Data privacy and the law

Data privacy and the law
Regardless of a firm鈥檚 choice of data sharing techniques, said businesses will have to get ahead of the game if they are to better serve clients and navigate evolving regulatory and security requirements, writes Unisearch.
Unisearch with Professor Lyria Bennett Moses and Professor Scott Sisson 鈥 09 November 2021
When the COVID-19 pandemic first hit, managing cyber security and data privacy was in the spotlight. For many firms, its 鈥渇ront-of-mind鈥 presence has diminished as the 鈥渘ew normal鈥 is accepted. Though to the contrary, the widely adopted hybrid work-from-home/office decentralisation significantly exposes law firms to greater data privacy risk.
Professor Lyria Bennett Moses encouraged law firms to remain vigilant about risks associated with data breaches and prioritise data privacy security measures 鈥 particularly given the sensitivity of client information.
鈥淔rom the Panama Papers to ransomware threats to publish data, lawyers have good reason to be concerned about protecting the confidentiality of their client鈥檚 information in the face of cyber threats. The risks of disclosure are primarily reputational and, to a lesser extent, the possibility of litigation by a disgruntled client. Legal requirements related to information security come from a variety of places, including the Privacy Act 1988 (Cth) APP 11, promises made in contracts, and the duty of care in tort,鈥 she said.
While the Legal Profession Uniform Law Australian Solicitors鈥 Conduct Rules 2015 rule 9 requires solicitors not to disclose confidential client information, they have less to say on the responsibility to keep information secret, other than a general standard to be competent and diligent (r 4.1.3). Data breach notification rules, which apply to the majority of law firms, and the related reputational risk are likely of more concern than professional conduct requirements and direct legal risk,鈥 said Professor Bennett Moses.
鈥淟awyers also need to keep track of cyber security obligations for all organisations, law firms included, as these are likely to increase. The Attorney-General鈥檚 Department is conducting a review of the Privacy Act 1988, asking questions inter alia as to whether the small business exemption should be modified, whether changes should be made to security requirements and, most crucially, whether the act should be modified to include a direct right of action for those impacted by failure to comply with privacy obligations.
鈥淔urther, the Department of Home Affairs is exploring regulatory incentives for cyber security practices, referring to the same issues being considered by the Attorney-General鈥檚 Department as well as ways to encourage 鈥榮ecure by design鈥 practices, possible changes to the Australian Consumer Law, the possibility of creating an enforceable cyber security code, and potential reforms that would strengthen corporate governance of cyber security risk.鈥
Professor Scott Sisson concurred.
鈥淢ost cyber security advice focuses on authentication, access controls, firewalls, anti-virus protection, software updates and care in the face of social engineering attacks. All of those things are important. However, it is also worth considering whether data and information can be stored and used in such a way they are protected even if a third party gets access,鈥 he outlined.
鈥淚n fact, third party access to and sharing of data is often a requirement of doing business. In this situation, there are a growing number of techniques available that are explicitly designed to allow for direct sharing of data between two parties, even those with mutual trust, that still provides a degree of privacy protection.鈥
At a practical level, suppose a law firm wishes to engage a data analytics firm to help it improve the accuracy of its costs estimates. For example, there is rich data in historic costs estimates, finance records, and invoices that could be used to provide better estimates, but these may also contain confidential information.
Alternatively, an international law firm may need to share data with overseas offices so that global trends can be understood. Or a firm might have the requirement to share information between departments or local offices or with employees analysing the data at home.
The question, therefore, becomes: can law firms extract value from their data without compromising its privacy and confidentiality?
鈥淔irms need to share sensitive data, so it鈥檚 important to implement privacy-centric procedures that support sharing whilst limiting breaches. There are a number of approaches that data custodians can use when they need to release data 鈥 whether this is publicly within departments in a single organisation, within a small group of organisations, or between countries. It鈥檚 important to note that simply providing aggregated data is not enough to guarantee that your individual-level data remains private,鈥 said Professor Sisson.
He provided further technical explanation, stating: 鈥淥ne data privacy technique, known as 鈥榙ifferential privacy,鈥 adds a random number, positive or negative, to each data point 鈥 so in principle, the larger numbers that are added, the more secure the data becomes, although the data are then less accurate.鈥
鈥淎nother approach is applying a 鈥榮ynthetic data鈥 model that randomly generates data with similar properties to the real data. Then there鈥檚 鈥榝ederated learning鈥, which is a decentralised technique that shares the result of data analyses rather than the data itself. And finally, 鈥榟omomorphic encryption鈥, which allows data analysis to be directly performed on encrypted data,鈥
he detailed.
鈥淲hich data sharing technique to use in a law firm will depend on the exact analytical needs and sensitivity of the data involved 鈥 and it may be that different methods are required for different situations. As such, we encourage legal practices, independently of size, to invest in a data-privacy audit through a professional organisation to determine how the firm鈥檚 data privacy needs can best be achieved.鈥
In addition, Professor Bennett Moses strongly suggested the legal industry 鈥済et ahead of the game鈥, both internally and in assisting corporate clients with the possibility of increased information security requirements.
Unisearch is a leading provider of expert opinion services. Professor Lyria Bennett Moses is a Unisearch expert and professor at 亚美棋牌鈥檚 faculty of law and justice, as well as serving as a director for the Allens聽Hub for Technology, Law and Innovation. Professor Scott Sisson is a Unisearch expert and director of the 亚美棋牌 Data Science Hub in the School of Mathematics and Statistics at 亚美棋牌.