25 November 2024
The Federal Government has reinforced its commitment to enhancing Australia’s cyber security by passing a suite of legislative reforms on 25 November 2024. The reforms were expedited on Parliamentary Joint Committee on Intelligence and Security (PJCIS) recommendations.
The Comprehensive Cyber Security Legislation comprises:
The reforms address a number of proposals which were set out in the 2023 – 2030 Cyber Security Strategy. However, it is the introduction of mandatory reporting of ransom payments and a new voluntary information sharing regime – each subject to a limited use protection - that we expect will have the most immediate impact on organisations and are the focus of this article.
Other amendments of note include:
Australian organisations are being increasingly targeted by ransomware attacks. Ransomware attacks accounted for 11% of all cyber incidents responded to by the ASD in 2023-2024, (up from 8% in the previous year) and 71% of all extortion-related cyber security incidents.[1]
While the Government has previously stated its desire to ban ransom payments, the Cyber Security Act only requires organisations to report ransomware payments to the Department of Home Affairs and the Australian Signals Directorate. This obligation will commence, at latest six months after the Cyber Security Act receives royal assent, or such earlier date set by proclamation. The reporting obligation applies broadly to:
Ransomware reports are to be made within 72 hours of payment and a failure to comply will result in a civil penalty of 60 penalty units (currently A$93,900). However, as detailed below, there are restrictions on how information provided in such reports can be used or further disclosed by the Government.
Notably, the reporting requirement is triggered on the payment of a ransom, not the receipt of a demand or the discovery of a ransomware attack. The requirement to report payments will need to be considered by Boards and General Counsel when considering whether to pay a ransom. Despite the introduction of mandatory reporting, the Government’s policy remains that organisations should not pay ransoms, arguing that payment does not guarantee the recovery or confidentiality of stolen data and merely encourages the proliferation of cybercrime. As such, the decision on how to respond to a ransom demand remains a difficult one for organisations given the potential consequences of both paying and not paying. For example:
If a ransom payment is made, then this reporting obligation will operate in addition to any other applicable reporting requirements that an organisation may be subject to, including under the Privacy Act 1988, the SOCI Act, continuous disclosure obligations under the ASX Listing Rules and CPS 234. Cyber incident response plans will need to address these overlapping regimes, noting the different regulators and reporting timeframes applicable to each.
For entities regulated under the SOCI Act, it is also conceivable that the Government could rely on its actions directions power to direct the entity to pay, or not pay, a ransom.
The Cyber Security Act also establishes a new National Cyber Security Coordinator (NCSC), to lead a whole-of-government response to significant cyber security incidents.
The Act provides a framework for the voluntary disclosure of information by any organisation operating in Australia, or any responsible entity under the SOCI Act, to the NCSC relating to cyber security incidents and, depending on the significance of the incident, imposes limitations on how the NCSC may further use and disclose information voluntarily provided by entities.
A cyber security incident is deemed a significant cyber security incident if:
Importantly, information voluntarily provided to the NCSC is subject to similar limited use protections as those that apply to information disclosed as part of a ransomware payment report.
This voluntary reporting regime and corresponding limited use protection will commence immediately.
The Cyber Security Act provides businesses with certain limited use protections when collaborating with the government’s cyber security agencies. This gives a clearer basis for businesses to work with the National Cyber Security Coordinator (NCSC) and through the NCSC, other government agencies to obtain assistance and guidance in responding to a cyber event.
It backstops the ‘gentlemen’s agreement’ Traffic Light Protocol (adopted from CISA) that these agencies have recently offered when providing assistance to Australian entities.
The Government’s view is that, not only are Government agencies such as the Australian Signal Directorate well placed to assist organisations in responding to cyber incidents, but greater information on current threats may prevent other organisations being subject to similar incidents.
This limited use protection responds to feedback received from the business community that disclosing information about a data breach to government cyber agencies may risk exposing the organisation to further regulatory or enforcement action, or to adverse publicity and litigation. The concern is that if a disclosure was determined to be contrary to the organisation’s best interests, then there is a risk that directors would be in breach of their duties in approving the disclosure, exposing directors to potential enforcement action from ASIC.
The Cyber Security Act does not go so far as to create a safe harbour but does limit the purposes for which information contained in a ransomware payment report or voluntarily provided to the NCSC in the context of a significant cyber security incident can be used or disclosed, e.g. to assist the reporting entity in responding to the incident.
The NCSC (and any Government agency it coordinates with) cannot record, use or disclose the information provided for the purposes of investigating or enforcing or assisting in the investigation or enforcement of any contravention of a Commonwealth, State or Territory law, with the exception of crimes and breaches of the limited use protections created by the Act. The crimes exception is a notable departure from a full safe harbour.
Secondly, information provided under these protections is not admissible in evidence against the disclosing entity, including criminal, civil penalty and civil proceedings (including a breach of the common law).
As an additional comfort, the Cyber Security Act expressly states that the provision of information to the NSCS does not affect any claim of legal professional privilege over the information contained in that information.
While this limited use protection should provide organisations with greater comfort when disclosing information to the Government, it is not a safe harbour and there are some notable gaps in the protection it affords. For example:
A similar limited use protection has been introduced via the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 for cyber incident information voluntarily shared with the ASD.
As a matter of priority, organisations should review and uplift their cyber security response plans and procedures to ensure they align with the mandatory ransomware reporting requirements.
While the limited use protection does afford organisations with some comfort as to how reports may be used, it is important to note that this protection is not a safe harbour. It would be prudent to update cyber playbooks to consider engagement with the cyber security authorities against the new limited use protection, and to test business decision making processes in this area, when conducting executive and Board level desk top exercises.
Consequently, the legality of ransom payments and the best interests of the organisation (particularly in the context of directors’ duties) remain key considerations in responding to any ransom demand.
[1] Australian Signals Directorate, Annual Cyber Threat Report 2023-2024
Authors
Head of Technology, Media and Telecommunications
Partner
Partner
Senior Associate
Tags
This publication is introductory in nature. Its content is current at the date of publication. It does not constitute legal advice and should not be relied upon as such. You should always obtain legal advice based on your specific circumstances before taking any action relating to matters covered by this publication. Some information may have been obtained from external sources, and we cannot guarantee the accuracy or currency of any such information.
Head of Technology, Media and Telecommunications