Queensland's IPOLA Guidelines – New Mandatory Notification Data Breach Scheme
10 April 2025

10 April 2025
On 4 December 2023, the Queensland Parliament gave assent to the Information Privacy and Other Legislation Amendment Act 2023 (Qld) (Act), with privacy reforms to the Information Privacy Act 2009 (Qld) (IP Act) to commence 1 July 2025. You can read more about that here.
In Queensland it has not been compulsory for agencies to notify the Office of the Information Commissioner Queensland (OICQ) of data breaches. The Act establishes a mandatory data breach notification (MNDB) scheme. This article summarises the Mandatory Notification of Data Breach scheme Guideline issued by the OICQ (Guideline)1, and provides practical steps to help agencies get ready to comply with the new Mandatory Notification of Data Breaches scheme.
An 'eligible data breach’ of an agency will trigger notification to the OICQ and impacted individuals if:
1 there is unauthorised access to, or unauthorised disclosure of, personal information held by the agency; or
2 there is a loss of personal information in circumstances where unauthorised access to, or unauthorised disclosure of the information is likely to occur;
AND
3 the unauthorised access to, or disclosure of the information is likely to result in serious harm to the affected individual to whom the personal information relates.
If only (1) or (2), but not (3) applies, then this will be a "data breach". A data breach of itself does not trigger the notification obligations under the IP Act.
The OICQ has released a flowchart which represents the process for identifying which MNDB scheme obligations apply, both initially and for assessments required under section 48 of the IP Act2. If a data breach is identified as an eligible data breach, further steps will need to be taken (see Mandatory Scheme Breach Obligations later in this article). Agencies can use these guidance materials to personalise their own assessment materials.
The data breaches identified above cover different scenarios where personal information is handled in a way that is not permitted. The Guideline provides the following interpretation of key terminology:
Unauthorised access and unauthorised disclosure can occur as a result of the same breach. Unauthorised (as used in relation to access and disclosure) is not defined in the IP Act. The Guideline refers to the ordinary meaning of the word in the Macquarie Dictionary Online as 'without proper permission or licence', noting this word is used in a similar context in the Criminal Code Act 1995 (Cth).
So how do they compare?
Comparison Table of Examples | ||
Unauthorised Access Examples | Unauthorised Disclosure Examples | Loss Examples |
|
|
|
At this point, an agency would have its internal and external advisors (IT, cyber and legal) assist in determining whether a data breach has occurred.
There needs to be "serious harm" in order for there to be an eligible data breach.
Serious harm to an individual includes serious physical, psychological, emotional, or financial harm to the individual, or serious harm to the individual's reputation, because of the access or disclosure. According to the Guideline, the effect on an individual must be more than mere irritation, annoyance, or inconvenience.
Many different factors will need to be weighed when analysing whether serious harm has occurred. That will look different for each data breach – there is a list of matters in section 47(2) that must be considered to determine if the data breach is likely to result in serious harm to the individual to whom the personal information relates.
When making the assessment, agencies must consider if serious harm is 'likely', which means 'more probable than not'. If doubt or ambiguity exists as to whether a data breach is likely to result in serious harm, agencies should err on the side of caution and assume that serious harm is likely.
Agencies must maintain an internal register of 'eligible data breaches', which includes the information in section 72(2) of the IP Act and publish a data breach policy on their website, which outlines the agency's overall strategy for managing all data breaches (not just 'eligible data breaches'). Implementing this will practically assist an agency in understanding how it will handle data breaches.
There may be circumstances where data breaches involve personal information in the possession of a contracted service provider. Those data breaches will be considered to be a data breach of an agency. Section 13 of the IP Act defines “held or holds” in relation to personal information as:
Personal information is held by a relevant entity, or the entity holds personal information, if the personal information is contained in a document in the possession, or under the control, of the relevant entity.
The words "under the control" in this definition are key. The definition has been designed to capture situations with contracted service providers where an agency may not be in physical possession of the relevant document containing personal information, but it still retains a legal entitlement to possession or a right or power to deal with the information.
Where a data breach affects an agency's contracted service provider, an agency will need to consider whether any impacted personal information is 'held' by the agency. This will require consideration of the specific circumstances, including the agency's right to control the information, why it was collected or created, who created it and the contractual arrangements governing provision of the services.
When an agency knows or reasonably suspects that a data breach is an 'eligible data breach', the following steps should be followed.
Agencies should also be aware that as of 11 June 2025 there will be changes to the federal Privacy Act 1988 (Cth) (Privacy Act) that will introduce a statutory tort for serious invasions of privacy. Individuals may take civil action for intrusion upon seclusion, or misuse of personal information in circumstances where:
An action can be brought whether or not conduct is permitted under or subject to the Privacy Act, meaning that conduct under the IP Act may also be the subject of an action. This presents a new risk for potential litigation against an agency as a result of a data breach (including potential class actions if multiple individuals are the subject of a data breach). This new risk of litigation from the statutory tort emphasises the importance of early engagement with individuals and having harm reduction strategies to minimise the impact on individuals due to any invasions of privacy.
Other authors: Alex White, Associate
The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to.
Readers should take legal advice before applying it to specific issues or transactions.