In brief – Voda­fone in breach of NPP 4.1

The Pri­va­cy Com­mis­sion­er has hand­ed down a report which has impor­tant impli­ca­tions for any busi­ness that stores per­son­al infor­ma­tion, par­tic­u­lar­ly where shared logins are used to access data, and pro­vides some guid­ance on what is required in order to meet the oblig­a­tions under Nation­al Pri­va­cy Prin­ci­ple (NPP) 4.1.


Call records and billing infor­ma­tion compromised

The Aus­tralian Pri­va­cy Com­mis­sion­er has issued his report into the alleged breach­es of pri­va­cy by Voda­fone Hutchi­son Aus­tralia Pty Ltd (VHA) that arose after com­plaints were made that cus­tomer call records and billing infor­ma­tion had been com­pro­mised. The Com­mis­sion­er has found that at the time of the inci­dent, VHA did not have an ade­quate lev­el of secu­ri­ty in place to pro­tect the per­son­al infor­ma­tion it held in its… system”.

How­ev­er, the inci­dent was not a breach of the prin­ci­ple that an organ­i­sa­tion must only use or dis­close per­son­al infor­ma­tion for the pri­ma­ry pur­pose for which it was col­lect­ed, unless an excep­tion applies (NPP 2.1).

Impli­ca­tions for business

The report makes it clear that the ques­tion of whether the steps tak­en to pro­tect per­son­al infor­ma­tion are rea­son­able in the cir­cum­stances is a sub­jec­tive test based on par­tic­u­lar risks with­in the par­tic­u­lar busi­ness con­cerned. There is no uni­ver­sal stan­dard that applies to all busi­ness­es hold­ing per­son­al infor­ma­tion. This means that every busi­ness must make its own risk assess­ment, iden­ti­fy­ing the par­tic­u­lar risks with­in the busi­ness and then imple­ment appro­pri­ate secu­ri­ty mea­sures in view of those risks.

Shared login identification

How­ev­er, the report also notes that the use of shared login iden­ti­fi­ca­tion rather than indi­vid­ual login iden­ti­fi­ca­tion – for exam­ple, allo­ca­tion of a sin­gle login to a par­tic­u­lar store — added to the under­ly­ing data secu­ri­ty risk. This increased the risk that anom­alies may not be detect­ed. Even if an anom­aly is detect­ed, the issue may not be able to be inves­ti­gat­ed ful­ly if there are shared logins, as the actions are not linked to an indi­vid­ual autho­rised user. Shared logins also reduce the abil­i­ty of audit trails to assist in inves­ti­ga­tions and access con­trol mon­i­tor­ing. These are impor­tant con­trols in any organ­i­sa­tion for pro­tect­ing per­son­al infor­ma­tion in com­pli­ance with the principle.

Speedy response to breach allegations

The report also acknowl­edges the impor­tance of a speedy response by any organ­i­sa­tion that is faced with an alle­ga­tion of a pri­va­cy breach, not­ing that this is a key fac­tor for mit­i­gat­ing dam­age. The report accepts that VHA act­ed imme­di­ate­ly to restrict access to per­son­al infor­ma­tion, reviewed its data secu­ri­ty prac­tices and launched an inter­nal investigation.

VHA’s response to the issue was imme­di­ate and was a pos­i­tive step”.

Do you col­lect and store per­son­al information?

If your busi­ness col­lects and stores per­son­al infor­ma­tion, this report is a time­ly reminder to review the par­tic­u­lar risks asso­ci­at­ed with that stor­age and to ensure that your process­es ade­quate­ly man­age those risks. If you allow access to per­son­al data by means of any form of shared login, we strong­ly rec­om­mend that you review that process immediately.

If you would like to know more, or have any ques­tions about your pri­va­cy com­pli­ance, please con­tact Swaab Attor­neys.

Authored by M Hall.

If you would like to repub­lish this arti­cle, it is gen­er­al­ly approved, but pri­or to doing so please con­tact the Mar­ket­ing team at marketing@​swaab.​com.​au. This arti­cle is not legal advice and the views and com­ments are of a gen­er­al nature only. This arti­cle is not to be relied upon in sub­sti­tu­tion for detailed legal advice.

Publications

Tem­po­rary Dis­con­for­mi­ty in Build­ing Defects: Myth, Not Law

The ​“tem­po­rary dis­con­for­mi­ty” argu­ment in con­struc­tion dis­putes sug­gests that defec­tive work iden­ti­fied before prac­ti­cal com­ple­tion is not a breach while the…

The impor­tance of a Request for Tender

Issu­ing a request for ten­der (RFT) is more than just secur­ing the best or low­est price. An RFT is your oppor­tu­ni­ty to man­age…

More Changes for Stra­ta — effec­tive 1 April 2026

The Fair Trad­ing and Build­ing Leg­is­la­tion Amend­ment Bill 2026 was passed by par­lia­ment dur­ing Feb­ru­ary 2026 with the changes effec­tive on…

In the News

We wel­comed trainee lawyer from Ger­many through Mer­i­tas network

Ear­li­er this year we wel­comed trainee lawyer Char­lotte Schnitzen­baumer from Munich-based law firm GvW Graf von West­phalen for a three‑month inter­na­tion­al…

Michael Byrnes appeared on the Game Chang­ers Radio pod­cast host­ed by Craig Bruce and Irene Hulme on 27 March 2026 to dis­cuss the First Case Man­age­ment Hear­ing in the pro­ceed­ings brought by Kyle Sandi­lands against ARN

Michael Byrnes appeared on the Game Chang­ers Radio pod­cast host­ed by Craig Bruce and Irene Hulme on 27 March 202…

Michael Byrnes is quot­ed in the arti­cle, Five more Kyle ques­tions answered: Would ARN have to pay a lump sum?”, pub­lished in Mum­brel­la on 25 March 2026

Michael Byrnes is quot­ed in the arti­cle, ​“Five more Kyle ques­tions answered: Would ARN have to pay a lump sum?”, pub­lished…

Sign up for our Newsletter

*Mandatory information