Emergency Incident ResponseReport a Confirmed or Potential Breach? Call   +1 770-870-6343
0 Results Found
              Back To Results
                White Papers

                4 Key Preparation Strategies for Eligible Breach Notification Laws

                What it means to Australian organisations and where to start

                On Feburary 13th 2017 a bill to amend the Australian Privacy Principles (APP) was approved by Australian Parliament.

                The bill introduces the mandatory notification of individuals whose personal information is compromised when eligible data breaches occur. This change will only affect organisations subject to the APP. In short, these changes would mean that any organisation subject to the APP must give notification if it has reasonable grounds to believe that an eligible data breach has happened, or it has been directed to do so by the office of the Privacy Commissioner. An eligible data breach is defined as unauthorised access to; or unauthorised disclosure of information that would likely, or could, result in serious harm to the individual to whom the information pertains. If the bill is passed by Parliament, organisations could have a window of time to prepare themselves before notification would become mandatory. This period will be an important time for organisations to be proactive.

                Many of those responsible for ensuring their organisations meet the terms set out in this amendment will be wondering “where do we start?” or “What can we do to better ready ourselves?” This paper aims to provide organisations with four key strategies they can implement to aid pragmatic preparation for the proposed changes to the APP.

                What You Will Learn

                • What the amendment means to organisations
                • The importance of creating a culture of Security
                • The importance of an organisations risk profile
                • The importance of testing your posture
                • Detection and response creating conditions for success

                Like what you're reading ?
                Get instant access by completing the form below


                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • > 1000
                • 501 - 999
                • < 500

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am)
                • Late morning (10am-12pm)
                • Early afternoon (12-3pm)
                • Late afternoon (3-5pm)

                Secureworks News :

                Related Content