LexisNexis Practical Guidance®

Straightforward guidance across a range of topics

Overview

  • Global privacy and data protection strategy

  • Australian data protection strategy

  • Ensuring data protection compliance

Developing a strategy for cross jurisdictional compliance

To develop a strategy for cross jurisdictional privacy and data protection, it is necessary to build a functional understanding of the physical assets, information located and the activities taking place within each jurisdiction. It is also necessary have a functional understanding of the legal regime in each jurisdiction with particular attention to:

  • the regime protecting information and communications from unauthorized access or interception;
  • rules that prevent cross border transfers ("on soil requirements") and/or which impose requirements that apply before information can be sent or made accessible outside the jurisdiction;
  • the privacy regime and whether or not it could be used to protect information not collected from residents in the jurisdiction;
  • making sure that local privacy policies and the information handling practices are consistent with the local law relating to collection, use or processing, disclosure and destruction or de-identification; and
  • information regulations that apply to specific industry sectors that may be applicable to your business and or the business that are your customers.

See Developing a strategy for cross jurisdictional compliance.

Your strategy needs to consider a range of elements including:

  • making sure that the transfers and disclosures of information that are taking place are consistent with the laws and policies in place in the source jurisdiction; and
  • making sure that information is not being placed at risk by procedures or processes taking place in a location where there may be no effective legal remedy for a failure in compliance and/or where security procedures cannot be assured.

The US National Institute of Standards and Technology (NIST) Framework for improving critical infrastructure cybersecurity, which has been adopted by the Australian Government and ASIC, outlines that a resilient strategy should:

  • identify the security environment;
  • protect the security system;
  • detect security breaches;
  • incorporate a data breach response strategy; and
  • incorporate a recovery strategy following a data breach.

See Analysing your data and data flows.

See Anticipating issues and risks.

See Selecting local experts and asking the right questions.

Documenting, implementing and maintaining compliance

Generally, strong technical controls and procedures are used to help prevent information from being hacked or a system from being compromised by malware. Technical controls can be overcome with well targeted and sometimes simple efforts in social engineering. There is no point in having strong software, network security and well trained personnel if relevant physical assets are vulnerable due to low security awareness, poor business practices or vulnerable physical security.

It is important to maintain a needs-based information control system across the organization. Access controls must ensure that information is not available to those who have no good reason to access it. Your strategy also needs to guard against a determined insider — background checking, security training, a culture that encourages and rewards reporting, appropriate logging of access incidents and information used together with periodic auditing and penetration testing must form part of the picture.

See Documenting, implementing and maintaining compliance.

In this subtopic, we discuss your objectives in developing a global privacy and data protection strategy. We identify aspects of your business that should be considered, the information collected and processed and the location of that information. We describe considerations in carrying out data mapping, anticipated issues and risks and also provide guidance regarding the selection of local experts. Finally, we provide suggestions for implementing and maintaining compliance.

The aim of your Australian data protection strategy is to establish and maintain a culture of information security awareness and compliance within your organisation taking into account the Australian regulatory environment.

Securing information is not just protecting it from being accessed by third parties. A commonly used way to summarise the key objective is to refer to the “CIA” — Confidentiality, Integrity and Availability or, to avoid confusion with the USA Central Intelligence Agency, the “AIC” triad. The AIC triad is an important reminder that information security is not just about confidentiality but also recognising that information can lose its value if it cannot be trusted, perhaps because it has been compromised by error or deliberate interference or has not been maintained accurately. The lack of availability of information when required can have the same consequences as loss or loss of integrity.

The first step in the preparation of a data protection strategy is to understand the regulatory context in which you operate and identify applicable rules and guidelines. Next, you should identify the relevant classes of information that you need to protect, consider the risk exposure that accompanies each class of information and whether or not the measures currently in place are adequate having regard to the potential risk to your organisation.

See Developing a strategy for Australian data protection.

It is important to consider the components that make up a secure framework. It is a common mistake to focus on the protection of IT systems. While the protection of IT systems from unauthorised access and careful control of access privileges is a critical component, it is also necessary to consider employee related issues such as background checking, the terms and conditions of employment, the adequacy of training, supervision and audit. Control of the physical environment is also relevant.

See Procedures for implementation and Systems for improvement.

In this chapter, we step through the development of an Australian specific cybersecurity strategy having regard to the Australian regulatory context.

Perhaps the most difficult challenge in ensuring effective cybersecurity is making sure that the elements of your strategy are implemented in practice.

Allocation of responsibility

The analysis necessary to identify relevant information, relevant risks and the steps necessary to devise appropriate remediation procedures and solutions can be undertaken at a point in time as a discrete project. It is relatively straightforward to complete such a project, publish your policies and to conduct initial training. The temptation and natural tendency is to regard the completion of that work as a job done. This is particularly the case because your policies can serve as evidence of compliance and may even be referenced to clients as evidence of your awareness of the relevant issues and an indication of your commitment to cybersecurity.

See Allocation of responsibility.

Induction and training

Policies and procedures buried on the intranet or forgotten at the bottom of the drawer will not impact the cybersecurity risks faced by your organisation. In order to be effective policies and procedures must be integrated in data to day operations, be used in decision making and training, and be revised and updated in response to changes in technology, changes to the business and experience with risks and incidents. If not implemented, your well-documented strategy can serve as a benchmark available to be called upon as evidence of proper practice should a third party claim or formal investigation by a regulator take place as a result of a security incident. It is vital that your security strategy be embedded in the operational life cycle of your organisation.

See Induction and training.

Monitoring, testing and responding to change

In this subtopic, we discuss steps that you can take to embed your cybersecurity strategy and the management culture and business life cycle of your organisation. As part of the privacy operational life cycle, data protection compliance is achieved through the monitoring, auditing and communication aspects of the management framework, where:

  • monitoring identifies any gaps and weaknesses in an organisation's privacy program;
  • auditing ensures consistency, effectiveness and sustainment of the privacy practices; and
  • communication creates internal and external awareness of the privacy program, ensuring flexibility to respond to legislative and industry changes.

See Monitoring and testing and Responding to change.

Guidance

Show All Guidance

Checklists

  • Cybersecurity strategy — Checklist for remote working

    LexisNexis Legal Writer Team
  • EU general data protection regulation (GDPR) — Checklist for controller versus processor

    S. Sharma, Special Counsel and B. Tomlinson, Partner, Maddocks
  • Data security — Checklist for Disaster recovery planning

    A. Mitchell, Unisys
  • Data security — Checklist for Data security audit plan

    A. Mitchell, Unisys
  • Data security — Checklist for De-identification of personal information

    A. Mitchell, Unisys
  • Privacy — Checklist for Privacy policy

    S. Sharma, Special Counsel, Maddocks
  • Privacy — Internal privacy guidelines for staff

    S. Sharma, Special Counsel, Maddocks
  • Workflow Checklist: Assessing a suspected data breach

    D. Kneller, Madgwicks Lawyers
  • Checklist for Transfers of personal data outside the European Economic Area

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for Complying with both the Privacy Act and the GDPR

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for computer and device use

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Content of notification

    D. Kneller, Madgwicks Lawyers
  • Cybersecurity strategy — Checklist for Overall cybersecurity strategy

    P. Fair and S. Lee, Baker McKenzie
  • Data Breach Assessment Guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Data breach response guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Ensuring data protection compliance

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Exceptions to notification obligations

    D. Kneller, Madgwicks Lawyers
  • EU General Data Protection Regulation (GDPR) — Compliance checklist

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Workflow Checklist: Identifying when a data breach is notifiable

    D. Kneller, Madgwicks Lawyers
  • Threshold compliance checklist — GDPR and the Privacy Act

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Privacy by design — practical checklist

    S. Sharma, Maddocks
  • Privacy — Checklist for direct marketing

    S. Sharma and E. Lau, Maddocks
  • Checklist for Staff training on data protection compliance

    P. Fair and S. Lee, Baker McKenzie

Legislation

Latest Legal Updates

18 May 2020

No right to not hire or force staff to sign up to COVIDSafe app

18 May 2020

Cybercrime Squad detectives charge woman over unlawful digital currency exchange

15 May 2020

COVIDSafe privacy safeguards become law

14 May 2020

UK Supreme Court’s decision on vicarious liability for employee’s data breach highlights importance of robust organisational privacy policy, security and training for remote workers

07 May 2020

Privacy Awareness Week — Tips on staying secure from the Australian Information Commissioner and the Office of the Privacy Commissioner of Canada

06 May 2020

COVIDSafe draft legislation released

30 Apr 2020

Privacy class action representative complaint for Optus data breach made to the Australian Information Commissioner

28 Apr 2020

OAIC supports privacy protections in COVIDSafe contact tracing App

22 Apr 2020

ACSC warns cyber scams mount during COVID-19 crisis

16 Apr 2020

The Office of the Australian Information Commissioner reiterates importance of conducting Privacy Impact Assessments to assess privacy risks with remote working arrangements during COVID-19 pandemic

02 Apr 2020

Ongoing threat of COVID-19-related online scams and increased risk of notifiable data breaches

26 Mar 2020

Australian Signals Directorate issues cyber security warning for remote working in response to COVID-19

26 Mar 2020

Office of the Information Commissioner publishes guidance on privacy obligations during the COVID-19 pandemic

16 Mar 2020

Australian Information Commissioner brings action against Facebook for contravention of the Privacy Act

19 Feb 2020

Do you have access to Victorian Government information? Are you aware of the revised protective data security standards?

13 Feb 2020

Beneficial changes to credit reporting come into effect

12 Feb 2020

Optus pays largest infringement notice issued under the Spam Act for unwanted marketing messages

30 Jan 2020

Privacy (Australian Bushfires Disaster) Emergency Declaration (No. 1) 2020 enhances information-sharing about individuals affected by the Australian bushfires

09 Jan 2020

Pioneering Australian class action lawsuit for alleged breach of privacy settles

25 Nov 2019

All organistions should consider cybersupply risk management as part of their overall cyber strategy

18 Nov 2019

UK and US governments sign historic data-sharing agreement to speed up criminal investigations and prosecutions

27 Sep 2019

Consumer Data Right scheme introduces data portability for consumers

25 Sep 2019

Notifiable Data Breaches on the rise again — human error accounts for large proportion of breaches

01 Jul 2019

Watch our for these top 12 scam email subject lines

24 Jun 2019

ACSC’s Six Day Easy Step Guide to protect yourself from cyber criminals

17 Jun 2019

Has your personal information been lost, released or accessed without your permission? What steps can you take now

13 Jun 2019

New phone scam — scammers impersonating ACSC and seeking help to act against cybercriminals

08 Feb 2019

Notifiable Data Breaches Quarterly Report (October – December 2018)

28 Jan 2019

Human Rights Watch looks into Australia’s surveillance and cybersecurity practices

25 Jan 2019

Key cybersecurity trends businesses should know in 2019

14 Jan 2019

2019’s first data breach took less than 24 hours

09 Jan 2019

My Health Record reported 42 data breaches in 2018

17 Dec 2018

Australian Government Information Security Manual updated

13 Dec 2018

Encryption bill becomes law

10 Dec 2018

Federal government releases new cybersecurity reports

06 Dec 2018

Australian Parliament passes legislation to strengthen My Health Record privacy

26 Nov 2018

My Health Record opt-out period has been extended to 31 January 2019

23 Nov 2018

Preventing data breaches should be business as usual

12 Nov 2018

The Assistance and Access Bill 2018

08 Nov 2018

Milestones for privacy and information access in 2017–18

30 Oct 2018

Facebook security breach investigated by OAIC

22 Oct 2018

Digitised crime reporting via cloud

08 Oct 2018

Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 (Cth)

02 Oct 2018

Telecommunications executives liable for misleading advertisements

24 Sep 2018

Unveiling of cybersecurity strategy

19 Sep 2018

Hacker convention on cyber-attack simulation

12 Sep 2018

Treasury Laws Amendment (Consumer Data Right) Bill 2018 (Cth)

12 Sep 2018

My Health Records Amendment (Strengthening Privacy) Bill 2018 (Cth)

03 Sep 2018

Cybersecurity strategy — Tech giants face $10m fines in new cyber security laws

28 Aug 2018

Cybersecurity strategy — Decryption laws edge closer to reality

20 Aug 2018

Mandatory data breach notification — Notifiable data breaches second quarterly report released

13 Aug 2018

Cyber security is being tightened at Australian airports after an identity card data hack

06 Aug 2018

Watch out for fake myGov tax refund email

30 Jul 2018

Timehop data breach impacts 21 million users

17 Jul 2018

My Health Record opt-out period begins, but privacy concerns remain

10 Jul 2018

Privacy by design — Aussie businesses look to get ahead of GDPR privacy requirements

10 Jul 2018

Privacy by design — Privacy business resource 21: Australian businesses and the EU General Data Protection Regulation

06 Jul 2018

Threat and kidnap scams targeting Chinese community

25 Jun 2018

Data security obligations and data security breaches — ASD confirms new cyber manual

19 Jun 2018

Service providers, security and data breach notification — ACSC working with PageUp People on security incident

11 Jun 2018

General Data Protection Regulation guidance for Australian businesses

05 Jun 2018

General Data Protection Regulation commences 25 May 2018

29 May 2018

Cybersecurity strategy — Pacific Cyber Security Operational Network

24 May 2018

Data security — Stop and check: is this for real? — Scams Awareness Week 2018

11 May 2018

Privacy — Privacy Awareness Week 2018 website launched

27 Apr 2018

Mandatory data breach notification — Global shipping company Svitzer announces first data breach under Australian Data Breach Notification Laws

18 Apr 2018

Data security — Scam calls claiming to be from ACSC

22 Feb 2018

The data breach notification regime — Guide to data breach preparation and response released

22 Feb 2018

Anti-piracy website-blocking regime under review

12 Jan 2018

The data breach notification regime — Small business cybersecurity guide released

07 Dec 2017

The data breach notification regime — What the Notifiable Data Breaches scheme means for schools

29 Nov 2017

Data security obligations and data security breaches — Updated 2017 ISM Controls

23 Nov 2017

ACSC: Threat Report 2017

06 Nov 2017

Understanding the relationship between privacy, cybersecurity and data resilience — Australian government agencies Privacy Code

02 Nov 2017

Australian data protection strategy — Reports 467 — Cybersecurity compliance — Inquiry based on Auditor-General’s report 42 (2016–17)

26 Oct 2017

Privacy by design — Australians continue to exercise choice and control over their personal information — OAIC Annual Report 2016–17 released

18 Oct 2017

The data breach notification regime — Guide to mandatory data breach notification in the My Health Record system

09 Oct 2017

Australian data protection strategy — Government to push for expansion of biometric surveillance — Seeks to have states hand over driver’s licence photos

06 Oct 2017

Personal data security breach management — New guide paves way for better data privacy management

06 Oct 2017

The data breach notification regime — New notifiable data breaches scheme resources released