What you need to know

  • The Australian Privacy Act 1988 is a federal law that regulates the handling of personal information by Australian government agencies and businesses.

  • The Act sets out the Australian Privacy Principles (APPs), which are a set of 13 privacy principles that organizations must follow when collecting, using, storing, and disclosing personal information.

  • Under the Privacy Act, personal information is defined as any information or opinion about an identified individual or an individual who is reasonably identifiable, whether the information is true or not and whether it is recorded in a material form or not.

  • The Privacy Act applies to all Australian government agencies and private sector organizations with an annual turnover of more than AUD $3 million (about USD $2 million), as well as some small businesses, health service providers, and other organizations.

  • Overall, the Privacy Act Australia is designed to protect individuals' privacy and ensure that organizations handle personal information in a responsible and transparent manner.

  • The Australian Privacy Act was first introduced in 1988? It has since undergone several amendments to keep up with changes in technology and society.

  • The Privacy Act applies to most private sector organizations, as well as all Australian government agencies and some non-government organizations?

  • The Australian Privacy Act regulates the transfer of personal information outside of Australia, and requires organizations to ensure that any overseas recipients of personal information comply with the APPs?

  • The Australian Privacy Commissioner has the power to investigate complaints, conduct assessments of privacy practices, and take enforcement action against organizations that breach the Privacy Act?

Key Benefits of comforte’s Australian Privacy Act Compliance services

The comforte Data Security Platform provides data discovery, classification and protection capabilities to help you:


sensitive data by implementing data encryption, tokenization, and masking techniques


data securely between different systems and locations


individuals with access to their personal information while protecting the privacy of other individuals by using data masking techniques


for and respond to data breaches, including: implementing data breach response plans, conducting breach simulations, and providing employee training

FAQs on Australian Privacy Act Compliance

Next steps


If you would like to learn more about compliance with the Australian Privacy Act, please feel free to get in touch with our experts who would be happy to discuss solutions.


Contact us