Office of the Australian Information Commissioner - Home

Australian Government - Office of the Australian Information Commissioner
Australian Government - Office of the Australian Information Commissioner

Main menu

Summary of version changes to APP guidelines

Chapter A: Introductory matters
VersionCurrency datesChanges and other comments
pdfv1.0125.36 KB 21-Feb-2014 to 31-Mar-2015  
v1.1 1-Apr-2015 to …
  • Inclusion of new [A.4] and [A.29]–[A.32] to explain that the APP guidelines may provide relevant guidance to Australian Capital Territory public sector agencies.
Chapter B: Key concepts
VersionCurrency datesChanges and other comments
pdfv1.0306.9 KB 21-Feb-2014 to 28-Feb-2014  
pdfv1.1917.8 KB 1-Mar-2014 to 31-Mar-2015
  • Amended text to reflect Privacy Act amendment to definition of sensitive information re; sexual orientation... [B.132]
v.1.2 1-Apr-2015 to…
  • Clarified the circumstances in which small business operators are treated as organisations and therefore APP entities ([B.7])
  • Revised and expanded discussion about ‘carries on business in Australia’, a component of the test for whether an APP entity has an ‘Australian link’ ([B.13–B.21])
  • Small clarifications to the discussion about ‘disclosure’, including the addition of a new footnote reference to an AAT decision ([B.64] and [B.68])
  • Minor stylistic change ([B.104])
  • Updated discussion about ‘sensitive information’ to explain that information may be sensitive information where it clearly implies one of the matters listed in the definition of ‘sensitive information’ in s 6(1) ([B.139])
Chapter C: Permitted general situations
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter D: Permitted health situations
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 1: APP 1 — Open and transparent management of personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 2: APP 2 — Anonymity and pseudonymity
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 3: APP 3 — Collection of solicited personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 4: APP 4 — Dealing with unsolicited personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 5: APP 5 — Notification of the collection of personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 6: APP 6 — Use or disclosure of personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 7: APP 7 — Direct marketing
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 8: APP 8 — Cross-border disclosure of personal information
VersionCurrency datesChanges and other comments
pdfv1.0193.79 KB 21-Feb-2014 to 31-Mar-2015  
v1.1 1-Apr-2015 to …
  • Revised discussion of the circumstances where an APP entity may be taken to breach the APPs, when it provides personal information to an overseas contractor as a ‘use’, and the information is mishandled overseas ([8.15])
  • Revised and expanded discussion about the circumstances in which the ‘international agreement’ exception in APP 8.2(e) applies ([8.47]–[8.51]).
  • Minor amendments to footnotes to correct website references ([8.1], [8.21])
Chapter 9: APP 9 — Adoption, use or disclosure of government related identifiers
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 10: APP 10 — Quality of personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 11: APP 11 — Security of personal information
VersionCurrency datesChanges and other comments
pdfv1.0190.81 KB 21-Feb-2014 to 31-Mar-2015  
v1.1 1-Apr-2015 to…
  • New reference to the OAIC Guide to securing personal information (2015) [Key point 3, [11.10] and ([11.34])
  • Consolidation and amendment of discussion, about relevant considerations in taking ‘reasonable steps’, for consistency with OAIC Guide to securing personal information (2015) ([11.7]–[11.10])
  • Minor stylistic changes ([11.11 and 11.42])
  • Small clarifications to examples of ‘loss’, ‘unauthorised access’, ‘unauthorised modification’ and ‘unauthorised disclosure’ including in footnotes ([11.15]–[11.21])
  • Minor amendment to footnote to correct reference to Australian Government Information Security Manual and to Australian Signals Directorate website ([11.37])
Chapter 12: APP 12 — Access to personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...  
Chapter 13: APP 13 — Correction of personal information
VersionCurrency datesChanges and other comments
v1.0 21-Feb-2014 to ...