Sapna is a content writer at Sprintlaw. She has completed a Bachelor of Laws with a Bachelor of Arts. Since graduating, she has worked primarily in the field of legal research and writing, and now helps Sprintlaw assist small businesses.
Data breaches are now a business risk every Australian organisation needs to plan for. Whether you run an online store, a professional services firm, or a growing tech startup, handling personal information comes with legal duties - and the stakes (legal, financial and reputational) are high if something goes wrong.
The good news is you can dramatically reduce risk with clear processes, the right legal documents, and fast, confident action if an incident occurs. In this guide, we unpack what counts as a data breach under Australian law, when you must notify, and practical steps to prepare and respond.
What Is A Data Breach Under Australian Law?
Under the Privacy Act 1988 (Cth), a data breach happens when personal information is accessed, disclosed, lost, or used without authorisation. Common examples include ransomware incidents, inbox compromises (business email compromise), misdirected emails with sensitive attachments, a lost laptop without encryption, or an employee snooping in files without a valid reason.
Personal information means information that identifies an individual or could reasonably identify them - names, addresses, emails, phone numbers, dates of birth, health information, financial details, and more.
Some breaches are minor and containable. Others are serious and trigger legal notification duties because they’re likely to cause serious harm (for example, identity theft, financial loss, or humiliation).
Who Must Comply With The Privacy Act And The NDB Scheme?
Most Australian businesses with an annual turnover of $3 million or more must comply with the Australian Privacy Principles (APPs). Many small businesses are also covered, including health service providers, businesses that trade in personal information, and those providing certain services (for example, credit reporting bodies).
The Notifiable Data Breaches (NDB) scheme requires eligible entities to notify affected individuals and the Office of the Australian Information Commissioner (OAIC) if a breach is likely to result in serious harm and you can’t quickly remediate the risk.
Even if you’re not an APP entity, strong privacy governance is fast becoming a market expectation. Clear customer-facing notices and internal practices protect trust - and they position you well if your business grows into APP coverage or services larger clients who demand robust privacy controls.
When Do You Have To Notify A Data Breach?
You must notify when three elements are present:
- There has been unauthorised access to, disclosure of, or loss of personal information;
- The breach is likely to result in serious harm to one or more individuals; and
- You haven’t been able to take remedial action that removes the likelihood of serious harm.
“Serious harm” is assessed on a case-by-case basis and includes physical, psychological, emotional, financial, or reputational harm. Think about the types of information involved, whether it’s encrypted, who accessed it, and how likely it is they will misuse it.
If the breach is not likely to cause serious harm, you generally don’t need to notify under the NDB scheme. However, keeping a record of your assessment and taking steps to reduce risk is still important from a governance and customer trust perspective.
It’s wise to formalise your decision-making steps in a documented Data Breach Response Plan so your team knows when and how to escalate, investigate and decide on notification.
Step-By-Step: What Should You Do If You Suspect A Data Breach?
Speed and structure matter. Here’s a practical approach that aligns with Australian privacy law expectations.
1) Contain The Incident
- Disable compromised accounts; revoke suspicious API keys; isolate affected systems; force password resets.
- Stop the data flow. For lost devices, trigger remote wipe if enabled; for misdirected emails, request deletion and verify action.
- Preserve evidence. Keep logs and notes to support your investigation and help forensic or legal advisors.
2) Assess The Risks
- Identify what personal information is involved (scope and sensitivity).
- Consider encryption, access controls and whether the data has likely been viewed or exfiltrated.
- Evaluate the likelihood of serious harm to individuals - identity theft, financial loss, distress, reputational damage, or targeted scams.
3) Decide If You Must Notify
Apply the NDB test: is serious harm likely and can you fully remediate the risk? If yes, prepare notifications to affected individuals and the OAIC. If you conclude the risk is low, document the reasoning and continue to monitor.
Have a template ready for data breach notification so you can move quickly and communicate clearly.
4) Notify Affected Individuals And OAIC (If Required)
- Provide a clear description of what happened, the data involved, the risks, and steps individuals can take (e.g. password changes, alerting their bank, scam vigilance).
- Explain what you’ve done to contain the incident and how you’re preventing recurrence.
- Submit a statement to the OAIC as required, including contact details for further information.
5) Remediate And Prevent Recurrence
- Patch vulnerabilities, improve access controls and implement additional monitoring or encryption.
- Update policies, revise onboarding/offboarding, and refresh training to address the root cause.
- Review your contracts with suppliers handling personal information and ensure they meet your security and notification expectations.
How To Prepare: Practical Measures That Reduce Breach Risk
Preparation makes all the difference. The aim is to lower the likelihood of an incident and shorten the time to detect, contain and notify if needed.
Build A Privacy Framework
- Publish a clear, accurate Privacy Policy that reflects your current data flows and practices.
- Use a Privacy Collection Notice at the point of collection so individuals understand what you collect, why, and how they can contact you.
- Document internal rules in an Information Security Policy covering access control, passwords, secure disposal, encryption and incident response.
Harden Your Tech And Processes
- Enable MFA on email, admin panels and remote access; restrict data access to “need-to-know”.
- Encrypt devices and backups; implement role-based access for sensitive systems.
- Run regular updates and patching; monitor logs for unusual activity.
Vet And Contract Your Vendors
If you use SaaS tools, cloud storage, marketing platforms or outsourced support, they may handle your customer data. Make sure your contracts include security, subprocessor controls, audit rights and breach notification obligations through a suitable Data Processing Agreement.
Train Your Team
Human error is a leading cause of breaches. Regular phishing simulations, secure handling of spreadsheets, rules on personal device use, and clear internal escalation paths will reduce risk. Consolidating staff expectations in an Employee Privacy Handbook also helps align day-to-day behaviour with your legal obligations.
Plan For The Worst
Create and test a practical, role-based Data Breach Response Plan. Run tabletop exercises so key people can practice decisions, comms and technical steps under time pressure.
Minimise What You Keep
Data you don’t hold can’t be breached. Set retention rules and delete or de-identify information you no longer need, guided by your legal and business requirements. For a deeper dive on this topic, see data retention laws in Australia.
What Should Notifications To Individuals Include?
When notification is required, your message should be clear, empathetic and actionable. Typically include:
- A concise description of the incident and when it occurred (or was discovered).
- The types of personal information involved, explained in plain English.
- Risks of harm (for example, identity theft, targeted phishing, financial fraud) without causing unnecessary alarm.
- Practical steps people can take now (change passwords, enable MFA, contact bank, be cautious about unsolicited messages).
- What your business has done to contain the issue and prevent recurrence.
- How to contact your privacy contact point for questions or complaints, supported by your Privacy Complaint Handling Procedure.
If payment card data is involved, consider strengthening guidance for customers and engaging your payment provider. Storing payment details comes with specific obligations - review your approach against Australian requirements for storing credit card details.
Key Legal Documents For Data Breach Readiness
Having the right documents in place reduces confusion during an incident and demonstrates compliance. Most Australian businesses handling personal information should consider:
- Privacy Policy: A customer-facing statement of how you collect, use, disclose and secure personal information, aligned to your actual practices and the APPs. Link this prominently on your website and in apps.
- Privacy Collection Notice: A concise notice provided at or before collection, describing the purpose, lawful basis (where relevant), and how individuals can access or correct their information.
- Information Security Policy: Internal rules for access, encryption, passwords, device security, vendor use, incident response and breach reporting lines.
- Data Breach Response Plan: A playbook defining roles, triage steps, risk assessment criteria, communications and timelines for OAIC/individual notifications.
- Data Processing Agreement: Contract terms with service providers (for example, cloud, CRM, marketing platforms) covering security, subprocessing, international transfers, audits and breach notification.
- Complaint Handling Procedure: A simple pathway for individuals to raise concerns and for you to respond consistently, feeding insights back into prevention.
- Staff Training Materials/Handbook: Practical guidance that turns policies into everyday actions for your team, especially around phishing, data sharing and device hygiene.
These documents work best when they are consistent with each other and with your actual systems and workflows. Review them at least annually, and after any substantive change to your tech stack or data flows.
Common Pitfalls (And How To Avoid Them)
“We Don’t Collect Much Data, So We’re Not At Risk.”
Even an email address paired with a name can be valuable to attackers. Treat “basic” data with care and keep your policies updated - especially your Privacy Policy and Information Security Policy.
Assuming Vendors Will Handle Everything
Third-party tools are part of your risk surface. Clarify security and notification duties in a proper Data Processing Agreement, and maintain a register of your processors and subprocessors.
Keeping Data Forever
Data retention creep increases breach impact. Set practical retention periods and delete or de-identify data you no longer need in line with data retention laws.
Unclear Decision-Making In A Crisis
Time lost equals risk. Rehearse your workflows with a realistic Data Breach Response Plan so you can assess, notify and remediate faster.
Key Takeaways
- A data breach includes unauthorised access, disclosure, loss or misuse of personal information - and serious breaches may trigger mandatory notification under the NDB scheme.
- Assess likelihood of serious harm quickly and document your reasoning; if notification is required, inform affected individuals and the OAIC without delay.
- Preparation is essential: publish a current Privacy Policy, adopt an Information Security Policy, and rehearse a Data Breach Response Plan.
- Reduce risk with technical controls (MFA, encryption, access limits), staff training, data minimisation and clear vendor contracts like a Data Processing Agreement.
- Good governance after an incident - containment, transparent communication and remediation - protects people and helps your business recover trust faster.
If you’d like a consultation on data breach readiness or response for your Australian business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.


