Queensland government agencies1 must handle personal information2 in accordance with the Information Privacy Act 2009 (Qld) (IP Act). Chapter 3A of the IP Act creates a mandatory notification of data breach (MNDB) scheme, which requires agencies (other than local government3) to notify individuals and the Information Commissioner about eligible data breaches involving personal information held by the agency.
The MNDB scheme also requires agencies to keep an internal register of eligible data breaches and publish a data breach policy. This guideline is intended to assist agencies to develop their data breach policy and eligible data breach register. It must be read in conjunction with Mandatory notification of data breach.
In addition to the MNDB guidelines,4 agencies may find these templates and quick guides helpful:
Section 72 of the IP Act requires agencies to keep an internal register of eligible data breaches. The register must include:
Depending on the circumstances, agencies may find it useful to include additional information about a data breach in the register, for example:
In addition to being a requirement under the MNDB scheme, maintaining an eligible data breach register will:
The Data breach register template and example register at Appendix A will assist agencies to develop a compliant data breach register.
Section 73 of the IP Act requires agencies to prepare and publish a Data Breach Policy (DBP) outlining how it will respond to a data breach, including a breach the agency suspects is an eligible data breach.
The DBP is not required to contain detailed information about an agency’s information security systems, practices or procedures.
A DBP is a documented policy or plan setting out the procedures to be followed if an agency experiences a data breach, including a breach that is a suspected eligible data breach. It should establish the roles and responsibilities of agency staff in responding to and managing a breach.
Data breaches can vary in size and complexity, and the consequences can be significant for individuals whose information is involved. The range of actual or potential harms they can cause include financial fraud, identity theft, damage to reputation, violence, or psychological harms.
Agencies may also experience serious consequences as a result of a data breach. Depending on the data or information involved, breaches may have negative impacts on an agency’s reputation, finances, interests, or operations. Data breaches can result in a loss of confidence and trust in an agency, including in the service it provides.
Having a robust, documented and operationalised DBP can facilitate a timely and effective response to a data breach, in turn avoiding or mitigating potential harms to affected individuals, and reducing the risks to agencies.
Agencies are required to publish their DBP on an accessible agency website.5 This will generally be the agency's website, but if the agency does not have a website, it can be included on the website of another appropriate agency. For example, Ministerial DBPs could be published on the departmental website.
Agencies should link to their DBP policy from their Queensland Privacy Principle Policy (QPP Policy)6 and intranet or other central staff repository, and ensure all staff know how to access the policy.
A DBP should set out an agency’s plan for dealing with data breaches from start to finish. A clear and precise DBP will enable agencies to:
At a minimum, a DBP should include:
It should align with and cross reference other relevant policies and procedures, such as cyber security response plans and QPP Policies. The DBP should be integrated into existing incident or crisis management processes align with relevant Queensland government information security reporting and incident response protocols.
The Data breach policy template and checklist in Appendix B will help agencies develop a compliant and effective DBP.
A DBP should provide a high-level outline of the actions the agency has taken to prepare for a data breach, including how these actions fit within the agency’s broader systems, policies, and procedures, eg cyber response, general incident or emergency management processes, communications strategies, and risk management frameworks.
The DBP should also include the key controls, systems, and processes that the agency has established for identifying suspected or actual data breaches and ensuring data breaches are effectively managed.
Well trained and risk aware staff contribute to a strong frontline defence against privacy risks, including from data breaches involving personal information. Data breach reporting by the Office of the Australian Information Commissioner indicates that breaches caused by human error are a significant component of all breaches involving government agencies.7 Prompt identification of breaches and timely reporting by staff is also an important factor in ensuring agencies can effectively respond to and manage breaches.
An agency’s DBP should outline its approach to staff training and awareness in identifying, responding to, and managing data breaches, and any training or awareness activities about other aspects of privacy protection, eg enhancing staff awareness of privacy and cyber principles and current threat trends.
Developing and documenting processes for promptly detecting data breaches will improve an agency’s ability to contain a breach and mitigate potential harms.
An agency’s DBP should clearly explain how internal staff and external entities, eg the public or another agency, can report an actual or suspected data breach and outline the agency's processes for identifying data breaches. This should not include details of specific controls which could place the agency at additional risk.
The appropriate processes for identifying and preventing data breaches will depend on the size and sophistication of an agency, its information holdings, and its security program and controls, but could include:
Agencies often outsource functions to external service providers (for example, payroll or IT services). These relationships are usually covered by legally binding contracts, memorandums of understanding, or non-disclosure agreements. The agency’s DBP should include information about its contractual or other controls over these service providers and how it monitors and manages service providers to ensure compliance.
Service providers who are not agencies may be bound to comply with aspects of the IP Act,8 but they cannot be bound to comply with the MNDB scheme; it only applies to agencies. Despite this, in some circumstances9 the agency’s MNDB obligations will apply if a service provider has a data breach, as discussed in Data breaches and contracted service providers.
Even where a service provider is not bound to comply with the IP Act, agencies should consider including data breach management and notification obligations in service provider contracts and agreements, including an obligation to notify the agency of any data breaches.
A DBP should include a clear explanation of what a data breach and an eligible data breach are, how data breaches can occur, and that identifying, assessing, and responding to data breaches must be conducted on a case-by-case basis. Including examples of the different ways a data breach can occur will be helpful, eg:
Scenarios will help raise awareness of high-risk activities and processes that could lead to a breach and how data breaches impact the agency, its functions, and the individuals whose information it handles. For example, an agency that handles a large amount of health information could provide examples or scenarios touching on the actual ways that health information is collected, used, stored, and disclosed in practice, reflecting any known risk factors for that agency.
A DBP should outline the steps an agency will take to respond to a data breach, including a suspected eligible data breach.
To help ensure responses to data breaches are easily and quickly put into action, the DBP should clearly outline the agency’s process for:
Where these processes require decisions about how to manage the breach response, the DBP should identify who is responsible for making those decisions.
The DBP should include strategies for managing, responding to, and providing notice of data breaches involving other agencies.[10]
This could include documenting key contacts and defining roles and responsibilities regarding assessment, remediation, information flow, and notification.
The DBP should include a clear notification strategy that is consistent with sections 51 to 54 of the IP Act and enables quick and effective communication with affected individuals and the Information Commissioner.
The strategy should outline:
Agencies may be required by contract, other laws, or the circumstances of the breach to take additional specific steps in response to a data breach. These could include taking specific containment or remediation actions or engaging with or notifying external stakeholders. A DBP should outline the situations in which external reporting or engagement is necessary. If reporting is discretionary, it should include guidance on making the decision.
Depending on the circumstances of the data breach and the categories of data involved, agencies may need to report to or engage with:
Agencies may also wish to canvass media and general communications strategies in their DBP.
Clearly establishing data breach roles and responsibilities will help ensure prompt responses to a data breach. A DBP should set out the roles and functions of agency heads, executive officers, privacy officers, staff generally and any other relevant internal parties in identifying, reporting, and responding to an actual or suspected data breach.
The DBP should identify the breach response team including:
It should contain escalation procedures for staff, including how to immediately report a suspected breach, when line managers can handle a breach, and the circumstances in which a breach should be escalated to the response team, eg due to the severity of the breach or the level of response required.
It should also identify who is responsible for:
Prompt action is critical when responding to a data breach. Response strategies will only be effective if they can be quickly and effectively implemented and actioned. This depends on staff, or other people such as external contractors, having the relevant skillsets and being available to deal with the breach.
A DBP should outline the agency’s strategy for ensuring:
The agency's processes for documenting breach and suspected breach management and response should be included in the DBP. Keeping appropriate records will provide evidence of how the agency actually responded to a breach or suspected breach, including breaches that do not get escalated to the breach response team or do not meet the eligible data breach threshold.
Accurate records will also assist in tracking and analysing data breaches, including the effectiveness of the response methods. This may enable agencies to identify and remedy weaknesses in security or processes that present a higher risk of error.
Recordkeeping responsibility should be clarified in the DBP. This should include:
Understanding which processes worked well, how issues were handled, and areas for improvement in the management of a data breach is an important component of the data breach administration process. This is particularly relevant to mitigating future risks, preventing reoccurrence of similar breaches, and improving personal information handling processes in line with expectations of the community and regulators.
DBPs should include:
Post-breach review and evaluation will identify any changes needed to process or procedures and is a key part of ensuring agencies can proactively and effectively manage data breaches.
Agencies should consider regular testing and review of the DBP to ensure it is operationally effective, up to date, and properly considers internal agency structure and function, and the changeability of the external threat environment.
Regular testing will also contribute to staff understanding their roles and responsibilities and becoming familiar with escalation procedures for more complex breach incidents. It will also allow for the checking of response processes, such as contact numbers, approval processes and reporting lines to ensure that they are current.
DBPs should be reviewed, tested, and updated at least annually, but agencies should consider developing a schedule for reviewing and updating their DBPs appropriate to their specific agency. The testing and review schedule should be set out in the DBP.
Appendix A – Eligible Data Breach Register example
Register of Eligible Data Breaches (EDB) (as required by section 72 Information Privacy Act 2009) | |||||||
Date of Breach | Description of EDB / type of data breach | Date statement provided to OIC | Date additional information supplied to OIC or N/A | Individuals notified, including date and method | Details of any exemption(s) relied on, or N/A | Steps taken to contain and mitigate | Actions taken to prevent similar breaches |
Appendix B – Checklist for Data Breach Policy (DBP)
Information to be included | Yes/No | Comments |
Steps the agency has taken to prepare for a data breach | ||
What a data breach is and how staff or external parties can identify and report one | ||
The agency’s plan for containing, assessing, and managing data breaches | ||
Processes that outline when and how individuals are notified | ||
Processes for responding to incidents that involve another entity | ||
Circumstances in which external engagement, including with law enforcement, regulators (such as the Information Commissioner), or other third parties may be necessary | ||
Requirements under agreements with third parties such as insurance policies or service agreements | ||
A clear communication strategy | ||
Clear escalation procedures and reporting lines for suspected data breaches | ||
Members of the data breach response team, including roles, reporting lines and responsibilities | ||
Details of any relevant external expertise or resources and when they should be engaged | ||
A record-keeping policy to ensure that breaches are documented | ||
A schedule for regular review and testing of the DBP | ||
A review process for identifying and addressing any root causes that contributed to the breach | ||
A system for a post-breach review and assessment of the data breach response and the effectiveness of the data breach policy |
Register of Eligible Data Breaches (EDB) (as required by section 72 Information Privacy Act 2009) | |||
---|---|---|---|
Date of breach | |||
Description of eligible data breach/type of breach | |||
Date statement provided to the OIC | |||
Date additional information supplied to OIC or N/A | |||
Individuals notified, including date and method | |||
Details of any exemption(s) relied on, or N/A | |||
Steps taken to contain and mitigate | |||
Actions taken to prevent similar breaches |
Information to be included | Yes/No | Comments |
---|---|---|
Steps the agency has taken to prepare for a data breach | ||
What a data breach is and how staff can identify one | ||
The agency’s plan for containing, assessing, and managing data breaches | ||
Processes that outline when and how individuals are notified | ||
Processes for responding to incidents that involve another entity | ||
Circumstances in which external engagement, including with law enforcement, regulators (such as the Information Commissioner), or other third parties may be necessary | ||
Requirements under agreements with third parties such as insurance policies or service agreements | ||
A clear communication strategy | ||
Clear escalation procedures and reporting lines for suspected data breaches | ||
Members of the data breach response team, including roles, reporting lines and responsibilities | ||
Details of any relevant external expertise or resources and when they should be engaged | ||
A record-keeping policy to ensure that breaches are documented | ||
A schedule for regular review and testing of the DBP | ||
A review process for identifying and addressing any root causes that contributed to the breach | ||
A system for a post-breach review and assessment of the data breach response and the effectiveness of the data breach policy |
Current as at: July 31, 2025