Agencies are required to deal with personal information in compliance with the Information Privacy Act 2009 (Qld) (IP Act). Chapter 3A of the IP Act creates a mandatory notification of data breach (MNDB) scheme.
The MNDB scheme requires agencies1 (other than local government2 which will be subject to the MNDB scheme from 1 July 2026) to notify the Information Commissioner and certain individuals of eligible data breaches. As part of the scheme, agencies are also:
This guideline is designed to assist Queensland government agencies to understand their data breach policy and eligible data breach register obligations under the MNDB scheme. It should be read in conjunction with the Mandatory notification of data breach and Mandatory notification of data breach exemptions guidelines.
Agencies may also find these templates and quick guides helpful when implementing their MNDB scheme:
This guideline is based on and includes material from guidelines developed by the NSW Information and Privacy Commission.
Key definitions and concepts are discussed in detail in OIC’s Mandatory notification of data breach guideline. A summary of concepts relevant to agency data breach policy and register obligations as discussed in this guideline is set out below.
Section 12 provides that ‘personal information; means information or an opinion about an identified individual or an individual who is reasonably identifiable from the information or opinion, whether the information or opinion is true or recorded in a material form.
A ‘data breach’ of an agency means either of the following in relation to information held by the agency:
(a) unauthorised access to, or unauthorised disclosure of, the information.
(b) the loss of the information in circumstances where unauthorised access to, or unauthorised disclosure of the information is likely to occur.3
Under section 47, for a data breach to be an ‘eligible data breach’ triggering notification and obligations under the MNDB scheme, both of the following must apply:
For more guidance on eligible data breaches refer to the Mandatory Notification of Data Breach guideline. This guideline includes discussion of key concepts such as:
Section 72 requires agencies to keep an internal register of eligible data breaches. The register must include the specific information required by section 72(2), as follows:
Depending on the circumstances, agencies may find it useful to include additional information about a data breach in the register, for example:
In addition to being a requirement under the MNDB scheme, maintaining an eligible data breach register will contribute to accurate record keeping and reporting processes. Data from the register may also assist with tracking and analysing data breach risk and reviewing the efficacy of response methods. This information will also assist agencies in responding to requests for information from the Information Commissioner.
Appendix A contains an example eligible data breach register to assist agencies to develop a register applicable to individual agency circumstances.
Section 73 requires agencies to prepare and publish a Data Breach Policy (DBP) outlining how it will respond to a data breach, including a suspected eligible data breach of the agency. It is important to note that the obligation publish a DBP includes data breaches generally.
The agency’s DBP should apply generally to any data breach an agency might experience. There is no requirement that it include detailed information about an agency’s information security systems, practices or procedures.
A DBP is a documented policy or plan setting out the procedures to be followed in the event an agency experiences a data breach, including a breach that is a suspected eligible data breach. It should also establish the roles and responsibilities of agency staff in relation to responding to and managing a breach.
Data breaches can vary in size and complexity, and the consequences can be significant for individuals whose information is involved. The range of actual or potential harms they can cause includes financial fraud, identity theft, damage to reputation, violence, or psychological harms.
Agencies may also experience serious consequences as a result of a data breach. Depending on the data or information involved, breaches may have negative impacts on an agency’s reputation, finances, interests, or operations. Data breaches can also result in a loss of confidence and trust in an agency, including in the service it provides.
Having a robust, documented and operationalised DBP can facilitate a timely and effective response to a data breach, in turn avoiding or mitigating potential harms to affected individuals, and reducing the risks to agencies.
Agencies are required to publish their DBP on an accessible agency website.10 This will generally be the agency's website, but if the agency does not have a website, it can be included on the website of another appropriate agency. For example, Ministerial DBPs could be published on the departmental website.
Agencies should link to their DBP policy from their Queensland Privacy Principle Policy (QPP Policy)11 and intranet or other central staff repository, and ensure all staff know how to access the policy.
A DBP should set out an agency’s plan for dealing with data breaches from start to finish. A clear and precise DBP will enable agencies to:
At a minimum, a DBP should include:
The checklist at Appendix B will help agencies ensure their DBP addresses all relevant issues.
A DBP should provide a high-level outline of the actions the agency has taken to prepare for a data breach, including how these actions fit within the agency’s broader systems, policies, and procedures, e.g., cyber response, general incident or emergency management processes, communications strategies, and risk management frameworks.
The DBP should also include the key controls, systems, and processes that the agency has established for expeditiously identifying suspected or actual data breaches and ensuring data breaches are effectively managed.
Having well-trained and risk-aware staff contributes to a strong frontline defence against privacy risks, including from data breaches involving personal information. Data breach reporting by the Office of the Australian Information Commissioner indicates that breaches caused by human error are a significant component of all breaches involving government agencies.12 Prompt identification by staff of breaches and timely reporting is also an important factor in ensuring agencies can expeditiously respond to and manage breaches.
An agency’s DBP should outline its approach to staff training and awareness in identifying, responding to, and managing data breaches, and any training or awareness activities about other aspects of privacy protection, e.g., enhancing staff awareness of privacy and cyber principles and current threat trends.
Developing and documenting processes for promptly detecting data breaches will improve the chances of an agency being able to contain a breach and mitigate potential harms.
An agency’s DBP should clearly explain how internal staff and external entities, eg, the public or another agency, can report an actual or suspected data breach. The DBP should also outline the agency's processes for identifying data breaches, however this should not include details of specific controls which could place the agency at additional risk.
The appropriate processes for identifying and preventing data breaches will depend on the size and sophistication of an agency, its information holdings, and its security program and controls, but could include:
Agencies often outsource functions to external service providers or another agency (for example, payroll or IT services). These relationships are usually covered by legally binding contracts, memorandums of understanding or non-disclosure agreements.
Depending on the agreement and service, the service provider may be bound to comply with aspects of the IP Act,13 although the application of the MNDB scheme is limited to agencies.14 Regardless of whether the service provider is bound to the IP Act, agencies may wish to consider including data breach management and notification obligations in service provider contracts and agreements.
The DBP should include information about any contractual controls and how the agency monitors and manages service providers to ensure compliance.
Agencies should consider regular testing and review of the DBP to ensure it is operationally effective, up to date, and properly considers internal agency structure and function, and the changeability of the external threat environment.
Regular testing will also contribute to staff understanding their roles and responsibilities and becoming familiar with escalation procedures for more complex breach incidents. It will also allow for the checking of response processes, such as contact numbers, approval processes and reporting lines to ensure that they are current.
DBPs should be reviewed, tested, and updated at least annually, but agencies should consider developing a schedule for reviewing and updating their DBPs appropriate to their specific agency. The testing and review schedule should be set out in the DBP.
A DBP should align with, and cross reference existing agency policies and procedures, such as cyber security response plans and QPP Policies. If an agency has existing incident or crisis management processes, the DBP should be integrated into those processes as well.
A DBP should also align to Queensland government information security reporting and incident response protocols.
A DBP should include a clear explanation of what a data breach is and how a data breach may occur. The explanation should be consistent with both the definition of data breach in schedule 5 of the IP Act, and the definition of eligible data breach in section 47. The DBP should also explain that identifying, assessing, and responding to data breaches must be conducted on a case-by-case basis to account for the different type of breaches that may occur.
To assist agency staff with understanding what constitutes a data breach, including an eligible data breach, it may be helpful to cover different types of data breach. This should include those that result from deliberate or accidental actions, and also explain that breaches can occur in a range of different ways, e.g., loss or theft of physical devices, misconfiguration or overprovisioning of access to systems, inadvertent disclosure, deliberate disclosure, social engineering or hacking.
Providing examples or scenarios which are relevant to the operating context of the agency will also improve staff understanding and increase the likelihood that data breaches will be identified promptly. Scenarios are also likely to help raise awareness of high-risk activities and processes which could lead to a breach. For example, an agency that handles a large amount of health information could provide examples or scenarios touching on the actual ways that health information is collected, used, stored, and disclosed in practice, reflecting any known risk factors for that agency. This will further help agency staff identify how a breach might impact the agency, its functions, and the individuals whose information it handles.
The agency’s strategy for containing, assessing, and mitigating eligible data breaches.
A DBP should outline the steps an agency will take to respond to a data breach, including a suspected eligible data breach.
To help ensure responses to data breaches are easily and quickly put into action, the DBP should clearly outline the agency’s process for:
Where any of these processes require a decision to be made on how to proceed with managing the breach response, the DBP should identify who is responsible for making the decision.
The DBP should address strategies for managing, responding to, and providing notice of data breaches involving other agencies.15
This could include documenting key contacts and defining roles and responsibilities regarding assessment, remediation, information flow, and notification to affected individuals and the Information Commissioner.16
The DBP should include a clear notification strategy that is consistent with sections 51 to 54 of the IP Act and enables quick and effective communication with affected individuals and the Information Commissioner.
The strategy should outline:
Agencies may be required by contract, other laws, or the circumstances of the breach to take additional specific steps in response to a data breach. These could include taking specific containment or remediation actions or engaging with or notifying external stakeholders if a data breach occurs.
Depending on the circumstances of the data breach and the categories of data involved, agencies may need to report to or engage with:
Agencies may also wish to canvass media and general communications strategies in their DBP.
A DBP should outline the situations in which external reporting or engagement is necessary. If reporting is discretionary, it should include guidance on making the decision.
Clearly establishing required roles and responsibilities is important to ensure prompt responses to a data breach.
A DBP should include clear guidance for agency heads, executive officers, privacy officers, staff generally and any other relevant internal party that explains their roles and functions in identifying, reporting, and responding to a breach or suspected breach.
The DBP should also identify the breach response team including:
The DBP should contain escalation procedures for staff, including how to immediately report a suspected breach, when line managers can handle a breach, and the circumstances in which a breach should be escalated to the response team, generally based on severity or the level of response required.
It should also identify who is responsible for:
Prompt action is critical when responding to a data breach. Response strategies will only be effective if they can be quickly and effectively implemented and actioned. This depends on staff, or other people such as external contractors, having the relevant skillsets and being available to deal with the breach.
A DBP should outline the agency’s strategy for ensuring:
The agency's processes for documenting breach and suspected breach management and response should be included in the DBP. Keeping appropriate records of data breach response and management will provide evidence of how the agency actually responds to breaches or suspected breaches, including those breaches that do not get escalated to the breach response team, or those that do not meet the eligible data breach threshold under the MNDB scheme.
Accurate records will also assist in tracking and analysing data breaches, including the effectiveness of the response methods. This may enable agencies to identify and remedy weaknesses in security or processes that present a higher risk of error.
Recordkeeping responsibility should be clarified in the DBP. This should include:
Understanding what processes worked well, how issues were handled, and areas for improvement in the management of a data breach is an important component of the data breach administration process. This is particularly relevant to mitigating future risks, preventing reoccurrence or similar breaches, and improving personal information handling processes in line with expectations of the community and regulators.
DBPs should include:
Register of Eligible Data Breaches (EDB) (as required by section 72 Information Privacy Act 2009) | |||
---|---|---|---|
Date of breach | |||
Description of eligible data breach/type of breach | |||
Date statement provided to the OIC | |||
Date additional information supplied to OIC or N/A | |||
Individuals notified, including date and method | |||
Details of any exemption(s) relied on, or N/A | |||
Steps taken to contain and mitigate | |||
Actions taken to prevent similar breaches |
Information to be included | Yes/No | Comments |
---|---|---|
Steps the agency has taken to prepare for a data breach | ||
What a data breach is and how staff can identify one | ||
The agency’s plan for containing, assessing, and managing data breaches | ||
Processes that outline when and how individuals are notified | ||
Processes for responding to incidents that involve another entity | ||
Circumstances in which external engagement, including with law enforcement, regulators (such as the Information Commissioner), or other third parties may be necessary | ||
Requirements under agreements with third parties such as insurance policies or service agreements | ||
A clear communication strategy | ||
Clear escalation procedures and reporting lines for suspected data breaches | ||
Members of the data breach response team, including roles, reporting lines and responsibilities | ||
Details of any relevant external expertise or resources and when they should be engaged | ||
A record-keeping policy to ensure that breaches are documented | ||
A schedule for regular review and testing of the DBP | ||
A review process for identifying and addressing any root causes that contributed to the breach | ||
A system for a post-breach review and assessment of the data breach response and the effectiveness of the data breach policy |
Current as at: July 1, 2025