Enforcement GuideAPAC

Australia Cyber Security Act 2024 Penalties and Fines

Six civil penalty provisions at 60 penalty units each (AUD 19,800 per individual contravention, up to AUD 99,000 for a body corporate), a staged smart device enforcement path, and the Regulatory Powers framework working behind both.

The penalty number is only part of the picture. Compliance notices, stop notices, recall notices, investigations, monitoring powers, infringement notices, enforceable undertakings, and injunctions can all reach you before a court order is sought.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
10

Structured answer sets in this page tree.

Primary sources
6

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

The Australia Cyber Security Act 2024 uses two enforcement channels. Smart device (Part 2) failures escalate through compliance notices, stop notices, and recall notices. Ransomware reporting failures and protected information misuse carry express civil penalties of 60 penalty units per contravention, which equals AUD 19,800 for individuals and up to AUD 99,000 for bodies corporate under the 5x multiplier at the current penalty unit rate of AUD 330. The Regulatory Powers (Standard Provisions) Act 2014 adds monitoring, investigation, enforceable undertakings, injunctions, and infringement notices across all civil penalty provisions. This page maps every penalty provision, enforcement lever, penalty calculation method, procedural safeguard, and practical risk-reduction step teams should have in place.

Section 1

How penalty units work and what they mean in dollar terms

The Australia Cyber Security Act 2024 penalties are expressed in penalty units, not dollar amounts. The value of one Commonwealth penalty unit is set by section 4AA of the Crimes Act 1914 and equals AUD 330 for contraventions occurring on or after 7 November 2024. The Cyber Security Act 2024 received Royal Assent on 29 November 2024, so every contravention under this Act uses the AUD 330 rate. That value is subject to indexation and may increase from 1 July 2026.

The Act contains six express civil penalty provisions, all set at 60 penalty units. At AUD 330 per unit, 60 penalty units equals AUD 19,800 per contravention for an individual. Under section 82(5) of the Regulatory Powers (Standard Provisions) Act 2014, if the triggering legislation does not specify a separate body corporate penalty, the maximum for a body corporate is five times the stated amount. This multiplier raises the effective maximum to 300 penalty units or AUD 99,000 per contravention for a body corporate. These are maximum penalties. A court determines the actual amount based on circumstances, conduct, and harm.

Section 87(2)(a) of the Act expressly prevents the rules from creating additional offences or civil penalties. Only the primary legislation can establish penalty provisions, so these six are the complete set. The penalty unit value applies to both civil penalty order proceedings and infringement notice calculations. An infringement notice penalty is typically one fifth of the maximum court penalty, meaning approximately 12 penalty units (AUD 3,960) for an individual per contravention.

  • One Commonwealth penalty unit equals AUD 330 from 7 November 2024 (Crimes Act 1914, section 4AA). This value is subject to indexation from 1 July 2026.
  • 60 penalty units equals AUD 19,800 for an individual and up to AUD 99,000 for a body corporate at the current rate.
  • The body corporate multiplier of five times applies under section 82(5) of the Regulatory Powers Act when the Act does not specify a separate body corporate amount.
  • An infringement notice penalty for a 60 penalty unit provision is approximately 12 penalty units (AUD 3,960 for an individual).
  • Section 27(5): Failure to report a ransomware payment within 72 hours carries a civil penalty of 60 penalty units (AUD 19,800 individual, up to AUD 99,000 body corporate).
  • Section 30(6): Prohibited secondary use or disclosure of ransomware payment report information carries a civil penalty of 60 penalty units.
  • Section 40(6): Prohibited secondary use or disclosure of information shared with the National Cyber Security Coordinator carries a civil penalty of 60 penalty units.
  • Section 50(1): Failure to comply with a Board document production notice carries a civil penalty of 60 penalty units.
  • Section 56(6): Prohibited secondary use or disclosure of Board review information carries a civil penalty of 60 penalty units.
  • Section 59(1): Disclosure of draft review reports from the Board carries a civil penalty of 60 penalty units.
Section 2

Smart device enforcement path under Part 2 of the Cyber Security Act

For Part 2 product obligations, the Secretary operates a staged enforcement path. Each stage escalates the response and the consequences. Businesses that treat early notices as routine correspondence, rather than serious escalation events, risk finding themselves at the recall stage faster than expected.

The Act limits each notice type to one per particular instance of non-compliance. This means the Secretary cannot issue multiple compliance notices for the same problem. But each new product or each new standard failure can start its own enforcement chain independently.

  • Step 1, Compliance Notice (section 17): The Secretary issues this when reasonably satisfied that an entity is not complying with sections 15 or 16, or is aware of information suggesting possible non-compliance. Must specify corrective action and set a reasonable compliance period
  • Step 2, Stop Notice (section 18): Follows when the entity has received a compliance notice and the Secretary is reasonably satisfied the entity has not complied or remedial actions are inadequate. Can specify actions the entity must take or must refrain from taking
  • Step 3, Recall Notice (section 19): Follows when the entity has received a stop notice and the Secretary is reasonably satisfied the entity has not complied. Can require the entity to ensure the product is not acquired in Australia, not supplied to suppliers, and arrange return of products
  • Step 4, Public Notification (section 20): If the entity fails to comply with a recall notice, the Minister may publish the entity identity, product details, non-compliance details, and risks posed by the product on the Department website or in any other manner considered appropriate
Recommended next step

Use Australia Cyber Security Act 2024 Penalties and Fines as a cited research workflow

Research Copilot can take Australia Cyber Security Act 2024 Penalties and Fines from understanding exposure and enforcement with cited answers to a reusable workflow inside Sorena. Teams working on Australia Cyber Security Act 2024 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 3

Ransomware reporting penalties under the Australia Cyber Security Act 2024

The most significant Australia Cyber Security Act 2024 penalty for day-to-day operations is the 60 penalty unit fine for failure to submit a ransomware payment report within 72 hours (section 27). At the current rate, this penalty equals AUD 19,800 for an individual and up to AUD 99,000 for a body corporate. The reporting obligation applies to reporting business entities, which are entities carrying on business in Australia with annual turnover exceeding AUD 3 million in the previous financial year, or entities that are responsible for a critical infrastructure asset under Part 2B of the Security of Critical Infrastructure Act 2018.

The Ransomware Payment Reporting Rules 2025 prescribe the AUD 3 million threshold. For partial-year businesses, the threshold is pro-rated using the formula: AUD 3 million multiplied by the number of days in operation divided by the total days in the financial year. The 72-hour clock starts from the moment the ransomware payment is made or the moment the reporting business entity becomes aware that the payment has been made, whichever is applicable.

Importantly, section 27(6) disapplies subsection 93(2) of the Regulatory Powers Act for this contravention. This means the standard reasonable steps defence is not available for ransomware reporting failures under the Australia Cyber Security Act 2024. The entity cannot argue that it took reasonable steps to prevent the contravention. Section 28 provides a good faith safe harbour: an entity is not liable for damages for acts done or omitted in good faith in compliance with the reporting obligation, but this does not reduce the civil penalty itself.

  • The 72-hour reporting clock starts from the moment the entity makes the payment or becomes aware it was made.
  • Civil penalty for failure to report: 60 penalty units (AUD 19,800 individual, up to AUD 99,000 body corporate).
  • Information in the report must include entity ABN, incident timing, impact on infrastructure and customers, ransomware variants, vulnerabilities exploited, payment amount and method, and communications with the extorting entity.
  • Information is only required to the extent the entity knows or can find out by reasonable search within the 72-hour window.
  • The AUD 3 million turnover threshold captures approximately 6.56 percent of Australian businesses according to the Explanatory Statement.
  • Section 93(2) of the Regulatory Powers Act is disapplied for section 27, meaning the standard reasonable steps defence is not available for ransomware reporting failures.
  • Ransomware payment report information is not admissible against the reporting entity in most criminal, civil, or tribunal proceedings (section 32).
  • The good faith safe harbour under section 28 protects against damages claims but does not reduce the civil penalty for late or missed reporting.
Section 4

Protected information penalties and the information safeguard framework

The Act creates civil penalties for unauthorized use or disclosure of protected information across three separate Parts. Each provision targets non-Commonwealth officers who handle sensitive, confidential, or commercially sensitive information obtained under the Act. Commonwealth officers who misuse protected information face criminal offences under the Criminal Code, not civil penalties.

These civil penalty provisions are triggered when the information is sensitive information about an individual disclosed without consent, confidential or commercially sensitive information, or information whose disclosure would damage Commonwealth security, defence, or international relations. Understanding these categories is essential because the trigger is about the nature of the information, not just the act of disclosure.

  • Section 30(6) covers ransomware report information under Part 3, carrying a civil penalty of 60 penalty units
  • Section 40(6) covers information voluntarily shared with the National Cyber Security Coordinator under Part 4, carrying a civil penalty of 60 penalty units
  • Section 56(6) covers information provided to the Cyber Incident Review Board under Part 5, carrying a civil penalty of 60 penalty units
  • Section 59(1) covers unauthorized disclosure of a draft review report, with exceptions for preparing submissions, using the entity's own information, acting with Chair consent, or after information becomes lawfully public
  • No evidential burden falls on the entity claiming an exception under section 59(3), which shifts the practical proof requirement to the regulator
Section 5

Regulatory Powers enforcement framework behind the penalties

The civil penalty provisions sit inside the Regulatory Powers (Standard Provisions) Act 2014, which gives enforcement authorities a toolkit well beyond the penalty amount itself. The Secretary and appointed SES employees can pursue civil penalty orders through the Federal Court of Australia, the Federal Circuit and Family Court (Division 2), and State or Territory courts with appropriate jurisdiction.

Enforcement also extends to enforceable undertakings for all civil penalty provisions and for sections 15 and 16 (smart device security standards). This means the Secretary can accept formal compliance commitments even where no civil penalty has been imposed. Monitoring powers under Part 2 of the Regulatory Powers Act apply to all civil penalty provisions and smart device standards, but cannot be exercised against residential premises.

  • Civil penalty orders are sought by the Secretary or appointed CEO/SES employees of designated Commonwealth bodies through the Federal Court or Federal Circuit and Family Court
  • Enforceable undertakings cover all six civil penalty provisions and sections 15 and 16, allowing the Secretary to accept formal compliance commitments
  • Monitoring powers include entry and inspection of business premises by APS employees under a magistrate-issued warrant, but exclude residential premises
  • Investigation powers under Part 3 include search and seizure warrants issued by a magistrate for all civil penalty provisions
  • Infringement notices under Part 5 can be issued by SES employees or equivalent for all civil penalty provisions, though the Crown is not liable to receive them
  • Injunctions under Part 7 can restrain a person from contravening, or compel compliance with, any civil penalty provision
Section 6

Review rights and procedural safeguards for enforcement notices

The Act builds in multiple procedural protections. Before issuing any enforcement notice (compliance, stop, or recall), the Secretary must notify the entity of the intent to issue the notice and provide at least 10 days for the entity to make representations. This pre-notice representation right applies to notice variations as well.

Entities can apply for internal review of compliance, stop, and recall notices, and of notice variations. The application must be made in writing within 30 days of the notice being given. The reviewing decision-maker must decide within 30 days and can affirm, vary, or revoke the original decision. A written statement of reasons must be provided as soon as practicable after the decision.

  • Pre-notice representation period is at least 10 days before any compliance notice, stop notice, recall notice, or notice variation is issued
  • Internal review applications must be made in writing within 30 days of the notice being given
  • The reviewing decision-maker must complete the review within 30 days of receiving the application
  • If the Secretary made the original decision personally, a delegate who was not involved in the original decision must conduct the review
  • The Secretary may also engage an independent expert to examine a product for compliance under section 23, with the entity entitled to reasonable compensation from the Commonwealth for complying with examination requests
Section 7

Non-admissibility protections and safe harbours under the Cyber Security Act

A major policy feature of the Australia Cyber Security Act 2024 is the set of non-admissibility protections designed to encourage reporting. Information in ransomware payment reports (section 32), information voluntarily provided to the National Cyber Security Coordinator (section 42), and information provided to the Cyber Incident Review Board (section 58) is not admissible against the reporting entity in criminal proceedings, civil penalty proceedings, or tribunal proceedings.

Entities and their officers, employees, and agents also benefit from a liability safe harbour (section 28). They are not liable for damages for acts done in good faith in compliance with ransomware reporting obligations. The same protection extends under section 74 to entities complying with Board document production notices. Additionally, providing information under the Act does not waive legal professional privilege in proceedings, except for coronial inquiries and Royal Commissions.

  • Ransomware payment report information cannot be used against the reporting entity in criminal, civil penalty, or tribunal proceedings under section 32
  • Information shared voluntarily with the National Cyber Security Coordinator cannot be used against the entity under section 42
  • Information provided to the Cyber Incident Review Board cannot be used against the entity under section 58
  • Narrow exceptions exist for false information offences under Criminal Code sections 137.1, 137.2, and obstruction under section 149.1
  • Legal professional privilege is preserved when providing information under the Act, so disclosures to the regulator do not open the door to discovery in unrelated litigation
Section 9

Comparison of Australia Cyber Security Act 2024 penalties with SOCI Act penalties

Organisations that are responsible entities for critical infrastructure assets may face penalties under both the Australia Cyber Security Act 2024 and the Security of Critical Infrastructure Act 2018 (SOCI Act). Understanding the relationship between these two penalty regimes is essential for enforcement risk planning. The SOCI Act carries penalties of up to 200 penalty units (AUD 66,000 at the current rate) for failures relating to critical infrastructure risk management programs, 150 penalty units (AUD 49,500) for annual reporting failures, and 50 penalty units (AUD 16,500) for failure to notify the regulator about a cyber security incident.

The Australia Cyber Security Act 2024 penalties for ransomware reporting failures (60 penalty units) are separate from and additional to any SOCI Act reporting obligations. A responsible entity for a critical infrastructure asset that makes a ransomware payment must comply with the 72-hour ransomware payment reporting obligation under the Cyber Security Act 2024 and may also need to report the underlying cyber security incident under Part 2B of the SOCI Act within 12 hours for critical incidents or 72 hours for other reportable incidents. Dual-regulated entities face penalty exposure under both Acts simultaneously.

While the per-contravention penalty amounts under the Australia Cyber Security Act 2024 are lower than the highest SOCI Act penalties, the Cyber Security Act enforcement framework is broader in several respects. The Regulatory Powers Act integration gives the regulator monitoring, investigation, infringement notice, enforceable undertaking, and injunction powers for every civil penalty provision. Both Acts use the Regulatory Powers (Standard Provisions) Act 2014 for enforcement, so dual-regulated entities should map both penalty regimes against their operations and ensure that reporting workflows satisfy both Acts.

  • SOCI Act: up to 200 penalty units (AUD 66,000) for critical infrastructure risk management program failures.
  • SOCI Act: 150 penalty units (AUD 49,500) for annual reporting failures.
  • SOCI Act: 50 penalty units (AUD 16,500) for failure to notify about a cyber security incident.
  • Cyber Security Act 2024: 60 penalty units (AUD 19,800 individual, up to AUD 99,000 body corporate) for ransomware payment reporting failures.
  • Ransomware reporting under the Cyber Security Act 2024 is separate from SOCI Act incident reporting obligations.
  • A critical infrastructure entity that makes a ransomware payment may face penalty exposure under both Acts simultaneously.
  • Both Acts use the Regulatory Powers (Standard Provisions) Act 2014 for enforcement, including infringement notices, undertakings, and injunctions.
Section 10

How to reduce Australia Cyber Security Act 2024 penalty and enforcement risk

The strongest defence against enforcement action is a current evidence trail that demonstrates diligence, control, and responsiveness. If your team can show how the product met the standard, how the statement of compliance was issued, how the ransomware reporting decision was handled, and how protected information is controlled, you are in a significantly better position than a business reconstructing facts after a notice arrives.

Design your evidence model around the six civil penalty provisions and the three-stage smart device enforcement path. Assign owners to each obligation, define evidence collection points in your existing workflows, and test retrieval before a regulator asks.

  • Keep version-specific product evidence and issued statements of compliance together, with clear links between each product release and its conformity assessment
  • Retain screenshots or archived copies of the public support period declaration and vulnerability reporting pages for each smart device product
  • Maintain an incident chronology for any event involving extortion, unauthorized access, or a payment decision, including timestamps, decision-makers, and communications
  • Escalate notice receipt immediately to legal, executive, and product owners, and confirm receipt within the team within 24 hours
  • Run mock regulator requests at least annually so that evidence retrieval, approval paths, and representation drafting are tested under realistic conditions
  • Implement access controls and audit logs for all protected information received under the Act, so that any secondary use or disclosure can be traced and justified
Primary sources

References and citations

legislation.gov.au
Referenced sections
  • Defines the Commonwealth penalty unit value as AUD 330 from 7 November 2024, with indexation provisions. Used to calculate the dollar amount of all civil penalties in the Australia Cyber Security Act 2024.
legislation.gov.au
Referenced sections
  • Primary source for all six civil penalty provisions (sections 27, 30, 40, 50, 56, 59), the smart device enforcement path (sections 17-20), internal review rights (section 22), non-admissibility protections (sections 32, 42, 58), non-legal person liability (section 85), and the Regulatory Powers framework (sections 79-83).
legislation.gov.au
Referenced sections
  • Provides the enforcement framework for monitoring, investigation, civil penalty orders, infringement notices, enforceable undertakings, and injunctions referenced throughout Part 6 of the Cyber Security Act 2024.
Related guides

Explore more topics

Australia Cyber Security Act 2024 Applicability Test | Who Must Comply
Complete Australia Cyber Security Act 2024 applicability test covering smart device security standards, ransomware payment reporting obligations.
Australia Cyber Security Act 2024 Compliance Checklist
Comprehensive Australia Cyber Security Act 2024 compliance checklist covering smart device security standards, ransomware payment reporting.
Australia Cyber Security Act 2024 Compliance Guide | Implementation Playbook
A detailed Australia Cyber Security Act 2024 compliance guide covering smart device security standards, statement of compliance requirements.
Australia Cyber Security Act 2024 Compliance Templates | Statement of Compliance, Ransomware Report, Evidence Pack, Vulnerability Disclosure, Support Period
Comprehensive Australia Cyber Security Act 2024 compliance templates with every required field.
Australia Cyber Security Act 2024 Deadlines and Compliance Calendar | Commencement Dates
Complete Australia Cyber Security Act 2024 deadlines and compliance calendar with all commencement dates: 30 November 2024 Royal Assent.
Australia Cyber Security Act 2024 FAQ | Frequently Asked Questions
Get detailed answers to frequently asked questions about the Australia Cyber Security Act 2024.
Australia Cyber Security Act 2024 Requirements | Smart Device and Ransomware Reporting Obligations
Complete guide to Australia Cyber Security Act 2024 requirements covering smart device password rules, vulnerability disclosure.
Australia Cyber Security Act 2024 Timeline and Commencement Dates | Full Schedule
Complete Australia Cyber Security Act 2024 timeline with every commencement date from Royal Assent on 29 November 2024.
Australia Cyber Security Act 2024 vs EU Cyber Resilience Act | Full CRA Comparison
Detailed comparison of the Australia Cyber Security Act 2024 and the EU Cyber Resilience Act covering scope, product categories, security requirements.
Australia Cyber Security Act 2024 vs UK PSTI Act | Product Security Comparison
Detailed product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act covering scope, ETSI EN 303 645, password requirements.
Australia Smart Device Compliance Checklist | Cyber Security Act 2024 | Sorena
Complete Australia Cyber Security Act 2024 smart device compliance checklist covering Schedule 1 password security, vulnerability disclosure.
Ransomware Payment Reporting in 72 Hours | Australia Cyber Security Act 2024
Complete guide to the 72 hour ransomware payment reporting obligation under Part 3 of the Australia Cyber Security Act 2024.
Scope and Definitions | Australia Cyber Security Act 2024
Complete guide to the Australia Cyber Security Act 2024 scope and definitions.
Smart device security standards | Australia Cyber Security Act 2024
Complete technical guide to the three Australia Cyber Security Act 2024 smart device security standards: password security under Clause 2.
Statement of Compliance and Recordkeeping | Australia Cyber Security Act 2024 | Section 9, Section 10, 5 Year Retention
Australia Cyber Security Act 2024 statement of compliance explained: all mandatory fields under Section 9(3) of the Smart Device Rules 2025.