Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Customer data sits at the centre of most Australian businesses today. Whether you’re running an online store, a professional services firm or a growing startup, how you collect, use and protect personal information is a big part of how customers decide to trust you.
History has also shown what can go wrong. The 2015 Ashley Madison leak exposed the intimate details of millions of users worldwide. The business model may have been unusual, but the lessons are universal: weak privacy practices and poor security can create serious legal exposure and long‑term brand damage.
In this guide, we’ll unpack what happened, why it still matters in Australia, what the law expects, and practical steps you can take to protect your customers and your reputation.
Why The Ashley Madison Leak Still Matters In Australia
Ashley Madison marketed itself on secrecy and “discreet encounters”. In 2015, attackers accessed its systems and exfiltrated a large dataset including names, emails, purchase records and other sensitive information. When the company didn’t meet the attackers’ demands, almost 30 million records were published online. The fallout included global headlines, lawsuits, regulatory scrutiny and lasting reputational harm.
Even if your business doesn’t handle intimate relationship data, the core lessons apply to any Australian organisation that collects personal information. Breaches don’t just stem from sophisticated attackers - they also occur through human error, weak controls, poor vendor management or keeping data you don’t need.
From an Australian perspective, three risks stand out:
- Widespread exposure: Once data leaves your environment, it can spread rapidly and be extremely difficult to contain.
- Regulatory consequences: If you’re covered by the Privacy Act or other frameworks, you may need to notify regulators and individuals, and you could face penalties for non‑compliance.
- Trust erosion: Customers judge you by how you prevent, respond to and communicate about incidents. Poor handling can damage a brand for years.
What Does Australian Law Require On Privacy And Data Breaches?
Australia regulates privacy and data breaches through several regimes. The right approach is to understand what applies to you, then build processes that meet (and ideally exceed) those obligations.
Privacy Act 1988 (Cth) and APP Entities
The Privacy Act sets baseline rules for handling personal information through the Australian Privacy Principles (APPs). It applies to most Australian Government agencies and many private sector organisations known as “APP entities”.
In the private sector, coverage generally includes businesses with an annual turnover of $3 million or more. Some smaller businesses are also covered, such as health service providers, businesses that trade in personal information, and certain organisations providing services under Commonwealth contracts. If you’re unsure whether you’re an APP entity, it’s worth getting advice - applying the APPs voluntarily is also common where customer trust is paramount.
If you are an APP entity, you’re expected to be transparent about personal information handling (APP 1), collect only what you reasonably need, secure it appropriately (APP 11), provide access and correction rights, and manage cross‑border disclosures responsibly (APP 8).
Notifiable Data Breaches (NDB) Scheme
The NDB scheme sits within the Privacy Act and requires APP entities to notify the Office of the Australian Information Commissioner (OAIC) and affected individuals when an eligible data breach is likely to result in serious harm.
- Assess within 30 days: If you suspect a breach may be eligible, you must assess it “expeditiously” and within 30 days.
- Notify as soon as practicable: If you determine there are reasonable grounds to believe an eligible breach occurred, you must notify the OAIC and affected individuals as soon as practicable.
- Serious harm: This can include financial loss, identity theft, reputational damage, psychological harm or physical safety risks.
Ashley Madison’s delay and reluctance to communicate would fall short of these expectations in Australia today. Timely assessment and clear, useful notifications are essential.
Australian Consumer Law (ACL) and Misleading Conduct
Separate to the Privacy Act, the Australian Consumer Law prohibits misleading or deceptive conduct. If your business says it will “keep data safe”, “delete on request” or “encrypt everything”, those statements need to be true in practice. Overstating security or privacy features can expose you to ACL risk. See how section 18 operates in our overview of misleading or deceptive conduct.
Data Handling Beyond the Privacy Act
Even if you’re not an APP entity, customers expect transparency and reasonable data protection. Many businesses adopt privacy‑by‑design practices and clear policies as good governance and to meet tender or enterprise client requirements. It’s also wise to think about operational rules for recordkeeping and deletion - our guide to data retention laws in Australia explains why a sensible retention schedule matters.
What Counts As A Data Breach?
Under the Privacy Act, a data breach includes unauthorised access to, unauthorised disclosure of, or loss of personal information that is likely to result in unauthorised access or disclosure. This covers more than cyberattacks. For example:
- Sending a spreadsheet with customer emails to the wrong recipient.
- Leaving an unencrypted laptop in a taxi.
- A staff member viewing records they’re not authorised to see.
Small or accidental breaches still need to be assessed. If serious harm is likely, notification duties may follow.
Practical Lessons Australian Businesses Can Apply
The Ashley Madison incident wasn’t just a “bad actor” story. It exposed gaps in data minimisation, security controls, vendor oversight and incident response. Here’s what you can apply, regardless of your size or industry.
1) Build Privacy By Design (And Delete What You Don’t Need)
Collect only the data you reasonably require. Limit sensitive information wherever possible, and build deletion into your workflows so personal information is not retained longer than necessary. If you say you delete data on request, ensure your systems and processes actually do it.
Good practice also includes privacy impact thinking at the start of new projects, and default settings that minimise data collection.
2) Be Transparent And Consistent
Explain clearly what you collect, why, how you secure it and when you delete it. If you’re an APP entity, you must have a clearly expressed policy accessible to the public. Even if you’re not covered, customers expect transparency and clarity.
Make sure your public‑facing documentation aligns with real practices. That usually includes a Privacy Policy and the specific disclosures you make at the point of collection via a Privacy Collection Notice.
3) Lift Security And Vendor Management
Security isn’t just technology. Start with risk‑based controls: strong authentication, least‑privilege access, encryption at rest and in transit, patching and backups. Then consider human risks like phishing and social engineering.
Map who has access to your data outside your business - cloud hosts, marketing platforms, software vendors and contractors. Where a third party processes personal information on your behalf, use a Data Processing Agreement that sets clear security, breach notification and deletion obligations.
4) Prepare For Incidents Before They Happen
Being prepared saves time, money and stress. Document who leads, who investigates, who communicates and how you assess harm. Practice with tabletop exercises so your team knows the drill.
Many businesses formalise this with a Data Breach Response Plan aligned to the NDB scheme’s 30‑day assessment window and notification requirements.
5) Invest In People And Culture
Human error causes a large share of breaches. Train staff on recognising suspicious emails, reporting incidents quickly and following data handling protocols. Keep training short, regular and practical - and make it easy to ask for help without blame.
6) Don’t Overpromise (ACL Risk)
Marketing and privacy statements should reflect reality. If you say data is “securely encrypted”, ensure that’s accurate across all systems. If you claim “we permanently delete your account”, check your backup and log retention practices align. Overpromising can create exposure under the ACL and erode trust fast.
What Legal Documents Help You Manage Privacy Risks?
Your contracts and policies are the backbone of privacy compliance and risk management. The right documents set expectations with customers, staff and suppliers - and keep your operations aligned with the law.
- Privacy Policy: Explains what you collect, the purpose, how you store and secure it, and how people can access or correct their data. For APP entities, this is mandatory; for others, it’s best practice and expected by customers. Consider a tailored Privacy Policy that matches your actual data flows.
- Privacy Collection Notice: The short, specific disclosure shown when you collect personal information (for example, on a form or checkout). A clear collection notice helps you meet transparency obligations.
- Website Terms and Conditions: Set ground rules for using your site, manage IP and acceptable use, and include contact and complaints pathways. See our Website Terms and Conditions.
- Data Processing Agreement (DPA): If third parties handle personal information for you, a DPA sets standards for security, sub‑processors, breach reporting and deletion/return at the end of the engagement.
- Non‑Disclosure Agreement (NDA): Use an NDA when sharing confidential information (including data schemas or security information) with potential partners or vendors before a full contract is in place.
- Internal Policies and Playbooks: Practical guides on passwords, access, incident response and recordkeeping (for example, bring‑your‑own‑device rules or acceptable use). These help staff follow the rules in day‑to‑day work.
Note: you don’t need every document on day one. Start with the essentials you’ll actually use, then build out as your business and data footprint grows.
Step‑By‑Step: What Should You Do If A Breach Happens?
Incidents are stressful. A simple, repeatable process helps you respond confidently and lawfully.
- Contain: Act fast to limit exposure (revoke credentials, isolate affected systems, disable compromised integrations, rotate keys, and stop the bleeding).
- Preserve evidence: Secure logs and artefacts to understand what happened. Avoid making changes that erase forensic data unless necessary for containment.
- Assess harm within 30 days: Determine whether personal information was involved and whether serious harm is likely. This assessment must be completed expeditiously and within 30 days under the NDB scheme for APP entities.
- Notify as required: If the breach is eligible, notify the OAIC and affected individuals as soon as practicable. Make notifications useful: what happened, what information is involved, the risks, and steps individuals can take.
- Engage stakeholders: Coordinate with key partners or processors who may also need to act or notify. Align any public statements with your legal obligations and facts on hand (avoid speculation).
- Remediate and monitor: Patch vulnerabilities, strengthen controls, and enhance monitoring to detect related activity.
- Review and improve: Run an internal post‑incident review. Update your processes, training and contracts so the same issue doesn’t recur.
Throughout, be careful about what you promise publicly. Under the ACL, statements about your security and response must be accurate and not misleading - the goal is to be transparent, not alarmist.
Key Takeaways
- The Ashley Madison breach shows how quickly privacy failures can become legal, financial and reputational crises - in any industry.
- Understand whether you’re an APP entity under the Privacy Act. If you are, the APPs and the NDB scheme (including the 30‑day assessment) set clear obligations.
- Minimise what you collect, secure it well, manage your vendors and build deletion into your lifecycle. Transparency must match reality to avoid ACL risk.
- Document the essentials: a fit‑for‑purpose Privacy Policy and collection notices, Website Terms and Conditions, NDAs and DPAs, and a practical breach response plan.
- Train your team and run drills. Most incidents involve human factors, and preparation improves outcomes.
- If a breach occurs, contain, assess and notify as required - and use the experience to strengthen your controls and contracts.
If you’d like a no‑obligations chat about data breaches, privacy obligations or preparing documents like a Privacy Policy or Data Breach Response Plan for your Australian business, reach our team on 1800 730 617 or team@sprintlaw.com.au - we’re here to help you protect your business and your customers.








