The NSW Auditor-General released a performance audit regarding NSW Health in late 2025. The findings were stark. The report, Cyber security in Local Health Districts, concluded that systems supporting healthcare delivery lacked adequate protection. Local Health Districts failed to meet minimum government standards set six years prior in 2019.

For the private sector, this document serves as more than a critique of public administration. It is a case study on how governance structures collapse. When clients approach SLK Lawyers seeking legal advice for data breach prevention, we often identify the same systemic gaps found in this government audit. The failure is rarely purely technical. The failure lies in management, contract definition, and unclear chains of command.

The Governance Gap

The audit identified a fundamental lack of clarity regarding roles. eHealth NSW and the Local Health Districts did not have a clear understanding of who was responsible for specific cyber risks. This confusion created a security vacuum.

We see this exact scenario in small and medium enterprises (SMEs). A business owner hires a Managed Service Provider (MSP) and assumes the MSP handles “security.” The MSP assumes they only handle software updates and hardware maintenance. The gap between those assumptions is where liability accumulates.

Under Australian law, directors must exercise due care and diligence. You cannot outsource this responsibility completely. If a breach occurs because no one knew who was responsible for patching a server, the regulator (and potentially the courts) will look at the business owners. As we have seen in the implications for private companies following recent Federal Court rulings, ignorance of technical detail is not a valid defence.

Defining “Crown Jewels”

One of the most concerning findings in the NSW Health report was the inability to identify “crown jewel” ICT assets. These are the systems critical to healthcare delivery. The Local Health Districts could not effectively protect these assets because they had not properly identified them.

In a commercial context, this is a fatal error. You cannot secure what you do not track. For a logistics company, the crown jewel might be the routing algorithm. For a medical practice, it is the patient database. For a law firm, it is client privilege.

When a cybersecurity lawyer Melbourne businesses engage reviews a risk management plan, the first question is often: “Where is your data inventory?” If a business cannot produce one, they are likely non-compliant with the Privacy Act 1988 (Cth). If you suffer a breach and cannot tell the Office of the Australian Information Commissioner (OAIC) exactly what was lost because you never knew what you had, the penalties will likely reflect that negligence.

The “Set and Forget” Risk

The audit noted that the standards the Districts failed to meet were established in 2019. Six years is a lifetime in technology. The failure was not just in implementation, but in maintaining currency. Compliance is an active process, not a one-time certificate.

Many SMEs draft a privacy policy, purchase a firewall, and consider the job done. This approach ignores the evolving nature of threat vectors. Data breach laws can play a role in forcing updates, but the legal impetus must come from the boardroom. A policy written in 2019 is likely useless against the ransomware tactics of 2025.

Business owners must view cybersecurity policies as living contracts. They require quarterly review. Insurance policies also demand this. If your cyber insurance application stated you patch systems monthly, but your practice is actually “whenever we get around to it,” your insurer may deny a claim. The NSW Health audit warns us that policies on paper mean nothing without operational adherence.

Vendor Management and Third-Party Risk

The relationship between eHealth NSW and the Local Health Districts mirrors the relationship between a parent company and its subsidiaries, or a business and its vendors. The audit found insufficient support and coordination. This lack of oversight constrained the Districts’ ability to manage risk.

In the private sector, third-party risk is a primary vector for data breaches. Healthcare data breach liability Australia wide often triggers when a third-party vendor fails to secure patient data. The primary business remains liable for the privacy breach in the eyes of the patient.

Commercial contracts must address this. Your agreements with vendors need specific clauses regarding:

  • Notification timelines in the event of a breach.
  • Indemnities for data loss caused by vendor negligence.
  • Right to audit the vendor’s security protocols.

Without these contractual protections, a business assumes the risk of its vendors’ incompetence. Recent enforcement trends signal a shift in Australian privacy enforcement, moving toward holding the principal entity responsible for the entire supply chain.

The Privilege of Delay

The NSW Auditor-General initially presented the report to Parliament on a confidential basis in July 2025. This allowed NSW Health time to respond and patch vulnerabilities before the public knew about them. The report was only tabled in December 2025.

Private businesses do not have this luxury. Under the Notifiable Data Breaches (NDB) scheme, you generally have 30 days to assess a suspected breach. You cannot hide a breach while you fix it. Attempting to do so can result in severe regulatory penalties and reputation damage.

This discrepancy highlights the need for a pre-prepared Incident Response Plan (IRP). When a breach hits, the clock starts. You do not have five months to form a taskforce. You need a retained forensic IT team and legal counsel ready to move immediately. Regulation for firm management suggests that having these relationships in place prior to an incident is a marker of reasonable steps taken to mitigate harm.

Business Continuity and Disaster Recovery

The audit found deficiencies in business continuity arrangements. If a cyber incident occurred, the Districts could not demonstrate they could continue essential services. In healthcare, this risks lives. In business, this risks insolvency.

Ransomware attacks often target backups. If your disaster recovery plan relies on on-site backups that are connected to the main network, they will likely be encrypted alongside your active data. Legal advice for data breach preparation involves testing these assumptions.

We advise clients to treat disaster recovery as a contractual obligation to their customers. If you promise 99.9% uptime in your Service Level Agreements (SLAs) but have no offline backups, you are potentially engaging in misleading and deceptive conduct under Australian Consumer Law.

Actionable Steps for Directors

The systemic failures at NSW Health provide a checklist for private directors. To avoid a similar “unsatisfactory” audit of your own business, consider the following:

  1. Clarify Roles: distinct responsibilities for internal IT, external MSPs, and management. Put it in writing.
  2. Inventory Assets: Document exactly what data you hold and where it sits. Identify your “crown jewels.”
  3. Test the Plan: A disaster recovery plan that has never been tested is a theoretical document. Run simulations.
  4. Review Insurance: Ensure your cyber liability policy covers the specific risks identified in your asset inventory.

The Auditor-General’s report warns that interconnected systems increase exposure. This is true for every modern business. The legal risk is not just that you might get hacked, but that you failed to manage the risk professionally. If you are concerned about your current governance structure or vendor contracts, contact SLK Lawyers to discuss your position.

Avatar photo
About Blaine HattieBlaine Hattie is a Principal in Commercial Transactions at Sutton Laurence King Lawyers. He advises businesses on transactions and finance with a special interest in technology, cybersecurity, digital media, defamation, and artificial intelligence.

Book an appointment with one of our Lawyers to discuss your specific needs.

Book a Consultation

A Note on the Information We Share

Reading this information does not create a lawyer-client relationship between you and SLK Lawyers. This only occurs with a formal written agreement. Content is current at publication and applies to Victorian law unless stated otherwise. It is general information only and not a substitute for specific legal advice. Strict time limits apply to legal claims. You should seek immediate legal advice on your specific situation to ensure your rights are protected.