
ISACA’s 2023 Privacy in Practice report included a list of the most common privacy failures in organisations. In this post, we’ll look into these common privacy failures – and discuss how to overcome them.
ISACA identified the following eight common privacy failures:

Source: Privacy in Practice 2023 Report by ISACA
On its face, the solution to overcome this common privacy failure seems simple – schedule training and awareness activities. However, there are some factors to consider:

Read more about developing effective training programs.
Privacy by design is a framework and systems design model that identifies possible risks to the rights of data subjects and minimizes them before they can cause damage, often in a way that creates win-wins (instead of pitting privacy against other departments).
ISACA’s study revealed some interesting trends seen in organisations that adopted privacy by design, including that they are:
We’ve written before about Privacy by Design and how it can be implemented including:
Data breaches are challenging to avoid altogether in the current landscape. However, with so many data breaches being caused by human error, there is plenty of room for improvement.
We covered Australian data breaches caused by human error in our coverage of the OAIC Data Breach Report: June – December 2023.
Many organisations overlook risk analysis before undertaking projects – and the consequences can be significant. (Just ask the Australian Federal Police, which has been on the receiving end of the OAIC’s investigative lens in two instances as a result of poor risk analysis)
Privacy Impact Assessments can establish and document what is actually going on (or what will happen), provide guardrails to staff and also be able to demonstrate compliance if the regulator comes calling. They also aren’t extremely complicated or expensive to undertake, especially when considering the alternatives (fines, OAIC investigations, and poor public perception, for example).
And remember, a privacy risk assessment is quite different to a security risk assessment: you need to do both.
The OAIC’s Data Breach Report: June – December 2023 revealed that almost 20% of breaches were caused by social engineering. Social engineering is a type of cyber attack where criminals use psychology and social pressure to gather information and gain account access. And no companies or humans are immune to these attacks – in fact, there have been successful social engineering attacks against the likes of Google and Facebook (to the tune of $100 million USD), CEOs of utilities providers, and Uber.
Instilling a healthy amount of skepticism is the best way to avoid social engineering attacks within your organisation. You should also:
This privacy failure essentially refers to the mismanagement of personal information within the organisation. Creating and maintaining a data inventory within a single database is the most effective protection against this failure.
This will help everyone in the organization not only understand all the data you hold but also identify what is personal data (often one of the biggest challenges for the organization).
Your data inventory can also help minimize the data you collect and hold, helping to establish retention and deletion requirements.
We only need to think about Optus, Medibank and Latitude to appreciate the risk associated with over retention of data,
There is a suite of tools that streamline the entire data discovery, mapping, lineage, and management process. We encourage organisations to consider these automation tools, wherever possible. They can reduce the risk of human error and oversight, streamline the data management process to deliver an immediate ROI, and improve data quality.
You can read more about data inventory management in the following posts:
Legal compliance can be complex for organisations, particularly those with operations outside of Australia (such as customers in the EU or the US states with privacy laws, or global companies headquartered in Australia).
However, noncompliance with applicable laws and regulations is also indicative of poor privacy practices. There are key trends within privacy regulation, such as transparency and consent, adequate security, accuracy, and data inventory management. And, generally, maintaining high privacy standards can help organisations meet many or most of their legal compliance obligations.
Organisations looking to overcome or avoid this privacy failing should work with their privacy team to improve compliance and strengthen privacy practices.
Automated decision making poses large ethical challenges for organisations. Automated or AI-enhanced decision making comes with the risk of introducing or perpetuating biases, alongside issues of lack of transparency. However, it also promises to promote efficiencies.
Before introducing automated decision making, organisations should consider:
You can read more about the ethics of AI in our discussion of the AI Ethical Framework.
Privacy 108 offers a comprehensive suite of privacy legal and consulting services, delivered by our team of privacy and security experts.
Wherever you are on your organisation’s privacy maturity journey, we can provide the advice and support you need to implement and operationalise your privacy program.
Reach out:
"*" indicates required fields
"*" indicates required fields
Privacy 108 collects your name and email to send you our newsletter. If you do not provide this information, we will be unable to send it to you. We may use third-party service providers (such as email marketing platforms) to distribute our communications. Some providers may store information overseas, including in the United States. For more information about how we handle your personal information, including how to access or correct it or make a complaint, please see our Privacy Policy or contact us at hello@privacy108.com.au. You can unsubscribe at any time using the link in our emails or by contacting hello@privacy108.com.au.