Business Insight

Queensland's IPOLA Guidelines – Queensland Privacy Principles – Part 3 

building texture

    What you need to know

    Privacy reforms to the Information Privacy Act 2009 (Qld) are expected to commence on 1 July 2025. The reforms will introduce new Queensland Privacy Principles (QPPs) that replace the existing Information Privacy Principles and the National Privacy Principles.

    In this article we consider obligations under QPP 11, QPP 12 and QPP 13.

    • QPP 11 requires agencies to take reasonable steps to protect the personal information they hold from misuse, interference, and loss, and from unauthorised access, modification or disclosure.
    • QPP 12 requires agencies to give an individual access to a document in their control, containing the individual's personal information, subject to the Right to Information Act 2009 (Qld).
    • QPP 13 requires agencies to take reasonable steps to correct the personal information they hold to ensure that, having regard to the purpose for which it is held, it is accurate, up to date, complete, relevant and not misleading.

    What you need to do

    • Agencies should be aware of the privacy reforms and implement practices, procedures and systems to ensure compliance with the new QPPs.
    • Agencies should only disclose information for the primary purpose for which it was collected, unless an exception applies.
    • An agency must ensure that the personal information it collects and discloses is accurate,
      up-to-date, and complete.

    On 4 December 2023, the Queensland Parliament assented to the Information Privacy and Other Legislation Amendment Act 2023 (Qld), with privacy reforms to the Information Privacy Act 2009 (Qld) (IP Act) expected to commence on 1 July 2025. You can read more about that here. This article examines Queensland Privacy Principles (QPPs) 11 to 13. Agencies should understand and adhere to the QPPs in order to comply with the amended IP Act.

    QPP 11

    Core Obligations

    QPP 11 requires two key obligations, notably:

    • agencies must take reasonable steps to protect the personal information they hold from misuse, interference, and loss, and from unauthorised access, modification or disclosure; and
    • agencies must destroy or de-identify personal information once it is no longer needed for any purpose for which it could be used or disclosed under the QPPs.1

    Security of personal information

    These terms are not defined in the IP Act and their meanings often overlap. However, the IPOLA Guidelines provides guidance on how to interpret the terms as follows:2

    TermsDefinition
    Misuse means using personal information for a purpose not permitted by the IP Act. QPP 6 outlines the limited scenarios in which personal information can be used, so anything outside of those scenarios could be considered misuse (see QPP 6 discussed in our previous article here).
    Interferencemeans a cyber or physical incident that compromises personal information without necessarily modifying its contents — for example, a ransomware attack that exposes data.
    Lossincludes both physical and electronic loss of information, such as misplaced USBs or the lack of a backup in case of system failure. Theft, power outages, or natural disasters could also lead to loss. Importantly, loss does not include intentional destruction or de-identification carried out in compliance with the QPPs or the Public Records Act 2023 (Qld) ('Public Records Act').
    Unauthorised accessoccurs when personal information is accessed by someone who is not permitted to do so. This could be a hacker, or an internal staff member who should not have had access.
    Unauthorised modification occurs when personal information is altered by someone who is not permitted to do so, or is altered in a way that is not permitted under the IP Act.
    Unauthorised disclosureoccurs when personal information is made accessible or visible to external parties in a way that is not allowed under the IP Act and the agency no longer has control over the information. For instance, an employee emailing a file containing personal information to the wrong recipient.

     

    Reasonable steps

    The reasonable steps an agency must take to ensure the security of personal information will depend on the circumstances, for example:3

    • the amount and sensitivity of the personal information held;
    • the possible adverse consequences for an individual if there is a breach and their personal information is not handled in accordance with the QPPs;
    • the practical implications of implementing security measures, considering the time and cost involved (note: it is not enough for an agency to claim that a security measure is timely or costly for it to make the steps unreasonable); and
    • whether a particular security measure is privacy invasive.

    Destruction or de-identification of personal information

    This obligation is subject to the provisions of the Public Records Act and/or any order of a court or tribunal requiring an agency to retain the information. If an agency chooses to keep personal information, it must genuinely expect future use or disclosure, actively considering if the information will be required for a permitted purpose. Retaining information 'just in case' is insufficient.

    Generally, agency documents can only be destroyed or altered if the Public Records Act authorises it. The obligation for an agency to take reasonable steps to destroy or de-identify personal information will not apply to a document that must be retained under Australian law.4

    The table below highlights the differences between de-identification and destruction of personal information:5

    DestructionDe-identification
    • For hard copy documents, destruction can involve: pulping, burning, pulverising, disintegrating or shredding documents.
    • For electronic documents, destruction can involve: ‘sanitising’ the hardware or irretrievably destroying the personal information through another method.
    • Where the above is not possible, de-identification should be considered.
    • Personal information is de-identified when the identity of the individual the information is about cannot, and in the future will not, be reasonably ascertainable.6
    • De-identification must be permanent, and the risk of re-identification must be actively managed by the agency.
    • De-identification is more appropriate where the information could provide further value or utility to the agency or a third-party. For instance, if the agency shares de-identified information with researchers, or uses de-identified information to develop or inform public policy.


    Notably, if personal information is stored on third-party hardware, the agency must take reasonable steps to verify that the information was destroyed/de-identified.

    Putting personal information 'beyond use'

    If an agency cannot irretrievably destroy personal information held in electronic format, it must take reasonable steps to put the information 'beyond use'. Personal information is considered beyond use if it is no longer available for use in the ordinary performance of the agency's functions. The agency must:

    • not be able, and will not attempt, to use or disclose the personal information;
    • not be able to give any other entity access to the personal information;
    • apply appropriate technical, physical, and organisational security measures, including access controls, logs, and audit trails; and
    • commit to taking reasonable steps to irretrievably destroy the personal information if or when this becomes possible.

    Reasonable steps

    The reasonable steps an agency must take to destroy or de-identify personal information for the purposes of QPP 11 will depend on the circumstances, for example:7

    • the amount and sensitivity of the personal information held;
    • the possible adverse consequences for an individual if their information is not destroyed or
      de-identified;
    • the nature of the agency (its size, resources, and information storage methods);
    • the agency’s information handling practices, such as how it collects, uses and stores personal information, including whether personal information handling practices are outsourced to third parties; and the practical implications of destroying or de-identifying information, considering the time and cost involved. Notably, it is not enough for an agency to claim that destroying or
      de-identifying information is timely or costly for it to make the steps unreasonable.

    QPP 12

    Core Obligations

    QPP 12.1 provides a right to access personal information held by an agency. It mandates that agencies must provide access to personal information upon request, unless there are legal or confidentiality concerns that justify refusal. This principle operates alongside the Right to Information Act 2009 (Qld) (RTI Act).8

    Under QPP 12.2, an agency is not required to give access to personal information if they would be authorised to refuse access under the RTI Act or another Australian law that provides for access to, or amendment of, documents.9

    Access should not automatically be managed through formal RTI Act mechanisms; instead, agencies should consider providing access administratively when the circumstances are not contentious and there are no legislative or confidentiality barriers.10

    QPP 13

    Core Obligations

    QPP 13.1 requires agencies to take reasonable steps to correct the personal information they hold to ensure that, having regard to the purpose for which it is held, it is accurate, up to date, complete, relevant and not misleading.

    An agency is only required to take these reasonable steps if:

    • it is satisfied, independent of any request, that personal information is inaccurate, out-of-date, incomplete, irrelevant or misleading, having regard to the purpose for which it is held; or
    • the individual asks the agency to correct the information.

    Agencies do not need to continuously check the personal information it holds. However, if it becomes aware that personal information is incorrect in the course of business, it must take reasonable steps to correct it.11

    QPP 13 operates alongside and is subject to, the amendment rights in the RTI Act and other laws that provide a right to amendment.12 QPP 13 does not prescribe a particular mechanism for correction requests. Agencies can give effect to QPP 13 by ensuring compliance with the RTI Act and administrative mechanisms for correction.13

    Where possible, personal information correction, should be managed administratively instead of through the formal RTI Act mechanisms. This should only be done where the information is not contentious, amending it would not breach legislative obligations, and amendment would not be refused under the RTI Act.14

    Making a notation

    If an agency refuses to correct personal information at an individual's request, the individual can ask the agency to provide a statement with the information to that effect.15 The agency must inform the individual of this option and, if requested, take reasonable steps to associate the statement in a way that makes it apparent to users.16 The statement should indicate that the information is inaccurate, out of date, incomplete, irrelevant, or misleading, and clarify whether it is based on the individual's assertion or the agency's inability to take reasonable steps to correct it.17

    Being satisfied that personal information is incorrect

    Being satisfied that personal information is incorrect does not always require detailed analysis; for instance, if an individual can correct their information through an online portal, no further steps may be needed. If more information is required to assess a correction request, the agency should clearly explain what is needed, why, and the consequences of not providing it, but should not place the entire burden on the individual.18 Agencies should be prepared to search their own records and other accessible sources, with the extent of investigation depending on the circumstances and potential adverse consequences for the individual.19

    Reasonable steps to correct

    Taking reasonable steps to correct personal information includes making appropriate additions, deletions or alterations to a record. In some circumstances, it may be appropriate to destroy or de-identify personal information if the agency is satisfied it is incorrect.20 If there are no reasonable steps an agency can take, it can decline to correct personal information. Agencies should also have regard to:21

    • the sensitivity of the information;
    • the possible adverse consequences for an individual if a correction is not made;
    • the practicability, including the time and cost involved (notably, it is not enough for an agency to claim that correcting information is timely or costly for it to make the steps unreasonable);
    • the likelihood that the agency will use or disclose the personal information;
    • the purpose for which the personal information is held; and
    • whether the personal information is in the physical possession of the agency or a third party.

    Contracted service providers

    Contracted service providers are required to comply with the QPPs and are bound by section 35 of the IP Act. However, they are not subject to the RTI Act.22

    Agencies should ensure there are processes in place for individuals to access and correct their personal information held by bound contracted service providers.

    This could be done by, for example:23

    • ensuring contracted service providers understand their access and correction obligations under QPP 12 and 13 and providing guidance; or
    • by establishing in the contract that relevant documents remain under the control of the agency, which means individuals can apply to the agency for access to or correction of their information.

    Compliance with the QPPs will require agencies to understand how some key concepts in the IP Act have been amended. Look out for our final article in the IPOLA Guidelines Series where we explain some of these key concepts.

    Want to know more?

    Authors: Clare Doneley, Partner; Jasneet Birdi, Associate; Chanel Gray, Associate and Tanisha Chadha, Graduate. 


    1. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 page 4 <QPP 11 – Security, deidentification and destruction of personal information>.
    2. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 pages 2-3 <QPP 11 – Security, deidentification and destruction of personal information>.
    3. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 pages 3-4 <QPP 11 – Security, deidentification and destruction of personal information>.
    4. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 page 4 <QPP 11 – Security, deidentification and destruction of personal information>.
    5. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 page 6 <QPP 11 – Security, deidentification and destruction of personal information>.
    6. Section 12 of the IP Act.
    7. Office of the Information Commissioner Queensland, IPOLA Guideline on QPP 11 page 5 <QPP 11 – Security, deidentification and destruction of personal information>.
    8. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 2 <QPP 12 and 13 Access and correction under the QPPs>.
    9. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 2 <QPP 12 and 13 Access and correction under the QPPs>.
    10. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 3 <QPP 12 and 13 Access and correction under the QPPs>.
    11. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 2 <QPP 12 and 13 Access and correction under the QPPs>.
    12. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 3 <QPP 12 and 13 Access and correction under the QPPs>.
    13. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 3 <QPP 12 and 13 Access and correction under the QPPs>.
    14. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 3 <QPP 12 and 13 Access and correction under the QPPs>.
    15. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 4 <QPP 12 and 13 Access and correction under the QPPs>.
    16. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 4 <QPP 12 and 13 Access and correction under the QPPs>.
    17. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 4 <QPP 12 and 13 Access and correction under the QPPs>.
    18. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 4 <QPP 12 and 13 Access and correction under the QPPs>.
    19. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 4 <QPP 12 and 13 Access and correction under the QPPs>.
    20. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 5 <QPP 12 and 13 Access and correction under the QPPs>.
    21. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 5 <QPP 12 and 13 Access and correction under the QPPs>.
    22. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 6 <QPP 12 and 13 Access and correction under the QPPs>.
    23. Office of the Information Commissioner Queensland, IPOLA Guideline on QPPs 12 and 13 page 6 <QPP 12 and 13 Access and correction under the QPPs>.

    The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to.
    Readers should take legal advice before applying it to specific issues or transactions.