Protecting Customer Data: A Practical Guide for Australian Small Businesses
Your customers trust you with their personal information when they buy from you, book your services, or use your website. That information — names, email addresses, phone numbers, payment details, purchase history — is both valuable to your business and a liability if it is compromised.
Australian law imposes obligations on how you protect customer data, and the penalties for significant breaches have reached record levels. This guide gives small business owners a practical roadmap for protecting the customer data they hold.
What Customer Data Do You Actually Hold?
The first step in protecting customer data is knowing what you have. Conduct a data inventory — a map of what personal information your business collects, where it is stored, how it is used, and when it is deleted.
Common types of customer data held by small businesses:
- Contact details: Name, email address, phone number, postal address
- Transaction data: Purchase history, payment method, invoice records
- Payment information: Credit card details (typically held by your payment processor, not by you directly — verify this)
- Booking and appointment records: Date, service type, preferences
- Health and medical information (for healthcare, fitness, and beauty businesses)
- Account credentials: Usernames and passwords if you operate a customer portal
- Usage data: Website browsing history, app usage data collected through cookies and analytics
- Financial information: ABNs, income details (for services involving financial advice or lending)
For each type of data, document:
- Why you collect it (the purpose)
- Where it is stored (which systems, databases, or physical files)
- Who has access to it
- How long you retain it
- When and how it is deleted
Do the Privacy Act Obligations Apply to Your Business?
Australian Privacy Principles (APPs) under the Privacy Act 1988 apply to:
- Businesses with annual turnover of more than $3 million
- Health service providers (regardless of turnover)
- Businesses that trade in personal information
- Businesses that provide services to the government
However, even businesses below the $3 million threshold face privacy-related risks:
- Consumer Law: Misleading customers about how you use their data can be an Australian Consumer Law breach even if the Privacy Act doesn't apply
- State legislation: Some states have additional privacy requirements
- Contractual obligations: Your e-commerce platform, payment processor, or data hosting agreements may impose privacy obligations
- Reputational risk: Customers do not care whether you technically had to comply — they care whether you protected their data
Best practice is to implement reasonable data protection measures regardless of your Privacy Act coverage.
Practical Steps to Protect Customer Data
1. Collect Only What You Need
The Privacy Act principle of "collection limitation" — collecting only personal information that is necessary for your purposes — is sound practice even outside the Act.
Questions to ask:
- Do you actually need the customer's date of birth for this transaction?
- Why do you keep customers' home addresses if you only email them?
- Are your online forms collecting information you never use?
The less data you hold, the less data you can lose.
2. Use Reputable, Secure Systems
The platforms and software you use to collect, store, and process customer data should be:
- Reputable providers with clear privacy policies and security standards
- Properly configured — default settings are not always the most secure
- Updated regularly — software updates often include security patches
Common customer data systems and what to check:
- CRM and customer database: Who has access? Are accounts protected with multi-factor authentication?
- E-commerce platform: How is payment data handled? Does the platform have PCI-DSS compliance?
- Email marketing platform: Is your email list stored securely? Are unsubscribes honoured promptly?
- Booking software: Are booking records accessible only to authorised staff?
- Accounting software: Customer financial records should have restricted access
3. Secure Payment Data Correctly
Payment card data is one of the highest-value targets for cybercriminals. Best practice:
- Use a PCI-DSS compliant payment processor (Stripe, Square, Tyro, and similar are designed for this)
- Do not store card numbers in your own systems — let your payment processor handle this
- Do not store CVV/CVC numbers — this is against payment card rules even with cardholder consent
- Use tokenisation if your payment processor supports it — replace card details with tokens in your systems
If you are not sure whether your payment handling is PCI-DSS compliant, ask your payment processor or a cybersecurity adviser.
4. Implement Access Controls
Not everyone in your business needs access to customer data. Implement:
- Role-based access: Customer payment records should be visible to accounts staff; browsing history to marketing staff; neither to warehouse staff
- Strong, unique passwords: Use a password manager; require at least 12-character passwords for accounts holding customer data
- Multi-factor authentication (MFA): Enable MFA on all accounts that hold customer personal information — particularly email, CRM, accounting software, and e-commerce platforms
- Account reviews: Remove access for departing staff immediately
5. Train Your Staff
Your systems' security is only as strong as the humans operating them. Train staff on:
- Recognising phishing emails (the most common way attackers gain access to business accounts)
- Safe password practices
- What to do if they suspect their account has been compromised
- Not sharing login credentials with colleagues
- How to handle customer data requests (access, correction, deletion)
A one-hour staff training session on cybersecurity awareness is one of the highest-return investments a small business can make.
6. Use HTTPS and Secure Your Website
If you have a website that collects customer information:
- HTTPS is essential — all websites that handle forms or logins must use HTTPS (indicated by a padlock in the browser). Customers entering data on an HTTP site are at risk.
- Keep your website platform updated — WordPress, Shopify, Squarespace, and other platforms regularly release security updates
- Use a web application firewall — many hosting providers offer this as an add-on
- Cookies and tracking: Ensure your cookie policy is accurate and that you obtain consent for non-essential tracking cookies as required by your terms of service and applicable law
7. Dispose of Data Properly
Data you no longer need is data that can breach. Implement data retention and deletion policies:
- Retention periods: How long do you need customer records? Tax law requires invoices and financial records for 5 years; employment records for 7 years; but marketing data may only need to be kept while the customer relationship is active
- Secure deletion: Deleting a file from your desktop does not permanently erase it. Use secure deletion software for sensitive data, or physical destruction for hard drives
- Paper records: Shred documents containing customer personal information rather than recycling them
8. Have a Breach Response Plan
Despite best efforts, breaches can occur. Having a plan before a breach happens dramatically reduces the chaos and cost when one does.
Your breach response plan should cover:
- Who to call: IT support, lawyer, PR/communications adviser
- Assessment: Is it a notifiable data breach under the Privacy Act?
- Notification: If notifiable, notify affected individuals and the OAIC within the required period
- Containment: Steps to prevent further data exposure
- Communication: How to communicate with customers about what happened
If you are subject to the Privacy Act's Notifiable Data Breaches scheme, the timeline is strict: you must assess within 30 days of becoming aware whether the breach is notifiable, and notify if it is.
The Notifiable Data Breaches Scheme
If your business is subject to the Privacy Act, you must report eligible data breaches to the OAIC and affected individuals. An eligible data breach is one where:
- There is unauthorised access to or disclosure of personal information (or loss that is likely to result in access or disclosure)
- This is likely to result in serious harm to any affected individual
Assessment of whether a breach meets the notifiable threshold must occur within 30 days. If notifiable:
- Notify affected individuals as soon as practicable
- Notify the OAIC using the OAIC's breach notification form
Failing to notify when required can result in civil penalties in addition to the underlying breach.
How Reguladar Helps
Customer data protection obligations are part of a broader privacy compliance picture that includes the Privacy Act, the Notifiable Data Breaches scheme, and industry-specific requirements. Reguladar surfaces your privacy obligations based on your business profile — including whether your business is subject to the Privacy Act, what your notifiable data breach obligations are, and how legislative changes affect you.
Know your customer data obligations. Start your free compliance check at Reguladar and get your complete privacy compliance profile today.
Related compliance guides
Privacy Policy Requirements for Australian Small Businesses: What You Must Include
Does your business need a privacy policy? Learn which Australian SMBs must have one, what it must contain under the Privacy Act, and the penalties for non-compliance.
Read guideData Breach Penalties in Australia: Case Studies Every Small Business Owner Should Read
Australian data breach penalties have skyrocketed. These case studies show what happens when businesses fail to protect customer data — and what you can do to avoid their mistakes.
Read guideEmployee Data Privacy: What Australian Employers Must Do with Staff Personal Information
Employers collect a lot of personal information about employees. Learn your obligations under the Privacy Act for handling employee records, health data, and monitoring.
Read guideNotifiable Data Breaches: A Guide for Australian Small Business Owners
The Notifiable Data Breaches scheme requires prompt action when personal data is compromised. This guide explains your obligations, the notification process, and how to prepare.
Read guideStay on top of your compliance
Reguladar helps Australian small businesses track their regulatory obligations and never miss a deadline.
Get Started Free