On 22 November 2023 the Australian government released the 2023–2030 Australian Cyber Security Strategy (the “Strategy”), with the aim of strengthening Australia’s cyberdefences and supporting people and businesses to be resilient to and recover quickly from cyber-attacks.
Alongside the Strategy was the 2023–2030 Australian Cyber Security Strategy: Action Plan (the “Action Plan”) setting out three “Horizons”, which culminate in Horizon 3 with Australia as a leader of the global frontier in developing cybertechnologies and adapting to risk and opportunities.
Last year marked the end of Horizon 1 (“Strengthen our foundations”), which aimed to address critical gaps, build protections, and support an initial uplift in cybermaturity. Between July and August 2025, the government conducted a public consultation concerning Horizon 2 (“Expand our search”). The government has moved into industry co-design on specific actions and initiatives; however, no substantive announcements have yet been made. Originally, Horizon 2 was intended to involve scaling Australia’s “maturity across the whole economy” through investments in the broader cyber-ecosystem and workforce.
The government has grounded its vision in six “shields” or “layers of defence” comprising the businesses and citizens, safe technology, world-class threat sharing and blocking, protected critical infrastructure, sovereign capabilities, and resilient region and global leadership. It has set out in its Action Plan different actions and objectives for each shield.
While the co-design process of Horizon 2 and any amendments to the Strategy and the Action Plan are still being contemplated, it is expected that changes to Australia’s overall strategy will be announced in the next 12 months.
Australia has a broad system of federal, state, and territory-based laws which govern data protection, cybersecurity, and cybercrime.
Data Protection
Entities dealing with personal information in Australia should also be aware of their obligations with respect to:
Further definitions and details on the Privacy Act are set out in 6.1 Cybersecurity and Data Protection.
Cybersecurity
Cybersecurity laws in Australia are primarily governed under sector-specific federal laws, and include the following.
There are additional laws that are highly relevant to the cybersecurity space that are less sector-specific, such as consumer law, specifically the Competition and Consumer Act 2010 (Cth) (the “Consumer Act”) which addresses consumer affairs, including consumer data protection and cyberscams.
Cybercrime
Overlaying the above are various cybercrime offences in Australia at the federal, state, and territory levels. These offences broadly encompass two categories:
Federally, cybercrime is criminalised under Parts 10.6 and 10.7 of the Schedule to the Criminal Code Act 1995 (Cth) (the “Criminal Code”), which sets out a variety of offences with maximum penalties ranging from fine-only through to life imprisonment.
Organisations should note that in addition to the Criminal Code:
Australian states and territories also have their own criminal laws which govern cybercrime offences.
Other Laws
Areas that are also related to cybersecurity include:
Australia has a range of federal, state, and territory regulators and agencies which deal with cybersecurity.
The overarching government agencies are:
While the key regulators and enforcement bodies include:
Specifically in relation to criminal enforcement, the following regulators are key:
Each of the above are addressed below.
Overarching Government Agencies
DoHA
The DoHA is the lead government department for cyberpolicy. The DoHA develops cybersecurity and cybercrime law and policy, implements Australia’s national cybersecurity strategy, and responds to international and domestic cybersecurity threats and opportunities, including in the areas of critical infrastructure and emerging technologies. The DoHA also has responsibility for cybersecurity and cybercrime operational agencies including the AFP, ACIC, AUSTRAC, and ASIO.
ASD, ACSC and CERT
The ASD is Australia’s operational lead on cybersecurity and plays both a signals intelligence and information security role. The ASD undertakes cyberthreat monitoring and conducts defensive, disruption, and offensive cyber-operations offshore to support military operations and to counter terrorism, cyber-espionage, and serious cyber-enabled crime. The ASD also advises and co-ordinates operational responses to cyber-intrusions on government, critical infrastructure, information networks and other systems of national significance.
Within the ASD sits the Australian Cyber Security Centre (ACSC). The ACSC drives cyber-resilience across the whole Australian economy including with respect to critical infrastructure, government, large organisations and small to medium businesses, academia, NGOs, and the broader Australian community. The ACSC provides general information, advice, and assistance to Australian organisations and the public on cyberthreats and it collaborates with business, government, and the community to increase cyber-resilience across Australia.
The ACSC also runs the Computer Emergency Response Team (CERT), which provides advice and support to industry on cybersecurity issues affecting Australia’s critical infrastructure and other systems of national significance.
Other key government bodies
At this juncture, the following bodies should also be noted:
Data Protection and Privacy
The OAIC is the federal privacy and information regulator with a range of functions and powers to investigate and resolve privacy complaints, enforce privacy compliance, make determinations, and provide remedies for breaches under the notifiable data breach (NDB) scheme. The OAIC operates by reference to the Privacy Act, the My Health Records Act, the Telecommunications Act, the TIA Act, and recently the Digital ID Act.
The remedies range from enforceable undertakings to civil penalties of 2,000 penalty units (approximately AUD660,000); but may also involve imprisonment. Since December 2022, serious and repeated interferences with privacy may attract a penalty of up to:
There are also state and territory privacy commissioners which administer state and territory-based privacy and health information laws. These include:
Critical Infrastructure Cybersecurity
The CIC is part of the DoHA and is the federal regulator of the SOCI Act and certain provisions of the Telecommunications Act with powers to investigate, audit, and enforce on compliance matters.
The CIC also has the ability to make recommendations to DoHA and the Home Affairs Minister on whether their information-gathering powers and directions powers should be exercised. The CIC additionally has enforcement powers which allows it to issue penalties for non-compliance that range from performance injunctions, enforceable undertakings, civil penalties of up to 120 penalty units (AUD39,600), or seek two years’ imprisonment.
Telecommunications, Broadcasting and Marketing Cybersecurity
The ACMA is Australia’s regulator for broadcasting, telecommunication, and certain online content and provides licensing to industry providers. ACMA has specific regulatory powers under the Telecommunications Act, the TIA Act, the Spam Act, and the DNCR Act to investigate and resolve complaints and enforce compliance.
In dealing with non-compliance, ACMA is empowered to issue warnings, infringement notices, enforceable undertakings, and remedial directions. ACMA is further able to cancel or impose conditions on licences and accreditations. ACMA also has the ability to commence civil proceedings or refer matters for criminal prosecution.
Additionally, the Office of the eSafety Commissioner (the “eSafety Commissioner”) has powers to promote and regulate online safety with respect to telecommunications, broadcasting, and other online industries. However, the eSafety Commissioner cannot investigate matters of cybercrime. Penalties range from takedown notices and blocking directions to infringement notices and injunction proceedings.
Corporations, Consumers and Financial Services Cybersecurity
ASIC is Australia’s corporate, market, and financial services regulator. It regulates publicly-listed corporations under the Corporations Act and is empowered to investigate and take action against corporations, directors, and officers for non-compliance with the Corporations Act, including cybersecurity issues.
APRA regulates certain finance, banking, insurance, and superannuation entities and issues regulatory guidance (eg, information security standards CPS 234). APRA has powers to supervise, monitor, and intervene in matters of cybersecurity for regulated entities and has a range of enforcement powers to deal with breaches of its standards. Such powers involve APRA issuing infringement notices, providing directions or enforceable undertakings, imposing licensing conditions, disqualifying senior officials, and commencing court-based action.
The ACCC is Australia’s competition regulator and consumer protector, and may, where appropriate, undertake enforcement action against breaches of the Consumer Act, including breaches involving cybersecurity, cybercrime, and cyberscam issues. The ACCC additionally:
Also relevant for the financial sector is that OAIC regulates the aspects of the Privacy Act which deal with credit reporting obligations and the credit reporting code, which imposes certain conditions on entities that hold credit-related personal information.
Cybercrime
Cybercrime at the federal level is investigated and enforced by the AFP and prosecuted by the CDPP. The AFP have a dedicated Cybercrime Operations team comprising investigators, technical specialists, and intelligence analysts who operate across multiple jurisdictions to conduct cyber-assessments and to triage, investigate, and disrupt cybercrime.
More specifically:
State and territory-based police and prosecution agencies investigate, enforce and prosecute state and territory cybercrimes.
Australia’s critical infrastructure and assets are regulated through Commonwealth, state, and territory legislation, with a particular emphasis on the SOCI Act. That said, there is broader legislation, such as the Privacy Act and Cyber Security Act, and more sector-specific legislation, such as the Telecommunications Act, that cannot be ignored.
The SOCI Act currently regulates certain assets across eleven sectors: communications, data storage and processing, financial services, energy, food and grocery, health and medical, higher education and research, space technology, transport, water and sewerage, and the defence industry. In November 2025, telecommunications security obligations (which were previously under the Telecommunication Sector Security Reforms (TSSR)) were moved into the SOCI, a change implemented by the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and Prevention) Act 2024 (Cth) (the “2024 SOCI Amendment Act”).
Notwithstanding recent reforms which clarified the SOCI Act, the exact parameters of the legislation are broad and complex, and extend to various participants in a supply chain including “responsible entities”, “reporting entities”, “direct interest holders”, “managed service providers”, and “operators”. Some of these definitions are asset-specific, but for our purposes, it is important to note that a “responsible entity” is generally the entity that owns, is licensed, or otherwise responsible for operating the asset.
Further, despite the imminent shift of the TSSR and its obligations to the SOCI Act, these obligations still remain in force and apply to the relevant infrastructure as is. The TSSR are applicable to carriers, carriage service providers, and carriage service intermediaries.
Cyber Security Act
Additionally, there are cybersecurity obligations imposed on critical infrastructure under the Cyber Security Act where they constitute “a reporting business entity”.
A “reporting business entity” is an entity that:
The SOCI Act imposes requirements on owners and operators of assets across various fields. The exact requirements vary depending on the particular asset/industry; however, it may include a requirement to:
Further still, the SOCI Act and associated rules impose enhanced cybersecurity obligations on assets designated as “systems of national significance” (SoNS). These must be assets that are already considered a “critical infrastructure asset”, but also that they are of “national significance”. These designations are private and confidential so as to avoid publicising their significance to malicious actors. Reports indicate that over 200 systems have been designated to date.
A responsible entity for a SoNS may be required to:
It is also worth noting that the SOCI Act also includes:
The SOCI Act
The SOCI Act imposes mandatory incident reporting obligations for responsible entities of critical infrastructure assets with regards to cybersecurity incidents.
Responsible entities must report cybersecurity incidents that have a significant or relevant impact on their asset. In other words, a “responsible entity” must make a report when it becomes aware of the following.
A “cyber security incident”, as defined under Section 12M, is the:
Either of these reports must be given to the ASD (unless another relevant Commonwealth body is specified in the rules). Failure to make a report at all or in writing, or in the approved form, is punishable by 50 penalty units (AUD16,500 fine).
The Cyber Security Act
Irrespective of whether the cybersecurity incident meets the above significance or relevance thresholds, most critical infrastructure assets (being “a reporting business entity”) have additional reporting obligations under the Cyber Security Act.
In summary, there is an obligation to report to the ASD (or another designated Commonwealth agency) where:
Such a report must be given with 72 hours of the reporting business entity becoming aware of the payment and must contain certain information.
A “cyber security incident” for these purposes is broader than under the SOCI Act. Under the Cyber Security Act, a “cyber security incident” is an act, event or circumstance covered by the SOCI Act but can also be an act, event, or circumstance if it involves “unauthorised impairment of electronic communication to or from a computer” (even mere interception).
However, in the case of the latter, the incident must involve a critical infrastructure asset; involve an Australian corporation (attracting paragraph 51(xx) of the Constitution); (actually or is reasonably expected to be) effected by means of “telegraphic, telephonic or other like service”; (actually, probably, or it is reasonable to expect it) impeded or impaired “the ability of a computer to connect to such a service”; or (probably or is reasonably expected to have) prejudiced Australia’s social/economic stability, defence or national security.
Voluntary Incident Reporting Obligations
The ACSC has a cyber-incident reporting portal through which critical asset owners are encouraged to voluntarily report cybersecurity incidents.
Any impacted entity carrying or a business in Australia or otherwise a responsible entity for critical infrastructure is now being statutorily encouraged to make voluntary reports to the NCS Coordinator under the Cyber Security Act, even where it is unclear if an incident is a cybersecurity incident.
Other Mandatory Reporting Obligations
Other reporting obligations under the SOCI Act for critical infrastructure assets include:
See additionally relevant obligations in 6.1 Cybersecurity and Data Protection.
Criminal Offences
Related to infrastructure, Part 10.6 of the Criminal Code places obligations on providers of content or hosting services to notify the AFP as to the existence of material displaying “abhorrent violent conduct” (if occurring in Australia) and, in any event, to expeditiously remove or cease to host such material.
Relevantly, this reporting obligation is supplemented by the OSA, which empowers the eSafety Commissioner to issue removal notices requiring hosting service providers to remove cyberbullying, cyber-abuse, and other harmful material within strict statutory timeframes.
The Australian government considers “the responsibility for ensuring the continuity of operations and the provision of essential services to the Australian economy and community” as being shared “between owners and operators of critical infrastructure, state and territory governments and the Australian government”.
Generally speaking, government bodies may also be captured within the scope of legislative regimes such as the Privacy Act and therefore have the same (or similar) obligations as their private-sphere counterparts. However, the SOCI Act does not apply to the Commonwealth or a body corporate established under Commonwealth law unless so declared or prescribed.
The Australian government is responsible for the “final defence” of Australian infrastructure and cybersecurity. To this end, the SOCI Act grants the Minister last resort “government assistance measures” and powers where a cybersecurity incident relates to a declared national emergency, or elsewhere there is a material risk that a cybersecurity incident has, is, or will likely seriously prejudice the Australia’s social or economic stability, defence, or national security. These include the heavily circumscribed Ministerial power to request an authorised agency to intervene in relation to computer-related activities where an entity is unwilling or unable to respond to an incident.
Additionally, the Cyber Incident Review Board (CIRB) has been established as an independent statutory advisory body responsible for conducting no-fault, post-incident reviews of significant cybersecurity incidents in Australia. The CIRB post review report will contain recommendations to government and industry about actions to prevent, detect, respond to, or minimise the impact of future cybersecurity incidents of a similar nature.
In pursuit of national cohesion, the state authorities adopt the following approaches.
Even for the financial sector, there is a patchwork of legislation covering the financial sector’s operational resilience, leading to variations in scope. This legislation includes the SOCI Act, the Corporations Act, the Banking Ac 1959 (Cth), and the Insurance Act 1973 (Cth).
Corporations Act
As a starting point, the Corporations Act imposes a duty to exercise “care and diligence” on all directors and officers of corporations (Section 180), which inherently involves considerations relating to cybersecurity resilience. But more specifically, the Corporations Act requires corporations holding financial licences to have adequate risk management systems (Section 912A).
CPS 234
On top of this, APRA’s CPS 234 regulates information security standards for APRA-regulated financial, insurance, and superannuation entities.
Other Legislation (SOCI Act and Cyber Security Act)
Additionally, other legislation and regulation applicable to sectors beyond the financial is equally relevant here. These include the SOCI Act, since the financial services and markets sector does fall within its scope, so as to include certain banking assets, superannuation assets, insurance assets, and financial market infrastructure assets (see 2. Critical Infrastructure Cybersecurity Regulation). Each of these are, in turn, defined and cover a range of assets owned or operated by entities with certain Australian market licensees, CS facility licensees, benchmark administrators, and more, but most with the underlying condition that the asset is “critical to the security and reliability of the financial services and markets sector”.
Those that fall outside the scope of the SOCI Act may fall within the scope of the Cyber Security Act, which imposes reporting obligations on “reporting business entities”. See 2. Critical Infrastructure Cybersecurity Regulation.
Information and communications technology (ICT) service providers are not expressly defined in Australia. However, legislation does address “data processing or storage” assets and providers. Such an asset may be considered itself a critical infrastructure asset, separate to other critical infrastructure, and therefore fall within the scope of the SOCI Act.
Specifically, an entity that owns or operates a “data storage or processing asset” will be considered a responsible entity under the SOCI Act and their asset “critical” if:
Further, the 2024 SOCI Amendment Act clarified the SOCI Act so that it included secondary assets who hold business critical data relating to the primary asset. Notably, the intent behind these amendments is not to capture all non-operational systems holding business critical data; rather only those where vulnerabilities could significantly impact critical infrastructure assets. Examples of relevant operational data included network blueprints, encryption keys, algorithms, operational system code, and tactics, techniques and procedures.
The regulations may specifically exclude other such assets. See 2. Critical Infrastructure Cybersecurity Regulation for their obligations and responsibilities.
There is no specific legislation for “digital operational resilience” for the financial sector as seen in the European jurisdictions; however, the objectives of enabling the financial sector to be or remain resilient in the face of serious operational disruption and prevent/mitigate cyberthreats are reflected in the patchwork of legislation.
The SOCI Act
Specifically looking at the obligations under the SOCI Act for the financial sector, although financial business using or constituting critical infrastructure assets have the same incident reporting obligations already covered (see 2.3 Incident Response and Notification Obligations), such services do not have the obligations to register as critical assets and to have a CIRMP under the SOCI Act (except where they are “payment services”). As an aside, a financial service can be classified as a SoNS under the SOCI Act, attracting the enhanced cybersecurity obligations.
The Corporations Act
Notwithstanding the position under the SOCI Act, financial services are likely already required to be registered with APRA and/or obtain a form of financial service licensing; and in doing the latter, must, inter alia, provide their services “efficiently and fairly” and have an adequate risk management program. Australian courts have already confirmed that such a risk management plan must ensure adequate cybersecurity and cyber-resilience measures are adequately implemented across its business.
CPS 234
APRA’s CPS 234 requires APRA-regulated financial, insurance, and superannuation entities to comply with legally binding minimum standards of information security, including by:
These standards provide that an entity’s board is ultimately responsible for information security and that the board must ensure that its entity maintains information security in a manner that is commensurate with the size and vulnerability of that entity’s information assets.
APRA-regulated entities are required to externally audit their organisation’s compliance with CPS 234 and report to APRA in a timely manner.
If organisations are non-compliant, they may be required to issue breach notices and create rectification plans. If organisations are unable to comply with the standards following this process, APRA may undertake a more formal enforcement process which may include enforceable undertakings or court proceedings.
The Cyber Security Act
In addition to the reporting obligations under the CPS 234, certain responsible entities concerning “critical financial market infrastructure asset” (2.1 Scope of Critical Infrastructure Cybersecurity Regulation) also have ransomware reporting obligations under the Cyber Security Act (see 2.3 Incident Response and Notification Obligations).
There has been no enforcement action against “data processing or storage” providers or other ICT services. In fact, there has been no enforcement action reported in relation to the SOCI Act.
According to CISC’s Compliance and Enforcement Strategy published in April 2022, the CISC prioritises industry partnership and pursues a co-operative, educative, and overall voluntary approach. Although it has a range of regulatory options available, it is yet to use any penalising enforcement action.
Depending on the breach, action against ICTs may also come from other regulators such as the OAIC.
Government Transfers
Although there are limits on the use of the cybersecurity information provided by reporting business entities under the Cyber Security Act and Intelligence Services Act 2001 (Cth), these limitations are unlikely to prevent the ASD, National Cyber Security Coordinator (the “NCS Coordinator”), or CIRB from disclosing the information to foreign authorities or joint partnerships for particular purposes.
For example, if information is voluntarily provided in relation to a significant cybersecurity incident, the NCS Coordinator may disclose this information for the purpose of “coordinating the whole of Government response” or to inform Commonwealth ministers. Those ministers may then disclose the same information for a “permitted cyber security purpose”, such as mitigating material risks that could prejudice Australia’s social/economic stability, defence, or national security. This onward disclosure may include sharing and international transfers of information to foreign authorities or co-ordinated partnerships.
Market Transfers
The Privacy Act
The principal legislation governing data transfers is the Privacy Act. International (cross-border) disclosures of personal information are addressed primarily by Chapter 8 of the Australian Privacy Principles (APP 8).
These principles require APP entities to “take such steps as are reasonable in the circumstances to ensure that the overseas recipient does not breach the Australian Privacy Principles”. What is “reasonable” depends on one’s specific circumstances but will usually involve a contract incorporating the APP 8 and the Australian entities monitoring or at least assessing the overseas entity’s systems. Importantly, APP 8 is not limited to where there is an active transfer of data but rather extends to wherever data is accessible to an overseas entity (eg, stored on servers in Australia, but accessible by overseas entities).
Since November 2024, the government has been able to add countries to a “white list”, a binding scheme that recognised countries as being on par to and therefore an exception to the APP 8 requirements. To date, no white list has been announced.
The CDR regime
In respect of data transfers more generally, Part IVD of the Consumer Act regulates the handling (including sharing) of CDR. The CDR was rolled out to the banking and energy sectors in 2020 and 2022 respectively. In 2023, the government paused the roll-out the superannuation, insurance, and telecommunications sectors (and then non-bank lenders and Buy Now Pay Later products) and remains in hiatus since an August 2024 report found compliance costs exceeded initial estimates. Enforcement continues with the Commonwealth Bank of Australia (CBA) receiving four infringement notices totalling AUD792,000 from the ACCC under the CDR scheme. CBA had failed to enable data sharing on accounts with a Trading Entity Business Name (TEBN) customer profile.
However, the Consumer Affairs Ministers across Australia recently renewed their commitment to a strong national consumer protection framework, including progressing nation-wide reforms to protect consumers from unfair trading practices. To many, including the Consumer Policy Research Centre, this suggests addressing questionable transfer and use of consumer data through subscriptions, digital design tactics or “dark patterns”, and other deceptive practices. What impact this has on data transfers remains to be seen.
Prohibitions
Certain information is prohibited from being held or taken outside Australia, such as records held for the purposes of the My Health Record system. Breaching this prohibition could result in a maximum criminal penalty of five years imprisonment and AUD99,000; or a civil penalty of AUD495,000.
Cybercrime
For completeness, it should also be noted that unauthorised access to computer systems (hacking, forceable transfers, etc) is criminalised by both State and Federal legislation. For example, persons suspected of unauthorised access to computer systems are charged pursuant to Section 478.1 of the Criminal Code, which provides for the offence of “Unauthorised access to, or modification of, restricted data”.
These offences have extraterritorial application, meaning that conduct undertaken outside Australia can still be charged and prosecuted under Australian law if:
Digital ID
The Digital ID Act and the Digital ID (Transitional and Consequential Provisions) Act 2024 (Cth) restrict an accredited entity on the collection, use, and disclosure of biometrics and other personal information. Although the Digital ID Rules can address the storing and transfer of information outside Australia and were expected to take the form of blanket prohibitions (with minimal exemptions), no such rules have yet been introduced.
Threat-led penetration testing (TLPT) is the testing of systems by replicating the methods used by actual threat actors against. Generally speaking, TLPT is not a requirement in Australia.
Currently, only those critical infrastructure assets designated as a SoNS may be required to undertake:
TLPT is also a component of regulatory guidance (eg, ASD’s best practices for deploying secure and resilient AI systems).
On the flipside, unsolicited/unauthorised penetration testing activity could be captured by Section 478.1 of the Criminal Code, which provides for the offence of “[un]authorised access to, or modification of, restricted data”.
There is no specific legislation for cyber-resilience in Australia. However, cyber-resilience requirements have legislative status across various contexts, including:
Under the Cyber Security Act, the government is moving towards mandatory security standards for smart devices, with the Cyber Security (Security Standards for Smart Device) Rules 2025 (Cth) set to take effect from 4 March 2026. This framework will be primarily targeted towards the manufacturers and suppliers of these devices.
Cyber-resilience obligations are imposed on certain responsible entities of critical infrastructure asset by way of the Critical Infrastructure Risk Management Program, which must be adopted, reviewed, and updated. The purpose of these programmes is to identify each hazard with a material risk and minimise, eliminate, or mitigate that hazard (or its material risk). The relevant responsible entities and specific requirements for these programs are set out in the Security of Critical Infrastructure (Critical infrastructure risk management program) Rules (LIN 23/006) 2023.
Additionally for APRA-regulated entities, Prudential Standard CPS 234 imposes obligations relating to information security capability, including maintaining controls over information assets and oversight of third-party service providers.
Other cyber-resilience obligations for critical infrastructure, the broader financial sector and others, as well as relevant enforcement mechanisms, are discussed elsewhere in this chapter.
There is no single legislation in Australia addressing broad-sweeping information technology and cybersecurity (ITC) certification procedures.
However, ITC-relevant certification provisions are relevant to the SOCI Act. Specifically, where a responsible entity holds a certain “certificate of hosting certification (strategic level)” that relates to its critical infrastructure asset, that entity is exempt from needing a critical infrastructure risk management programme. This certificate must be issued under a scheme that is administered by the Commonwealth and is known as the “Hosting Certification Framework” (HCF).
This HCF is only available to data centre providers and cloud service providers; and approximately 11 data centre facilities and 14 cloud services were certified. However, the DoHA has paused the HCF registration process until reforms have been completed in line with the DoHA’s Protective Security Policy Framework released on 24 July 2025 and tranche 2 of the Commonwealth Cyber Security Uplift reforms. These reforms are still ongoing.
For additional context, since 30 June 2022, all government contracts for hosting services must be with certified service providers. However, this policy requirement is not restricted to “strategic level” certification per the SOCI Act. Under this framework, there are three certification levels: “strategic”, “assured”, and “uncertified”. Depending on a government department’s risk profile and data set, they may contract with a “Certified Assured Service Provider”.
At present, Australia does not operate mandatory, sector-specific cybersecurity certification schemes for industries such as the automotive sector, nor does cybersecurity certification generally operate as a condition of market access outside defined government procurement contexts.
The Privacy Act
Scope
Federally, data containing personal information is protected under the Privacy Act, which regulates the handling of this information by “APP entities”.
At this juncture, it is important to note two definitions.
Schedule 1 of the Privacy Act contains 13 Australian Privacy Principles, which are minimum standards for processing and handling personal information by APP entities. The Privacy Act also requires mandatory reporting for certain APP breaches under the NDB scheme. Breaches of the Privacy Act may result in investigation and enforcement action by the OAIC.
Reporting obligations (the NDB scheme)
The NDB scheme requires APP entities to notify both affected individuals and the OAIC where there are reasonable grounds to believe that an “eligible data breach” has occurred. In short, as per Section 26WE(2) of the Privacy Act, an “eligible data breach” occurs where:
However, Section 26WF of the Privacy Act creates an exception to reporting such an incident, where the entity in question takes remedial action to ensure that the breach does not cause serious harm to the individuals concerned.
Notably, specific data breaches related to certain health records are excluded from this scheme and are to be addressed under Section 75 of the My Health Records Act (see 6.3 Cybersecurity in the Healthcare Sector).
The ACSC provides an overarching definition for cybersecurity events in its Guidelines for Cyber Security Incidents. In these Guidelines, a cybersecurity event is “an occurrence of a system, service or network state indicating a possible breach of security policy, failure of safeguards or a previously unknown situation that may be relevant to security”. While there is no general legislative definition of a cybersecurity event, the SOCI Act in Section 12M provides a limited, more complex definition.
Statutory tort
Since 2024, the Privacy Act has contained a statutory tort for serious invasions of privacy, giving individuals a route to seek redress for privacy harms in the courts.
State and Territory Reporting Obligations
There are also schemes at the state/territory level. For example, both NSW and Queensland had introduced mandatory notification of data breach schemes via, respectively, the Privacy and Personal Information Protection Amendment Act 2022 (NSW) (entered into force 28 November 2023) and Information Privacy and Other Legislation Amendment Act 2023 (Qld) (commencement date to be set by proclamation). These largely mirror the federal scheme.
Other Reporting Obligations
There is other relevant legislation for data protection and reporting obligations, including in relation to certain health records (see 6.3 Cybersecurity in the Healthcare Sector), the financial sector (3. Operational Resilience in the Financial Sector) and critical infrastructure assets (2. Critical Infrastructure Cybersecurity Regulation).
At the time of writing, there is no AI-specific regulation on AI; however, there is a patchwork of laws regulating critical infrastructure, privacy, consumer protection, data security, and more that all touch on aspects of AI development and use.
Further, Australia has voluntary instruments, including the following.
Similarly, regulators such as ASD, in conjunction with foreign authorities such as the U.S. National Security Agency’s Artificial Intelligence Security Centre, has published guidance on deploying, engaging with, and developing AI systems. On 24 January 2024, the ASD alongside international partners published a report titled “Engaging with artificial intelligence”, which recognises privacy issues such as when organisations provide customer data to generative AI systems.
Further, the ASD has endorsed the Cybersecurity Performance Goals (CPGs) developed by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST).
In Australia, healthcare provider organisations must generally notify the Australian Digital Health Agency (ADHA) of potential risk or actual data breaches relating to the My Health Record system.
The ADHA has provided a guide on how to notify the agency if there is a risk or if an actual data breach has occurred. The four steps are: Contain, Assess, Manage Notifications, and Continue Investigation.
Reporting Obligations
Certain data breaches relating to My Health Record information or the system itself are to be reported under Section 75 of the My Health Records Act (rather than through the NDB scheme under the Privacy Act).
Section 75 of the My Health Records Act requires a report where there has (actually or potentially) been unauthorised collection, use, or disclosure of health information included in a healthcare recipient’s My Health Record or the (actual or potential) compromise of the security or integrity of the My Health Record. This report must be made to the relevant system operator and/or the OAIC. Subsequently, all “affected healthcare recipients” must also be notified of the compromise or unauthorised disclosure.
Other than those data breaches to which the My Health Records Act applies, medical data would generally be personal information and covered by the federal NDB scheme (see 6.1 Cybersecurity and Data Protection).
Level 9, 299 Elizabeth Street
Sydney NSW 2000
Australia
+61 292 648 884
dm@ngm.com www.ngm.com.au
Introduction
Since releasing the 2023-2030 Australian Cyber Security Strategy (the “CS Strategy”) on 22 November 2023, the Australian government has pursued sweeping reforms to address the gaps in cybersecurity. The government aims to become “a world leader in cyber security by 2030”. The CS Strategy is aimed at strengthening Australia’s cyberdefences and supporting people and businesses to be resilient to and recover quickly from cyber-attacks. Grounded in the 2023-2030 Australian Cyber Security Strategy: Action Plan (the “Action Plan”), the CS Strategy is planned out across three “Horizons” targeting six “shields” or “layers of defence”. Although Australia has already entered Horizon 2 (“Expand our search”), the government is still assessing progress under Horizon 1 and determining what the next stage truly looks like: ie, scaling cybermaturity across the whole economy, making investments, and growing a diverse cyberworkforce. The effectiveness of the actions implemented to date and of the reforms are also uncertain, as is expected when a country starts taking unprecedented steps in an environment that demands consistent reassessment and a “set and forget” approach is not an option.
Between 2024 and 2025, Australia introduced a range of leading reforms, from the Australian-first cybersecurity legislation under the Cybersecurity Act package to the world-first social media ban via the Online Safety Amendment (Social Media Minimum Age) Act 2024 (Cth). As the dust continues to settle, further reform is to be tabled and law enforcement approaches are evolving.
Threat Landscape
Victim typologies
The Australian Signals Directorate (ASD) Annual Cyber Threat Report for 2024-25 (the “ASD 2024-25 Report”) indicates an 11% increase in incidents reported to ASD since the 2023-24 period.
In terms of the top five sectors reporting cyberthreats, there was a shift from FY2023-24 (and the previous year). The top two remained the same, being federal government and state/local governments, however, financial and insurance services rose from eighth position (4%) to third (7%), usurping the three sectors previously tied for fourth, which still contained healthcare and social assistance; professional, scientific and technical services (increased from 5% to 6%); as well as information media and telecommunications; with education and training maintaining its 5% share, but fell to a tie for seventh place.
The ASD 2024-25 Report flagged that the ASD responded to 1,200 cybersecurity incidents and received over 84,700 cybercrime reports (a further 3% drop, compared to a 7% drop the previous year). The crime trends differ amongst targets, as outlined below.
Another key source of information relates to the notifiable data breach (NDB) scheme under the Privacy Act 1988 (Cth), which requires notification of eligible data breaches. The Office of the Australian Information Commissioner’s latest report covers January to July 2025, which indicates there were 532 notifications received and 178 (33%) resulted from cybersecurity incidents. These incidents include:
The top five sectors primarily reflect the ASD’s statistics, being from first to fifth:
Cybercrime-as-a-service
In the 2024-25 Report, the ASD also describes the “cybercrime ecosystem” and highlights the professionalisation of certain services “that support cybercriminal activities” and enable their crimes. The five “enable services” identified are as follows.
While some of these services are arguably criminal in nature, others are painted as “cybercrime-as-a-service” with extremely broad strokes. Whether the service providers are criminal should turn on the purpose or intent of their development. Encryption, network providers, and decentralised cryptocurrency exchanges have legitimate purposes and genuine uses that are seemingly ignored by ASD and other regulators. Specific instances are often created with the primary interest of privacy, universality, and freedom. However, their criminality appears to turn on their responsiveness to regulators’ demands or the intentions of certain users.
Such behaviour is illustrated by the Australian Criminal Intelligence Commission (ACIC) in its submission to the Parliamentary Joint Committee on Intelligence and Security’s review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 when it stated “ACIC observation shows there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform”. In the same submission, it recognised encryption and anonymising technologies as having a “valuable role in protecting the privacy and data of Australians”. ACIC later clarified it was only referring to “encrypted communication platforms which can only be used to communicate with similar devices, such as SkyECC, Encrochat, and Phantom Secure” and which it deemed had no “legitimate use before they were disrupted”.
The danger of such broad and unnuanced rhetoric is that it bleeds into the legislative and regulatory approaches, leading to legitimate services being criminalised. Such action could destabilise existing cybercriminal models and offer some (temporary) measure of protection to the public. However, such actions could be at the expense of societal innovation, legitimate business, and, most concerningly, criminal law principles, including its focus on criminal intent.
Practical Advice
The firm's experience aligns with the above data, with both individuals and businesses coming to Nyman Gibson Miralis for compliance and security advice, but also in the aftermath of money loss, information exposure, or both.
Some general advice to proactively combat common cyber-risks include the following.
In the aftermath of a cybersecurity event, it is critical that individuals and businesses engage a law firm as soon as possible. For individuals, this is to ensure they know their rights in terms of law enforcement, banks, and other protections. While for businesses, the legal and risk landscape is even more complex and includes reporting obligations, internal investigations, listing announcements, corporate duties, and more. Hiring legal experts is therefore key.
Legislative and Regulatory Reform
Cyber Security Act
In 2024, the Australian government passed an Australian first: the Cyber Security Act 2024, a statute specifically aimed at cybersecurity. This Act included:
New roles
The full impact of the two new roles is still to be seen.
The first NCS Co-ordinator, Lieutenant General Michelle McGuinness CSC, has operated mainly in the background, with the only publicised event being the cybersecurity incident against MediSecure.
Meanwhile, the Minister of Home Affairs has still to appoint members to the CIRB or the Expert Panel that is to advise the Board. Accordingly, the continued absence of this independent advisory body means that Australia still lacks the no-fault, post-incident reviews of significant cybersecurity incidents in Australia. In turn, this leads to an increase in regulators undertaking educational and co-operative regulatory approaches, despite their outward pivots to monitoring and enforcement approaches.
Mandatory ransomware reporting obligations
On 30 May 2025, the mandatory ransomware reporting obligations under Part 3 of the Cyber Security Act 2024 (Cth) commenced with the release of the outstanding details under the Cyber Security (Ransomware Payment Reporting) Rules 2025. Per these new rules, businesses with annual turnovers of AUD3 million or more and entities responsible for critical infrastructure must report a cybersecurity incident within 72 hours of making the payment (or becoming aware of a ransomware being made). How this new information is used to inform key regulators and their approaches in this space remains to be seen.
The broader framework remains the same. The Act implements “limited use” obligations on the bodies who receive the information (primarily or secondarily). In doing so, the Act excludes the use of the information for investigations or enforcement action, unless it is a contravention of the reporting obligations themselves or a law attracting “a penalty or sanction for a criminal offence”. This prevents the information from being used in most regulatory enforcement actions, but leaves the entities exposed to criminal law provisions.
While individuals (including directors) may be able to rely on the privilege against self-incrimination where criminal law issues become live, the business entity itself is unlikely to have such protections given corporate entities do not have such a privilege under Australian law. Public suggestions of including a safe harbour provision were dismissed by the Australian government and this may complicate compliance with this obligation, particularly if the Australian government relies on criminal sanctions (alone or as alternatives to civil penalties) to enforce cybersecurity legislation.
Contrastingly, there are expanded protections for any information voluntarily provided to the National Cyber Security Co-ordinator concerning an actual or potential cybersecurity incident, with Section 42 rendering such information inadmissible in criminal proceedings (except in very specific circumstances) and any “proceedings for breach of any other Commonwealth, State or Territory law (including the common law)”. However, these protections do not prevent authorities from obtaining the information via other methods and relying on it thereafter.
Online Safety Act
On 10 December 2025, the under 16-year-old ban mandated by the Online Safety Amendment (Social Media Minimum Age) Act 2024 (Cth) came into effect and more than five million accounts were deactivated. This legislation passed 12 months prior and imposed an obligation on ten social media platforms to take “reasonable steps” to prevent age-restricted users from having an account, imposes restrictions on the kind of information that can be collected, and how this information is stored, used, and protected. Since the legislation’s passing, the government adopted the Online Safety (Age-Restricted Social Media Platforms) Rules 2025 and the eSafety Commissioner has released guidance. Reportedly, several countries, including Denmark, France, New Zealand, and Malaysia, as well as the EU, have said they are considering similar bans.
Enforcement
ASIC enforcement action
In 2025, ASIC has ramped up its enforcement action and commenced its second and third cybersecurity enforcement actions against AFS licensees.
The first such action was finalised in May 2022, when the Federal Court ruled another AFS licensee, RI Advice, had breached its license obligations to act efficiently and fairly when it failed to have adequate risk management systems to manage its cybersecurity risks.
Both of these cases appear to have involved a cyber-incident, with a hacker accessing FIIG’s IT network undetected from 19 May to 8 June 2023, only coming to FIIG’s attention when contacted by ASD’s ACSC regarding a potential cybersecurity incident on 2 June 2023 and failing to investigate for six days; and several of Fortnum’s authorised representatives experiencing cyber-incidents in or around May 2023, including one major cyber-attack that led to the data of 9,000 clients being published online.
ASIC’s position is that cyber-risk management is a non-negotiable part of AFSL compliance and a key part of a licensee’s duty to provide services efficiently, honestly, and fairly under Section 912A of the Corporations Act. The importance is underscored by ASIC’s priorities announced in its Corporate Plan (2025-26), as it enters another year of its multi-year cyber-resilience transformation programme.
These two cases are ones to watch not, only for financial licensees, but also all businesses with cybersecurity and data-protection obligations. There still remains an ongoing concern that this could become a hot spot for regulator “pile-ons”, given that data breaches and cybersecurity issues have generally been regulated from a privacy perspective by the Office of the Australian Information Commissioner (OAIC). While this concern remains, the regulators appear to be staying in each their own siloed lanes.
Technical assistance requests
In a world-first, the Telecommunications (Assistance and Access) Act 2018 (Cth) granted the Department of Home Affairs the power to request or compel assistance from telecommunications providers and technology companies in accessing encrypted communications, such as Technical Assistance Requests (TARs), Technical Assistance Notices (TANs), and Technical Capability Notices (TCNs).
According to the latest Telecommunication (Interception and Access) Act annual report (covering 2023-24), these powers were overwhelmingly used by state police, specifically TARs (47 by NSW Police, 3 by Victorian Police, and 5 by WA police) and the ACIC (5). Most TARs were issued in relation to homicide (or related offences) or illicit drugs (38 of the 63 issued), suggesting they are indeed being reserved for serious offences, at least at the state level.
This distribution of use largely reflected previous years, with TARs being issued by state police forces or the ACIC, and no TANs or TCNs being used. In fact, in 2024, the ASIO Director stated “encryption damages intelligence coverage” in all priority counter-terrorism and counter-espionage cases; but instead of flagging an increased use of these powers, the Director called for “tech companies to do more[…] to give effect to the existing powers and to uphold existing laws”. The value in these powers that were rushed through parliament was heavily in question, as was the authorities’ capacities to properly wield them.
However, in an Australia-first, the Australian Federal Police issued two TANs during the 2023-2024. Whether this marks a shift in the AFP and other law enforcements’ capacity to properly use these powers remains to be seen.
Compliance sweep
From January 2026, the OAIC commenced its first-ever compliance sweep. This sweep involves the Privacy Commissioner reviewing whether approximately 60 entities from six sectors are complying with the Privacy Act, particularly the changes passed in 2024 by the Privacy and Other Legislation Amendment Act 2024 (Cth). The six industries relate to property, pharmaceuticals, licenced venues, car rentals, car dealerships, and second-hand dealers.
Under the Office’s regulatory powers, expanded in the December 2024 reforms, entities found to have non-compliant privacy policies may face compliance and infringement notices and penalties of up to AUD66,000. This is a marked shift in the Privacy Commissioner’s regulatory approach, from educational to enforcement.
Businesses in these six industries, and any industry that is covered by the Privacy Act, should ensure that they have up-to-date privacy policies that align with the Privacy Act, the Australian Privacy Principles, as well as any new guidance published by the Office.
Cybersecurity sanctions
The Australian government’s response to the 2022 cyber-attack against Medibank Private continues, as does its use of Magnitsky-style sanctions against cybercriminals. On 12 February 2025, the government imposed sanctions under the Autonomous Sanctions Regulations 2011 (Cth) on ZServers and five Russian employees. ZServers is reportedly a “bullet-proof hosting provider” (see “Threat Landscape”), which provided infrastructure to host and disseminate data stolen from Medibank Private in 2022. This was the first cybersanction against a business and the first sanction for the provision of services or infrastructure used to engage in cybercrime. The USA and the UK also imposed similarly targeted sanctions.
These latest sanctions make it a criminal offence to provide assets to ZServers or the five sanctioned individuals, or to use or deal with their assets, with penalties of up to ten years’ imprisonment and/or heavy fines. These sanctions also ban the individuals from entering Australia.
State-sponsored attacks
Regulators continue to be concerned about state-sponsored attacks, with the ASD releasing joint cybersecurity advisories concerning:
These advisories were co-sealed by a variety of authorities and countries, illustrating the co-ordinated and multijurisdictional approach being taken by law enforcement authorities. In an effort to proactively build priority capabilities to defend against state-sponsored cyber-actors targeting Australia’s critical infrastructure, the ASD’s ACSC has released “CI Fortify” – a new series of guidance for critical infrastructure providers.
State-sponsored cyber-operations are set only to increase with growing geopolitical tensions. Additionally, as sanctions expand globally, the sanctioned states will likely continue to turn towards co-opting actors and engage in state-sponsored hacking to supplement revenue streams.
On the Horizon
As Australia enters Horizon 2, the Australian government has taken significant leaps in 2023 to 2025, with its eyes glued on becoming the “frontier” in cybersecurity. However, as in 2024, it continues to play catch up with technology, other countries, and now, its own strategy.
Some key dates to keep an eye on include the following.
Importantly, businesses should keep an eye on the regulators as they move into a more adversarial, enforcement approach, particularly the Privacy Commissioner and ASIC. This action will shed light on how the legislative and regulatory frameworks are to be practically implemented, and the costs for not doing so.
As 2026 begins, several components of the 2024 reforms are still to be implemented and their impact is yet to be assessed. Similarly, the implications of “Horizon 2” for Australian agencies and the wider community remains unclear. Until such steps are clarified, whether 2026 will be a year of consolidating what Australia already has or a year of further developments and change, will remain uncertain.
Level 9, 299 Elizabeth Street
Sydney NSW 2000
Australia
+61 292 648 884
dm@ngm.com www.ngm.com.au