Insight

5 Key Actions Your Business Can Take to Manage Data Breach Risk

Data breach incidents are an unfortunate reality of 21st century life. A recent study of data breach incidents in Australia found that, on average, a cyber breach costs business $2.82 million to rectify.

PL

Written by Philip Catania & Tim Lee

Published: August 2, 2015

Data breach incidents are an unfortunate reality of 21st century life. A recent study of data breach incidents in Australia found that, on average, a cyber breach costs business $2.82 million to rectify.

Apart from the financial costs, there are other compelling reasons why businesses should take data breach management seriously. Not to mention that the Federal Government has just released a draft bill that would require businesses to notify the Federal Privacy Commissioner and affected individuals of serious data breaches involving personal information.

You can take steps to protect your business from data breaches and reduce their impact if they occur.

In this article we outline five actions to better data breach management. Following these steps will also help your business comply with the Privacy Commissioner’s voluntary guidelines on data breach notification, and prepare for the potential introduction of mandatory notification requirements in Australia.

ACTION 1: TAKE STOCK OF WHAT DATA YOUR BUSINESS HOLDS

It is essential the decision makers in your business understand (and monitor) the types and amount of personal information that the business holds, and how/where that information is stored.

Under the Privacy Act, entities are responsible for the security of any records containing personal information (whether physical or electronic) that are in the entity’s possession or control. This can include information that is processed or stored by external service providers (including cloud storage providers). Particular care should also be taken to identify and manage archived and backup copies of data.

Your business’ risk and compliance governance procedures should incorporate regular reporting on information security and data storage issues so that management has appropriate visibility of any risks and can take a co-ordinated approach to manage them. These matters should be reported on at the most senior levels of governance in an organisation.

ACTION 2: REVIEW YOUR CONTRACT TERMS WITH SERVICE PROVIDERS

Your business should have appropriate operational procedures (and contractual rights) in place so that you can promptly and accurately identify and assess any security breaches affecting your data, regardless of whether the breach is suffered by you or your service provider.

Ideally, contracts should include a clause requiring the service provider to immediately notify the customer of any security breaches affecting the customer’s data, and to co-operate with the customer in connection with the management of the breach.

You should also seek to ensure that the contractual trigger for notification operates on an objective basis, and is not subject to an assessment of severity by the service provider.

The cost of managing data breaches should also be addressed in the contract. The contract should include appropriate liability positions, indemnity obligations and insurance requirements.

ACTION 3: ENCRYPT YOUR DATA AND REVIEW YOUR INFORMATION SECURITY PRACTICES

The Privacy Commissioner recognises that it is not possible (nor required under the Privacy Act) for businesses to design completely impenetrable security systems. Rather, organisations are required to implement information security measures that are “reasonable” in the circumstances (based on factors such as the nature of the business and the amount and sensitivity the personal information held).

The Privacy Commissioner says that determining whether a reasonable security measure has been put in place should not be judged solely by reference to the expense of the implementation.

A good information security program should incorporate both proactive and reactive risk management – it should:

help you to prevent unauthorised access/disclosure or loss of data (e.g. firewalls, network security, malware detection and prevention software); and

reduce the risk posed to affected individuals when breaches do occur (e.g. passwords, data encryption and database segregation techniques, which make it more difficult for hackers to use data extracted from your systems).

Implementing sufficiently strong reactive security measures (such as an adequate level of data encryption) could potentially save you from having to notify, as the proposed Australian data breach notification regime would allow businesses to consider factors such as “whether the information is in a form that is intelligible to an ordinary person” and “whether the information is protected by security measures” when determining whether a data breach is “serious” (thereby triggering the notification requirement).

ACTION 4: IMPROVE YOUR BREACH DETECTION PROCESSES

It’s critical to identify data breach incidents quickly so that remedial steps and notifications can be performed in a timely manner. The notification requirements under the proposed mandatory data breach notification regime will apply to any serious data breaches that the organisation “ought reasonably to be aware of”.

Businesses can consider breach detection measures such as:

network security tools, which act as a “security alarm” for your IT systems (e.g. intrusion detection software to monitor unauthorised access, and data loss prevention software to scan outbound e-mails sent by staff);

regular security testing to identify potential weak spots – this could include technical testing (such as network penetration testing) and operational readiness testing (such as training exercises for staff that simulate phishing attacks); and

training for staff to identify and report errors in handling personal information.

ACTION 5: HAVE A DATA BREACH MANAGEMENT RESPONSE PLAN IN PLACE

Your business should have a clear data breach plan in place that sets out a strategy for identifying and remedying the source of a data breach. The plan should also identify key responsible personnel, and set out the procedures for determining whether notice should be given of the breach.

A good starting point in designing the plan would be to refer to the Government’s draft bill on the proposed mandatory data breach notification regime. The Privacy Commissioner has also published a range of guidance materials on data breach management, and is currently in the process of public consultation on a draft Guide to Developing a Data Breach Response Plan (although it should be noted that the consultation draft of the Guide was released prior to the draft bill, and so does not currently reflect the proposed mandatory data breach notification regime).

Businesses should also consider having a list of “go-to” subject matter experts that can be engaged at short notice to assess the severity of the breach, advise on steps on containment and risk mitigation and determine whether notification is required.

Search the Best Lawyers legal directory to connect with experienced lawyers in your area.

Trending Articles

The Family Law Loophole That Lets Sex Offenders Parent Kids


by Bryan Driscoll

Is the state's surrogacy framework putting children at risk?

family law surrogacy adoption headline

Recognizing Legal Leaders: The 2027 Best Lawyers Awards in Australia, Japan and Singapore


by Jamilla Tabbara

Market drivers, diversity trends and the elite practitioners shaping the legal landscape.

Illustrated maps of Australia, Japan and Singapore displayed with their national flags, representing

Holiday Pay Explained: Federal Rules and Employer Policies


by Bryan Driscoll

Understand how paid holidays work, when employers must follow their policies and when legal guidance may be necessary.

Stack of money wrapped in a festive bow, symbolizing holiday pay

Can a Green Card Be Revoked?


by Bryan Driscoll

Revocation requires a legal basis, notice and the chance to respond before status can be taken away.

Close-up of a U.S. Permanent Resident Card showing the text 'PERMANENT RESIDENT'

New Texas Family Laws Transform Navigating Divorce, Custody


by Bryan Driscoll

Reforms are sweeping, philosophically distinct and designed to change the way families operate.

definition of family headline

How Far Back Can the IRS Audit You?


by Bryan Driscoll

Clear answers on IRS statutes of limitations, recordkeeping and what to do if you are under review.

Gloved hand holding a spread of one-hundred-dollar bills near an IRS tax document

US Tariff Uncertainty Throws Canada Into Legal Purgatory


by Bryan Driscoll

The message is clear: There is no returning to pre-2025 normalcy.

US Tariff Uncertainty Throws Canada Into Legal Purgatory headline

Can You File Bankruptcy on Credit Cards


by Bryan Driscoll

Understanding your options for relief from overwhelming debt.

Red credit card on point-of-sale terminal representing credit card debt

Musk v. Altman: The Lawyers Behind the Case


by Jamilla Tabbara

Meet the Trial Lawyers Shaping One of AI's Biggest Legal Disputes.

Portrait photos of Elon Musk and Sam Altman positioned in front of the OpenAI logo.

How AI Is Changing the Way Clients Find Lawyers


by Jamilla Tabbara

Best Lawyers CEO Phil Greer explains how AI-driven search tools are reshaping legal marketing and why credibility markers matter.

AI chat bubble icon with stars representing artificial intelligence transforming client-lawyer conne

Colorado’s 2026 Water Rights Battles


by Bryan Driscoll

A new era of conflict begins.

Colorado Water Rights 2026: A New Era of Conflict headline

When Is It Too Late to Stop Foreclosure?


by Bryan Driscoll

Understanding the foreclosure timeline, critical deadlines and the legal options that may still protect your home.

Miniature house model on orange background surrounded by thumbtacks representing foreclosure

Can You Go to Jail at an Arraignment?


by Bryan Driscoll

Understanding What Happens at Your First Court Appearance.

A heavy chain lying on the ground in the foreground with a blurred figure standing in the background

What’s the Difference Between DUI and DWI?


by Bryan Driscoll

Understanding the terminology and consequences of impaired driving charges.

Driver during nighttime police traffic stop with officer's flashlight shining through car window

Canadian Firms Explore AI, But Few Fully Embrace the Shift


by David L. Brown

BLF survey reveals caution despite momentum.

Canadian Firms Explore AI, But Few Fully Embrace the Shift headline

The Legal Teams Behind the Blake Lively–Justin Baldoni Settlement


by Grace Greer

A closer look at the legal teams and attorneys involved in the Blake Lively–Justin Baldoni litigation and its resolution.

Split-screen image of Blake Lively and Justin Baldoni