Queensland government agencies1 are required to handle personal information in accordance with the Queensland Privacy Principles (QPPs) and overseas disclosure rules (section 33) in the Information Privacy Act 2009 (Qld) (IP Act). A key part of meeting these obligations is assessing the privacy impacts of policies, projects, and other agency undertakings.
Personal information is any information about an identified individual or an individual who can be identified. The QPPs and section 33 of the IP Act apply to personal information generally, but there is also a subset of personal information called sensitive information which has its own special rules.
Refer to Key privacy concepts – personal and sensitive information for more information.
A Privacy Impact Assessment (PIA) is a scalable tool that agencies can use to identify:
Project is used broadly in this guideline2 to refer to the full range of agency activities and initiatives which could have privacy implications, e.g. new systems, processes or practices, new legislation or policies, or information sharing initiatives.
Integrating the PIA process into the agency’s project management systems and processes can create efficiencies and help ensure privacy impacts are considered early on a throughout the life of a project.
This can be done, example, by:
The IP Act does not require a PIA, however the Office of the Information Commissioner (OIC) strongly encourages PIAs as part of a privacy by design approach. Including privacy as a key consideration in the early stages of a project and throughout its lifecycle significantly reduces the risk of noncompliance.
A PIA:
A PIA should be undertaken early enough in the development of a project that its findings can influence the design of the project. This will prevent unnecessary effort being expended on noncompliant design options.
Projects are rarely static; specifications are redefined or changed as it progresses. Building one or more PIA checkpoints into the project plan, as a trigger to check whether anything significant has changed since the PIA was first conducted, will help ensure the privacy impacts of project changes are addressed.
A PIA generally involves the following steps:
A PIA will be beneficial for any project that involves new or changed ways of handling personal information. However, not every project will need a PIA. For example, a PIA will not be necessary if the project will not involve personal information or does not propose any changes to existing information handling practices (where the privacy impacts of these practices have previously been assessed previously and deemed appropriate).
If the answer to: 'Will any personal information be collected, stored, used or disclosed in the project?’ is yes, some form of PIA will generally be required. Threshold privacy assessment form may be helpful in making this determination.
Keeping a record of the threshold assessment is an important part of documenting the PIA decision.
If the threshold assessment indicates a PIA is required, the next step is to plan the PIA. Consider:
The PIA does not need to be conducted by a privacy specialist, but it is important to seek input from your agency's privacy officer or other officer familiar with the IP Act.
The Privacy Impact Assessment project plan template may assist.
How detailed a PIA needs to be will depend on the scale and complexity of the project. For simple projects, the PIA process can be quick, and the PIA report may be quite short. Complex projects will involve a more formal and intensive exercise.
The level of detail will be influenced by:
Having a clear understanding of the project's purpose and outcomes will provide context for the PIA process. There is often more than one way of designing a project to deliver its intended outcome; a PIA will help identify the most privacy compliant way of reaching that outcome.
Relevant information could include:
This information can typically be sourced from the project’s management documentation, such as the Project Brief or Business Case.
Consultation with stakeholders who will be affected by the project, or who have an interest in the project, is essential to the PIA process. It allows people to identify privacy impacts and solutions based on their experience or expertise.
Who you should consult will depend on the nature of the project, but may include:
Consultation is not necessarily a separate step; it can be useful to consult throughout the PIA process.
Involving internal stakeholders in the PIA process is critical as these are the people who can answer questions about likely information flows, governance structures, technical architecture, legislation under which the agency operates and recordkeeping requirements. They may also be able to suggest potential actions to address the identified privacy issues or provide advice on what option is the most appropriate.
External consultation often involves seeking the views of the people whose personal information will be affected by the project. There are two main aims: it enables the agency to understand the concerns of those individuals and improves transparency by making people aware of how their personal information will be involved in the project and its outcomes.
Factors that will influence the required extensiveness of consultation include whether there is:
Even if a broad public consultation is not warranted, it may be that some form of targeted consultation should be undertaken, such as with relevant government independent statutory bodies, advocacy groups or professional associations.
Effective consultation
Effective consultations should follow these principles:
Refer to Privacy impact assessments – consultation for more information.
The next step is to describe the personal information is involved in the project and how it will flow through the agency’s systems and processes as a result of the project's outcome.
Clearly mapped information flows will assist in identifying privacy impacts in the next step of the PIA process.
The ‘map’ of personal information flows should include:
There is no ‘one size fits all’ approach to documenting the flow of information. For example, you could use tables to describe the different kinds of personal information involved in the project and how it will flow. A diagram, business process map, or comparative information map may be effective, especially to show how current processes or systems will be change by the project,
The best method will depend on the complexity of the information flows in your project.
A privacy impact can be negative (a risk) or positive (an opportunity). While this section focuses on identifying and mitigating risks, a similar analysis can be used to identify and maximise opportunities. This section of the guideline should be read in conjunction with Privacy impact assessments - risk consideration.
Privacy risks are identified by checking the project’s handling of personal information against the QPPs and section 33. If the project or its outcomes will involve contractors, it must also be checked against the requirement in chapter 2, part 3 to take bind contracted service providers to the IP Act.
Agencies should also ensure that the project allows noncompliance to be identified, in order to meet its mandatory data breach obligations in chapter 3A of the IP Act.
The PIA report template includes questions to help identify potential privacy impacts. Not all questions will be relevant to every project and additional considerations may be required, depending on the nature of your project and your agency.
A PIA can also be used to measure the project's compliance with:
Even where an act or practice complies with the IP Act, individuals may be uncomfortable with their information being involved in the act or practice. Consultation with the community is a key way to assess whether a project is seen as privacy-intrusive.
Recording privacy risks in the project risk register/log helps ensure accurate reporting to the Project Executive/Steering Committee/senior management. It will also help ensure that actions needed to address the risk can be tracked and prioritised appropriately.
If privacy risks have been identified, they must be addressed. If there are multiple options for addressing the risk, it may be necessary to evaluate the costs, risks and benefits of each option to identify which is the most appropriate.
Options for addressing privacy issues include:
Refer to Privacy impact assessments - risk consideration for more information.
Using a risk matrix3 helps prioritise risks according to their likelihood and potential severity.
While identifying and mitigating privacy risks is a critical component of good privacy practice, risk mitigation does not provide an alternative to IP Act compliance. Privacy must be incorporated into project goals, not balanced against them.
If it is not possible to mitigate a privacy risk, the agency could apply for a waiver or modification of the agency’s obligation to comply with the privacy principles. Approval is only granted where the public interest in non-compliance is stronger than the public interest in compliance.
Refer to QPP codes and privacy waivers for more information.
The next step is to prepare a report for the approval of the Project Executive/Steering Committee/senior management. The report should at a minimum:
Refer to Tips for PIA report drafting and the PIA report template for more information.
It is important that recommendations made in the report are implemented and that the PIA is updated and reviewed, even after the project’s completion.
The first step is to document what the Project Executive/Steering Committee/senior management agreed to, i.e.:
It can often be helpful to prepare a plan for implementing the recommendations to record what actions need to be taken, timeframes and responsibilities. Alternatively, they could be integrated into a revised project plan, which will help ensure the activities necessary to implement the recommendations are managed and reported.
Publishing a PIA report and the agency’s response demonstrates a commitment to openness and transparency and that the project has been designed with privacy in mind. If detailed information about the project cannot be published due to security or commercial concerns, consider publishing a summary or redacted version of the PIA report.
A PIA report is a living document. It should be revisited and updated if changes to the design of the project create new privacy impacts that were not previously considered.
Similarly, a PIA does not end on delivery of the project. Reassessing the privacy impacts of the system or process after it is in operation, for example when updates are deployed or new features are released, will help ensure that the agency continues to approach privacy as a ‘design feature’ of its processes and activities.
Current as at: June 1, 2025