Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Identity theft isn’t just a consumer problem. For Australian businesses, a single compromise can lead to fraudulent invoices, stolen funds, privacy breaches and major reputational damage.
The good news? With the right mix of governance, practical controls and clear legal documents, you can significantly reduce your risk and respond quickly if something goes wrong.
Below, we’ll walk through how identity theft affects businesses in Australia, the laws that apply, practical steps to safeguard your data and operations, and the contracts and policies that help you stay compliant and protected.
Why Identity Theft Is A Business Risk In Australia
Identity theft happens when someone uses stolen or fabricated information to impersonate your business or your people. Criminals then exploit that trust to redirect payments, open accounts, request sensitive data or make unauthorised purchases.
For businesses, identity theft can hit hard in a few ways:
- Financial loss: Fraudulent invoices paid to a fake supplier, diverted payroll, or unauthorised credit applications in your business’ name.
- Operational disruption: Locked accounts, compromised email systems, or internal investigations that slow down your team.
- Legal and compliance risk: Potential breaches of the Privacy Act 1988 (Cth) and contract obligations if personal data is exposed.
- Reputation damage: Customers and partners may lose confidence if their data is mishandled or they’re targeted using your brand.
Identity theft often starts with basic information criminals harvest online: company directors’ names, ABNs, registered addresses, employee email formats and supplier lists. This information is then used to make highly convincing scams that can slip past busy teams.
How Do Identity Thieves Target Businesses?
Business Email Compromise (BEC)
An attacker gains access to or spoofs a genuine business email account (for example, your CEO or accounts inbox). They then send realistic payment change requests or urgent fund transfers. Because the sender appears legitimate, these scams can be very effective.
Phishing And Social Engineering
Fake login pages, malicious attachments or phone-based “IT support” calls trick staff into sharing passwords or multi-factor authentication (MFA) codes. Once inside, attackers search email for invoices and vendor details to run fraud.
Impersonation Of Suppliers Or Partners
Criminals register lookalike domains (e.g. swapping an “l” for a “1”) and send amended bank details. They may also lodge change-of-details forms with service providers to reroute communications and approvals.
Public Registry And Renewal Scams
Scammers monitor public records and send official-looking notices demanding payment for registrations. Be cautious with any renewal reminders and verify through official channels - many Australian businesses encounter a business name renewal scam that looks like legitimate correspondence.
Physical Mail Theft And Document Harvesting
Mail redirection scams and old-fashioned letterbox theft still occur. Documents with ABNs, bank details or signatures can be used to authenticate fraudulent requests.
Practical Steps To Protect Your Business
You don’t need an enterprise-sized budget to lift your defences. Focus on a few high-impact areas that work together.
1) Strengthen Governance And Policies
- Set clear roles and approvals: Define who can create vendors, change bank details, approve payments and sign contracts. Use maker-checker controls for critical processes.
- Adopt an Information Security Policy: This sets expectations for passwords, MFA, data handling and access controls. A tailored Information Security Policy helps embed good practice across your team.
- Align your privacy approach: If you collect personal information, you’ll typically need a clear, accessible Privacy Policy and a concise Privacy Collection Notice that explain what you collect, why and how it’s used.
2) Build A Security-Aware Culture
- Run phishing awareness training: Teach staff to spot red flags, verify requests for bank detail changes and report suspicious emails quickly.
- Use simple verification rules: For any change to bank details, require phone verification using a known, independently sourced number (not the one in the email).
- Keep logins private: No shared accounts for critical systems. Always enable MFA for email, payroll and finance tools.
3) Tighten Technology Controls
- Secure email: Enable MFA, deploy spam and phishing filters, and consider email authentication standards (SPF, DKIM, DMARC) to reduce spoofing.
- Device and access management: Use strong passwords via a password manager, enforce automatic updates and remove access promptly when staff leave.
- Data minimisation and retention: Store only what you need and keep it only as long as required under your legal and business needs. This reduces exposure and supports compliance with data retention laws.
4) Manage Third Parties Carefully
- Vendor due diligence: Assess how suppliers secure your data and systems, especially IT, payroll, marketing and payments providers.
- Contracts that protect you: Where a supplier handles personal information on your behalf, ensure a Data Processing Agreement sets clear obligations around security, breach notification, and sub-processor controls.
5) Protect Payments And Financial Data
- Payment controls: Use dual authorisation for payments, lock down who can add or amend payees, and reconcile regularly to spot anomalies.
- Cardholder data: If you accept or store card data, be mindful of PCI DSS standards and your legal obligations around storing credit card details.
6) Plan For Incidents
- Prepare a response plan: A documented Data Breach Response Plan sets out who does what when something goes wrong, so you can act quickly and meet your legal obligations.
- Test your plan: Run tabletop exercises so your team knows how to contain, assess and notify within tight timeframes.
What Laws Apply To Identity Theft And Data Protection In Australia?
Several Australian laws and frameworks shape how businesses handle personal information and respond to identity-related incidents. Your obligations will depend on your size, industry and the type of data you hold.
Privacy Act 1988 (Cth) And Australian Privacy Principles (APPs)
If the Privacy Act applies to your business, you must handle personal information in line with the APPs, including transparency, security and access/correction rights. You’ll also need an accessible Privacy Policy describing your practices in plain English.
Notifiable Data Breaches (NDB) Scheme
If you experience an eligible data breach likely to cause serious harm, you must notify affected individuals and the OAIC (Office of the Australian Information Commissioner) as soon as practicable. Your Data Breach Response Plan should outline how you assess “serious harm” and the notification process.
Consumer Law And Communications
How you communicate with customers matters. Ensure marketing practices and consent processes align with applicable rules, including spam and consent requirements reflected in standard email marketing laws.
Payment And Financial Information
Payment card data must be handled securely and in line with contractual obligations you have with your payment service provider. If you store or process card data, review your obligations around storing credit card details and consider whether you can avoid storing this data at all by using tokenised payment solutions.
Record Keeping And Retention
Keep records only as long as you need them and dispose of them securely. This is a key part of minimising identity theft risk and staying aligned with Australian data retention laws.
What Legal Documents Should You Have In Place?
Documentation won’t stop every threat, but it puts clear rules around your data, relationships and responsibilities - making prevention easier and your incident response smoother.
- Privacy Policy: Explains what personal information you collect, why you collect it and how you use and store it. A compliant, plain-English Privacy Policy builds trust and supports APP transparency requirements.
- Privacy Collection Notice: A short notice at the point of collection setting out the key facts (what, why, who you share with). A tailored Privacy Collection Notice is practical for forms, sign-ups and onboarding flows.
- Information Security Policy: Sets the baseline for passwords, MFA, encryption, remote work, removable media and access control. An Information Security Policy helps standardise secure behaviour.
- Data Breach Response Plan: A step-by-step playbook for investigating, containing and notifying after a suspected breach. A structured Data Breach Response Plan saves critical time.
- Data Processing Agreement (DPA): If a supplier processes personal information for you (e.g., CRM, payroll, marketing tools), a Data Processing Agreement sets out security, subprocessor approvals and breach duties.
- Acceptable Use Policy: Defines how staff can use company systems, devices and data to reduce risky behaviour and clarify consequences.
- Employee Agreements And Policies: Clear employment contracts and workplace policies make it easier to enforce confidentiality, device use and security controls.
- Supplier And Customer Terms: Strong contract clauses around data security, confidentiality and fraud controls help manage risk across your supply chain and customer relationships.
You may not need every document on day one, but most businesses benefit from several of these as they grow and start handling more data, vendors and systems.
Responding To Identity Theft Or A Data Breach
If you suspect identity theft or a data incident, speed and structure matter. Here’s a practical roadmap you can adapt to your business.
1) Contain And Preserve Evidence
- Disconnect affected devices and disable compromised accounts (don’t wipe systems before capturing forensic information).
- Change passwords, revoke tokens and reset MFA for impacted services.
- Quarantine suspicious emails and block malicious domains or IPs.
2) Assess The Impact
- Identify what information was accessed or exfiltrated (personal data, financial data, credentials).
- Determine how the incident occurred and whether it’s ongoing.
- Consider obligations under the NDB scheme, contracts and any industry rules.
3) Notify Where Required
- If the incident triggers the NDB scheme, notify affected individuals and the OAIC.
- Check contract terms with clients and vendors for notice requirements (DPAs often set timelines and content).
- Where relevant, coordinate with banks, payment providers and law enforcement (particularly for fraudulent transfers).
4) Assist Affected Individuals
- Provide clear instructions on steps they can take (password resets, MFA, monitoring accounts).
- Offer a contact channel for questions and support, and keep updates transparent and timely.
5) Learn And Improve
- Patch the root cause, update controls and run a post-incident review.
- Refresh staff training with real lessons learned and update your Data Breach Response Plan.
If payment redirection fraud occurred, notify your bank immediately and provide written details. Early reporting can help with recovery efforts.
Key Takeaways
- Identity theft is a growing business risk in Australia, driven by email compromise, social engineering and supplier impersonation.
- Simple, layered controls - MFA, verification of bank detail changes, strong approvals and staff training - can dramatically reduce your exposure.
- Australian privacy laws (including the NDB scheme) require strong security, clear privacy practices and timely notification after certain breaches.
- Core documents like a Privacy Policy, Information Security Policy, Data Breach Response Plan and Data Processing Agreement help set expectations and meet legal duties.
- Have a tested incident playbook so you can contain, assess and notify quickly if something goes wrong.
- Review public records and official-looking notices carefully to avoid scams such as fake business name renewal demands.
If you’d like a consultation on protecting your business against identity theft and getting the right documents in place, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








