
Draft new cyber security bills were released this month. The purpose of the new laws are to support Australia’s 2023 – 2030 Cyber Security Strategy and bring Australia in line with international best practice (according to the government’s media release).
The measures are said to be designed to address gaps in current legislation to:
The package will also progress and implement reforms under the Security of Critical Infrastructure Act 2018 (SOCI Act) including clarifying existing obligations in relation to systems holding business critical data and enhancing government assistance measures to better manage the impacts of all hazards incidents on critical infrastructure.
The legislative package consists of the following three draft bills:
We look more closely at some of the proposed changes below.
The measures in this package were informed by an extensive consultation process, both prior to and following the release in November 2023 of the much anticipated 2023-30 Australian Cyber Security Strategy. The Strategy was accompanied by an Action Plan which detailed key initiatives to be implemented across the next two years, although no decision was made about appropriate regulation. (We summarised the then-current status of Australia’s Cyber Security Strategy and the on-going consideration of what sort of cyber security regulation might be introduced to support that strategy in a blog post in 2023.)
As part of the Action Plan, the Government subsequently released a Consultation Paper proposing measures to address gaps in the existing cyber security legislative and regulatory framework. We’ve covered that Consultation Paper in our blog post. In that post, we focused on three of the nine proposed measures, which were:
These three measures are included in the draft legislation released this month, and are the focus of this post.
The Cyber Security Bill 2024 (Cyber Security Bill) introduces a mandatory reporting requirement for certain entities that pay a ransomware payment (or other benefit) to an extorting entity.
The legislation requires that a report be made to the Department of Home Affairs within 72 hours of making the payment, where:
The notice must include the following (plus other information as may be prescribed by rules):
Other information relating to the cyber security incident may also be included in the ransomware payment report.
Some Australian businesses will be exempt from the reporting requirement, if their annual turnover falls below an as-yet unspecified amount. (The amount will be specified in rules yet to be issued.)
Originally it was proposed to introduce two reporting obligations in relation to ransom demands:
However, the legislation now proposes just one single reporting obligation (where a payment or other benefit is provided to the ransoming entity).
The move to a single reporting requirement reflects concerns around the burden on entities at a time when they are trying to respond to a difficult situation. It may also reflect concern for the ability of the ASD to handle a large volume of reports.
It is also worth noting that failure to comply with these reporting obligations may result in a civil penalty.
Concerns around loss of legal privilege have also been addressed by including a specific provision that providing information in a ransomware payment report does not otherwise affect a claim of legal professional privilege that anyone may make in relation to that information in any proceedings.
Given the above reporting obligations and the powers of the Board described below, there were concerns regarding how that information might be used, particularly if shared with other regulators who could commence investigations.
The legislation includes a ‘limited use’ obligation to restrict how cyber incident information shared with the Australian Signals Directory and the National Cyber Coordinator can be used by other Australian Government entities, including regulators.
Allowed uses include:
This should alleviate some of the concerns around the provision of ransomware attack-related information to the relevant bodies.
Under the consultation paper, a Cyber Incident Review Board (similar to those in other jurisdictions like the USA) was proposed to conduct no-fault post-incident reviews to reflect on lessons learned from significant cyber incidents, and share these lessons with the Australian public.
Following a series of major data breaches, a National Cyber Incident Review Board was established in April 2024. The Board’s main objective is to ensure a well-coordinated response to cyber threats, thus protecting businesses and critical infrastructure. The responsibilities of the NCIRB include:
The new legislation will upgrade the board’s investigative powers. The board will now be able to conduct “no-fault” investigations after significant cyber attacks. The board will then share insights to promote improvements in cyber security practices more generally. These insights will be anonymised to ensure the identities of victims of cyber attacks aren’t publicly revealed.
Under the proposed legislation, the Board will be comprised of a Chair, standing members and an Expert Panel. The Expert Panel will be drawn from a pool of industry members with relevant expertise.
Limited information gathering powers will be granted to the Board, so it will largely rely on cooperation by impacted businesses.
Amendments to the Security of Critical Infrastructure Act 2018 were also proposed.
The key change to note for regulated entities is that secondary assets which hold ‘business-critical data’ may also be captured as critical infrastructure assets, regardless of the primary purpose of the asset. Other changes to the Security of Critical Infrastructure Act 2018 include the provision of further clarity on the secrecy and disclosure provisions, and the implementation of new powers for the Secretary of the Department of Home Affairs
The package is a set of draft legislation. Submissions are invited by Friday, 25 October 2024. Further information about making a submission to a parliamentary committee is available here.
Given the significant consultation which has already taken place on this set of reforms, it is not expected that any major changes will be made to the current drafts which may pass in the next parliamentary sitting.
"*" indicates required fields
"*" indicates required fields
Privacy 108 collects your name and email to send you our newsletter. If you do not provide this information, we will be unable to send it to you. We may use third-party service providers (such as email marketing platforms) to distribute our communications. Some providers may store information overseas, including in the United States. For more information about how we handle your personal information, including how to access or correct it or make a complaint, please see our Privacy Policy or contact us at hello@privacy108.com.au. You can unsubscribe at any time using the link in our emails or by contacting hello@privacy108.com.au.