• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
australia passes bill to fine companies up to $50 million

Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches

You are here: Home / General Cyber Security News / Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches
November 30, 2022

The Australian federal government has handed a monthly bill that markedly raises the penalty for organizations suffering from critical or repeated facts breaches.

To that finish, the greatest fines have been bumped up from the present-day AU$2.22 million to AU$50 million, 30% of an entity’s altered turnover in the relevant period, or 3 times the worth of any profit attained by the misuse of facts, whichever is larger.

The turnover period of time is the time length from when the contravention transpired to the conclusion of the thirty day period when the incident is formally dealt with.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

“Sizeable privacy breaches in latest months have demonstrated present safeguards are out-of-date and insufficient,” Attorney-Basic Mark Dreyfus explained in a assertion. “These reforms make very clear to companies that the penalty for a main data breach can no for a longer period be regarded as the price of executing organization.”

The legislation, termed the Privacy Laws Amendment (Enforcement and Other Measures) Invoice 2022, also bestows more powers to the Australian Info Commissioner to address security breaches.

The “new information and facts sharing powers will facilitate engagement with domestic regulators and our global counterparts to aid us carry out our regulatory function efficiently and effectively,” Australian Data Commissioner and Privacy Commissioner Angelene Falk reported.

The monthly bill, which has been tabled as part of broader reforms to the Privacy Act 1988, now awaits Royal Assent to be formally signed into legislation.

The advancement will come in the wake of new major breaches at Optus and Medibank that have resulted in the leak of own facts connected with 2.1 million and 9.7 million clients, respectively.

Observed this article appealing? Comply with THN on Facebook, Twitter  and LinkedIn to go through much more special material we write-up.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «3 new vulnerabilities affect ot products from german festo and 3 New Vulnerabilities Affect OT Products from German Festo and CODESYS Companies
Next Post: Most Small Biz IaaS Users Seeing Surge in Attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.