Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
High-profile data breaches make headlines because they’re shocking, reputationally devastating and expensive. The Ashley Madison data breach was all three - and it still stands as a cautionary tale for every business that collects customer data.
If you’re running a small business in Australia, you may not be storing millions of records - but the same risks apply. The difference is that smaller teams often don’t have the time or tools to bounce back.
In this guide, we break down what happened in the Ashley Madison incident, why it matters to Australian businesses, the laws that apply if you suffer a breach, and the practical legal steps to prevent, prepare and respond confidently.
What Happened In The Ashley Madison Data Breach?
In 2015, attackers gained access to Ashley Madison’s systems and exfiltrated large datasets containing sensitive personal information. When the company didn’t meet the attackers’ demands, data was leaked publicly.
Beyond the immediate harm to impacted individuals, the incident caused long-term reputational damage, multiple regulatory investigations, class actions and significant financial loss. The real headline for small businesses, though, is this: the root causes were not exotic. Weak security practices, excessive data retention and poor incident readiness were all cited as key failings.
That’s important because those are exactly the areas small businesses can control - today.
Why This Matters For Small Businesses In Australia
Breaches aren’t just an “enterprise” problem. Small businesses are prime targets because attackers know teams are lean, patching is ad hoc, and backups or monitoring may be inconsistent.
Even if you hold only names, emails and purchase details, compromised data can trigger legal obligations under Australian privacy law, erode customer trust and lead to lost revenue. If you handle more sensitive data (health, IDs, financial details), the risk is even higher.
The Ashley Madison breach is a reminder that the biggest impacts often come from business decisions - what you collect, how long you keep it, and how quickly you can detect and contain issues - not just from “sophisticated hackers.”
What Laws Apply If Your Business Has A Data Breach?
In Australia, the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs) set out how personal information must be collected, used, disclosed and secured. If your business is covered by the Privacy Act (many are, and the net is widening), you must also comply with the Notifiable Data Breaches (NDB) scheme.
The Notifiable Data Breaches (NDB) Scheme
- If a data breach is likely to cause serious harm to an individual, you must notify both the Office of the Australian Information Commissioner (OAIC) and the affected individuals as soon as practicable.
- Notifications must include the nature of the breach, the kinds of information affected and steps individuals can take to protect themselves.
- Failing to assess or notify a breach properly can lead to enforcement action and penalties.
Australian Privacy Principles (APPs)
- APP 1: You must manage personal information in an open and transparent way - practically, that means having a clear, accessible Privacy Policy and implementing privacy-by-design.
- APP 11: You must take reasonable steps to secure personal information - think governance, access controls, encryption, patching and documented processes.
- APPs also cover collection, use and disclosure, cross-border transfers, correction and access.
Sector-specific rules can also apply. For example, if you store payment data, expect payment card industry obligations and consumer law implications around misleading representations about security. Our overview on storing credit card details highlights the extra care needed in this area.
Practical Steps To Prevent And Prepare
You can’t reduce risk to zero, but you can materially lower it - and be ready to act if something goes wrong. Here’s a practical, small-business-friendly checklist inspired by lessons from Ashley Madison.
1) Map Your Data
List the personal information you collect, where it lives (systems, devices, cloud apps), who can access it, and why you need it. If you don’t need it, stop collecting it.
2) Minimise Retention
Old data is a breach magnet. Create a simple retention schedule and securely delete what you no longer need. Our guide to data retention laws in Australia explains how to approach “how long is long enough.”
3) Secure The Basics
- Multi-factor authentication (MFA) for email, admin panels and any remote access.
- Patch operating systems and software promptly; enable automatic updates where possible.
- Use a password manager and enforce strong, unique passwords.
- Encrypt laptops and portable drives; restrict USB use if you can.
- Back up critical data and test restores regularly.
4) Train Your Team
Most incidents start with human error. Short, regular training on phishing, safe data handling and incident reporting goes a long way. Put the rules in writing with an Information Security Policy and make it part of onboarding.
5) Strengthen Vendor Management
Third-party tools are convenient - and a common breach source. Ensure you have a Data Processing Agreement in place with service providers who handle personal information, setting standards for security, sub-processing, breach notification and data return or deletion.
6) Build An Incident Response Muscle
Speed and clarity are everything in the first 48 hours. Define roles, escalation paths, legal checks and communication templates ahead of time in a tailored Data Breach Response Plan. Test it with short tabletop exercises twice a year.
What Policies, Contracts And Documents Should You Have?
The Ashley Madison incident showed that policies on paper aren’t enough - but clear, tailored documents do set expectations, drive consistent behaviour and prove compliance when it matters. For most small businesses, the essentials include:
- Privacy Policy: Explains what you collect, why, how you use it, and how customers can access or correct their data.
- Information Security Policy: Sets baseline security requirements for your team and systems (access control, device security, backups, incident reporting).
- Data Breach Response Plan: A step-by-step playbook to detect, assess, contain and notify - crucial for meeting NDB timelines.
- Data Processing Agreement: Contractual safeguards when vendors or contractors process personal information on your behalf.
- Non-Disclosure Agreement (NDA): Protects confidential information when collaborating, hiring or pitching to partners and suppliers.
Depending on your operations, you may also adopt an Acceptable Use or device policy, detailed email handling rules, and website or platform terms. The important thing is that documents are tailored to how your business actually works, and that your team knows and uses them.
Responding To A Breach: A 48-Hour Game Plan
In a stressful moment, checklists help you stay calm and compliant. If you suspect a breach, act fast and follow a structured approach.
Step 1: Contain And Preserve
- Isolate affected accounts, devices or systems (e.g. disable compromised credentials, revoke API keys, remove exposed content).
- Preserve logs and evidence. Don’t wipe systems before you capture what happened; you’ll need it for forensics and legal decisions.
Step 2: Assemble Your Response Team
- Nominate a lead, technical support, legal/compliance owner and a communications contact per your Data Breach Response Plan.
- Decide whether to engage external IT forensics and notify your cyber insurer (if applicable).
Step 3: Assess Against The NDB Scheme
- What information was involved? How many individuals? How sensitive is it?
- Is “serious harm” likely? Consider identity theft, financial loss, humiliation or reputational damage.
- If likely, prepare notifications to affected individuals and the OAIC “as soon as practicable.”
Step 4: Communicate Clearly
- Use simple language and offer practical steps people can take (password resets, fraud alerts).
- Keep a record of who was notified, when and how, and keep your support team briefed.
Step 5: Remediate And Learn
- Patch the root cause, rotate credentials and strengthen controls.
- Update your policies and training. The goal is to prevent the same issue recurring.
Common Pitfalls The Ashley Madison Breach Highlights
- Collecting too much data: If you don’t have it, it can’t be breached. Minimise up front and apply retention limits.
- Weak access controls: Use least-privilege access, MFA and proper offboarding to reduce insider and credential risks.
- Poor vendor controls: Treat third parties like an extension of your business - with contracts, due diligence and oversight.
- No rehearsed response: Decisions made under pressure can create liability. Practice your plan before you need it.
- Overpromising security in marketing: Be careful with statements about “bank-grade” or “military” security if you can’t substantiate them. Consumer law applies to security claims, too.
Key Takeaways
- Ashley Madison’s breach was amplified by common, avoidable issues: excessive data, weak controls and limited readiness.
- Australian privacy law (including the NDB scheme) may require you to notify the OAIC and affected individuals if serious harm is likely.
- Reduce risk by mapping data, minimising retention, training staff and tightening vendors - then document it with a Privacy Policy and security policies.
- Have a tested incident plan so you can assess, contain and notify quickly and accurately within legal timeframes.
- Use contracts such as a Data Processing Agreement and NDAs to set clear data-handling standards inside and outside your business.
- Getting legal advice early helps tailor your documents and response plan to your operations, so you’re ready on day one.
If you’d like a consultation on preparing your small business for data breaches - from drafting your Privacy Policy to a tailored Data Breach Response Plan - you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








