Authored by Lindsay O’Connor , General Manager Content Pacific & Content Strategy APAC For years, legal technology has promised greater efficiency. Firms have invested in research platforms, document...
The use of artificial intelligence in legal practice continues to mature. While early adoption focused on discrete applications such as drafting assistance, document summarisation, and research support...
This blog was originally published in 2025 and has been updated in March, 2026 to reflect Protégé General AI’s updates. As AI becomes more common in legal practice, many professionals are discovering...
This blog was originally published in 2020 by Professor Sharon Christensen, Queensland University of Technology, and has been updated in the Australian Property Law Bulletin in 2026 to reflect current...
Authored by Alison Cripps , Head of Workplace, In-House and Technology, Practical Guidance “It’s just a smart precinct pilot - nothing major.” Two meetings later, the diagram tells a different story...
Privacy by design is a practical framework that aims to “embed” privacy into the design and architecture of information systems, business processes and networked infrastructure. It aims to ensure that privacy is considered before, at the start of, and throughout the development and implementation of initiatives, projects and products and services that involve the collection and handling of personal information.
Privacy by design is a “best practice” approach to privacy governance and an essential tool for moving towards “data resilience”.
Implementing a robust privacy by design approach is a practical way to ensure compliance with key Australian Privacy Principles (APPs), however, it will also effectively help mitigate cybersecurity risks including to minimise the impact of a cybersecurity incident and allow your client or business to (potentially) continue to operate effectively during a cybersecurity event.
The Australian Government Agencies Privacy Code (the Code) was registered on 27 October 2017 and commenced on 1 July 2018. The Code sets out specific requirements and key practical steps that Australian Government agencies must take as part of complying with Australian Privacy Principle 1.2.
The Code requires agencies to move towards a best practice approach to privacy governance to help build a consistent, high standard of personal information management across all Australian Government agencies.
There are seven internationally recognised foundational principles of privacy by design. These should be considered in all business projects and decisions that involve personal information:
Below are some basic steps you can take to ensure that your organisation or client is taking a privacy by design approach:
APP 11.1 states that an APP entity that holds personal information must take reasonable steps to protect the information from misuse, interference and loss, as well as unauthorised access, modification or disclosure. What constitutes “reasonable” steps will depend on the circumstances of collection and factors such as the amount and sensitivity of the personal information held and the possible adverse consequences for an individual in the case of a breach.
However, the Office of the Australian Information Commissioner has published the Guide to securing personal information which includes detailed information regarding what could constitute “reasonable steps”. While the Guide to securing personal information is not legally binding, it is very prescriptive. Accordingly, if an APP entity has in place the measures described in the Guide to securing personal information, it would help in ensuring compliance with APP 11.1 if it were ever under investigation.
Appropriate security measures for protecting personal information need to be considered in regard to all of your entity’s acts and practices. Taking a whole of business collaborative approach and adopting a “privacy by design” approach is essential with clear procedures for oversight, accountability and lines of authority for decisions regarding personal information security established.
To read the full guidance notes ‘Understanding personal data’ and ‘Securing personal information across the information life cycle’, subscribe to Practical Guidance Cybersecurity, Data Protection & Privacy module.