LexisNexis Practical Guidance®

Straightforward guidance across a range of topics

Overview

  • Cross-border transfers of personal data

  • Data requirements in Asia

  • Data protection aspects of cloud computing

  • Transfers of employee data

Understanding personal data

The cross-border transfer of personal data is a complex and evolving area

In Europe, the commencement in May 2018 of the General Data Protection Regulation (GDPR) ushered in a new era of control and transparency for the greater benefit of data subjects but with that comes a regulatory and compliance impost on the collectors of personal data.

In Australia, the introduction in February 2018 of the Notifiable Data Breach scheme has some important ramifications for offshoring and outsourcing.

In this group of topics, therefore, we highlight key issues in the current regulatory landscape affecting cross-border transfers of personal data, starting with a consideration of what is meant by the term “personal data”.

See Understanding personal data.

Complying with transfer of personal data obligations under Australian law

As a general guide, personal data in Australia may be equated with the definition of “personal information” under the Privacy Act 1988 (Cth) (Privacy Act). The transfer of such data (and its collection) overseas by Australian-based organisations is primarily regulated by the Privacy Act, and within the Act the Australian Privacy Principles (APPs). APP 8 — Cross-border disclosure of personal information is the most relevant in respect of transferring data out of Australia.

See Complying with transfer of personal data obligations under Australian law.

Identifying requirements for transferring personal data overseas

Different regulatory regimes apply in China, Britain, the European Union and the United States in relation to the transfer of data into and out of those jurisdictions.

China has recently enacted legislation which creates a more restrictive regime around the transfer of certain types of personal information out of its territory.

Britain and the EU present their own issues in that Australian laws are not seen as “substantially equivalent” to the regimes in those jurisdictions. This may potentially hinder the transfer of data to Australia out of those jurisdictions. The introduction of the GDPR on 25 May 2018 will likely throw this disparity into greater relief. This is because the GDPR contains additional measures designed to foster transparent information handling practices and corporate accountability in relation to the collection, storage, processing and handling of personal data.

In the United States, the patchwork of state-based laws means that Australian businesses operating there or otherwise subject to data privacy laws in the US will have to consider the requirements of the particular state(s) or industries in which they conduct business.

See Identifying requirements for transferring personal data overseas.

Businesses operating in Asia, or who engage service providers with operations in Asia, need to be across the potential regulatory impacts in force in other jurisdictions that could apply. This subtopic takes a closer look at Indonesia, China, Malaysia and Singapore each of which have or are in the process of introducing new, cybersecurity-specific legislation.

The Asia-Pacific region is incredibly diverse and this diversity is reflected in the levels of cyber sophistication to be found throughout the region. The region has some of the most cyber-sophisticated countries according to the Global Cybersecurity Index 2017 (GCI) — Singapore, for example, was ranked number 1 out of 193 countries. The GCI measures regulatory commitment to cybersecurity and is produced by the United Nations International Telecommunication Union.

In September 2018, 10 Association of Southeast Asian Nations (ASEAN) nations announced that they would create a framework for cooperation on cybersecurity. The framework will focus on greater regulatory cooperation and on the introduction of more comprehensive cybersecurity laws.

Indonesia, China, Malaysia and Singapore’s new laws all have one thing in common — they all implement measures to protect Critical Information Infrastructure (CII). The meaning of this term differs between jurisdictions, but it can be anything from healthcare to transport to financial services. In all jurisdictions, entities that operate CII will be subject to more onerous requirements than other organisations and individuals.

As well as insight into the regulation of CII, this subtopic provides practical tips about:

  • Developments in Indonesia, including the establishment of a new cyber agency under direct presidential control;
  • See Understanding the regulatory framework in Indonesia.
  • China’s new cybersecurity law, which introduces new responsibilities for a huge variety of organisations, including multinational corporations. In a complex regulatory landscape, lawyers and their clients are urged to keep a close eye on the interpretation and implementation of cybersecurity laws in China;
  • See Understanding the regulatory framework in China.
  • Malaysia’s new cybersecurity law, yet to commence, and Malaysia’s current regulation of cybersecurity and personal data, including who regulates it. Malaysia is well placed to enforce its new law, with a single agency dedicated to cybersecurity, a government committed to overcoming cybersecurity issues and a well-established record on personal data protection;
  • See Understanding the regulatory framework in Malaysia.
  • Singapore’s new cybersecurity Bill and how it relates to Singapore’s strong existing legislation on cybersecurity and data protection, as well as the practical application of Singapore’s existing personal data protection acts;
  • See Understanding the regulatory framework in Singapore.

The opportunities presented by cloud computing make this technology one of the most important IT developments in recent years, with both the private and public spheres increasing their uptake of cloud services. Workplace environment transformations, increased collaboration, shared or remote workspaces, and flexible work arrangements, have all encouraged the proliferation of cloud computing.

The Australian Signals Directorate (ASD), adopting the definition developed by the National Institute of Standards and Technology (NIST), defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (eg networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

But with increased opportunity there is also corresponding risk. The shift to cloud computing raises issues and risks regarding:

  • the collection;
  • storage; and
  • handling,

of personal information. Purchasers and consumers of cloud computing products and services must have a firm understanding of these issues and risks and their legal implications.

With that in mind, the purpose of this subtopic is to:

  • alert current and prospective cloud computing users to data security and contracting issues that may arise in connection with cloud computing;
  • provide an overview of the application of privacy and data protection laws to storing, processing and accessing information within a cloud environment;
  • highlight cross border data transfer and supply chain risks; and
  • outline some of the key data security standards relevant to cloud computing.

Handing over personal data at work is an activity that most people accept is just a normal part of their job.

But for employers, and their lawyers, it is crucial to be aware of the rules regulating employee data, especially if employers are operating in more than one jurisdiction. As it will become apparent in this guidance note, different jurisdictions take very different approaches to regulating employee data which can cause confusion and may result in unnecessary penalties.

There are many questions that different data protection laws have attempted to answer worldwide. For example, when a jobseeker completes an online application, or hands over their CV, are they relinquishing ownership of that personal information? Do they need to provide consent if their prospective employer, or employer, wants to use it? When an employee sends an email, can their employer read it or use its meta data? For what purpose? What about employees’ web browsing history on their work laptops? Can employers send their employees’ data to another country?

This guidance note provides practical guidance on how different jurisdictions regulate the protection of employee data. Often, employee data is not distinguished from personal data in the way it is regulated. The regulation of personal data is covered specifically in Understanding personal data, but is also covered here to the extent it is relevant to employee data.

In this subtopic, you will learn about:

  • the regulation of employee data in Australia, Asia, and Europe;
  • what specific employee data is protected under each regulatory framework (see Protecting employee data);
  • how employers are allowed to handle their employees’ data, including whether they can transfer it across borders (see Cross-border transfers of employee data));
  • whether in certain jurisdictions, a distinction is made legally between “personal data” and “employee data”; and
  • instances where employers have failed to comply with employee data protection laws and the repercussions of non-compliance (see Understanding employee data privacy obligations in Europe).

Guidance

Understanding personal data

Complying with transfer of personal data obligations under Australian law

Identifying requirements for transferring personal data overseas

Show All Guidance

Checklists

  • Cybersecurity strategy — Checklist for remote working

    LexisNexis Legal Writer Team
  • EU general data protection regulation (GDPR) — Checklist for controller versus processor

    S. Sharma, Special Counsel and B. Tomlinson, Partner, Maddocks
  • Data security — Checklist for Disaster recovery planning

    A. Mitchell, Unisys
  • Data security — Checklist for Data security audit plan

    A. Mitchell, Unisys
  • Data security — Checklist for De-identification of personal information

    A. Mitchell, Unisys
  • Privacy — Checklist for Privacy policy

    S. Sharma, Special Counsel, Maddocks
  • Privacy — Internal privacy guidelines for staff

    S. Sharma, Special Counsel, Maddocks
  • Workflow Checklist: Assessing a suspected data breach

    D. Kneller, Madgwicks Lawyers
  • Checklist for Transfers of personal data outside the European Economic Area

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for Complying with both the Privacy Act and the GDPR

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Checklist for computer and device use

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Content of notification

    D. Kneller, Madgwicks Lawyers
  • Cybersecurity strategy — Checklist for Overall cybersecurity strategy

    P. Fair and S. Lee, Baker McKenzie
  • Data Breach Assessment Guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Data breach response guideline

    P. Fair and S. Lee, Baker McKenzie
  • Checklist for Ensuring data protection compliance

    P. Fair and S. Lee, Baker McKenzie
  • Workflow Checklist: Exceptions to notification obligations

    D. Kneller, Madgwicks Lawyers
  • EU General Data Protection Regulation (GDPR) — Compliance checklist

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Workflow Checklist: Identifying when a data breach is notifiable

    D. Kneller, Madgwicks Lawyers
  • Threshold compliance checklist — GDPR and the Privacy Act

    S. Sharma, S. Field and B. Tomlinson, Maddocks
  • Privacy by design — practical checklist

    S. Sharma, Maddocks
  • Privacy — Checklist for direct marketing

    S. Sharma and E. Lau, Maddocks
  • Checklist for Staff training on data protection compliance

    P. Fair and S. Lee, Baker McKenzie

Legislation

Latest Legal Updates

18 May 2020

No right to not hire or force staff to sign up to COVIDSafe app

18 May 2020

Cybercrime Squad detectives charge woman over unlawful digital currency exchange

15 May 2020

COVIDSafe privacy safeguards become law

14 May 2020

UK Supreme Court’s decision on vicarious liability for employee’s data breach highlights importance of robust organisational privacy policy, security and training for remote workers

07 May 2020

Privacy Awareness Week — Tips on staying secure from the Australian Information Commissioner and the Office of the Privacy Commissioner of Canada

06 May 2020

COVIDSafe draft legislation released

30 Apr 2020

Privacy class action representative complaint for Optus data breach made to the Australian Information Commissioner

28 Apr 2020

OAIC supports privacy protections in COVIDSafe contact tracing App

22 Apr 2020

ACSC warns cyber scams mount during COVID-19 crisis

16 Apr 2020

The Office of the Australian Information Commissioner reiterates importance of conducting Privacy Impact Assessments to assess privacy risks with remote working arrangements during COVID-19 pandemic

02 Apr 2020

Ongoing threat of COVID-19-related online scams and increased risk of notifiable data breaches

26 Mar 2020

Australian Signals Directorate issues cyber security warning for remote working in response to COVID-19

26 Mar 2020

Office of the Information Commissioner publishes guidance on privacy obligations during the COVID-19 pandemic

16 Mar 2020

Australian Information Commissioner brings action against Facebook for contravention of the Privacy Act

19 Feb 2020

Do you have access to Victorian Government information? Are you aware of the revised protective data security standards?

13 Feb 2020

Beneficial changes to credit reporting come into effect

12 Feb 2020

Optus pays largest infringement notice issued under the Spam Act for unwanted marketing messages

30 Jan 2020

Privacy (Australian Bushfires Disaster) Emergency Declaration (No. 1) 2020 enhances information-sharing about individuals affected by the Australian bushfires

09 Jan 2020

Pioneering Australian class action lawsuit for alleged breach of privacy settles

25 Nov 2019

All organistions should consider cybersupply risk management as part of their overall cyber strategy

18 Nov 2019

UK and US governments sign historic data-sharing agreement to speed up criminal investigations and prosecutions

27 Sep 2019

Consumer Data Right scheme introduces data portability for consumers

25 Sep 2019

Notifiable Data Breaches on the rise again — human error accounts for large proportion of breaches

01 Jul 2019

Watch our for these top 12 scam email subject lines

24 Jun 2019

ACSC’s Six Day Easy Step Guide to protect yourself from cyber criminals

17 Jun 2019

Has your personal information been lost, released or accessed without your permission? What steps can you take now

13 Jun 2019

New phone scam — scammers impersonating ACSC and seeking help to act against cybercriminals

08 Feb 2019

Notifiable Data Breaches Quarterly Report (October – December 2018)

28 Jan 2019

Human Rights Watch looks into Australia’s surveillance and cybersecurity practices

25 Jan 2019

Key cybersecurity trends businesses should know in 2019

14 Jan 2019

2019’s first data breach took less than 24 hours

09 Jan 2019

My Health Record reported 42 data breaches in 2018

17 Dec 2018

Australian Government Information Security Manual updated

13 Dec 2018

Encryption bill becomes law

10 Dec 2018

Federal government releases new cybersecurity reports

06 Dec 2018

Australian Parliament passes legislation to strengthen My Health Record privacy

26 Nov 2018

My Health Record opt-out period has been extended to 31 January 2019

23 Nov 2018

Preventing data breaches should be business as usual

12 Nov 2018

The Assistance and Access Bill 2018

08 Nov 2018

Milestones for privacy and information access in 2017–18

30 Oct 2018

Facebook security breach investigated by OAIC

22 Oct 2018

Digitised crime reporting via cloud

08 Oct 2018

Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 (Cth)

02 Oct 2018

Telecommunications executives liable for misleading advertisements

24 Sep 2018

Unveiling of cybersecurity strategy

19 Sep 2018

Hacker convention on cyber-attack simulation

12 Sep 2018

Treasury Laws Amendment (Consumer Data Right) Bill 2018 (Cth)

12 Sep 2018

My Health Records Amendment (Strengthening Privacy) Bill 2018 (Cth)

03 Sep 2018

Cybersecurity strategy — Tech giants face $10m fines in new cyber security laws

28 Aug 2018

Cybersecurity strategy — Decryption laws edge closer to reality

20 Aug 2018

Mandatory data breach notification — Notifiable data breaches second quarterly report released

13 Aug 2018

Cyber security is being tightened at Australian airports after an identity card data hack

06 Aug 2018

Watch out for fake myGov tax refund email

30 Jul 2018

Timehop data breach impacts 21 million users

17 Jul 2018

My Health Record opt-out period begins, but privacy concerns remain

10 Jul 2018

Privacy by design — Aussie businesses look to get ahead of GDPR privacy requirements

10 Jul 2018

Privacy by design — Privacy business resource 21: Australian businesses and the EU General Data Protection Regulation

06 Jul 2018

Threat and kidnap scams targeting Chinese community

25 Jun 2018

Data security obligations and data security breaches — ASD confirms new cyber manual

19 Jun 2018

Service providers, security and data breach notification — ACSC working with PageUp People on security incident

11 Jun 2018

General Data Protection Regulation guidance for Australian businesses

05 Jun 2018

General Data Protection Regulation commences 25 May 2018

29 May 2018

Cybersecurity strategy — Pacific Cyber Security Operational Network

24 May 2018

Data security — Stop and check: is this for real? — Scams Awareness Week 2018

11 May 2018

Privacy — Privacy Awareness Week 2018 website launched

27 Apr 2018

Mandatory data breach notification — Global shipping company Svitzer announces first data breach under Australian Data Breach Notification Laws

18 Apr 2018

Data security — Scam calls claiming to be from ACSC

22 Feb 2018

The data breach notification regime — Guide to data breach preparation and response released

22 Feb 2018

Anti-piracy website-blocking regime under review

12 Jan 2018

The data breach notification regime — Small business cybersecurity guide released

07 Dec 2017

The data breach notification regime — What the Notifiable Data Breaches scheme means for schools

29 Nov 2017

Data security obligations and data security breaches — Updated 2017 ISM Controls

23 Nov 2017

ACSC: Threat Report 2017

06 Nov 2017

Understanding the relationship between privacy, cybersecurity and data resilience — Australian government agencies Privacy Code

02 Nov 2017

Australian data protection strategy — Reports 467 — Cybersecurity compliance — Inquiry based on Auditor-General’s report 42 (2016–17)

26 Oct 2017

Privacy by design — Australians continue to exercise choice and control over their personal information — OAIC Annual Report 2016–17 released

18 Oct 2017

The data breach notification regime — Guide to mandatory data breach notification in the My Health Record system

09 Oct 2017

Australian data protection strategy — Government to push for expansion of biometric surveillance — Seeks to have states hand over driver’s licence photos

06 Oct 2017

Personal data security breach management — New guide paves way for better data privacy management

06 Oct 2017

The data breach notification regime — New notifiable data breaches scheme resources released