Are you ready for the Notifiable Data Breaches scheme?**

02/02/20183 Minute Read

Australia’s new Notifiable Data Breaches scheme is designed to bring our privacy laws up to the standard the community expects in the information age.

It takes effect on 22 February, 2018, and, in many cases, obliges organisations to notify both the Office of the Australian Information Commissioner (OAIC) and all affected individuals if there is a data breach. This notification must include the recommended steps set out in the legislation.

Apart from receiving notifications of eligible breaches, the role of the OAIC includes offering advice and guidance to organisations covered by the scheme, and providing information to the community about how it operates.

Why the NDB?

The Notifiable Data Breaches scheme (NDB) strengthens the protections afforded to everyone’s personal information and improves transparency in the way agencies and organisations respond to serious data breaches.

It is intended to give the broader community confidence that their personal information is being protected and respected, and to encourage a higher standard of personal information security across Australian industries.

Notification also gives those affected by data breaches the opportunity to take steps to minimise the damage that can result from a data breach.

Who must comply?

The NDB applies to all organisations with existing obligations under APP 11 of the Privacy Act to protect the personal information they hold.

This includes Australian government agencies, and all businesses and not-for profit organisations that have an annual turnover of more than $3 million.

Small businesses with a turnover below the $3 million threshold are generally excluded under the APPs, but there are several exceptions. These include businesses that trade in personal information, and organisations that provide a health service to, and hold health information about, individuals.

For more information about the Notifiable Data Breaches scheme, see this link

Rise in digital transformation

With the growth of digital transformation and the adoption of this new law, organisations may find themselves even more so exposed to potential IT risks. Networks are more vulnerable than ever and all endpoint devices could be a potential target for hackers.

And yet, only 18% of companies monitor printers for threat*.

It is now highly critical that businesses take a closer look at an often neglected part of their cyber security policy: print security. And this is a whole lot more than just keeping documents in safe hands.

Today’s threats require attention to data in-transit and endpoint devices on the network—something HP printing security can help you stay a step ahead with.

HP’s commitment to data protection

As an innovation leader with a trusted heritage, HP continuously strives to lead the industry by creating world class secure and resilient products, solutions and services for businesses.

HP can provide support for data protection needs with robust security technologies in an extensive device and solutions portfolio. These include:

  • Industry-leading print and PC security in products and solutions and services, HP helps customers to maintain personal data confidentiality and integrity through technical means, such as encryption, authentication and device security protection.
  • Additionally, HP Print Security Advisory and Implementation Services supports customers in assessing their general security posture, including analysis of organisational controls and building a risk management framework around the endpoint infrastructure.

For more information about HP Print security Solution click here

*18%: Spiceworks, “HP Printer Security Research,” November 2016.

**The information contained in this webpage is general in nature. It is not intended to be comprehensive or to constitute legal advice. You should not rely on this information without first obtaining legal advice based on your specific circumstances.

Tektonika Staff 01/02/2018 3 Minute Read

Secure your endpoint devices with this quick and handy guide**

Use this checklist as a practical resource if you're looking to improve IT security for endpoint devices and comply with the strict new regulations.

Jasmine W. Gordon 01/02/2018 4 Minute Read

Don’t become hacker bait

The time for complacency is over. Your data and other confidential info can be wiped by cybercriminals accessing unsecured printers and other endpoints.

  1. 1

Nigel Bowen 31/01/2018 4 Minute Read

Don’t be the next data breach example**

We all want to avoid sending data breach notifications to potential victims at risk, but the OAIC's resources will help you plan your data breach response.

Leave a Comment

Your email address will not be published. Required fields are marked *