Australian Government Architecture
Search

Privacy protection standard

The Australian Government ensures the safety and security of its operations to remain a trusted custodian of sensitive information. This standard is designed to ensure that personal information of individuals is handled in a manner that is consistent with legislative and regulatory frameworks. This helps enhance trust in government, promote transparency, and foster a culture of privacy awareness.

It is critical this standard be considered alongside those of related capabilities:

  • Application Security
  • Information Asset Security
  • Network Security
  • Permissions

Comply with legislation

Entities must:

  • comply with relevant Commonwealth legislation including (but not limited to):
    • Privacy Act 1988 (Cth) 
    • Archives Act 1983 (Cth)
    • Freedom of Information Act 1982 (Cth)
  • adhere to the principles-based law of the Australian Privacy Principles (APPs)
  • comply with any other legislation applicable to specific functions and circumstances.

Entities should:

  • utilise the Office of the Australian Information Commissioner (OAIC) APP guidelines to assist in applying the APPs
  • seek independent legal advice where appropriate.

Align to guidelines and standards

Entities must:

Entities should:

Be private-by-design

Entities should:

  • embed privacy practices into the design and implementation of solutions
  • develop and maintain robust governance and reporting
  • ensure protocols, procedures, and technology solutions adapt to changing privacy laws, technologies, opportunities, and threats
  • foster a culture of privacy awareness through training and governance
  • follow OAIC’s Privacy by Design guidance.

Take a proactive approach to privacy risks and incident responses

Entities must:

  • undertake a Privacy Impact Assessment (PIA) for all high privacy risk projects
  • periodically review PIAs to reflect changes in technology and data usage
  • implement mechanisms to detect, report, and respond to data breaches in line with the Notifiable Data Breaches (NDB) scheme.

Entities should:

Adhere to reuse principles

The Australian Government Architecture provides information for entities on Reuse.

Entities should:

  • compare their requirements with those of other comparable entities and system functions, and seek to reuse learnings from preceding implementations
  • consider specific functional and non-functional requirements prior to solution design or consideration of technology choice, including:
    • volume and nature of information assets
    • broader system purpose
    • performance and availability requirements
    • privacy/sensitivity concerns
  • meet the requirements of the Digital and ICT Reuse Policy.
Was this information helpful?

Do not include any personal information. We are unable to respond to comments or feedback. If you would like a response, please email, or phone us. Our details are on the AGA contact page www.architecture.digital.gov.au/contact-us.