Insight

What are ‘Reasonable Steps’ to Protect Personal Information’? 5 Key Lessons from the Privacy Commissioner’s Determinations

It is important to implement reasonable steps to protect any personal information they hold against misuse, interference, loss, unauthorized access, modification or disclosure.

Personal Information
Philip Catania

Philip Catania

November 22, 2016 12:00 AM

Under Australian privacy laws, organisations need to implement ‘reasonable steps’ to protect any personal information they hold against misuse, interference, loss, unauthorised access, modification or disclosure. We look at the Privacy Commissioner’s determinations for guidance on what should be done.

Recently, when Australia’s privacy regulator (the OAIC) was asked about its privacy governance priorities for 2016, the issue of information security was, unsurprisingly, high on the agenda.

The OAIC emphasised the need for corporate counsel to focus on “get(ting) security right and…mak(ing) sure that there is a real culture of building in privacy and security protections in organisations.”

Growing concerns around cyber security and the prospect of more stringent regulation of data breaches have prompted many businesses to reassess their information security practices.

While the Privacy Commissioner has issued best practice guidelines on applying the ‘reasonable steps’ requirement, these guidelines do not provide a ‘bright line’ test for minimum compliance. This has led to some uncertainty as to how the ‘reasonableness’ standard will be applied in the context of today’s rapidly evolving cyber security landscape.

How to determine ‘reasonable steps’: 5 key lessons

Below, we’ve set out five key lessons that can be extracted from the Commissioner’s published reports on data breach investigations, in the hope they will assist in framing what ‘reasonable steps’ are.

Lesson 1: Be aware that ‘reasonable steps’ is not the same as ‘reasonable industry practice’


It is clear from the Commissioner’s investigations that there is no ‘tick the box’ approach to regulatory compliance. This is because the Commissioner has:

• rejected arguments that ‘reasonableness’ should be equated with ‘industry practice’ or what is ‘commercially’ reasonable; and

• found that engaging external providers to advise on and manage information security may not, in and of itself, be sufficient to discharge the “reasonable steps” requirement.

While the above factors may be relevant to assessing ‘reasonable steps’, organisations should not rely exclusively on these external benchmarks as a substitute for giving specific consideration to their own risk profile (based on factors such as the quantity and sensitivity of the organisations’ personal information holdings).

Lesson 2: Always accept ownership of the risk


A clear message from the investigation reports is that organisations have a duty to independently consider their particular needs and circumstances and implement appropriate information security measures.

Your organisation must take ownership of its self-assessment, and cannot outsource ownership of the risk to external consultants or advisers. While organisations should seek expert advice where appropriate, final responsibility for cyber security remains with your organisation.

In this regard, it is helpful to manage information security as a corporate governance issue – that is, organisations should view information security as an enterprise-wide business risk that requires continual monitoring, effective governance and appropriate oversight from the Board and senior management.

Lesson 3: Manage costs by adopting a systematic, risk-based approach


Cost is obviously a key consideration when developing an information security strategy.

The Commissioner has made it clear that an organisation will only be excused from implementing a security measure that would otherwise be considered “reasonable” if the cost or inconvenience of implementation would be “excessive”.

An effective way to manage costs is to adopt a risk-based approach to information security management. This is also consistent with regulatory guidance from the Commissioner and ASIC, who both recommend that organisations should structure their security programs around identifying and addressing key areas of risk.

Implementing a recognised information security standard such as the NIST framework (which has been recommended by ASIC) and the ISO/IEC 27000 series can help your organisation take a systematic, risk-based approach to managing information security risk. These standards are generally scalable in nature, and can be implemented in a way that fits the particular risk profile and resources of your organisation.

Further, implementing a recognised standard does not guarantee compliance with the Privacy Act’s security requirements, but it certainly helps. The Commissioner has referred approvingly to standards such as the ISO/IEC 27000 series in both his best practice guidelines, and in certain investigation reports.

Lesson 4: Your security is only as good as its weakest link


It is critical for businesses to ensure that adequate security measures are implemented consistently across all business systems and processes.

In the event of a security breach investigation, the Commissioner will assess whether the business had implemented “reasonable” security in relation to the particular system or process that was actually exploited in the breach (rather than considering whether the business’ overall security framework was “reasonable” as a whole).

Therefore, organisations should ensure that security testing procedures are suitably comprehensive, and go beyond the obvious ‘high value’ IT assets. Organisations need to be vigilant to ‘weak points’ that might not be immediately obvious.

Lesson 5: Be aware of issues previously considered by the Commissioner


The Commissioner generally avoids making definitive statements about information security standards (for example, encryption standards) in his investigation reports. He is careful to emphasise that there is no ‘one size fits all’ approach, and that the particular circumstances of each case must be considered on its own merits.

Nevertheless, organisations should be aware of the types of security practices that the Commissioner has previously held to be insufficient in his investigation reports. These provide a useful benchmark for organisations to measure their security practices against.

Some recent examples of security practices that the Commissioner has found to be insufficient (and should be avoided) include:

• Storing user e-mails, passwords and password hints in plain text, or only encrypting them with a single encryption key and ‘block cipher’ encryption algorithm.

• Storing user data on a publically-accessible web server.

• Failing to identify a system vulnerability due to limited, sample-based security testing.

• Issuing consumer equipment to customers without conducting adequate testing to determine whether factory default settings provided appropriate access controls and privacy protections for the customer.

• Failing to conduct appropriate software maintenance and lifecycle management (e.g. patch deployment).

• Using cryptographic protocols such as SSL to secure data in transit, without ensuring that the destination location is also secure.

• Failing to properly configure a website to disable directory browsing and content indexation by search robots (such as Googlebot).

• Failing to promptly purge old user data once it becomes out of date, and/or failing to promptly decommission old servers.

• Failing to have appropriate policies regarding the redaction of personal information from published reports, and failing to properly educate staff on the importance of complying with those policies.

• Storing hard copy documents containing personal information on premises that are not adequately secured or monitored by the organisation.

The five key lessons extracted from the Privacy Commissioner’s determinations and outlined in this article should assist organisations to determine what ‘reasonable steps’ are in relation to the protection of personal information. They are not a definitive set of rules though and need to be amended against the particular systems in place.

For more information, follow the source link below.

Trending Articles

The 2024 Best Lawyers in Spain™


by Best Lawyers

Best Lawyers is honored to announce the 16th edition of The Best Lawyers in Spain™ and the third edition of Best Lawyers: Ones to Watch in Spain™ for 2024.

Tall buildings and rushing traffic against clouds and sun in sky

Best Lawyers Expands Chilean 2024 Awards


by Best Lawyers

Best Lawyers is pleased to announce the 14th edition of The Best Lawyers in Chile™ and the inaugural edition of Best Lawyers: Ones to Watch in Chile™, honoring the top lawyers and firms conferred on by their Chilean peers.

Landscape of city in Chile

Best Lawyers Expands 2024 Brazilian Awards


by Best Lawyers

Best Lawyers is honored to announce the 14th edition of The Best Lawyers in Brazil™ and the first edition of Best Lawyers: Ones to Watch in Brazil™.

Image of Brazil city and water from sky

Announcing The Best Lawyers in South Africa™ 2024


by Best Lawyers

Best Lawyers is excited to announce the landmark 15th edition of The Best Lawyers in South Africa™ for 2024, including the exclusive "Law Firm of the Year" awards.

Sky view of South Africa town and waterways

The Best Lawyers in Mexico Celebrates a Milestone Year


by Best Lawyers

Best Lawyers is excited to announce the 15th edition of The Best Lawyers in Mexico™ and the second edition of Best Lawyers: Ones to Watch in Mexico™ for 2024.

Sky view of Mexico city scape

How Palworld Is Testing the Limits of Nintendo’s Legal Power


by Gregory Sirico

Many are calling the new game Palworld “Pokémon GO with guns,” noting the games striking similarities. Experts speculate how Nintendo could take legal action.

Animated figures with guns stand on top of creatures

The Best Lawyers in Portugal™ 2024


by Best Lawyers

The 2024 awards for Portugal include the 14th edition of The Best Lawyers in Portugal™ and 2nd edition of Best Lawyers: Ones to Watch in Portugal™.

City and beach with green water and blue sky

Presenting The Best Lawyers in Australia™ 2025


by Best Lawyers

Best Lawyers is proud to present The Best Lawyers in Australia for 2025, marking the 17th consecutive year of Best Lawyers awards in Australia.

Australia flag over outline of country

The Best Lawyers in Peru™ 2024


by Best Lawyers

Best Lawyers is excited to announce the landmark 10th edition of The Best Lawyers in Peru, the prestigious award recognizing the country's lop legal talent.

Landscape of Peru city with cliffside and ocean

How To Find A Pro Bono Lawyer


by Best Lawyers

Best Lawyers dives into the vital role pro bono lawyers play in ensuring access to justice for all and the transformative impact they have on communities.

Hands joined around a table with phone, paper, pen and glasses

Presenting the 2024 Best Lawyers Family Law Legal Guide


by Best Lawyers

The 2024 Best Lawyers Family Law Legal Guide is now live and includes recognitions for all Best Lawyers family law awards. Read below and explore the legal guide.

Man entering home and hugging two children in doorway

The Best Lawyers in Colombia™ 2024


by Best Lawyers

Best Lawyers is honored to announce the 14th edition of The Best Lawyers in Colombia™ for 2024, which honors Colombia's most esteemed lawyers and law firms.

Cityscape of Colombia with blue cloudy sky above

Announcing the 2024 Best Lawyers in Puerto Rico™


by Best Lawyers

Best Lawyers is proud to announce the 11th edition of The Best Lawyers in Puerto Rico™, honoring the top lawyers and firms across the country for 2024.

View of Puerto Rico city from the ocean

Canada Makes First Foray Into AI Regulation


by Sara Collin

As Artificial Intelligence continues to rise in use and popularity, many countries are working to ensure proper regulation. Canada has just made its first foray into AI regulation.

People standing in front of large, green pixelated image of buildings

Commingling Assets


by Tamires M. Oliveira

Commingling alone does not automatically turn an otherwise immune asset into an asset subject to marital distribution as explained by one family law lawyer.

Toy house and figure of married couple standing on stacks of coins

How To Check a Lawyer's Reputation


by Best Lawyers

If you find yourself facing legal issues, researching and hiring a lawyer with a solid track record and high level of credibility can make all the difference.

Figure holding a magnify glass over digital profile