Mandatory notification of data breach exemptions

Overview

Queensland government agencies1 must handle personal information2 in accordance with the Information Privacy Act 2009 (Qld) (IP Act). Chapter 3A of the IP Act creates a mandatory notification of data breach (MNDB) scheme, which requires agencies (other than local government3) to notify individuals and the Information Commissioner about eligible data breaches involving personal information held by the agency, unless an exemption applies.

This guideline is intended to assist agencies in assessing whether an exemption to their notification obligations applies. It must be read in conjunction with Mandatory notification of data breach and Notification under the mandatory notification of data breach scheme.

In addition to the MNDB guidelines,4 agencies may find these templates and quick guides helpful:

Notification of eligible data breaches

As soon as practicable after forming a reasonable belief that there has been an eligible data breach, agencies must notify both the Information Commissioner and individuals whose information was involved in an eligible data breach about the eligible data breach.5

Exemption from notification

Under section 50(2) of the IP Act, an agency is not required to comply with its notification obligations if an exemption applies. These exemptions are set out in section 55-60 of the IP Act.

Reliance on an exemption is discretionary. When deciding whether to rely on an exemption, agencies should to take into account that the policy intent of the MNDB scheme is to empower individuals, enhance transparency, and build trust in agency management of personal information. In most cases, notification of individuals affected by an eligible data breach can be presumed to be beneficial, as it empowers those individuals to take steps to protect themselves. Notification delays can have significant impacts on affected individuals. Exemptions to notification are intended to apply only in exceptional circumstances.

If an agency decides to rely on an exemption, it should keep appropriate records of the assessment and decision making process, including accurate records of information and evidence used to support that decision.

Exemption from notification to individuals only

These exemption only exempt agencies from the obligation to notify individuals. Agencies must still notify the Information Commissioner under section 52 of the IP Act.

Agency has taken remedial action

Section 57 provides that an agency is not required to notify individuals if the agency has taken remedial action to mitigate the breach so that the breach is no longer likely to result in serious harm to any individual.

If the data breach involves unauthorised access to, or disclosure of, personal information, the agency can rely on section 57 if:

  • it takes action to mitigate the harm caused by the data breach before the access or disclosure results in serious harm to any individual; and
  • as a result of the action taken, the data breach is no longer likely to result in serious harm to any individual.

If the data breach involves loss of personal information, the agency can rely on section 57 in two circumstances:

  • Where the agency takes action to mitigate the loss before there is unauthorised access to or disclosure of the personal information and as a result there is no unauthorised access to, or disclosure of, the personal information.
  • Where the agency takes action to mitigate the loss after there is unauthorised access or disclosure but before it results in serious harm to any individual and as a result the data breach is no longer likely to result in serious harm to any individual.

Serious risk of harm to health or safety

Under section 59 of the IP Act, an agency is not required to notify individuals of an eligible data breach to the extent that compliance with section 53 would create a serious risk of harm to an individual's health or safety. It is important to note that:

  • this exemption encompasses serious risk of harm to any individual, not just the individual affected by the eligible data breach
  • the test is whether there exists a serious risk of harm, rather than serious harm, which is the test for an eligible data breach under section 47; and
  • the agency can decide to rely on this exemption permanently or temporarily.

When determining whether this exemption applies, the agency must have regard to whether the harm caused by complying with notification obligations is greater than the harm of not complying, the currency of the information the agency is relying on to make its decision, and any other relevant matters.

Health refers to an individual’s mental and physical wellbeing. Safety refers to freedom from danger, risk, or injury. Whether notification would create a serious risk of harm to an individual’s health or safety should be assessed objectively, based on best available information and a careful evaluation of all relevant circumstances.

Determining whether notification would result in a serious risk of harm to an individual requires consideration of both the likelihood and consequence of harm to an individual. A high likelihood of detrimental impact on the health or safety of an individual would constitute a serious risk of harm.

However, a lower likelihood could still amount to a serious risk of harm if the potential consequences would be extremely detrimental to an individual’s health or safety. For example, the threshold for application of the exemption may be met where the agency makes an assessment that there is a serious risk:

  • that notification will exacerbate the mental health condition of an affected individual
  • of harm to the physical safety of agency staff members – for example where an affected individual has a documented history of actual or threatened violence against staff
  • of an individual disengaging from treatment for a significant or life-threatening medical condition; or
  • of at-risk individuals disengaging with domestic violence or child protection services in circumstances where the agency is aware that is a real risk of serious physical harm or death to the individual and/or their family if service provision is discontinued.

A serious risk of harm to the health or safety of an individual other than the person to whom the information relates may be a relevant risk for the purpose of section 59. For example, circumstances may exist where notification would cause a serious risk of harm to the affected individual’s spouse or another family member.

Individuals for whom notification would create a serious risk of harm may be a sub-group of those affected by the breach. If the broader group can be notified without creating a serious risk of harm to the at-risk subgroup, the exemption will not apply in relation to notification to the broader group.

Systematic risks such as harm to the individual’s confidence in a service or system will not usually meet the threshold for this exemption. However, in exceptional and limited circumstances where notification is likely to damage an individual’s trust in an agency to such an extent that they would completely disengage from a medical or other essential services, the exemption may apply.

Balancing impacts

When deciding whether to rely on section 59, the agency must consider whether the harm of notification outweighs the harm of not notifying. It must be satisfied that the harm that could result from notifying is real, substantial and, in practice, not unlikely to result.

Taking into account the policy intent of the MNDB scheme and the starting point that notification to affected individuals is usually beneficial, agencies should only rely on section 59 in circumstances where the harm posed by notification is substantively greater than the potential harm from failing to notify.

Actions to mitigate risk

When making a decision on whether to rely on this exemption, agencies should consider whether there are additional steps or actions available that could lessen or manage the anticipated harms. If there is a practical means of delivering the notification in a way that will mitigate the risks to an individual’s health or safety, the exemption will not apply.

Actions to mitigate risk of harm could include:

  • In person notification and/or provision of support – if an agency is concerned that receiving a notification might cause significant distress to an affected individual, this may be mitigated by providing notice in person with a support person and clinical staff in attendance.
  • Redaction of some information – an agency should consider whether identified risks could be mitigated by redacting specific information or providing a high-level summary. For example, if a law enforcement officer investigating serious organised crime inappropriately accessed information held about individuals in an organised crime group, it may be open to the relevant agency to form the reasonable belief that notification would create a real risk of harm to the relevant officer’s health or safety. When balancing the relevant impacts, the agency should consider whether notification of the data breach can be provided without identifying the individual officer.
  • Notification to an authorised representative – in circumstances where an affected individual lacks decision making capacity, the agency may make the notification to the individual’s authorised representative. The notification should include information about the health or safety risks to the affected individual and the services available to support the authorised representative to inform the affected person of the breach after they regain capacity.

Agencies are expected to take all reasonable steps to identify any actions they could reasonably take to mitigate the identified harms and enable notification to occur.


Children's information

If a data breach involves the personal information of a child, notification should generally be made to the child’s parent or legal guardian. For minors aged 16 years or older it may be appropriate to make the notification directly to the child.

If an agency decides that notifying a child aged 16 years or over would result in a serious risk of harm to their health or safety, the agency should consider whether it is appropriate to make notification to the child’s parent or guardian rather than exercising the exemption.

In these circumstances the notification should be accompanied by information on counselling or support services for the child and their family and factors for the parent or legal guardian to consider before informing their child.

Currency of information

Before relying on section 59, the agency must consider the currency of the information it is relying on to assess whether notification could create a serious risk of harm. This is because individuals’ vulnerability to harm is dynamic and relative rather than being a fixed trait, and agency records may be old and reflect a particular moment in time.

If agency records indicate that a situational factor or a particular characteristic of the individual gives rise to a risk of harm, consideration should be given to the age of those records and the likelihood that the individual’s circumstances may have changed in the intervening time.

Determining the duration of the exemption

The agency can decide to rely on section 59 permanently or temporarily. In keeping with the policy intent of the MNDB scheme, the exemption should be applied for the minimum amount of time required to avoid or mitigate the anticipated harm.

Where notification would create a serious risk of harm to an individual’s health or safety and the risk cannot be mitigated or removed over time, it may be appropriate to apply the exemption permanently.

A permanent exemption should only be granted in exceptional circumstances and where the agency has a high degree of confidence that harm mitigation measures, alternative methods of notification and/or the passage of time will not substantially lessen the risk. For example, a permanent exemption may be appropriate where an affected individual has a persistent, serious mental health condition and a documented history of violence or self-harm.

Where the risk of harm arises from a particular factual scenario or a temporary vulnerability, agencies should consider applying section 59 only until notification can be safely made. For example, if an individual is suffering a mental illness that puts them at risk of causing harm to themselves or others if notified of a breach, consideration should be given to whether that mental illness is episodic or likely to resolve, and whether notification obligations could be deferred until the individual is well enough to safely receive notification.

Notifying the Information Commissioner

If an agency relies on this exemption it must give written notice to the Information Commissioner setting out:

  • that the agency is relying on the exemption and the extent to which it is relying on it, e.g., to not notify only a sub-class of affected individuals
  • whether the exemption is temporary or permanent; and
  • if temporary, the expected duration of the exemption.

This is in addition to the statement it must give the Commissioner under section 51 of the IP Act. OIC recommends that agencies also provide the Commissioner with the following information, if it is practicable to do so:

  • the number of individuals to whom the exemption has been applied
  • the total number of individuals affected by the breach
  • the nature of the serious risk of harm to health or safety expected to arise from notification
  • an explanation of why the risk arising from notifying affected individuals outweighs the risk of not notifying
  • the nature and age of information the agency relied on to form its reasonable belief; and
  • whether agency records were searched to assess the impact of notification and the grounds on which the search was authorised.

This can be a high-level summary and must not include any personal information.

Compromise to cybersecurity

Section 60 exempts an agency from the obligation to notify an individual to the extent that complying with that notification obligation is likely to:

  • compromise or worsen the agency’s cybersecurity; or
  • lead to further data breaches.

Exemption under section 60 is temporary. It only applies for the period that notification to individuals is likely to result in either of the above outcomes.

Cybersecurity is not defined in the IP Act. The Queensland Government’s Cyber Security Hazard Plan uses the relevant International Standard definition ’actions required to preclude unauthorised use of, denial of service to, modifications to, disclosure of, loss of revenue from, or destruction of critical systems or informational assets‘.6

The cybersecurity exemption in section 60 requires that notification would likely have a detrimental impact on these measures. There is no specific threshold or degree to which an agency’s cybersecurity must be negatively affected to trigger section 60, however the effect must be non-trivial.

Before relying on section 60, the agency must be satisfied that there is a real risk that notification would compromise or worsen the agency’s cybersecurity or lead to a further data breach. A mere possibility is not sufficient; it must be more likely than not to occur. Reliance on this exemption should be tightly framed and exercised for the least amount of time necessary to avoid cybersecurity detriment or further data breaches.

The Information Commissioner recommends that departments, Ministers, statutory bodies and other State government agencies consider seeking advice from the Queensland Government Cybersecurity Unit when contemplating use of this exemption. Local government, universities, and other non-State agencies should consult with their internal or external cybersecurity specialists.

Circumstances where notification would likely compromise or worsen an agency’s cybersecurity or lead to further data breaches could include:

  • Where notification could lead to further unauthorised access to, or disclosure of information. For example, where a system upgrade reconfigures access restrictions, making personal information available online to users who should not be able to access it, and the access restrictions have not yet been rectified, notification could alert individuals to the issue and result in further unauthorised access. In this example, it is likely the exemption would only apply for a short period while containment and mitigation activities were undertaken by the agency.
  • Where the notification could allow the breach, or a similar breach, to be replicated. For example, if the breach was caused by a cyber-attack which took advantage of a system vulnerability or a new or emerging cyber method, and steps to protect the system from similar attacks have not been finalised, notification could result in compromising the agency’s cyber security, and also lead to further data breaches.

When agencies could choose not to rely on the exemption

When deciding whether to rely on section 60, agencies should consider whether there are options available to notify affected individuals without increasing the risk to the agency. It may be possible to comply with the notification obligations without revealing specific details of how the breach occurred, or the actions the agency is conducting to contain or mitigate the impact of the breach. For example, a notification could include a high-level statement that the breach occurred due to a cyberattack on agency systems, without providing detailed information on the methods used or the vulnerabilities exploited.

If an agency takes this approach, it may be appropriate to advise individuals that further information will be provided as investigation and remedial action is undertaken by the agency.

Resolving any cybersecurity flaws or weaknesses giving rise to the exemption

Exemption from notification to individuals under section 60 is only temporary. Agencies should address any cybersecurity or information security weaknesses as promptly as possible, so as to mitigate any risks giving rise to reliance on the cybersecurity exemption and permit notification as soon as is possible.

Notifying the Information Commissioner

In addition to the statement it must give the Commissioner under section 51 of the IP Act, if an agency relies on this exemption it must give written notice to the Information Commissioner setting out:

  • the agency is exempt from complying with notification obligations under the scheme; and
  • when it expects the exemption will no longer apply; and
  • how the application of the exemption will be reviewed.

The agency must also review the application of the exemption for each month during the period it is relying on the exemption and provide the Information Commissioner with a summary of the monthly review as soon as practicable.

OIC recommends that agencies also provide the Commissioner with the following information, if it is practicable to do so:

  • the number of individuals to whom the exemption has been applied
  • an explanation of why notification is likely to compromise or worsen the agency’s cybersecurity or lead to further breaches
  • confirm whether the agency has consulted with the Queensland Government Cybersecurity Unit or, for non-State government agencies, its cybersecurity adviser; and
  • an explanation of the timelines and work planned to remedy the issue and enable notification.

Monthly review

Issues that may be considered during the mandatory monthly review of the use of the cybersecurity exemption could include considering whether:

  • the risks identified during the initial assessment continue to apply
  • mitigation action removed the risk to agency cybersecurity
  • notification to affected individuals is still likely to compromise or worsen the agency’s cybersecurity, or lead to further data breaches
  • mitigation activities can be completed within the estimated timeframe; and
  • the timeframe of the exemption should be amended.

The agency must give the Information Commissioner a summary of every review as soon as practicable after the review is completed.

Exemption from notifying individuals and the Information Commissioner

Investigations and proceedings

Section 55 exempts an agency from notifying both individuals and the Information Commissioner to the extent that providing those notifications would likely prejudice:

  • an investigation that could lead to the prosecution of an offence; or
  • proceedings before a court or tribunal.

There must be more than a mere possibility of the prejudice occurring; it must be more likely than not to occur.

The agency relying on this exemption does not need to be the agency conducting the investigation. It is sufficient that notifying would prejudice an investigation being conducted by another agency or entity.

This exemption is not confined to criminal investigations by law enforcement agencies such as the Queensland Police Service. It can apply to any investigation which may result in a prosecution, for example:

  • investigations by agency compliance officers into breaches of environmental regulations or permit conditions
  • investigations by local government officers into breaches of local or other laws
  • investigations into breaches of liquor licensing laws; and
  • investigations into official misconduct or police misconduct which could result in prosecution.

The exemption can apply to any proceedings before any court or tribunal, regardless of jurisdiction. It does not need to be a court or tribunal of Queensland and the agency the subject of the data breach does not need to have instigated or be involved in the proceedings.

The investigation or proceedings can be at any stage of the process. Finalised investigation or proceedings, however, would not enliven this exemption.

Before relying on this exemption, agencies should carefully consider whether it is possible to undertake notification under section 52 or 53 in a way that would avoid likely prejudice to relevant investigation or proceedings. If an agency can provide some of the information required under sections 52 and 53, without causing the anticipated prejudice, the exemption will not apply to that information.

Multiple agency breach

If a data breach involves more than one agency, an agency may be able to rely on section 56 to not notify individuals and the Commissioner. Section 56 will apply where:

  • all of the personal information the subject of the breach is also the subject of a data breach of one or more other agencies;7 and
  • at least one of the other agencies is undertaking assessment8 and is required to notify individuals and the Commissioner9 in relation to the data breach.

Section 56 does not apply where the other entity or entities involved in the breach are not agencies as defined in the IP Act. In those circumstances, the agency must comply with its notification obligations, even if another entity, including an agency of the Commonwealth or another state or territory, was also required to notify affected individuals under Commonwealth or other law.

Where a breach involves multiple agencies, the agencies should consult with each other to determine which agency will be responsible for assessment and notification of the data breach. Agencies should work together during the assessment process to ensure all affected individuals are identified.

The notification should identify all agencies involved in the breach and include a central contact for further enquiries.

Agencies relying on section 56 should ensure they assess the data breach in terms of mitigating future or current risks, preventing future data breaches, and identifying if the data breach is also a breach of another law, or if they may have non-IP Act obligations to notify or mitigate.

Section 56 does not remove the agency's obligation to update its data breach register with details of the breach.

Inconsistency with confidentiality and secrecy provisions

Most agencies are subject to confidentiality or secrecy provisions in addition to their obligations under the IP Act. These may be contained in agency-specific legislation or in laws that apply to certain kinds of information, regardless of who holds it, or certain actions or functions, regardless of who undertakes them.

Under section 58, if notifying individuals or the Commissioner would be inconsistent with a provision of a Commonwealth or State Act that prohibits or regulates the use or disclosure of the information, agencies are not required to notify in relation to that information.

Careful consideration must be given to the relevant provision and its specifics to determine if and how much of the information required by section 52 or 53 would breach the relevant provisions if it was provided to individuals or the Commissioner. If an agency can provide some of the required information without breaching the relevant provisions, the exemption will not apply to that information.

  • 1 Agency includes a Minister.
  • 2 Information about an identified or identifiable individual. Refer to section 12 of the IP Act and Key privacy concepts – personal and sensitive information for more information.
  • 3 The application of the MNDB scheme to local governments is delayed until 1 July 2026. Until that time, local government agencies should refer to Privacy breach management and notification for local government.
  • 4 Which are based on and include material from guidelines developed by the NSW Information and Privacy Commission.
  • 5 Sections 51 and 53 of the IP Act.
  • 6 International Standard: IECT/TS 62443-1-1 ed. 1.0, as quoted in the Queensland Government Cyber Security Hazard Plan, page 6.
  • 7 Under section 48(5).
  • 8 Under section 48(2)(b) and (3).
  • 9 Section 56(1)(b).

Current as at: July 31, 2025