External Review case study - responding to applicant concerns as an alternative to focussing on access to documents

September 1, 2013 - 8:58am

Sometimes, when access is refused under the RTI Act, applicants make incorrect assumptions about the information that has been withheld. While OIC is under strict obligations not to disclose information in issue, sometimes through discussion and negotiation, agencies agree to OIC providing an explanation to the applicant which directly addresses their concerns without the need to disclose information which would be contrary to the public interest. OIC has successfully resolved a number of reviews on this basis in the 2012-2013 financial year.


Parliamentary committee reports on OIC’s performance

August 13, 2013 - 3:15pm

The Legal Affairs and Community Safety Committee (Committee) recently published their report on the performance of the Office of the Information Commissioner (OIC) for the 2011-2012 financial year.



Privacy and mobile apps

April 30, 2013 - 8:07am

Mobile applications or ‘apps’ are software programs designed to run on a smartphone, tablet computer or other mobile device.  Mobile apps can capture a range of personal information such as location, device or contact information. Queensland Government agencies contemplating developing and deploying apps need to consider their privacy obligations under the Information Privacy Act 2009.


OIC releases model protocols on reporting to ministers and senior executive on access applications

February 28, 2013 - 3:25pm

The new model protocols for Queensland government departments on reporting to Ministers and senior executive on right to information (RTI) and information privacy (IP) applications has now been released.


Finding the Silver Lining: Moving government to the cloud

December 10, 2012 - 11:50am

OIC recently contributed an article for the October issue of the Bulletin of the International Association of Privacy Professionals (Australia and New Zealand) )(iappANZ) which put forward the view that privacy protections were not necessarily compromised through the use of cloud services.