For identity security information on protecting your business in your location, please use the links below.
Source: eSafety Commissioner
There are good reasons to collect customer information. These include staying connected, tailoring services to individual needs, and improving customer satisfaction and retention.
Customer information is usually personal information, which is any piece of information or data that can reasonably identify who a person is or how to find them. It may be used on its own or in context with other information to identify them. This includes any of the following:
A person’s identity information and credentials make up their legal identity. Credentials include:
The downside of collecting personal or identity information is that it can be stolen or misused.
Sources: Office of the Australian Information Commissioner
The following 2 steps are key to reducing identity theft and the risk of cyber incidents against your business:
It might be tempting to know as much as you can about your customers. But if this information is stolen, it could hurt your business and put your customers’ safety and privacy at risk.
If you are collecting identity information, you must collect it:
The more identity information your business holds, the greater target you will be for identity theft, scammers and cyber incidents.
The Attorney-General’s Department has developed National Identity Proofing Guidelines which give broad, best practice guidance for establishing whether a person is who they say they are. The guidelines can increase your confidence in an identity document’s validity and reduce the need to keep copies of documents. This results in significant cost savings, promotes privacy, lessens the impact of data breaches and protects against identity fraud.
Recent large data breaches have demonstrated the risks associated with storing identity information and keeping copies of credentials.
Consider the likelihood of future data breaches when deciding what identity information you store. Protect your business and your customers by destroying or de-identifying identity information you no longer need. For example, if you decide to keep documents, consider redacting (removing or concealing) the details that are not required and destroying the data altogether when it is no longer needed.
Keep any data you do retain secure. Limit the number of staff who have access to this data.
The Australian Government’s Document Verification Service (DVS) offers businesses an alternative to collecting identity information. The DVS verifies identity electronically by checking whether the identity document details your customer provides match the original records. This eliminates the need for your business to keep records of identity documents, such as driver licences, birth certificates, passport numbers and other identity details. Instead of storing full identity documents, the DVS creates an auditable transaction number. The service also makes it harder for people to use fake identity documents.
The Face Verification Service (FVS) is like the DVS but supports a higher level of identity verification. It compares a photo of a person’s face against an image from an identity document.
At present, only approved Australian Government agencies may use the FVS. In the future, all levels of government and private sector organisations will be able use the FVS.
Users of the FVS need to meet strong privacy, security and oversight requirements to access the service, including obtaining express consent from the individual whose identity is being verified.
For more information about the identity verification services, visit About our services.
Identity crime is outpacing traditional methods of data collection and storage, putting business and customer identity information and credentials at risk.
Source: Australian Competition and Consumer Commission
The identity information your business stores can be valuable to scammers. The more information a scammer holds about an individual, the more targeted and sophisticated scams can be, increasing the risk of financial loss and harm. Some common business scams to watch out for are:
The Scamwatch website has resources to help you understand the different types of scams affecting businesses, ways to protect your business and customers from scams, and how to report a scam.
Find out more in the Business scams fact sheet.
Source: NSW Government
The NSW Government has some useful information about keeping your business safe .
Source: NSW Small Business Commissioner
Sources: NSW Government
Office of the Australian Information Commissioner
Valuable identity information can be stolen through incidents such as a cyber attack, data leak or ransomware infection. Data breaches involving identity information can have a significant impact on your business in terms of cost, productivity, reputation and loss of trust.
Having a well-prepared data breach response plan is essential for all businesses collecting identity information. Detecting and quickly responding to a breach of identity information will prevent further damage and harm to both your business and your customers.
If the identity information your business holds has been breached, the Office of the Australian Information Commissioner suggests you take the following steps:
Report identity crime early to protect your business and customers from additional harm. You can report identity crime to:
While prevention is better, sometimes remediation is required after a breach happens. Help to remediate the harm of identity crime, and support for businesses affected by identity misuse and data breaches, is available at:
Source: Cyber.gov.au
For a small business, even a minor cyber security incident can have devastating impacts. In 2023–24, the average cost of a cybercrime incident, which includes identity crime, rose to over $49,600 for small businesses.
There are many simple and inexpensive measures you can take to improve the online safety and data security of your business. These include ensuring your software is up to date, backing up your information and using 2‑factor authentication.
The Australian Cyber Security Centre has resources to help small businesses protect against common cyber security threats, including:
The Department of Home Affairs, in collaboration with the Australian Signals Directorate, has developed a Cyber Health Check Tool for small businesses, not-for-profits and individuals, providing straightforward and concise cyber security guidance.
If you are collecting someone’s personal information, you may be required to comply with Australian legislation. This includes the Privacy Act 1988 and Australian Privacy Principles.
The Privacy Act regulates the way personal information is handled and requires businesses to notify individuals that their personal information will be collected, how it will be used and who it will be disclosed to
Before collecting personal information from someone, it is important to understand the risks involved and be sure you have a legitimate reason to do so.
The Office of the Australian Information Commissioner provides information and a privacy checklist for small business that can help you determine whether you need to comply with the Australian Privacy Principles.
Australian small businesses can get support to improve your digital capabilities through the Australian Small Business Advisory Services. The Australian Government Business website can direct you to a digital solutions advisor near you.
Please refer your customers to our Keep your identity safe page.