1 Map the personal information you hold Identify what personal information you collect, where it comes from, where it is stored, who can access it, who it is shared with, and how long it is kept. You cannot prepare properly for reform if you do not have a clear data map. This also supports existing obligations to manage personal information openly and securely.
2 Review your privacy policy and collection notices Update your privacy policy and collection language so they accurately reflect how personal information is collected, used, disclosed, retained, and protected. This is especially important if your organisation uses AI, profiling, scoring, automated approvals, or other systems that make or support significant decisions about individuals. New APP 1 obligations about automated decisions commence on 10 December 2026.
3 Identify where automated decision-making is used Create an inventory of systems that use personal information in automated or substantially automated decisions. Assess which of those decisions could significantly affect an individual’s rights or interests, then document what data is used, what decisions are made, and how those decisions are explained. That will make the 2026 transparency changes much easier to meet.
4 Tighten retention and deletion practices Review whether personal information is being kept longer than necessary. Reduce unnecessary data holdings, set retention rules, and make sure disposal or de-identification processes are working in practice. The broader reform direction continues to emphasise stronger lifecycle management and better handling of privacy risk.
5 Reassess vendors, processors, and overseas disclosures Check which third parties handle personal information on your behalf, what contractual controls are in place, and whether overseas disclosures are properly governed. Privacy compliance is no longer just about your own systems — it also depends on the way suppliers, platforms, and service providers handle data.
6 Strengthen security and breach response Review access controls, logging, monitoring, encryption, incident response, and breach assessment procedures. The reform direction clearly points toward higher expectations for accountability and security, and organisations still need to meet current obligations to take reasonable steps to protect personal information.
Continuous 24×7 Breach Monitoring The NDB scheme doesn’t care what time a breach occurs. ThreatDefence provides round-the-clock monitoring across your endpoints, networks, cloud environments, and identity systems — detecting the indicators of unauthorised access, data exfiltration, and privilege abuse the moment they appear. How this maps to the Privacy Act: – Reduces the gap between breach occurrence and organisational awareness — starting your 30-day assessment clock at the earliest possible moment – Detects unauthorised access and disclosure events covered by the NDB scheme – Provides continuous evidence that you took “reasonable steps” to protect personal information under APP 11
User & Entity Behaviour Analytics (UEBA) Insider threats and compromised accounts are responsible for a significant proportion of NDB-eligible breaches. ThreatDefence UEBA builds behavioural baselines for every user and entity in your environment, alerting when behaviour deviates — bulk file downloads, after-hours access to customer databases, unusual email forwarding, or mass record exports. How this maps to the Privacy Act: – Detects insider data theft — one of the most underreported categories of eligible data breach – Surfaces compromised credential abuse before bulk personal information is exfiltrated – Provides person-of-interest evidence for OAIC investigation responses and potential litigation under the new statutory tort
Cloud Security Posture Management (CSPM) Cloud misconfigurations are among the most common triggers of NDB notifications in Australia — exposed S3 buckets, overly permissive storage accounts, publicly accessible databases. ThreatDefence continuously monitors your cloud environments for misconfigurations, excessive permissions, and exposure events, alerting before data is accessed by unauthorised parties. How this maps to the Privacy Act: – Prevents cloud-driven eligible data breaches before they occur – Detects cloud storage exposure in real time, minimising the duration of any potential breach – Supports APP 11 obligations to take reasonable steps to protect personal information held in cloud environments
NDB Notification Support & Playbooks When a breach is confirmed as notifiable, ThreatDefence structured incident playbooks guide your team through the OAIC notification process — what to include in the notification, how to notify affected individuals, what remediation steps to take. Pre-built templates reduce the time from “breach confirmed” to “OAIC notified.” How this maps to the Privacy Act: – Reduces risk of missing the notification requirement through structured escalation workflows – Provides draft notification content aligned to OAIC guidance – Documents your organisation’s response actions — demonstrating good faith compliance to the regulator
Next-Generation SIEM — Detect the Access, Not Just the Aftermath Our Next-Generation SIEM ingests and correlates security events from across your environment: Active Directory, email platforms, file servers, cloud storage, SaaS applications, databases, and endpoints. Behavioural baselines and anomaly detection surface abnormal access to personal information before it becomes a notifiable breach. How this maps to the Privacy Act: – Detects unusual access patterns to databases or file shares containing personal information – Identifies compromised credentials being used to access sensitive personal data – Retains structured, searchable logs for breach scoping and OAIC investigation responses – Supports the 30-day assessment period with a complete timeline of access events
Network Detection & Response (NDR) — Evidence for Breach Scoping When a breach occurs, one of the hardest questions to answer is: what data left the network? ThreatDefence NDR retains weeks of network-level evidence, enabling forensic reconstruction of data flows. You can determine precisely what was exfiltrated, to where, and when — the information the OAIC needs in your notification. How this maps to the Privacy Act: – Enables accurate breach scoping: which individuals’ personal information was involved – Provides the network-level evidence required to determine whether harm is “likely” — the test for NDB eligibility – Supports OAIC investigation responses and civil litigation defence under the new statutory tort
Digital Forensics & Incident Response (DFIR) When a potential breach is identified, your 30-day assessment clock is running. ThreatDefence DFIR capability provides rapid forensic investigation — determining the nature of the incident, what personal information was involved, whether serious harm is likely, and whether the breach meets the NDB notification threshold. How this maps to the Privacy Act: – Delivers the breach assessment required to determine NDB notification obligations within the 30-day window – Produces structured forensic reports aligned to OAIC notification requirements – Provides legal-grade evidence for regulatory investigations and civil proceedings under the Privacy Act statutory tort – Identifies root cause and containment steps to prevent reoccurrence
APP 11 Security Programme Support Australian Privacy Principle 11 requires organisations to take reasonable steps to protect personal information from misuse, loss, and unauthorised access. “Reasonable steps” is assessed against the sensitivity of the information, the size of the organisation, and the state of industry practice. ThreatDefence gives you the monitoring, vulnerability management, and configuration benchmarking needed to demonstrate that your security posture meets the APP 11 standard. How this maps to the Privacy Act: – Provides continuous evidence of proactive security measures for OAIC audits and investigations – Benchmarks your security controls against industry standards including ACSC Essential Eight – Identifies and remediates security weaknesses before they lead to a breach