All Queensland government agencies1 must handle personal information in accordance with the Queensland Privacy Principles (QPP) in the Information Privacy Act 2009 (Qld) (IP Act).
This guideline is based on and includes material from the Australian Privacy Principle guidelines developed by the Office of the Australian Information Commissioner.
Section 12 of the IP Act provides that personal information means information or an opinion about an identified individual or an individual who is reasonably identifiable, whether or not it is true or recorded in a material format.
The individual does not need to be directly identified in the information for it to be personal information. It is sufficient if they can reasonably be identified by reference to other information.
Refer to Key privacy concepts – personal and sensitive information for more information.
Under QPP 11, agencies must take reasonable steps to protect the personal information they hold from misuse, interference, and loss, and from unauthorised access, modification or disclosure.
QPP 11 also requires agencies to destroy or deidentify personal information once it is no longer needed for any purpose for which it could be used or disclosed under the QPPs. This obligation is subject to the provisions of the Public Records Act 2023 (Qld) and/or any order of a court or tribunal requiring the agency to retain the information.
The six things QPP 11 requires an agency to take reasonable steps to protect personal information from are: misuse, interference, loss, unauthorised access, unauthorised modification, and unauthorised disclosure of personal information.
These terms are not defined in the IP Act and their meanings often overlap.
Agencies may find the Privacy Risk register template helpful when implementing QPP 11.
An agency misuses personal information if it is uses it for a purpose not permitted by the IP Act. Use is defined in section 23 of the IP Act and QPP 6 sets out when an agency can use personal information.
See Key privacy concepts – Use and disclosure and the QPP 6 guidelines for more information.
Interference with personal information occurs if there is an attack on personal information held by an agency that interferes with the personal information but does not necessarily modify its content.
Interference includes an attack on a computer system that, for example, leads to exposure of personal information.
Loss of personal information covers the accidental or inadvertent loss of personal information held by an agency. This includes:
Loss can also occur as a result of theft following unauthorised access, unauthorised modification, or as a result of power outages or natural disasters such as floods or fires.
It does not apply to the intentional destruction or deidentification of personal information done in accordance with the QPPs or the Public Records Act 2023 (Qld).
Unauthorised access of personal information occurs when personal information is accessed by someone who is not permitted to do so. This includes unauthorised access by an employee of the entity or independent contractor, as well as unauthorised access by an external third party, e.g., via malware or hacking.
Unauthorised modification of personal information occurs when personal information is altered by someone who is not permitted to do so, or is altered in a way that is not permitted under the IP Act.
Unauthorised modification can occur as a result of, for example, unauthorised alteration by an employee, or following unauthorised access to databases by an external third party.
Disclosure is defined in section 23 of the IP Act. Unauthorised disclosure occurs when an agency:
This includes unauthorised disclosure by an employee of the agency.
See Key privacy concepts – Use and disclosure and the QPP 6 guidelines for more information on permitted disclosures.
As part of taking reasonable steps to protect personal information, an agency should consider how it will protect personal information at all stages of the information lifecycle. This includes before personal information is collected (including whether it should be collected), once it is collected and held, and when it is destroyed or deidentified once it is no longer needed.
The reasonable steps an agency must take to ensure the security of personal information will depend on the circumstances, for example:
Reasonable steps should include, where relevant, taking steps and implementing strategies in relation to:
QPP 11 requires agencies to destroy or deidentify personal information that is no longer needed for any purpose.
Generally, agency documents can only be destroyed or altered if the Public Records Act 2023 (Qld) and any Retention and Disposal Schedule issued under that Act authorises it.
Agencies must also comply with any other Australian law, or any court or tribunal order, that requires information or documents to be kept in an unaltered form.
As such, the obligation in QPP 11 to take reasonable steps to destroy or deidentify personal information will not apply to personal information that:
QPP 11 specifies that the personal information must no longer be needed for any purpose for which the information could be used or disclosed under the QPPs.
This means that the purpose for which it is retained in an identified form can be either the primary purpose of collection or any other secondary purpose set out in QPP 6.
However, similar to the principles governing collection of information, there must be a genuine expectation of required future use or disclosure. This means agencies must actively consider whether the personal information will actually be required for a permitted purpose. Retaining information 'just in case' it may be needed for some future use by the agency or a third party is not sufficient.
Information will often have statistical and research value and can inform and guide public policy decisions, but the purpose for which personal information is being kept must be specific and identifiable, rather than undefined and hypothetical.
QPP 11 requires agencies to take reasonable steps to ensure that personal information is deidentified or destroyed when it is no longer needed for a permitted purpose.
What constitutes reasonable steps to deidentify or destroy personal information depends on the specific circumstances, for example.
De-identification involves removing or altering personal information. Generally, deidentification includes two steps:
Personal information is deidentified when the identity of the individual the information is about cannot, and in the future will not, be reasonably ascertainable.5 Deidentification must be permanent, which means that the agency must not be able to match the deidentified information with other records to re-establish the individual’s identity.
Deidentification may be more appropriate than destruction if the deidentified information could provide further value or utility to the agency or a third party. For example, if:
Whatever deidentification method is used, the risk of reidentification must be actively assessed and managed to mitigate this risk. If the risk of reidentification cannot be appropriately minimised, the agency should consider taking reasonable steps to destroy the personal information.
Where personal information is stored on third party hardware, e.g., cloud storage, and the agency tells the third party to deidentify the personal information, taking reasonable steps includes verifying that it was done.
Personal information is destroyed if it can no longer be retrieved. The reasonable steps an agency takes to destroy personal information depends on whether the personal information is held in hard copy or electronic form.
For hard copy personal information, throwing it in the garbage or recycling would generally not constitute taking reasonable steps to destroy the personal information, unless it had already been destroyed through a process such as pulping, burning, pulverising, disintegrating or shredding.
For personal information in electronic form, reasonable steps will vary depending on the kind of hardware used to store the personal information. In some cases, it may be possible to ‘sanitise’ the hardware to completely remove stored personal information. If hardware cannot be sanitised, reasonable steps must be taken to destroy the personal information in another way, such as by irretrievably destroying it.
Where it is not possible to irretrievably destroy personal information held in electronic format, an agency should consider taking reasonable steps to deidentify the personal information. Alternatively, the agency could put the information beyond use as set out below.
If personal information is stored on third party hardware, eg cloud storage, and the agency tells the third party to destroy it, taking reasonable steps includes verifying that it was done.
If an agency cannot irretrievably destroy personal information held in electronic format, reasonable steps to destroy it would include putting the personal information ‘beyond use’.
Personal information is beyond use if it is no longer available for use in the ordinary performance of the agency’s functions. The agency must:
The circumstances in which an agency could not destroy electronic personal information will be very limited, e.g., if it is impossible to irretrievably destroy the personal information without also irretrievably destroying other information the entity is required to retain.
Current as at: July 1, 2025