How Australia's ASIC v FIIG decision supports your cyber investment business case
FIIG's $2.5m fine is the first court-imposed civil penalty for cyber security under general financial services licence obligations.
According to ASIC Deputy Chair Sarah Court, the decision represents the most significant milestone in ASIC’s cyber security enforcement since RI Advice, establishing a "clear licence-to-operate expectation for robust cyber resilience."
FIIG's $2.5 million penalty was more than double the estimated $1.2 million cost of compliant cyber security measures. The Federal Court sent a clear message that underinvestment in cyber security will cost far more than appropriate investment.
Post-incident remediation costs were approximately $1.5m – again, well below the penalty amount.
The Court considered the penalty an appropriate "sting" for FIIG, more than a cost of doing business. $2.5m amounted to 20% of FIIG’s net assets and around 8% of turnover – far more than merely a cost of doing business.
The Court also ordered FIIG to pay $500,000 towards ASIC's costs.
FIIG was not penalised for suffering a cyber attack – it would be "all but impossible to prevent every cyber attack." Organisations aren't expected to reduce cyber security risk to zero – but risk must be materially reduced to an acceptable level.
We unpack the penalty further below.
The FIIG Securities decision reinforces the previous RI Advice decision – that failing to ensure adequate cyber security measures are in place can breach the obligation to do all things necessary to provide financial services efficiently and honestly, and that cyber security is an essential part of adequate risk management systems (breaching s 912A(1)(a) and (h) of the Corporations Act).
In FIIG Securities, and in the yet-to-be-determined ASIC v Fortnum action, ASIC sought an additional contravention – that insufficient investment in cyber security (including financial, technological, and dedicated employed personnel with necessary skills) is itself a failure to provide adequate resources to provide financial services (breaching s 912A(1)(d) of the Corporations Act). Personnel numbers and budgets are becoming a simple proxy for adequate cyber security investment in both ASIC and OAIC actions.
ASIC and FIIG agreed on specific factors that informed what standards should be expected of FIIG:
While different factors might apply in other situations, we can expect considerations to be broadly similar – the OAIC considers similar factors when assessing data breach incidents. With the consumer protection focus of many regulators, we may see customer promises becoming increasingly relevant.
While an order for external cyber security review was also made in RI Advice decision, the compliance program ordered in FIIG Securities was more prescriptive.
At its conclusion, FIIG's CEO will be required to personally attest that they have read and understood reports and are satisfied with FIIG's remedial actions.
Using attestations to drive accountability in senior management and boards (and, in the case of boards, to trigger directors' duties) is a hallmark of critical infrastructure regulation in Australia.
ASIC has emphasised for several years the importance of boards actively engaging on cyber risk – and as the recent Star Entertainment decision demonstrates, boards are expected to ensure they receive the right information to fulfil their duties.
ASIC's cyber prosecutions demonstrate how technology-neutral laws designed for a previous age can be adapted to address current and emerging high-tech threats.
Expect ASIC to leverage the regime to address emerging risks like artificial intelligence and quantum decryption. Australia's National AI Plan emphasises that AI risks will be addressed by existing regulators under existing frameworks – in most cases, regulators will apply technology-neutral laws (read more).
FIIG is a specialist in fixed income financial products and services. FIIG collected and maintained significant quantities of personal information about its clients as part of its business, including names, addresses, dates of birth, phone numbers, email addresses, copies of driver's licences, passports and Medicare cards, tax file numbers and bank account details.
In May 2023, a FIIG employee inadvertently downloaded a file containing malware whilst browsing the Internet. The malware allowed a threat actor to remotely access FIIG's network and download approximately 385GB of data, including personal client information relating to approximately 18,000 individuals.
Despite numerous firewall email alerts flagging suspicious activity being generated since May 2023, FIIG had not identified or responded to the cyber intrusion until alerted by the Australian Cyber Security Centre that its systems may have been compromised. FIIG's own risk registers also recognised a "high or likely to eventuate" risk of confidential information being obtained by hackers if controls were not in place.
ASIC commenced civil penalty proceedings against FIIG in March 2025, alleging that FIIG failed to take adequate steps to protect itself and its clients against cyber security risks over a four-year period prior to the incident, in breach of Australian Financial Services Licence (AFSL) general obligations.
In addition to its AFSL obligations, FIIG was subject to obligations under the Privacy Act 1988 (Cth), the Privacy (Tax File Number) Rule 2015 (Cth) and the Taxation Administration Act 1953 (Cth) to take reasonable steps to protect personal information and tax file number information from misuse, loss and unauthorised access, as well as contractual obligations to its clients to take reasonable steps to keep confidential information secure and to have computer systems which are secure.
As in ASIC's previous RI Advice decision, and the recent Australian Clinical Labs decision, ASIC and FIIG negotiated agreed facts and submissions, as well as proposed orders. The Court's role was to independently determine if it was sufficiently persuaded of the accuracy of the agreed facts and consequences, and the appropriateness of the agreed orders. It was not required to weigh competing evidence or legal interpretations.
FIIG admitted breaches of:
The Court ordered FIIG to pay a pecuniary penalty of $2.5 million, the first penalty imposed for cyber security failures under AFSL general obligations.
The penalty amount was submitted as appropriate by ASIC and FIIG, and the Court assessed, taking into account submissions, whether that amount was appropriate.
Because ASIC and FIIG agreed contraventions of three subparagraphs of section 912A(1), the maximum potential penalty was $41,250,000. However, the contraventions were a single "course of conduct", indicating a penalty at or near the maximum was not appropriate.
In assessing the penalty, the Court had regard to the following factors, with deterrence the paramount consideration.
This publication is a joint publication from Ashurst Australia and Ashurst Risk Advisory Pty Ltd, which are part of the Ashurst Group.
The Ashurst Group comprises Ashurst LLP, Ashurst Australia and their respective affiliates (including independent local partnerships, companies or other entities) which are authorised to use the name "Ashurst" or describe themselves as being affiliated with Ashurst. Some members of the Ashurst Group are limited liability entities.
Ashurst Australia (ABN 75 304 286 095) is a general partnership constituted under the laws of the Australian Capital Territory.
Ashurst Risk Advisory Pty Ltd is a proprietary company registered in Australia and trading under ABN 74 996 309 133.
The services provided by Ashurst Risk Advisory Pty Ltd do not constitute legal services or legal advice, and are not provided by Australian legal practitioners in that capacity. The laws and regulations which govern the provision of legal services in the relevant jurisdiction do not apply to the provision of non-legal services.
For more information about the Ashurst Group, which Ashurst Group entity operates in a particular country and the services offered, please visit www.ashurst.com.
This material is current as at 25 March 2026 but does not take into account any developments to the law after that date. It is not intended to be a comprehensive review of all developments in the law and in practice, or to cover all aspects of those referred to, and does not constitute legal advice. The information provided is general in nature, and does not take into account and is not intended to apply to any specific issues or circumstances. Readers should take independent legal advice. No part of this publication may be reproduced by any process without prior written permission from Ashurst. While we use reasonable skill and care in the preparation of this material, we accept no liability for use of and reliance upon it by any person.