Australia Privacy Amendment (Notifiable Data Breaches) Act 2017 Compliance

Thales e-Security can help your organization comply with Australia’s Privacy Amendment (Notifiable Data Breaches) Act 2017

Australia Privacy Amendment

Thales e-Security’s Vormetric Data Security Platform and nShield Hardware Security Modules (HSMs) provide the tools you need to help prevent data breaches. Should a breach occur, Thales can, by encrypting your sensitive data, help save you from a public breach notification.

Regulation Summary

On February 13, 2017, the Australian Senate passed a bill establishing a mandatory requirement to notify the Privacy Commissioner and affected individuals of "eligible" data breaches. The Privacy Amendment (Notifiable Data Breaches) Act 2016 amends Australia's Privacy Act 1988 and is slated to take effect on February 22, 2018 if no earlier date is proclaimed.

Penalties

According to Global Legal Monitor:

A failure to notify that is found to constitute a serious interference with privacy under the Privacy Act 1988 can be penalized with a fine of up to … AU$1.8 million … (about … US$1.37 million …).

Compliance Summary

Section 26WG of The Act says breach notification is not necessary if “access or disclosure … would not be likely to result in serious harm.” The section further states:

Access to, or disclosure of, information would not be likely [to result in serious harm] if a security technology or methodology:

...

(i) was used in relation to the information; and

(ii) was designed to make the information unintelligible or meaningless to persons who are not authorised to obtain the information

Vormetric Transparent Encryption from Thales e-Security’s provides data-centric protection that ensures that if data is stolen, it is meaningless and therefore useless to those who steal it.

Moreover, Thales e-Security can help your organization keep breaches from happening in the first place through:

  • Access control to ensure only credentialed users can retrieve the data
  • Security intelligence logs to identify irregular access patterns and breaches in progress
  • Hardware security modules to provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more
Data-Centric Protection

Thales e-Security protects the data itself through Vormetric Transparent Encryption with integrated Key Management for data at rest, Application Encryption, Tokenization with Dynamic Masking and other solutions. These techniques make the data meaningless and worthless without the tools to decrypt it.

Access Control

The Vormetric Data Security Platform, from Thales e-Security, provides state of the art user access control:

  • Separation of privileged access users and sensitive user data. With the Vormetric Data Security Platform, administrators can create a strong separation of duties between privileged administrators and data owners. Vormetric Transparent Encryption encrypts files, while leaving their metadata in the clear. In this way, IT administrators—including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain privileged access to the sensitive data residing on the systems they manage.
  • Separation of administrative duties. Strong separation-of-duties policies can be enforced to ensure one administrator does not have complete control over data security activities, encryption keys, or administration. In addition, the Vormetric Data Security Manager supports two-factor authentication for administrative access.
  • Granular privileged access controls. Vormetric’s solution can enforce very granular, least-privileged-user access management policies, enabling protection of data from misuse by privileged users and APT attacks. Granular privileged-user-access management policies can be applied by user, process, file type, time of day, and other parameters. Enforcement options can control not only permission to access clear-text data, but what file-system commands are available to a user.
Security Intelligence Logs

Thales e-Security lets the enterprise monitor and identify extraordinary data access. Vormetric Security Intelligence Logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes accessed data, under which policies, and if access requests were allowed or denied. The management logs will even expose when a privileged user submits a command like 'switch users' in order to attempt to imitate, and potentially exploit, the credentials of another user. Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation. For example, an administrator or process may suddenly access much larger volumes of data than normal, or attempt to do an unauthorized download of files. These events could point to an APT attack or malicious insider activities.

Hardware Security Modules (HSMs)

nShield HSMs from Thales e-Security provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Certified at FIPS 140-2 Levels 2 and 3, nShield HSMs support a variety of deployment scenarios. nShield Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

In addition nShield HSMs:

  • Generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases
  • Sign your application code so you can ensure that your software remains secure, unaltered and authentic
  • Create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

Compliance Brief : Thales e-Security Helps Prepare You For Australia’s Notifiable Data Breaches Act 2017

Thales e-Security’s Vormetric Data Security Platform and nShield Hardware Security Modules provide tools you need to help prevent data breaches. Should a breach occur, Thales can, by encrypting your sensitive data, help save you from a public breach notification.

Download

Mire nuestra demostración interactiva Explorar
Programe una demostración en vivo Programar
Comuníquese con un especialista Contacto