Australia · Office of the Australian Information Commissioner (OAIC)
Privacy Act / APPs

Privacy Act & Australian Privacy Principles

The 13 Australian Privacy Principles (APPs) govern how APP entities handle personal information under the Privacy Act.

Status · Privacy Act 1988 (Cth), as amended

What Privacy Act / APPs actually is.

The Privacy Act 1988 sets out how Australian Privacy Principles entities - most Commonwealth agencies and private-sector organisations with turnover above $3M (and specific exceptions below that) - must handle personal information. The 13 APPs cover collection, use and disclosure, data quality, security (APP 11), access and correction, and cross-border transfers. APP 11 is the control-level expectation that has teeth for cybersecurity programs: entities must take reasonable steps to protect personal information from misuse, interference, loss, unauthorised access, modification or disclosure.

Applies to

Australian Government agencies, private-sector organisations over $3M turnover, and specific classes of entity regardless of turnover (health service providers, credit reporters, residential tenancy databases, businesses trading in personal information).

Key requirements

The control areas the framework covers.

Summary of the control families and outcomes the framework drives. Always validate against the official publication for the authoritative wording.

  1. 01

    APP 1 – Open and transparent management

    Have a clearly expressed, up-to-date privacy policy.

  2. 02

    APP 3 – Collection of personal information

    Collect only personal information reasonably necessary for functions or activities.

  3. 03

    APP 6 – Use or disclosure

    Use personal information only for the primary purpose, or a related secondary purpose the individual would reasonably expect.

  4. 04

    APP 8 – Cross-border disclosure

    Take reasonable steps to ensure overseas recipients meet APP standards.

  5. 05

    APP 11 – Security of personal information

    Reasonable steps to protect personal information and to destroy or de-identify it when no longer needed.

Official source

Read it from the issuing body.

For anything with a regulator or certification body behind it, the authoritative text is what counts - not our summary.

Security, engineered around you.

Talk to an engineer - not a call centre. Most Vectra conversations start with a 30-minute technical briefing and end with a written plan.