02 December 2025
It has been a year since the Australian government introduced a voluntary cyber security disclosure regime to encourage timely, frank cooperation between business and government during cyber incidents. As private organisations navigate this regime, many are considering whether to volunteer information during cyber incidents. The regime restricts how government can use voluntarily disclosed information, creating a protected channel for incident response. This article explains how it operates and provides practical guidance for organisations seeking to leverage voluntary disclosure pathways while managing legal risks.
The voluntary cyber security disclosure pathway is part of a suite of cyber security legislative reforms which were introduced in late 2024. It creates parallel information use restrictions under Part 4 of the Cyber Security Act 2024 (Cth) (CSA) and Part 6 of the Intelligence Services Act 2001 (Cth) (ISA) (the limited use obligation regime). These restrictions protect information that organisations voluntarily share with the Commonwealth Government in relation to cyber incidents (Voluntary Disclosure Information). The regime aims to promote open communication with government in response to cyber security incidents by limiting government entities from using this information against organisations in civil or regulatory action. However, it still allows regulators to obtain the same information through their existing powers and preserves law enforcement and national security functions.
Organisations should consider voluntary disclosure as part of a broader review of their cyber security response plan, which should also reflect other key changes to the cyber threat and regulatory landscape.
An organisation impacted by a cyber security incident may receive significant benefits from voluntarily disclosing information to the National Cyber Security Coordinator (NCSC) and to the Australian Signals Directorate (ASD) under the limited use regime. This may be the case where government involvement would expedite identification, containment and recovery, reduce response costs, and minimise financial, operational and reputational harms for the organisation. These benefits increase with early engagement. Benefits may include:
Reputation and stakeholder management: Targeted ministerial briefing can support coordinated public messaging and stakeholder management, particularly important for incidents with significant public concern.
Organisations impacted by a cyber security incident (impacted entity) have the option to make voluntary disclosures to both the NCSC under the CSA and the ASD under the ISA. Each pathway is available simultaneously and offers distinct capabilities, while providing similar limited use protections for the impacted entity. The choice to engage one or both bodies should be informed by the nature of the incident and the specific assistance required, as each pathway is designed to achieve different objectives.
In practice, organisations may benefit from disclosing to both the NCSC and the ASD. Once either the NCSC or the ASD has been provided with information, they may also make a secondary disclosure to the other body if they consider their involvement is necessary for the incident response.
Organisations might engage the NCSC (supported by the National Office of Cyber Security) under the Cyber Security Act limited use regime where the cyber security incident may be serious and an urgent response is required. This is particularly where the response requires coordination of government entities and ongoing consequence management. The NCSC is best placed to facilitate a whole-of-government response, manage public communications and coordinate support across Commonwealth and State bodies.
Organisations may engage the ASD under the ISA limited use regime for technical assistance, up-to-date threat intelligence, and cyber vulnerability support in response to a cyber security incident or a cyber security vulnerability. The ASD provides specialist expertise in threat analysis, forensic support, and disruption of malicious actors.
Organisations should consider both disclosure pathways as complementary options, each serving different but equally important roles in incident response. Utilising both the NCSC and ASD can maximise the benefits of government support and ensure a comprehensive approach to managing and resolving cyber security incidents.
The legislation requires that the NCSC and ASD only use and disclose Voluntary Disclosure Information for permitted cyber security purposes. This is primarily to assist the impacted entity in responding to, mitigating or resolving the cyber security incident.
Other permitted purposes include:
Where the NCSC or ASD shares limited use information with another entity (such as State bodies or other Commonwealth bodies), those secondary recipients are bound by the same limited use restrictions and must handle the information in accordance with the CSA and ISA frameworks.
The limited use regime provides key protections for impacted entities that voluntarily disclose cyber security incident information:
The limited use regime offers important protections and provides the private sector with an available resource for responding to cyber security incidents. However, organisations should be aware of the following limitations and continuing obligations when disclosing Voluntary Disclosure Information:
Key limited use obligation exceptions and boundaries: Limitations on the use of Voluntary Disclosure Information do not apply to information that becomes lawfully public, information already in the public domain, information provided to meet other mandatory reporting regimes, or information the government has obtained through independent means. Additionally, as indicated above, coronial inquiries, Royal Commissions and certain federal court proceedings are not covered by privilege or inadmissibility protections.
Not a safe harbour from regulatory action: The regime restricts how voluntarily disclosed information may be used by government bodies, not whether regulators can investigate the impacted entity. Regulators retain full power to compel the same information using their existing statutory powers and may still do so independently of any voluntary disclosure.
Mandatory reporting obligations remain separate and applicable: Voluntary disclosure does not relieve entities of mandatory cyber security incident reporting and disclosure requirements under other statutory regimes (e.g. ransomware payment reports under the CSA, and reporting obligations under the Security of Critical Infrastructure Act 2018 (Cth) Part 2B, and the Privacy Act 1988 (Cth)). Organisations cannot treat voluntary disclosure as a substitute for these separate obligations.
Privacy obligations continue to apply: For voluntary disclosures to the NCSC under the CSA, Privacy Act 1988 (Cth) obligations continue to apply to all disclosure and handling of personal information.
To maximise the benefits of voluntary disclosure while managing legal risks, organisations should integrate the following steps into their cyber security incident response planning:
The limited use obligation regime represents a significant development in the Australian government’s cyber security incident response role, creating a structured pathway for government-industry collaboration during cyber incidents. The regime offers meaningful protections to the private sector to encourage disclosure to government. However, organisations should approach voluntary disclosure strategically in light of the legal position, understanding both the benefits and limitations, maintaining compliance with separate mandatory obligations and integrating disclosure pathways into broader incident response planning. Early engagement with the NCSC and/or the ASD with a clear understanding of the legislation and the disclosure process is key to leveraging government support effectively while managing legal and regulatory risks.
Authors
Tags
This publication is introductory in nature. Its content is current at the date of publication. It does not constitute legal advice and should not be relied upon as such. You should always obtain legal advice based on your specific circumstances before taking any action relating to matters covered by this publication. Some information may have been obtained from external sources, and we cannot guarantee the accuracy or currency of any such information.