Understanding External Review

October 22, 2018 - 9:38am

Want to know more about how the Office of the Information Commissioner’s External Review Team works? How it’s structured? Or exactly what happens after an external review application arrives at OIC?


New guide to identify and process documents of an agency for social media, personal web mail and text messages

October 17, 2018 - 10:57am

Increasingly, access applications are encompassing social media platforms, such as Facebook and Twitter, material held in personal email accounts, and text and other messages sent using devices such as smart phones and tablets.

The Office of the Information Commissioner recently published a guideline to assist agencies to identify when these will be classed as documents of an agency or a Minister, as well as on capturing and processing these documents as part of an access application.

To complement the guideline a quick reference guide Digital documents and right to information has been published and highlights common digital documents and the requirements under the Right to Information Act 2009.


The 2018 Solomon Lecture is now available online

October 2, 2018 - 1:20pm

Professor Ken Smith delivered the 2018 Solomon Lecture on ‘Trust, transparency and right to information: accountability in an age of democratic disquiet’ as part of this year’s Right to Information Day (RTI Day) activities.


OIC Annual Report 2017-18

September 27, 2018 - 3:29pm

Our Annual Report is now available and provides an overview of our performance towards achieving an informed Queensland that values and respects information rights and responsibilities.


Privacy Impact Assessment workshop – 26 November 2018

September 19, 2018 - 2:11pm

We are offering a 90 minute workshop on Privacy Impact Assessments (PIA). The workshop is designed for agency officers who are contemplating conducting a PIA or who wish to better understand and/or assess a PIA that has been undertaken.

Participants will work through a hypothetical proposed new program that has significant privacy implications, with a focus on three elements: mapping personal information flows, identifying applicable privacy principles and ensuring compliance with the privacy principles.