<!--The Official Report of Parliamentary Debates (Hansard) of the Legislative Council and the House of Assembly of the Parliament of South Australia are covered by parliamentary privilege. Republication by others is not afforded the same protection and may result in exposure to legal liability if the material is defamatory. You may copy and make use of excerpts of proceedings where (1) you attribute the Parliament as the source, (2) you assume the risk of liability if the manner of your use is defamatory, (3) you do not use the material for the purpose of advertising, satire or ridicule, or to misrepresent members of Parliament, and (4) your use of the extracts is fair, accurate and not misleading. Copyright in the Official Report of Parliamentary Debates is held by the Attorney-General of South Australia.-->
<hansard id="" tocId="" xml:lang="EN-AU" schemaVersion="4.0" xsi:noNamespaceSchemaLocation="hansard_1_0.xsd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2007/XMLSchema-instance" xmlns:mml="http://www.w3.org/1998/Math/MathML">
  <name>House of Assembly</name>
  <date date="2023-10-18T10:30:00+10:30" />
  <sessionName>Fifty-Fifth Parliament, First Session (55-1)</sessionName>
  <parliamentNum>55</parliamentNum>
  <sessionNum>1</sessionNum>
  <parliamentName>Parliament of South Australia</parliamentName>
  <house>House of Assembly</house>
  <venue></venue>
  <reviewStage>published</reviewStage>
  <startPage num="5669" />
  <endPage num="5784" />
  <dateModified time="2024-07-24T15:39:00+09:30" />
  <proceeding continued="true">
    <name>Question Time</name>
    <subject>
      <name>Super SA Cybersecurity Incident</name>
      <text id="202310180dc4c83c1f21470780000484">
        <heading>Super SA Cybersecurity Incident</heading>
      </text>
      <talker role="member" id="5377" referenceid="84fdb62c8e6644ce93a7ff01f8e92c3d" kind="question">
        <name>Mr COWDREY</name>
        <house>House of Assembly</house>
        <electorate id="">Colton</electorate>
        <questions>
          <question date="2023-10-18T00:00:00+10:30">
            <name>Super SA Cybersecurity Incident</name>
          </question>
        </questions>
        <startTime time="2023-10-18T14:27:24+10:30" />
        <text id="202310180dc4c83c1f21470780000485">
          <timeStamp time="2023-10-18T14:27:24+10:30" />
          <by role="member" id="5377" referenceid="84fdb62c8e6644ce93a7ff01f8e92c3d">Mr COWDREY (Colton) (14:27):</by>  My question is again to the Treasurer. Has the government conducted contract management activity or risk assessments of third-party providers in compliance with the South Australian government's data security and storage requirements? With your leave, sir, and that of the house, I will explain.</text>
        <text id="202310180dc4c83c1f21470780000486">Leave granted.</text>
      </talker>
      <talker role="member" id="5377" referenceid="84fdb62c8e6644ce93a7ff01f8e92c3d" kind="question" continued="true">
        <name>Mr COWDREY</name>
        <house>House of Assembly</house>
        <electorate id="">Colton</electorate>
        <text id="202310180dc4c83c1f21470780000487">
          <by role="member" id="5377" referenceid="84fdb62c8e6644ce93a7ff01f8e92c3d">Mr COWDREY:</by>  The Auditor-General, in his 2022 annual controls opinion report, stated that insufficient checks of the organisation's data security and systems were being undertaken by the South Australian government.</text>
      </talker>
      <talker role="member" id="4842" referenceid="78a22826e43d4639bdfa63b5f3ef73f9" kind="answer">
        <name>The Hon. S.C. MULLIGHAN</name>
        <house>House of Assembly</house>
        <electorate id="">Lee</electorate>
        <portfolios>
          <portfolio id="">
            <name>Treasurer</name>
          </portfolio>
          <portfolio id="">
            <name>Minister for Defence and Space Industries</name>
          </portfolio>
        </portfolios>
        <startTime time="2023-10-18T14:27:53+10:30" />
        <text id="202310180dc4c83c1f21470780000488">
          <timeStamp time="2023-10-18T14:27:53+10:30" />
          <by role="member" id="4842" referenceid="78a22826e43d4639bdfa63b5f3ef73f9">The Hon. S.C. MULLIGHAN (Lee—Treasurer) (14:27):</by>  In short, yes, across government there is a significant amount of effort on making sure that agencies are putting a much stronger focus on contract management.</text>
        <text id="202310180dc4c83c1f21470780000489">For example, if you have a look at the Auditor-General's Report, he raises significant concerns about the contract that was entered into, I think in November 2021, with Ventia, a significant facilities management company appointed by the previous government to undertake facilities management across a range of agencies. Certainly, the experience to date from the client agencies, let alone the people that those agencies are meant to be providing services to, is that that contract has been very difficult.</text>
        <page num="5701" />
        <text id="202310180dc4c83c1f21470780000490">Specifically, in relation to the member for Colton's broader line of questioning which is about the cybersecurity breach, I am advised that it occurred—again, as I said before—in a third-party provider for services to governments agencies. It was a call centre, and the call centre was contracted, as I am advised, by Super SA to assist Super SA field phone calls from Super SA members who were impacted by the 2019 cybersecurity breach. It is still being investigated why that call centre provider had retained data on its systems relating to managing that particular agency's client relations task in relation to the 2019 much broader Frontier cybersecurity breach.</text>
        <text id="202310180dc4c83c1f21470780000491">As far as I am aware, the contract that engaged that call centre, which has been the subject of this specific cybersecurity breach the member for Colton's questioning relates to, was engaged to deal with those inquiries back from the 2019 cybersecurity breach. That raises, we could all understand, a series of further questions: what requirements are there for these agencies to not continue holding government data on their ICT systems after they complete doing work for government?</text>
        <text id="202310180dc4c83c1f21470780000492">The member for Colton might recall that this was the source of the Frontier cybersecurity breach in 2019 that caused the data of tens of thousands of public sector workers and former public sector workers to be breached. That payroll data had been kept on Frontier's networks for a period of time longer than it should have been, and it seems this same issue has arisen again in the same context of dealing with the customer inquiries from that same cybersecurity breach.</text>
        <text id="202310180dc4c83c1f21470780000493">It is absolutely clear that the way in which these incidents have been managed is not good enough because it is causing the exposure of South Australians' sensitive data to be exposed to illegal access. The point that sits behind the member for Colton's question—what activity is now ongoing across the public sector to review the requirements of these contracts—is a good question because government agencies are having to review the stipulations they have in these agreements with third-party providers to make sure this sort of thing doesn't happen.</text>
      </talker>
    </subject>
  </proceeding>
</hansard>