NDIS Cyber Security Compliance
What this means for you…
Cyber Security is an often neglected area in any sector, but particularly so in Disability Services.
According to Element Two of the NDIS Code of Conduct, NDIS providers both registered and unregistered( including sole traders) are required to “respect the privacy of people with a disability” – including comprehensive compliance with the Commonwealth Privacy Act 1988 and State and Territory privacy laws.
With the increase in hacking, phishing and scamming, the NDIA has released a guideline for Registered Service Providers, SMEs and Sole Traders to better protect Participant’s data. Many Sole Traders don’t realise that they are obligated under the NDIS Practice Standards to safeguard a Participant’s privacy; including electronic transit and storage, along with securing any devices from which sensitive information may be sent.
This can best be broken down into three main areas of concern:
Endpoint Protection:
Sole Traders and Small Businesses are required to secure their devices from possible incursions by a third party. This is generally achieved by either a software (Layer 7) or hardware firewall, anti-virus protection, and the implementation of best practices pertaining to the opening of data from untrusted sources.
It has been my experience that most sole traders and small businesses simply don’t have the budget for expensive cyber security audits by third parties. Thus I have developed a budget solution that will bring them into compliance. This is achieved using reliable and free software that I have used on my own devices for nearly two decades – in conjunction with Microsoft Office 365.
Transit Security:
The NDIS Cyber Compliance requirements stipulate that data in transit must be protected by adequate encryption, at a minimum TLS 1.2, but preferably TLS 1.3.
TLS, or Transport Layer Security, is a protocol designed to facilitate privacy and data security for communications over the Internet. The primary application of TLS is to encrypt communications between web applications and servers, such as web browsers sending data to and from a web application. Common examples of this are OneDrive, Google Docs and Dropbox – all of which use HTTP over TLS, commonly known as HTTPS, to protect data whilst in transit from the user’s computer to the data storage application.
I have a variety of free browser extensions that I can recommend that enforce HTTPS, but it is vital that any cloud-based file transfer/storage application utilises TLS 1.2 as a minimum to ensure NDIS cyber compliance.
Storage:
The NDIS has stipulated that storage must AES256 as a minimum. The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the Australian government to protect classified information located on storage devices, both local and remote (the Cloud). The 256 in AES256 demotes how many bits the encryption key uses to “hash” the text data into a cipher. Both Windows and OSX have local vault systems that use AES256 encryption, as do the cloud based solutions mentioned above.


NIcola Barts