Sign In / Sign Up To Add Wishlist
Wishlist is available for members only. Please sign in or sign up to add your wishlist.

Alert Me When It's Ready
You'll be the first to hear from us when we get it!
Mandatory field!

Cyber Security and Regulatory Compliance

At Brother Australia, we are committed to maintaining strong cyber security practices and protecting the integrity, confidentiality and availability of our products, systems and customer information.

The Australian Government’s Cyber Security Act 2024 (Cth) and the Cyber Security (Security Standards for Smart Devices) Rules 2025 commenced on 4 March 2026. These regulations introduce minimum cyber security requirements for internet-connected consumer products supplied in Australia.

We have implemented governance, product security and incident management practices designed to meet applicable requirements under this legislation for relevant connectable products supplied in Australia.

 

Our Approach

Our cyber security approach includes:

  • Security standards embedded into product design and lifecycle management
  • Defined processes for vulnerability identification and remediation
  • Ongoing security updates and support for applicable products
  • Centralised governance and escalation of cyber security incidents

 

Product Security Updates

For the latest security notices, vulnerability disclosures and product security updates relating to Brother products, visit the Brother Global Product Security page.

 

Reporting an Incident or Concern

If you become aware of a cyber security incident, vulnerability, or suspected compromise involving a Brother product or service, we encourage you to report it promptly.

To report an incident:

  1. Submit the details using our Support Enquiry form.
  2. Under Reason for contact, select “I'd like help with my Brother product”.
  3. Include the product or system involved, a description of what occurred, and when it was identified.
  4. Attach any supporting information where available.

Reports are assessed in accordance with our cyber security incident response and governance processes, including escalation and regulatory engagement where required.