<!--The Official Report of Parliamentary Debates (Hansard) of the Legislative Council and the House of Assembly of the Parliament of South Australia are covered by parliamentary privilege. Republication by others is not afforded the same protection and may result in exposure to legal liability if the material is defamatory. You may copy and make use of excerpts of proceedings where (1) you attribute the Parliament as the source, (2) you assume the risk of liability if the manner of your use is defamatory, (3) you do not use the material for the purpose of advertising, satire or ridicule, or to misrepresent members of Parliament, and (4) your use of the extracts is fair, accurate and not misleading. Copyright in the Official Report of Parliamentary Debates is held by the Attorney-General of South Australia.-->
<hansard id="" tocId="" xml:lang="EN-AU" schemaVersion="1.0" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xml="http://www.w3.org/XML/1998/namespace" xmlns:xsi="http://www.w3.org/2007/XMLSchema-instance" xmlns:mml="http://www.w3.org/1998/Math/MathML" xsi:noNamespaceSchemaLocation="hansard_1_0.xsd">
  <name>Legislative Council</name>
  <date date="2022-07-05" />
  <sessionName>Fifty-Fifth Parliament Parliament, First Session (55-1)</sessionName>
  <parliamentNum>55</parliamentNum>
  <sessionNum>1</sessionNum>
  <parliamentName>Parliament of South Australia</parliamentName>
  <house>Legislative Council</house>
  <venue></venue>
  <reviewStage>published</reviewStage>
  <startPage num="597" />
  <endPage num="672" />
  <dateModified time="2022-08-06T14:30:00+00:00" />
  <proceeding continued="true">
    <name>Answers to Questions</name>
    <subject>
      <name>Frontier Software Cybersecurity Incident</name>
      <text id="202207053858db0ba4e6413a80001214">
        <inserted>
          <heading>Frontier Software Cybersecurity Incident</heading>
        </inserted>
      </text>
      <talker role="member" id="5419" kind="question">
        <name>The Hon. F. PANGALLO</name>
        <house>Legislative Council</house>
        <questions>
          <question date="2022-07-05">
            <name>Frontier Software Cybersecurity Incident</name>
          </question>
        </questions>
        <text id="202207053858db0ba4e6413a80001215">
          <inserted>In reply to <by role="member" id="5419">the Hon. F. PANGALLO </by>(18 May 2022).  </inserted>
        </text>
      </talker>
      <talker role="member" id="4697" kind="answer">
        <name>The Hon. K.J. MAHER</name>
        <house>Legislative Council</house>
        <portfolios>
          <portfolio id="">
            <name>Attorney-General</name>
          </portfolio>
          <portfolio id="">
            <name>Minister for Aboriginal Affairs</name>
          </portfolio>
          <portfolio id="">
            <name>Minister for Industrial Relations and Public Sector</name>
          </portfolio>
        </portfolios>
        <questions>
          <question date="2022-07-05">
            <name>Frontier Software Cybersecurity Incident</name>
          </question>
        </questions>
        <text id="202207053858db0ba4e6413a80001216">
          <inserted>
            <by role="member" id="4697">The Hon. K.J. MAHER (Attorney-General, Minister for Aboriginal Affairs, Minister for Industrial Relations and Public Sector):</by>  I have been advised:</inserted>
        </text>
        <text id="202207053858db0ba4e6413a80001217">
          <inserted>The South Australian government responds to hundreds of cybersecurity incidents each year. It is generally not advisable to comment on the specifics of individual cybersecurity incidents, unless it is in the best interests of the community.</inserted>
        </text>
        <text id="202207053858db0ba4e6413a80001218">
          <inserted>The breach notice sets out a range of actions that the South Australian government is requiring Frontier Software to undertake in remediating its failure to adequately protect the personal information of affected current and former public sector employees, this includes implementing the recommendations made by PricewaterhouseCoopers (PwC) as part of its independent post-incident review. Frontier Software will be responsible for meeting the third-party costs incurred by the South Australian government in responding to the cyber incident.</inserted>
        </text>
        <text id="202207053858db0ba4e6413a80001219">
          <inserted>No decision has been made on whether Frontier Software’s contract will be extended or renewed at this time. Frontier’s compliance with the requirements of the breach notice will be an important consideration in making this decision. </inserted>
        </text>
        <text id="202207053858db0ba4e6413a80001220">
          <inserted>Government officials were not involved in any discussions between Frontier Software and the cyber criminals. The information provided by Frontier at the time was simply that a ransom demand had been made. Frontier has refused to provide any further details regarding the nature of the ransom demands or their communications with the cyber criminals. </inserted>
        </text>
      </talker>
    </subject>
  </proceeding>
</hansard>