which have no limit on general damages or right to aggravated damages. It will be interesting to see whether the tort is pleaded together with equitable causes of action.
Posted in Privacy
|
Post a comment »
The University of Western Sydney has suffered a data breach involving the loss of data of 10,000 individuals. It has posted a statement today which reveals that on 24 March 2025 it became aware of a post on the dark web referring to information taken from the university. That was over 2 weeks ago. The post itself was dated 1 November 2024, over 5 months ago. The University’s statement follows the usual pattern in Australia of saying it notified the various authorities. It lists those authorities. What it hasn’t done is notify the 10,000 current and former students but “expects to” do so. It is a fairly average notice, far below that which one would expect of a large organisation. It says very little in a lot of words. It concludes by Read the rest of this entry »
Posted in Privacy
|
Post a comment »
April 9, 2025
The National Institute of Standards and Technology have released an especially valuable document, the Incident Response Recommendations and Considerations for Cybersecurity Risk Management.
The abstract provides:
This publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities as described by the NIST Cybersecurity Framework (CSF) 2.0. Doing so can help organizations prepare for incident responses, reduce the number and impact of incidents that occur, and improve the efficiency and effectiveness of their incident detection, response, and recovery activities. Readers are encouraged to utilize online resources in conjunction with this document to access additional information on implementing these recommendations and considerations.
The Report provides a useful glossary for those reporting on or drafting protocols and procedures dealing with data breaches including:
- an event is any observable occurrence that involves computing assets, including physical and virtual platforms, networks, services, and cloud environments. Examples of events are user login attempts, the installation of software updates, and an application responding to a transaction request. Many events focus on security or have security implications.
- Adverse events are any events associated with a negative consequence regardless of cause, including natural disasters, power failures, or cybersecurity attacks. This guide addresses only adverse cybersecurity events.
- A cybersecurity incident is “…an occurrence that actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.” with such incidents including:
- Employing a botnet to send high volumes of connection requests to an internet-facing service, making it unavailable to legitimate service users
- Obtaining administrative credentials at a software-as-a-service provider, which puts sensitive tenant data entrusted to that provider at risk
- Intruding upon an organization’s business network to steal credentials and use them to instruct industrial control systems to shut down or destroy critical physical components, causing a major service disruption
- Deploying ransomware to prevent the use of computer systems and cause multiple data breaches by copying files from those systems
- Using phishing emails to compromise user accounts and using those accounts to commit financial fraud
- Identifying a new vulnerability in network management appliances and exploiting the vulnerability to gain unauthorized access to network communications
- Compromising a vendor’s software, which is subsequently distributed to customers in its compromised state
Regarding incident response roles and Read the rest of this entry »
Posted in Privacy
|
Post a comment »