Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Whether you run a clinic, a SaaS startup, an e‑commerce store or a professional services firm, there’s a good chance you’re handling information people consider highly private. With privacy complaints, cyber incidents and regulator scrutiny on the rise, knowing what counts as “sensitive information” in Australia - and treating it correctly - is essential.
If you’re unsure where the lines are, you’re not alone. In this guide, we’ll break down what sensitive information means under the Privacy Act, practical examples you’ll see day to day, when the rules apply to small businesses, and the steps you can take to stay compliant and build trust.
By the end, you’ll have a clear checklist for collecting, storing and sharing sensitive data safely and lawfully in Australia.
What Is “Sensitive Information” Under Australian Law?
Australian privacy law draws a clear distinction between general personal information and “sensitive information”. Both relate to an identifiable individual, but the latter is given extra protection because mishandling it could cause serious harm to a person’s privacy, dignity or safety.
Under the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs), sensitive information includes specific categories of personal information such as health data, biometric templates, and details about someone’s beliefs or affiliations. Because it’s more intrusive, you generally need express consent to collect it and stronger safeguards to protect it.
Two quick definitions to ground the rest of this guide:
- Personal information: Information or an opinion about an identified person, or a person who is reasonably identifiable (for example, full name, email, phone number, or IP address linked to a profile).
- Sensitive information: Certain types of personal information that the Privacy Act lists as more private and therefore more strictly regulated (see examples below).
Examples Of Sensitive Data You Might Handle
While a customer’s name or shipping address is personal information, it’s not automatically sensitive. Here are the categories that are treated as sensitive information in Australia, with practical examples you may encounter.
Health Information
Health information is one of the most commonly handled types of sensitive information, and it attracts additional obligations. This can include medical histories, diagnoses, pathology results, prescriptions, injury reports, disability information, and health service bookings.
In practice, that might be a physiotherapy clinic’s patient records, a workplace injury report, Telehealth intake forms, or a fitness app’s health questionnaire.
Genetic Information
Genetic information that is not otherwise health information is also sensitive information - for example, a raw DNA sequence held by a research platform, where it could be used to identify an individual. If genetic data predicts a person’s health (such as a genetic predisposition recorded in a medical file), it will generally fall under health information as well.
Biometric Information And Biometric Templates
Biometric information used for automated verification or identification - like facial recognition scans or fingerprint data - and biometric templates derived from that information are sensitive. Think: facial recognition to unlock an office door, or voiceprints used to verify callers in a call centre.
Racial Or Ethnic Origin
Information about a person’s race or ethnicity, such as responses in a diversity survey or equal opportunity monitoring form.
Religious Or Philosophical Beliefs
Details of a person’s religious observance, faith-based memberships, or philosophical views collected in the course of service delivery or employment.
Political Opinions, Affiliations And Union Membership
Political views, party memberships, union affiliation, or donation records. For example, if your platform manages union membership subscriptions, you’re handling sensitive information.
Sexual Orientation Or Practices
Sexual orientation, gender identity or details about a person’s sexual practices, including information gathered for employee benefits or inclusivity programs.
Criminal Record
Information about convictions or charges, such as police check results for job candidates or volunteers.
If your business runs police checks, uses face recognition, collects health questionnaires, records diversity data, or manages union subscriptions, you’re very likely handling sensitive information and the stricter APP rules will apply.
Does The Privacy Act Apply To My Small Business?
Many smaller businesses assume privacy law only applies to “big tech” or enterprises. That’s not quite right - but the detail matters. The Privacy Act generally applies to organisations with an annual turnover of more than $3 million. However, there are important exceptions where it applies to small businesses below that threshold.
When Small Businesses Must Still Comply
- Health service providers: If you provide a health service and hold health information (for example, allied health, counselling, Telehealth, NDIS services), the Privacy Act applies regardless of turnover.
- Trading in personal information: If you buy, sell or disclose personal information for a benefit, service or advantage (such as selling marketing lists), you’re covered.
- Credit reporting participants: If you’re a credit reporting body or certain credit providers handling credit eligibility information, the Privacy Act (including Part IIIA and the CR Code) applies.
- Commonwealth contracts: If you’re a contractor to a Commonwealth agency and you handle personal information under that contract, you must comply.
- Tax file number recipients: If you hold TFN information, you must comply with TFN rules and protect that information appropriately.
Simply “operating online” does not automatically make you subject to the Privacy Act. Instead, check your turnover and the exceptions above. Even if you’re exempt, adopting best‑practice privacy safeguards is still good risk management and often expected by customers.
State And Territory Health Privacy Laws
Alongside the federal Privacy Act, some states and territories have their own health privacy laws that may apply to private sector health providers. For example, New South Wales and Victoria have health records legislation that sets additional rules for handling health information. If you operate a private health service in those jurisdictions, you should factor those obligations into your compliance plan.
Your Key Legal Obligations When Handling Sensitive Information
If the Privacy Act applies to you, expect stricter rules for sensitive information than for other personal information. Here’s a plain‑English summary of the big-ticket items to focus on.
1) Get Valid, Express Consent (With Limited Exceptions)
You will generally need the individual’s express consent to collect sensitive information. Consent should be informed, voluntary, specific and current. There are limited exceptions (for example, where required by law, to prevent a serious threat to life, health or safety, or certain permitted health research scenarios), but the starting point is express consent.
Make consent clear and unambiguous - for instance, a dedicated tick box with a short explanation about what you’re collecting and why, accompanied by your Privacy Collection Notice and Privacy Policy.
2) Be Transparent And Limit Use To The Purpose
Say what you collect, why you collect it, who you share it with, and how long you keep it. Only use or disclose sensitive information for the purpose you collected it (or a directly related purpose the person would reasonably expect), unless another APP exception applies or you obtain fresh consent.
3) Secure It Appropriately
Sensitive information requires strong security. That means access controls (role‑based permissions, least privilege), encryption in transit and at rest where feasible, vigilant credential and logging practices, secure disposal, and regular reviews. Consider documenting your approach in an Information Security Policy and training staff regularly.
4) Respect Access And Correction Rights
Individuals can ask to access or correct their information. Build a simple process to handle these requests promptly and securely, including identity verification and a clear communication pathway.
5) Prepare For The Notifiable Data Breaches (NDB) Scheme
If a data breach involving sensitive information is likely to cause serious harm, you must assess quickly and, if criteria are met, notify affected individuals and the Office of the Australian Information Commissioner (OAIC). A tested Data Breach Response Plan helps your team respond fast and lawfully.
6) Understand The Employment Records Exemption (And Its Limits)
Private sector employers may rely on a limited exemption for employee records that are directly related to the employment relationship. It doesn’t cover job applicants or contractors, and it doesn’t override obligations under other laws (for example, workplace or health and safety requirements). Many businesses choose to adopt privacy best practice across all workforce data for consistency and trust.
Practical Steps To Protect Sensitive Information
Every business is different, but these actions will put you on solid footing.
Map What You Hold
Start with a data inventory. Identify what sensitive information you collect, where it lives (systems, spreadsheets, inboxes), who accesses it, how long you keep it, and who you share it with. This makes it easier to tighten controls, establish retention periods and meet transparency obligations. If you’re planning a new system or feature, a lightweight Privacy Impact Assessment helps you identify risks early.
Tighten Collection And Consent
Collect only the sensitive information you genuinely need. Use clear prompts, short explanations and explicit consent mechanisms. Make sure consent is not bundled or buried - people should be able to say yes to what’s actually necessary for your service.
Lift Your Security Baseline
Adopt secure defaults: strong authentication (ideally MFA), role‑based access, encryption at rest where feasible, segregated environments, vulnerability patching and regular backups with restore testing. If a vendor hosts or processes sensitive information for you (for example, a cloud platform or outsourced HR system), put a Data Processing Agreement in place and assess their security posture.
Set Clear Policies And Train Your Team
Document the “how” for staff and contractors. Your policies should cover data handling, incident reporting and acceptable use. Many businesses bundle this guidance into a practical Staff Handbook and reinforce it through onboarding and refresher training.
Define Retention And Disposal
Don’t keep sensitive information longer than you need it. Set retention periods that align with your legal and business needs and then securely delete or de‑identify. If you’re unsure how long you should keep things, this overview of data retention laws in Australia is a helpful starting point.
Prepare For Incidents
Run a tabletop exercise using your Data Breach Response Plan. Practising roles, decision points and communications in advance drastically cuts response time and risk if something does go wrong.
Use Contracts To Manage Risk
When you share sensitive information with suppliers or partners, back it up with the right paperwork. An NDA helps preserve confidentiality during discussions, while your service contracts and Data Processing Agreement can lock in security, breach notification and sub‑processor controls.
Industry-Specific Points To Watch
Some sectors have extra layers to consider alongside the Privacy Act. A few common examples:
- Health services (including NDIS providers and health tech): You will generally be covered by the Privacy Act regardless of turnover and, in some jurisdictions, state health records legislation too. Tailor your Privacy Policy for health services so it clearly addresses health information handling.
- Financial services and credit: If you participate in consumer credit reporting, Part IIIA of the Privacy Act and the CR Code impose specific rules for “credit information” and “credit eligibility information”. Note this is separate from obligations under the National Consumer Credit Protection Act (which primarily regulates credit activities rather than privacy).
- Education and childcare: Sensitive information often includes health data and criminal record checks (for example, working with children clearances). Check sector‑specific guidance in your state or territory.
- Workplaces using biometrics: If you use biometrics for time and attendance or site access, treat those templates with the heightened protection they require, and provide a clear explanation and consent pathway.
Common Mistakes (And How To Avoid Them)
We regularly see the same issues crop up. Here’s how to sidestep them.
- Bundled or vague consent: Don’t rely on a generic “I agree” checkbox for sensitive information. Keep consent specific to the sensitive data you’re collecting.
- Over‑collection: If you don’t need a piece of sensitive information to provide your service, don’t ask for it. Less data means lower risk.
- Unclear notices: If your collection notices are long or generic, people won’t understand what’s happening. Use plain English and link to your Privacy Collection Notice and Privacy Policy.
- Weak access control: Staff access to sensitive information should be on a strict “need‑to‑know” basis. Remove access when roles change.
- No vendor oversight: If a supplier processes sensitive information for you, make sure their contract covers security, breach reporting and sub‑processors, preferably via a Data Processing Agreement.
- Keeping data forever: Set retention periods and securely dispose of sensitive information when it’s no longer required.
What To Do If There’s A Data Breach Involving Sensitive Information
Act fast, follow your plan, and document decisions. In short:
- Contain and assess: Stop the leak, preserve evidence and quickly assess whether the breach is likely to cause serious harm (which is more likely when sensitive information is involved).
- Decide on notification: If the criteria for an eligible data breach are met, notify affected individuals and the OAIC as soon as practicable. Provide practical steps for people to protect themselves.
- Learn and improve: After the incident, strengthen controls, update procedures and training, and review vendor arrangements if relevant.
Having a rehearsed Data Breach Response Plan saves precious time and reduces legal and reputational risk.
Key Takeaways
- Australia’s Privacy Act gives extra protection to sensitive information such as health data, biometric templates, criminal records, and details about beliefs, affiliations, sexual orientation or ethnicity.
- Small businesses under $3 million turnover can still be covered - especially health service providers, businesses that trade in personal information, credit reporting participants, Commonwealth contractors and TFN recipients.
- Collect sensitive information only with express consent (unless a limited exception applies), be transparent about why you collect it, and restrict use and disclosure to the stated purpose.
- Implement stronger security, access controls and retention rules for sensitive information, supported by practical policies, staff training and vendor contracts.
- Prepare for the Notifiable Data Breaches scheme with a clear, tested incident response process and make sure your contracts include breach reporting obligations.
- Core documents like a Privacy Policy, Privacy Collection Notice, Data Breach Response Plan, NDA and a Data Processing Agreement help you operationalise compliance and reduce risk.
If you’d like a consultation on managing sensitive data in your business and meeting your privacy obligations, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no‑obligations chat.








