Agencies are required to deal with personal information in compliance with the Information Privacy Act 2009 (Qld) (IP Act). Chapter 3A of the IP Act creates a mandatory notification of data breach (MNDB) scheme. The Office of the Information Commissioner encourages agencies to undertake voluntary notification of data breaches, even where the IP Act does not require it.
The MNDB scheme imposes the following obligations on agencies1 (other than local government2 which will be subject to the MNDB scheme from 1 July 2026).
Where an agency knows or reasonably suspects that a data breach of the agency is an eligible data breach, the agency must immediately, and continue to take all reasonable steps to:
If there is uncertainty as to whether the data breach is eligible, assess whether there are reasonable grounds to believe the data breach is an eligible data breach of the agency within 30 days.3 When an agency knows or reasonably believes that the data breach is an eligible data breach, the agency must as soon as practicable:
The Office of the Information Commissioner (OIC) has developed the OIC Agency Portal, an online platform that enables agencies to act on their voluntary or mandatory reporting obligations under the MNDB scheme.
An agency must also:
This guideline explains agency obligations under the MNDB scheme. It should be read in conjunction with the Mandatory notification of data breach exemptions and Data breach registers and policies guidelines.
A MNDB Assessment Tool is available on the OIC website, and agencies may find these templates and quick guides helpful when implementing their MNDB scheme:
This guideline is based on and includes material from guidelines developed by the NSW Information and Privacy Commission.
The following definitions and concepts are important when considering the MNDB scheme.
The MNDB scheme applies in relation to personal information, other than personal information in a document to which the privacy principle requirements do not apply, held by an agency.
Section 12 defines ‘personal information’ as follows:
Personal information means information or an opinion about an identified individual or an individual who is reasonably identifiable from the information or opinion—
(a) whether the information or opinion is true or not; and
(b) whether the information or opinion is recorded in a material form or not.
Refer to Key privacy concepts - personal and sensitive information for more information.
Section 13 defines “held or holds” in relation to personal information as:
Personal information is held by a relevant entity, or the entity holds personal information, if the personal information is contained in a document in the possession, or under the control, of the relevant entity.
The overall effect of this provision is to expand the ordinary meaning of the terms ‘hold or held’ to include situations where an agency may not be in physical possession of the relevant document containing personal information, but it still retains a legal power or a right to deal with the information.
Examples of physical possession include documents stored in an agency’s records management or IT systems, and hard copy documents on a ‘paper’ file or in a physical storage repository.
Agencies will be in ‘control’ of a document where they have a present legal entitlement to physical possession,8 or a power to handle the information, such as by way of a contractual or other legal right. This may include, for example, documents provided to a legal services provider by an agency for the purposes of seeking advice,9 or documents an agency may require a service provider to provide to the agency under the terms of a service agreement.
Central to the MNDB scheme are the concepts of a ‘data breach’ and an ‘eligible data breach’. Each is defined in the IP Act, and those definitions are discussed further below.
A ‘data breach’ means either of the following in relation to information held by an agency:
(a) unauthorised access to, or unauthorised disclosure of, the information.
(b) the loss of the information in circumstances where unauthorised access to, or unauthorised disclosure of the information is likely to occur.10
Unauthorised11 access to personal information occurs when information held by an agency is accessed by someone who is not authorised to do so. For example:
Unauthorised disclosure occurs when an agency intentionally or unintentionally discloses personal information when the agency does not have permission or is not entitled to make that disclosure. For example:
Unauthorised access and disclosure are not mutually exclusive and can occur as a result of the same breach or as part of a chain of events. For example, if an agency mistakenly discloses personal information via a webform on its internet site and a third party can view the information, this may amount to unauthorised disclosure of personal information by the agency and unauthorised access by the external party.
Loss of personal information involves an agency no longer having possession or control of the information. Loss may occur because of a deliberate or accidental act or omission of an agency, or due to the deliberate action of a third party. For example:
The loss of personal information will result in a data breach only where such loss is likely to result in unauthorised access or disclosure of the information. If the personal information is inaccessible, or is known to have been destroyed, it will be unlikely that a data breach has occurred.
Examples of the above may include where:
As the loss of personal information in the above examples did not or was unlikely to result in unauthorised access or disclosure, it will be unlikely that a data breach has occurred.
For a data breach to be an ‘eligible data breach’ triggering notification and other obligations under the MNDB scheme, both of the following must apply:
The harms which can potentially arise from a data breach will vary based on the nature of the personal information involved and the context of the breach.
Serious harm is defined in schedule 5 of the IP Act as including:
This is not an exhaustive definition, and other kinds of harm can meet the serious threshold. Serious harm occurs where the harm arising from the data breach has, or may, result in a real and substantial detrimental effect to an individual. The effect on an individual must be more than mere irritation, annoyance, or inconvenience. It is important to note that serious harm is not limited to physical harm to a person or their physical safety and can involve emotional or reputational harm arising from a data breach.
Section 47(2) contains a list of stated matters to which an agency must have regard to when considering if a breach is likely to result in serious harm.
The section 47(2) matters are:
Other relevant matters to consider may include (but not be limited to):
'Likely to result’ requires that the risk of serious harm to an individual be more than merely possible; it must be more probable than not to occur. Whether a data breach is likely to result in serious harm is an objective test to be determined on the facts of the specific breach, taking into account the section 47(2) matters, as set out above.
A data breach will be an eligible data breach if serious harm is more likely than not to affect an individual, or a subset of individuals affected by a breach. Serious harm does not need to be likely for all individuals to whom a data breach relates.
An agency does not need to identify the specific individuals who may be harmed in order to determine that serious harm is likely to result for one or more individuals. A data breach affecting a large number of individuals may therefore be an eligible data breach even if the personal information involved is not highly sensitive – provided the agency concludes that serious harm is likely to result for some of those individuals.
OIC recommends that agencies should carefully consider the factors for assessing the risk of serious harm to an individual. If doubt or ambiguity exists as to whether a data breach is likely to result in serious harm, agencies should err on the side of caution, and treat the data breach as an eligible data breach.
Agencies have the following obligations regarding data breaches under the MNDB scheme.
If an agency knows or reasonably suspects that a data breach is an eligible data breach involving personal information held by the agency, it must immediately take, and continue to take, all reasonable steps to contain the data breach and mitigate the harm caused by the data breach.13 Steps may include:
If a third party is in possession of the personal information and declines to return it, it may be necessary to seek legal advice on what action can be taken to recover the information. When recovering information, agencies should also take steps to ascertain whether the information has been shared or disseminated and ensure copies have not been made or that all copies are recovered.
Agencies should be careful to ensure that while containing an eligible or suspected eligible data breach, they do not destroy information that may be required as part of an internal or external investigation into the breach.
An agency’s data breach policy14 should clearly identify the steps to be followed in responding to, containing, and mitigating an eligible or suspected eligible data breach, including appropriate escalation pathways. Depending on the circumstances of the data breach and an agency’s data breach policy, this may include informing:
If an agency does not know, but reasonably suspects that a data breach is an eligible data breach, it must assess whether there are reasonable grounds to believe it is an eligible data breach.15 This assessment must be completed within 30 days unless the assessment time is extended under section 49.
An agency’s assessment and reasons for its decision as to whether a data breach is an eligible data breach should be recorded in writing and include the material facts of the specific breach. The assessment should address the section 47(2) matters set out above, and any other relevant factors.
If an agency is satisfied that it will not be able to complete the assessment in 30 days, it can extend that time under section 49. An agency can only extend the assessment period by a further period that is reasonably required to complete the assessment.
Before the initial 30 day assessment period expires, the agency must:
The notice to the Information Commissioner must state:
The Information Commissioner can ask the agency to provide information or progress updates about the assessment.
If the agency becomes aware that an eligible or suspected eligible data breach may affect another agency, it must give the other agency a written notice of the data breach that includes:
If an agency reasonably believes that there has been an eligible data breach involving personal information held by the agency, it must:
Unless an exemption applies, agencies must notify the Information Commissioner as soon as practicable after forming the belief that a data breach is an eligible data breach.
Agencies are welcome to seek advice from the OIC about a data breach, but notification of an eligible data breach must be made in writing.
Under section 51, the agency must prepare and give the Information Commissioner a statement, which must include:
If it is not reasonably practicable to include some of the above information to the Information Commissioner (e.g. the agency may not yet know the total number of affected individuals) the agency must take all reasonable steps to provide required information to the Information Commissioner as soon as practicable.
Unless an exemption applies, as soon as practicable after forming a reasonable belief that a data breach is an eligible data breach, an agency must take the steps set out in section 53 to notify particular individuals and provide them with the information required in 53(2) (the required information).
Section 53 provides three options for notifying individuals, depending on what is reasonably practicable in the circumstances. Whether an option is reasonably practicable will depend on a consideration of factors, including:
If it is reasonably practicable to notify each individual whose personal information was accessed, disclosed or lost, the agency must take reasonable steps to notify each individual of the required information.
If Option 1 does not apply, agencies must take reasonable steps to notify each affected individual of the required information for the data breach, if doing so is reasonably practicable.
Under section 47(1)(a)(ii) and (b)(ii), an ‘affected individual’ is someone:
'To whom the information relates' is not defined in the IP Act. It should be given its ordinary meaning, which is the individual about whom the personal information concerns. An individual will be an affected individual if the information involved in an eligible data breach is about them, regardless of whether it was originally collected from the individual or a third party.
If options 1 and 2 do not apply, an agency must publish the required information on an accessible agency website for a period of at least 12 months. An agency is not required to include information in its notice if it would prejudice its functions.
An agency must advise the Information Commissioner how to access the notice and the Information Commissioner is required to publish the notice on the Commissioner's website for at least 12 months.
The information that must be given to an affected individual or included in the agency's public notice under section 53(2), must, to the extent it is reasonably practicable, include:
If an individual is notified directly, the notice to the individual must also include a description of their personal information involved in the data breach, and the agency's recommendations about any steps they should take in response to the eligible data breach.
There is no requirement to notify individuals whose personal information is not involved in a data breach. However, if an agency identifies an individual who is likely to suffer harm for reasons other than their personal information being involved, the OIC recommends that agencies consider notifying these individuals if it is possible to do so without the risk of further breaches - as this may assist in mitigating any risk of harm.
For public notification via an agency's website, the notification must include a description of the kind of personal information involved in the data breach, without including any personal information in the description.
Where a data breach involves the personal information of a child, notification should generally be made to the child’s parent or legal guardian.
For minors aged 16 years or older, it may be appropriate to make the notification directly to the child.
Chapter 3A, part 3, division 3 of the IP Act sets out the circumstances in which an agency is not required to comply with the notification obligations, including where:
A number of these exemptions have limitations or impose additional obligations. Refer to Mandatory notification of data breach exemptions for more information.18
While not required by the IP Act, in some circumstances it may be appropriate to – or agencies may be required to – notify other entities of a data breach, for example:
Depending on the circumstances of the data breach and the information involved, other notifications may be appropriate. For example, the agency’s portfolio Minister, financial institutions, or credit card companies, or professional or other regulatory bodies.
Agencies should note that the above reporting obligations and considerations may apply to any breach or compromise of any type of information, and not only to those assessed as eligible data breaches under the MNDB scheme.
An agency must keep an internal register of eligible data breaches19 and publish a data breach policy on its website.20
Refer to Data Breach Registers and Policies for more information.
Chapter 3A, part 4 of the IP Act sets out the Information Commissioner's role in relation to eligible data breaches, including:
Prior to the commencement of the MNDB scheme, OIC administered a voluntary data breach reporting scheme, which we continue to operate.
The Information Commissioner encourages agencies to advise the OIC of data breaches that do not meet the threshold of an ‘eligible data breach’. Information gathered from voluntary reports will allow OIC to provide agencies with assistance and advice in relation to a data breach and to assist the Information Commissioner in fulfilling their broader performance and monitoring statutory functions under section 135, including:
Under section 54, a regulation may provide for the collection, use, and disclosure of ‘relevant personal information’ between agencies where the receiving agency is involved in an eligible data breach, and the information is needed to confirm the name and contact details of a notifiable individual or whether a notifiable individual is deceased.
For section 54(1) of the IP Act, the Information Privacy Regulation 2025 (IP Regulation) prescribes:
Neither the disclosing agency or receiving agency are required to comply with a QPP in relation to this disclosure, collection, or use. ‘Notifiable individual’ and ‘relevant personal information’ are defined in section 54.
Current as at: July 1, 2025