Skip to content
BISTEC IT Services
Definition

What is Privacy Act 1988 (Cth)?

The Privacy Act 1988 (Cth) is the Australian federal law governing how organisations collect, use, store, and disclose personal information. It is administered by the Office of the Australian Information Commissioner (OAIC) and includes the Notifiable Data Breaches (NDB) scheme, which since February 2018 has required organisations to notify affected individuals and the OAIC of eligible data breaches likely to result in serious harm. The Act sets out the 13 Australian Privacy Principles (APP 1 to APP 13) covering open management of personal information, collection, use and disclosure, data quality and security, access and correction, and cross-border disclosure. It applies across financial services, accounting, legal, healthcare and most APP entities.
Last reviewed: May 2026

Privacy Act 1988 (Cth)

Privacy Act + NDB scheme alignment.

Australian Privacy Principles mapping. Notifiable Data Breaches readiness. Cross-vertical.

Cross-vertical experience — financial services, accounting, legal, healthcare. The Privacy Act is the floor; sector frameworks sit alongside.

The problem

Most mid-market organisations have a privacy policy on the website and assume they are covered. The OAIC sees a different picture. Recent enforcement and the ongoing Privacy Act review have raised the floor: organisations now need documented APP-by-APP control mapping, a tested NDB notification playbook, and clear handling of cross-border data flows (APP 8) — particularly for cloud platforms, support providers and analytics tools that hold or process personal information overseas.

The hardest patterns we see

  • APP 11 (security)Generic "we use industry-standard security" language with no documented control mapping.
  • APP 8 (cross-border)Cloud and SaaS platforms hosted overseas without documented disclosure analysis or contractual safeguards.
  • NDB scheme readinessNo tested 30-day assessment playbook; no documented decision criteria for "likely to result in serious harm".
  • APP 1 (open management)Privacy policy on the website, but no internal privacy management plan or annual review.

Australian Privacy Principles to BISTEC delivery

Each of the 13 APPs paired with what we deliver. The Privacy Act is the floor; sector-specific frameworks (CPS 234, NDIS Quality & Safeguards, Law Society obligations) sit alongside it.

APPWhat it coversWhat BISTEC delivers
APP 1Open and transparent managementDocumented privacy management plan template; annual review cadence; integration with your ISMS
APP 2Anonymity and pseudonymityService desk and ticketing configuration to support pseudonymous access where required
APP 3Collection of solicited personal informationForm and intake-channel review; data-minimisation patterns
APP 4Unsolicited personal informationDocumented intake handling; retention rules in M365 / SharePoint
APP 5Notification of collectionNotification templates embedded in onboarding and intake flows
APP 6Use and disclosureAccess-control architecture; documented purpose-limitation logic
APP 7Direct marketingMarketing-platform integration; consent register
APP 8Cross-border disclosureCloud and SaaS hosting register; documented APP 8 analysis per third party; sub-processor location map
APP 9Government identifiersTax-file-number, Medicare and similar handling rules
APP 10Quality of personal informationMaster-data hygiene; documented correction process
APP 11SecurityISO 27001-aligned controls; Essential Eight ML2 baseline; senior security operations; documented incident response
APP 12AccessSubject-access request workflow; documented response timelines
APP 13CorrectionDocumented correction workflow integrated with APP 12

NDB scheme readiness

We deliver an NDB scheme playbook that includes:

  1. 01

    Eligible-breach assessment template

    Documented decision criteria for "likely to result in serious harm".

  2. 02

    30-day clock

    Documented timeline from suspicion of a breach to OAIC notification.

  3. 03

    Notification templates

    For OAIC and affected individuals, reviewed against current OAIC guidance.

  4. 04

    War-room runsheet

    Named decision-makers (CEO/COO, CISO, Head of Risk, Head of Legal/General Counsel, communications lead).

  5. 05

    Annual tabletop exercise

    Documented minutes — built to satisfy regulator inspection.

Why BISTEC

Why BISTEC for Privacy Act work

  • Sydney HQ. Senior security operations.
  • Cross-vertical experience — financial services (paired with CPS 234), accounting firms (Xero/MYOB/practice systems), law firms (privileged document handling under post-incident scrutiny), healthcare (My Health Record, NDIS Quality & Safeguards alignment).
  • ISO 27001 certified · Microsoft Solutions Partner · AWS Partner · Great Place to Work — Asia Top 30.
  • Privacy Impact Assessment delivery as ad-hoc project work.
  • Named lead, named delivery lead, no rotation onto larger accounts.

25-question diagnostic

Privacy Act Readiness Audit

A 25-question diagnostic across the 13 Australian Privacy Principles plus the NDB scheme. 30-minute completion. Outputs a prioritised gap list and a board-pack-ready summary. Free. Email-gated. Built from real cross-vertical engagements.

Frequently asked

  • The Privacy Act 1988 (Cth) is the Australian federal law that governs how organisations collect, use, hold, disclose and protect personal information. It applies to APP entities — Australian government agencies and most private-sector organisations with annual turnover above $3 million, plus health service providers and a small set of other categories regardless of turnover. It is administered by the Office of the Australian Information Commissioner (OAIC).