Free tool
Cyber incident notification tree
A cyber incident can trigger 4+ separate regulator notifications with very different deadlines. This tool maps your organisation profile to every clock that fires and lists the immediate steps to protect privilege and contain the breach.
1 notification required
OAIC + affected individuals
Up to 30 days assessment, then 'as soon as practicable'
Eligible data breach — likely to result in serious harm
Lodge: OAIC NDB statement + direct notification of affected individuals
Immediate steps
- Activate incident response plan; designate incident owner + comms lead.
- Preserve evidence — do NOT delete logs or reformat systems.
- Contain — isolate affected systems, suspend compromised accounts, rotate credentials.
- Notify cyber insurer within 24 hours (policy condition); their forensic panel will engage.
- Engage legal counsel (incident response privilege).
- Open contemporaneous incident register entry — time of awareness, who knew, actions taken.
Sources
Reference tool — not legal advice. For active incidents, engage your cyber insurer panel + incident-response lawyer immediately. State privacy regulators (IPC NSW, OVIC, OIC Qld) may have additional notification duties.