Insight

What are ‘Reasonable Steps’ to Protect Personal Information’? 5 Key Lessons from the Privacy Commissioner’s Determinations

It is important to implement reasonable steps to protect any personal information they hold against misuse, interference, loss, unauthorized access, modification or disclosure.

Personal Information
Philip Catania

Philip Catania

November 22, 2016 12:00 AM

Under Australian privacy laws, organisations need to implement ‘reasonable steps’ to protect any personal information they hold against misuse, interference, loss, unauthorised access, modification or disclosure. We look at the Privacy Commissioner’s determinations for guidance on what should be done.

Recently, when Australia’s privacy regulator (the OAIC) was asked about its privacy governance priorities for 2016, the issue of information security was, unsurprisingly, high on the agenda.

The OAIC emphasised the need for corporate counsel to focus on “get(ting) security right and…mak(ing) sure that there is a real culture of building in privacy and security protections in organisations.”

Growing concerns around cyber security and the prospect of more stringent regulation of data breaches have prompted many businesses to reassess their information security practices.

While the Privacy Commissioner has issued best practice guidelines on applying the ‘reasonable steps’ requirement, these guidelines do not provide a ‘bright line’ test for minimum compliance. This has led to some uncertainty as to how the ‘reasonableness’ standard will be applied in the context of today’s rapidly evolving cyber security landscape.

How to determine ‘reasonable steps’: 5 key lessons

Below, we’ve set out five key lessons that can be extracted from the Commissioner’s published reports on data breach investigations, in the hope they will assist in framing what ‘reasonable steps’ are.

Lesson 1: Be aware that ‘reasonable steps’ is not the same as ‘reasonable industry practice’


It is clear from the Commissioner’s investigations that there is no ‘tick the box’ approach to regulatory compliance. This is because the Commissioner has:

• rejected arguments that ‘reasonableness’ should be equated with ‘industry practice’ or what is ‘commercially’ reasonable; and

• found that engaging external providers to advise on and manage information security may not, in and of itself, be sufficient to discharge the “reasonable steps” requirement.

While the above factors may be relevant to assessing ‘reasonable steps’, organisations should not rely exclusively on these external benchmarks as a substitute for giving specific consideration to their own risk profile (based on factors such as the quantity and sensitivity of the organisations’ personal information holdings).

Lesson 2: Always accept ownership of the risk


A clear message from the investigation reports is that organisations have a duty to independently consider their particular needs and circumstances and implement appropriate information security measures.

Your organisation must take ownership of its self-assessment, and cannot outsource ownership of the risk to external consultants or advisers. While organisations should seek expert advice where appropriate, final responsibility for cyber security remains with your organisation.

In this regard, it is helpful to manage information security as a corporate governance issue – that is, organisations should view information security as an enterprise-wide business risk that requires continual monitoring, effective governance and appropriate oversight from the Board and senior management.

Lesson 3: Manage costs by adopting a systematic, risk-based approach


Cost is obviously a key consideration when developing an information security strategy.

The Commissioner has made it clear that an organisation will only be excused from implementing a security measure that would otherwise be considered “reasonable” if the cost or inconvenience of implementation would be “excessive”.

An effective way to manage costs is to adopt a risk-based approach to information security management. This is also consistent with regulatory guidance from the Commissioner and ASIC, who both recommend that organisations should structure their security programs around identifying and addressing key areas of risk.

Implementing a recognised information security standard such as the NIST framework (which has been recommended by ASIC) and the ISO/IEC 27000 series can help your organisation take a systematic, risk-based approach to managing information security risk. These standards are generally scalable in nature, and can be implemented in a way that fits the particular risk profile and resources of your organisation.

Further, implementing a recognised standard does not guarantee compliance with the Privacy Act’s security requirements, but it certainly helps. The Commissioner has referred approvingly to standards such as the ISO/IEC 27000 series in both his best practice guidelines, and in certain investigation reports.

Lesson 4: Your security is only as good as its weakest link


It is critical for businesses to ensure that adequate security measures are implemented consistently across all business systems and processes.

In the event of a security breach investigation, the Commissioner will assess whether the business had implemented “reasonable” security in relation to the particular system or process that was actually exploited in the breach (rather than considering whether the business’ overall security framework was “reasonable” as a whole).

Therefore, organisations should ensure that security testing procedures are suitably comprehensive, and go beyond the obvious ‘high value’ IT assets. Organisations need to be vigilant to ‘weak points’ that might not be immediately obvious.

Lesson 5: Be aware of issues previously considered by the Commissioner


The Commissioner generally avoids making definitive statements about information security standards (for example, encryption standards) in his investigation reports. He is careful to emphasise that there is no ‘one size fits all’ approach, and that the particular circumstances of each case must be considered on its own merits.

Nevertheless, organisations should be aware of the types of security practices that the Commissioner has previously held to be insufficient in his investigation reports. These provide a useful benchmark for organisations to measure their security practices against.

Some recent examples of security practices that the Commissioner has found to be insufficient (and should be avoided) include:

• Storing user e-mails, passwords and password hints in plain text, or only encrypting them with a single encryption key and ‘block cipher’ encryption algorithm.

• Storing user data on a publically-accessible web server.

• Failing to identify a system vulnerability due to limited, sample-based security testing.

• Issuing consumer equipment to customers without conducting adequate testing to determine whether factory default settings provided appropriate access controls and privacy protections for the customer.

• Failing to conduct appropriate software maintenance and lifecycle management (e.g. patch deployment).

• Using cryptographic protocols such as SSL to secure data in transit, without ensuring that the destination location is also secure.

• Failing to properly configure a website to disable directory browsing and content indexation by search robots (such as Googlebot).

• Failing to promptly purge old user data once it becomes out of date, and/or failing to promptly decommission old servers.

• Failing to have appropriate policies regarding the redaction of personal information from published reports, and failing to properly educate staff on the importance of complying with those policies.

• Storing hard copy documents containing personal information on premises that are not adequately secured or monitored by the organisation.

The five key lessons extracted from the Privacy Commissioner’s determinations and outlined in this article should assist organisations to determine what ‘reasonable steps’ are in relation to the protection of personal information. They are not a definitive set of rules though and need to be amended against the particular systems in place.

For more information, follow the source link below.

Trending Articles

Introducing the 2026 Best Lawyers Awards in Australia, Japan, New Zealand and Singapore


by Jennifer Verta

This year’s awards reflect the strength of the Best Lawyers network and its role in elevating legal talent worldwide.

2026 Best Lawyers Awards in Australia, Japan, New Zealand and Singapore

Discover The Best Lawyers in Spain 2025 Edition


by Jennifer Verta

Highlighting Spain’s leading legal professionals and rising talents.

Flags of Spain, representing Best Lawyers country

Unveiling the 2025 Best Lawyers Editions in Brazil, Mexico, Portugal and South Africa


by Jennifer Verta

Best Lawyers celebrates the finest in law, reaffirming its commitment to the global legal community.

Flags of Brazil, Mexico, Portugal and South Africa, representing Best Lawyers countries

How to Increase Your Online Visibility With a Legal Directory Profile


by Jennifer Verta

Maximize your firm’s reach with a legal directory profile.

Image of a legal directory profile

Paramount Hit With NY Class Action Lawsuit Over Mass Layoffs


by Gregory Sirico

Paramount Global faces a class action lawsuit for allegedly violating New York's WARN Act after laying off 300+ employees without proper notice in September.

Animated man in suit being erased with Paramount logo in background

The Future of Family Law: 3 Top Trends Driving the Field


by Gregory Sirico

How technology, mental health awareness and alternative dispute resolution are transforming family law to better support evolving family dynamics.

Animated child looking at staircase to beach scene

Effective Communication: A Conversation with Jefferson Fisher


by Jamilla Tabbara

The power of effective communication beyond the law.

 Image of Jefferson Fisher and Phillip Greer engaged in a conversation about effective communication

The 2025 Legal Outlook Survey Results Are In


by Jennifer Verta

Discover what Best Lawyers honorees see ahead for the legal industry.

Person standing at a crossroads with multiple intersecting paths and a signpost.

Safe Drinking Water Is the Law, First Nations Tell Canada in $1.1B Class Action


by Gregory Sirico

Canada's argument that it has "no legal obligation" to provide First Nations with clean drinking water has sparked a major human rights debate.

Individual drinking water in front of window

The Best Lawyers Network: Global Recognition with Long-term Value


by Jamilla Tabbara

Learn how Best Lawyers' peer-review process helps recognized lawyers attract more clients and referral opportunities.

Lawyers networking

New Mass. Child Custody Bills Could Transform US Family Law


by Gregory Sirico

How new shared-parenting child custody bills may reshape family law in the state and set a national precedent.

Two children in a field holding hands with parents

Jefferson Fisher: The Secrets to Influential Legal Marketing


by Jennifer Verta

How lawyers can apply Jefferson Fisher’s communication and marketing strategies to build trust, attract clients and grow their practice.

Portrait of Jefferson Fisher a legal marketing expert

Finding the Right Divorce Attorney


by Best Lawyers

Divorce proceedings are inherently a complex legal undertaking. Hiring the right divorce attorney can make all the difference in the outcome of any case.

Person at a computer holding a phone and pen

The Future of Canadian Law. Insights from Best Lawyers: Ones to Watch Honorees


by Jennifer Verta

Emerging leaders in Canada share their perspectives on the challenges and opportunities shaping the future of Canadian law

Digital eye with futuristic overlays, symbolizing legal innovation and technology

New Texas Law Opens Door for Non-Lawyers to Practice


by Gregory Sirico

Texas is at a critical turning point in addressing longstanding legal challenges. Could licensing paralegals to provide legal services to low-income and rural communities close the justice gap?

Animated figures walk up a steep hill with hand

Family Law Wrestles With Ethics as It Embraces Technology


by Michele M. Jochner

Generative AI is revolutionizing family law with far-reaching implications for the practice area.

Microchip above animated head with eyes closed