Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you’re running a business in Australia, you’re probably collecting customer details every day - from online enquiry forms and checkout pages to newsletter sign-ups and support tickets.
That information is often called “PII.” In Australia, the law uses the term “personal information,” and it sets clear rules for how you must collect, use and protect it.
This guide explains what counts as PII in the Australian context, which laws apply, and a practical, step-by-step way to protect your customers’ data and your business. If you want a simple roadmap to compliance that you can put into practice, you’re in the right place.
What Does “PII” Mean Under Australian Law?
PII (personally identifiable information) is a broad, global term. In Australia, the Privacy Act 1988 (Cth) is the main law that applies, and it uses “personal information.”
Personal information is information or an opinion about an identified person, or a person who is reasonably identifiable. It doesn’t matter whether the information is true, or whether it’s recorded in a material form.
That covers obvious details such as names, email addresses and phone numbers - and also less obvious data that can identify someone, such as an IP address linked to a user account, a photo, location data, purchase history, or notes customer support has recorded about an individual.
Sensitive Information
Some information is treated as more private and needs extra care. The Privacy Act calls this “sensitive information” and it includes health information, racial or ethnic origin, political opinions, religious beliefs, sexual orientation and criminal records. Generally, you’ll need consent to collect it, and stricter rules apply to how you use and store it.
Small Business Exemptions (And When They Don’t Apply)
As a general rule, the Privacy Act applies to Australian businesses and not-for-profits with annual turnover over $3 million.
However, many small businesses must still comply regardless of turnover, including if you:
- provide a health service and hold health information,
- trade in personal information (for example, sell or buy customer lists),
- are a credit reporting body,
- are a contractor to a Commonwealth agency, or
- handle tax file numbers (TFNs) and similar regulated datasets.
Even if you’re technically exempt, your customers still expect you to respect their privacy - and implementing privacy best practice early makes growth and compliance much easier.
Why Getting PII Right Matters For Your Business
Customers choose brands they trust with their data. Strong privacy practices reduce the risk of breaches, complaints and reputational damage - and help you meet your legal obligations.
Australia’s Notifiable Data Breaches (NDB) scheme requires you to assess suspected data breaches, and notify affected individuals and the Office of the Australian Information Commissioner (OAIC) if there’s a likely risk of serious harm. Handling a breach is far easier if you’ve planned ahead and your team knows what to do.
Good privacy compliance is not just about avoiding penalties - it’s about creating a better customer experience, improving data quality, and building a resilient business.
Which Laws Apply To PII In Australia?
Several laws can apply to the way you collect, use and disclose personal information. The key ones most Australian businesses should consider are below.
The Privacy Act 1988 And The Australian Privacy Principles (APPs)
The Privacy Act sets out 13 Australian Privacy Principles (APPs) that regulate the lifecycle of personal information - from collection and use, to disclosure, security, access and correction.
In practice, most businesses that are covered by the Privacy Act will need to:
- be transparent about data handling and publish a clear, accessible Privacy Policy,
- collect only what’s reasonably necessary for your functions and do so fairly,
- use and disclose data only for the purpose you collected it (or a related purpose the person would reasonably expect), unless you have consent or another legal basis,
- take reasonable steps to keep information secure and destroy or de-identify it when it’s no longer needed, and
- respond to access and correction requests within a reasonable period.
Spam And Direct Marketing
If you send electronic marketing messages, the Spam Act 2003 sets rules around consent, sender identification and unsubscribe functionality. This sits alongside the APPs, which also regulate direct marketing using personal information. For a practical overview of marketing compliance, see this guide to email marketing laws.
State And Territory Privacy And Health Records Laws
Most state and territory privacy laws primarily regulate public sector bodies. However, private businesses that handle health information may be covered by health records laws in some jurisdictions (for example, private sector health services in Victoria and New South Wales). If you operate in health or allied health, check whether health records legislation applies in addition to the Privacy Act.
Cross-Border Data Transfers (APP 8)
If you send personal information overseas - for example, by using an offshore CRM, cloud storage or email service - APP 8 requires you to take reasonable steps to ensure the overseas recipient will handle the information in a way that’s consistent with the APPs. This cross-border obligation is a common compliance gap, so it’s worth reviewing your vendor list and reading through this APP 8 cross‑border data sharing guide.
When Does The GDPR Apply?
The EU’s General Data Protection Regulation (GDPR) can apply to Australian businesses if you have an establishment in the EU, or if you offer goods or services to people in the EU or monitor their behaviour in the EU. It’s not triggered merely because you “deal with EU citizens” in general - it’s about where the individual is located and whether you’re targeting or monitoring them. If GDPR applies, you’ll need to meet additional requirements (for example, lawful bases, DPOs in some cases, and international transfer rules). Sprintlaw offers a practical GDPR package if you need to align with both frameworks.
Australian Consumer Law (ACL)
Your privacy representations must not be misleading or deceptive under the Australian Consumer Law. If you say you encrypt data, store it in Australia, or delete it on request, make sure those statements match your actual practices. For specific advertising conduct, see common issues under section 18 of the ACL.
How To Handle PII Safely: A Practical Step‑By‑Step
If you’re wondering where to start, this sequence helps you move from “we collect data” to “we collect data safely and lawfully.”
1) Map Your Data
List the types of personal information you collect (customers, employees, contractors), where it’s stored, who can access it, and who you share it with.
Include website analytics, cookies, and any identifiers that could make a person reasonably identifiable when combined with other data.
2) Define Purposes And Minimise Collection
For each data type, write down why you collect it and whether it’s necessary for your functions. Remove fields from forms you don’t truly need. If it’s sensitive information, consider whether you have a clear, lawful reason to collect it and how you’ll obtain consent.
3) Update Your Privacy Notices
Make your data handling transparent. Most businesses need both a public-facing Privacy Policy and a concise Privacy Collection Notice presented at the point of collection (for example, near a web form). Keep these documents consistent with your actual practices.
4) Secure The Information (APP 11)
Take reasonable steps to protect personal information from misuse, interference and loss, and from unauthorised access, modification or disclosure. Practical controls often include:
- role‑based access and multi‑factor authentication,
- encrypting devices and backups,
- vendor due diligence and least‑privilege access,
- secure disposal and data retention schedules, and
- staff training and acceptable use rules.
It’s a good idea to formalise these controls in an Information Security Policy so your team knows what “good security” looks like day to day.
5) Prepare For Incidents
Security incidents happen. Under the NDB scheme, you’ll need processes to assess suspected breaches and notify where required. While a plan is not generally mandated by the Privacy Act itself, having a Data Breach Response Plan is widely considered a reasonable step and often expected by regulators and business partners.
6) Manage Third Parties And Cross‑Border Transfers
Review your suppliers (SaaS tools, cloud storage, marketing platforms) and confirm where data is stored or accessed from. Put appropriate privacy and security clauses in your contracts, and consider a Data Processing Agreement if a vendor processes personal information for you.
7) Handle Access And Correction Requests
Build a simple process to verify the requester, locate their data, and respond within a reasonable time. Keep a record of requests and your responses.
8) Review Regularly
Revisit your data map, notices, and security controls at least annually or whenever your business model, technology stack or vendors change.
Documents And Controls That Help You Comply
The right documents make your obligations clear, guide your team and set expectations with customers and suppliers. Consider:
- Privacy Policy: a public statement of how you collect, use, disclose and secure personal information, aligned to the APPs. Start with a tailored Privacy Policy that matches your actual practices.
- Privacy Collection Notice: a short notice at the point of collection that explains what you’re collecting, why, and who you may share it with; a practical collection notice helps you be transparent.
- Information Security Policy: sets baseline security controls (access, passwords, device use, incident response); see a structured Information Security Policy.
- Data Breach Response Plan: allocates roles, outlines triage steps, and includes NDB assessment and notification templates; a clear response plan reduces confusion in a crisis.
- Data Processing Agreement (DPA): contract terms with processors covering security, confidentiality, sub‑processors, and international transfers; a standardised DPA will streamline vendor onboarding.
- Website Terms & Conditions: rules for using your site and disclaimers; these complement your privacy disclosures (see Website Terms & Conditions).
- Internal Procedures: checklists for access requests, correction requests, complaints and record‑keeping; consider adding a privacy complaints workflow supported by a privacy complaint handling procedure.
Not every business needs every item listed above on day one, but most will need several. The key is to make sure your documents reflect how your business actually operates.
Common Pitfalls To Avoid
- Copy‑pasting policies: generic policies rarely match your tech stack or workflows. Tailor them to your practices.
- Over‑collection: asking for unnecessary data increases risk without adding value. Trim your forms.
- Shadow IT: unapproved apps quietly collecting personal information can undermine compliance. Keep an up‑to‑date vendor list.
- Unclear consent: pre‑ticked boxes and bundled consents can cause issues. Keep consent specific and easy to withdraw.
- Set‑and‑forget: privacy is ongoing. Schedule reviews and training.
Key Takeaways
- In Australia, “PII” aligns with “personal information” under the Privacy Act - anything that can reasonably identify a person, with extra rules for sensitive information.
- The Privacy Act and APPs, Spam Act, health records laws (for some health providers), APP 8 cross‑border rules, and the ACL can all apply to how you handle customer data.
- GDPR may apply if you’re established in the EU or you target or monitor individuals in the EU - it’s about location and targeting, not citizenship alone.
- A practical program covers data mapping, purpose limitation, clear privacy notices, reasonable security, incident response, third‑party management, and regular reviews.
- Helpful tools include a tailored Privacy Policy, a concise Collection Notice, an Information Security Policy, a Data Breach Response Plan, strong Website Terms & Conditions and robust processor terms.
- Even small businesses benefit from privacy best practice - it builds trust, reduces risk and prepares you for growth and regulatory change.
If you would like a consultation on PII compliance for your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








