Queensland's IPOLA Guidelines – Queensland Privacy Principles – Part 3
29 May 2025

29 May 2025
Privacy reforms to the Information Privacy Act 2009 (Qld) are expected to commence on 1 July 2025. The reforms will introduce new Queensland Privacy Principles (QPPs) that replace the existing Information Privacy Principles and the National Privacy Principles.
In this article we consider obligations under QPP 11, QPP 12 and QPP 13.
On 4 December 2023, the Queensland Parliament assented to the Information Privacy and Other Legislation Amendment Act 2023 (Qld), with privacy reforms to the Information Privacy Act 2009 (Qld) (IP Act) expected to commence on 1 July 2025. You can read more about that here. This article examines Queensland Privacy Principles (QPPs) 11 to 13. Agencies should understand and adhere to the QPPs in order to comply with the amended IP Act.
QPP 11 requires two key obligations, notably:
These terms are not defined in the IP Act and their meanings often overlap. However, the IPOLA Guidelines provides guidance on how to interpret the terms as follows:2
Terms | Definition |
Misuse | means using personal information for a purpose not permitted by the IP Act. QPP 6 outlines the limited scenarios in which personal information can be used, so anything outside of those scenarios could be considered misuse (see QPP 6 discussed in our previous article here). |
Interference | means a cyber or physical incident that compromises personal information without necessarily modifying its contents — for example, a ransomware attack that exposes data. |
Loss | includes both physical and electronic loss of information, such as misplaced USBs or the lack of a backup in case of system failure. Theft, power outages, or natural disasters could also lead to loss. Importantly, loss does not include intentional destruction or de-identification carried out in compliance with the QPPs or the Public Records Act 2023 (Qld) ('Public Records Act'). |
Unauthorised access | occurs when personal information is accessed by someone who is not permitted to do so. This could be a hacker, or an internal staff member who should not have had access. |
Unauthorised modification | occurs when personal information is altered by someone who is not permitted to do so, or is altered in a way that is not permitted under the IP Act. |
Unauthorised disclosure | occurs when personal information is made accessible or visible to external parties in a way that is not allowed under the IP Act and the agency no longer has control over the information. For instance, an employee emailing a file containing personal information to the wrong recipient. |
The reasonable steps an agency must take to ensure the security of personal information will depend on the circumstances, for example:3
This obligation is subject to the provisions of the Public Records Act and/or any order of a court or tribunal requiring an agency to retain the information. If an agency chooses to keep personal information, it must genuinely expect future use or disclosure, actively considering if the information will be required for a permitted purpose. Retaining information 'just in case' is insufficient.
Generally, agency documents can only be destroyed or altered if the Public Records Act authorises it. The obligation for an agency to take reasonable steps to destroy or de-identify personal information will not apply to a document that must be retained under Australian law.4
The table below highlights the differences between de-identification and destruction of personal information:5
Destruction | De-identification |
|
|
Notably, if personal information is stored on third-party hardware, the agency must take reasonable steps to verify that the information was destroyed/de-identified.
If an agency cannot irretrievably destroy personal information held in electronic format, it must take reasonable steps to put the information 'beyond use'. Personal information is considered beyond use if it is no longer available for use in the ordinary performance of the agency's functions. The agency must:
The reasonable steps an agency must take to destroy or de-identify personal information for the purposes of QPP 11 will depend on the circumstances, for example:7
QPP 12.1 provides a right to access personal information held by an agency. It mandates that agencies must provide access to personal information upon request, unless there are legal or confidentiality concerns that justify refusal. This principle operates alongside the Right to Information Act 2009 (Qld) (RTI Act).8
Under QPP 12.2, an agency is not required to give access to personal information if they would be authorised to refuse access under the RTI Act or another Australian law that provides for access to, or amendment of, documents.9
Access should not automatically be managed through formal RTI Act mechanisms; instead, agencies should consider providing access administratively when the circumstances are not contentious and there are no legislative or confidentiality barriers.10
QPP 13.1 requires agencies to take reasonable steps to correct the personal information they hold to ensure that, having regard to the purpose for which it is held, it is accurate, up to date, complete, relevant and not misleading.
An agency is only required to take these reasonable steps if:
Agencies do not need to continuously check the personal information it holds. However, if it becomes aware that personal information is incorrect in the course of business, it must take reasonable steps to correct it.11
QPP 13 operates alongside and is subject to, the amendment rights in the RTI Act and other laws that provide a right to amendment.12 QPP 13 does not prescribe a particular mechanism for correction requests. Agencies can give effect to QPP 13 by ensuring compliance with the RTI Act and administrative mechanisms for correction.13
Where possible, personal information correction, should be managed administratively instead of through the formal RTI Act mechanisms. This should only be done where the information is not contentious, amending it would not breach legislative obligations, and amendment would not be refused under the RTI Act.14
If an agency refuses to correct personal information at an individual's request, the individual can ask the agency to provide a statement with the information to that effect.15 The agency must inform the individual of this option and, if requested, take reasonable steps to associate the statement in a way that makes it apparent to users.16 The statement should indicate that the information is inaccurate, out of date, incomplete, irrelevant, or misleading, and clarify whether it is based on the individual's assertion or the agency's inability to take reasonable steps to correct it.17
Being satisfied that personal information is incorrect does not always require detailed analysis; for instance, if an individual can correct their information through an online portal, no further steps may be needed. If more information is required to assess a correction request, the agency should clearly explain what is needed, why, and the consequences of not providing it, but should not place the entire burden on the individual.18 Agencies should be prepared to search their own records and other accessible sources, with the extent of investigation depending on the circumstances and potential adverse consequences for the individual.19
Taking reasonable steps to correct personal information includes making appropriate additions, deletions or alterations to a record. In some circumstances, it may be appropriate to destroy or de-identify personal information if the agency is satisfied it is incorrect.20 If there are no reasonable steps an agency can take, it can decline to correct personal information. Agencies should also have regard to:21
Contracted service providers are required to comply with the QPPs and are bound by section 35 of the IP Act. However, they are not subject to the RTI Act.22
Agencies should ensure there are processes in place for individuals to access and correct their personal information held by bound contracted service providers.
This could be done by, for example:23
Compliance with the QPPs will require agencies to understand how some key concepts in the IP Act have been amended. Look out for our final article in the IPOLA Guidelines Series where we explain some of these key concepts.
Authors: Clare Doneley, Partner; Jasneet Birdi, Associate; Chanel Gray, Associate and Tanisha Chadha, Graduate.
The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to.
Readers should take legal advice before applying it to specific issues or transactions.