Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Handling sensitive information is one of the most important privacy responsibilities you’ll face as an Australian business owner. Get it right and you’ll build trust, reduce risk and meet your legal obligations. Get it wrong and you could face complaints, investigations, costly remediation, and serious damage to your reputation.
Privacy law can feel complex when you’re busy running a business. The good news is that with a clear understanding of what “sensitive information” is and a practical plan to manage it, you can turn compliance into a strength rather than a stress.
In this guide, we break down exactly what counts as sensitive information under the Privacy Act 1988 (Cth), when the law applies to your business, how consent works, and the key steps and documents you’ll need to protect this data from collection through to deletion.
What Counts As “Sensitive Information” In Australia?
Under the Privacy Act 1988 (Cth), “personal information” covers any information or opinion about an identified person (or someone who is reasonably identifiable). Within that, “sensitive information” is a special category that attracts stricter rules due to the risk of harm or discrimination if it’s mishandled.
Sensitive information includes the following categories:
- Health information (e.g. medical history, disability details, mental health information)
- Racial or ethnic origin
- Political opinions
- Membership of a political association
- Religious beliefs or affiliations
- Philosophical beliefs
- Membership of a professional or trade association
- Membership of a trade union
- Sexual orientation or practices
- Criminal record
- Biometric information that is to be used for automated biometric verification or identification
- Biometric templates
- Genetic information (including genetic information that is not otherwise health information)
Because of the potential for harm, the Australian Privacy Principles (APPs) impose tighter restrictions on when and how you can collect, use and disclose sensitive information, and require stronger security safeguards.
Does The Privacy Act Apply To My Business?
Most private sector organisations that are “APP entities” must comply with the APPs. In general, the Privacy Act applies to:
- Businesses and not-for-profits with an annual turnover of more than $3 million; and
- Certain small businesses under $3 million in turnover if they fall into specific categories (for example, health service providers, businesses that trade in personal information, credit reporting bodies, TFN recipients, and some contractors to the Commonwealth).
Importantly, many small businesses that handle health information are covered even if their revenue is below $3 million. If you operate in healthcare, disability support, fitness, wellness or similar sectors, assume the Act will likely apply.
There’s also an “employee records” exemption for private sector employers, but it’s narrow. It only applies to employee records held in relation to current or former employees and only where the handling is directly related to the employment relationship. It doesn’t cover applicants, contractors, customers, or records held outside that narrow context-so treat sensitive information with care across your wider operations.
If you’re unsure whether the Act applies to your business model or data practices, it’s worth getting tailored privacy advice early so you can set up the right processes from day one.
Collecting Sensitive Information: Consent And Lawful Grounds
Because sensitive information is high-risk, the threshold for lawful collection is higher than for other personal information.
When Can You Collect Sensitive Information?
Under APP 3, an APP entity must not collect sensitive information unless:
- You have the individual’s consent and the information is reasonably necessary (or, for some organisations, directly related) to your functions or activities; or
- An exception applies (for example, the collection is required or authorised by Australian law, necessary to reduce or prevent a serious threat to life, health or safety, for the establishment or defence of a legal claim, for locating a missing person, or in certain permitted health situations).
Two points to keep in mind:
- “Consent” under the Privacy Act must be voluntary, informed, current and specific, and given by someone with capacity. Express consent (e.g. a clear tick box or signed form) is best practice for sensitive information. Implied consent can be recognised in limited circumstances, but it’s harder to demonstrate and riskier, so we recommend express consent wherever practicable.
- Collect the minimum amount you need, for a clearly stated purpose. If the purpose changes later, you may need fresh consent.
Making Consent Practical In Your Business
In everyday operations, make consent straightforward and unambiguous. For example:
- Use plain language to explain what sensitive information you are collecting and why (e.g. “We ask about allergies to ensure your safety during our service”).
- Keep a separate, prominent consent mechanism for sensitive information rather than burying it in general terms.
- Link transparently to your Privacy Policy and include a tailored Privacy Collection Notice at or before the point of collection.
- Maintain records of when, how and what the person consented to.
Where consent is not practical and an APP exception is relied upon, document your reasoning and the facts supporting that decision. This helps demonstrate compliance if your decision-making is ever reviewed.
Practical Steps To Protect Sensitive Information
Strong privacy practice is a mix of smart design, day‑to‑day discipline and the right documentation. The following steps will help you manage sensitive information across its lifecycle.
1) Map Your Data And Limit Collection
Start with a quick audit. Identify what sensitive information you collect, where it comes from, where it’s stored (systems and physical files), who can access it, and who you share it with. Include emails, forms, chat logs, backups and paper records.
Then apply data minimisation. If you don’t need it, don’t collect it. If you need it for a short time, set a deletion date. This reduces risk and cuts compliance overheads.
2) Strengthen Security Controls (Proportionate To Risk)
Security should be proportionate to sensitivity and volume. Practical controls include:
- Role-based access controls, strong passwords and multi-factor authentication
- Encryption of data at rest and in transit (where feasible)
- Segregating sensitive records from general business data
- Regular backups and secure disposal/destruction processes
- Staff training focused on handling sensitive information, phishing awareness and secure sharing
- Vendor due diligence and contractual safeguards when using third-party systems or support services
Security is not just IT. Clear internal rules help too. Many businesses adopt an Information Security Policy to define responsibilities, acceptable practices and escalation procedures.
3) Be Transparent With Clear Notices And Policies
Transparency underpins trust and the APPs. Make sure your Privacy Policy is easy to find, up to date and specific about how you handle sensitive information (collection, use, disclosure, security, access/correction and complaints).
At the point of collection, a tailored Privacy Collection Notice should explain what you’re collecting, the purposes, consequences if information isn’t provided, and who you may disclose it to.
4) Manage Third Parties Carefully
If you use cloud platforms, marketing tools, practice management software or external support teams, you’re likely sharing personal information with third parties. Put strong terms in place to control how they handle your data-particularly any sensitive information.
A dedicated Data Processing Agreement (DPA) can set requirements around security, confidentiality, sub-processing, breach notification, international transfers and deletion/return at the end of the engagement.
5) Prepare For Incidents Before They Happen
Mistakes and cyber incidents happen. What matters is how quickly and effectively you respond. Have a practical, tested Data Breach Response Plan that covers triage, containment, assessment, decision-making (including Notifiable Data Breaches thresholds), notifications and post‑incident improvements.
Breaches involving sensitive information are more likely to carry a risk of serious harm, so timely assessment and clear communication are crucial.
6) Train Your Team And Embed Privacy By Design
People handle data daily. Regular training helps your team recognise sensitive information, collect only what’s needed, and follow secure practices. Build privacy checks into new projects, forms, marketing campaigns and product features from the start rather than bolting them on later.
Documents And Policies You’ll Likely Need
Having the right documents in place shows regulators, customers and partners that you handle sensitive information professionally. It also makes day‑to‑day compliance easier.
- Privacy Policy: Explains how your business collects, uses, discloses and stores personal and sensitive information, and how people can access or correct their data. Consider a tailored Privacy Policy if you handle sensitive information regularly.
- Privacy Collection Notice: Presented at or before the time of collection, this sets out key details specific to that collection. A clear Privacy Collection Notice is essential for transparency.
- Privacy Consent Form: A simple, specific opt‑in for collecting or using sensitive information, especially helpful in health, wellness, HR and education contexts. A dedicated Privacy Consent Form makes consent easy to capture and audit.
- Employee Privacy Handbook: Sets internal rules for staff handling personal and sensitive information, including access controls, sharing, storage and incident reporting. An Employee Privacy Handbook helps standardise practice across your team.
- Information Security Policy: Outlines technical and organisational measures to protect data, acceptable use, and responsibilities. Pairing your privacy documents with an Information Security Policy strengthens your overall governance.
- Data Processing Agreement (DPA): Contractual controls with vendors and service providers who process personal data on your behalf. Use a Data Processing Agreement to lock in security, confidentiality and breach notification requirements.
- Data Breach Response Plan: A practical playbook for identifying, containing and assessing incidents, including Notifiable Data Breaches obligations. A tested Data Breach Response Plan will save time and uncertainty when it matters most.
You won’t necessarily need every document on day one, but most businesses handling sensitive information will need several of these. If you’re unsure which ones fit your situation, a quick privacy advice session can help you prioritise the essentials.
Handling Breaches, Complaints And Enforcement
Under the Notifiable Data Breaches (NDB) scheme, you must notify affected individuals and the Office of the Australian Information Commissioner (OAIC) if a data breach is likely to result in serious harm. Breaches involving sensitive information, such as health or biometric data, are more likely to meet the notification threshold.
The OAIC has a range of powers, including making determinations, requiring enforceable undertakings and commencing proceedings. Civil penalties are imposed by the courts (following OAIC action), not directly by the regulator. Taken together, these powers, plus reputational impacts, make early compliance a smart investment.
Have a clear pathway for privacy complaints. Your Privacy Policy should explain how to raise concerns and how your business will respond. Prompt, respectful handling of complaints can prevent issues from escalating to regulatory attention.
If you operate in a regulated sector, you may have additional obligations. For example, health and disability providers often need sector-specific privacy documentation and additional consent workflows. Consider whether specialised policies (such as a health‑focused privacy policy or NDIS privacy materials) are warranted alongside your standard Privacy Policy.
Key Takeaways
- “Sensitive information” under the Privacy Act includes health, biometric, genetic, criminal, sexual orientation, political and religious information, as well as certain memberships and beliefs-these categories attract stricter rules.
- The Privacy Act applies broadly to APP entities, including many small businesses that provide health services or trade in personal information-check your status early and build compliance into your operations.
- You generally need valid consent to collect sensitive information unless a specific legal exception applies; express consent is best practice and should be informed, current and specific.
- Minimise collection, strengthen security, manage vendors with a robust Data Processing Agreement, and prepare an actionable Data Breach Response Plan to respond quickly to incidents.
- Core documents like a Privacy Policy, tailored Privacy Collection Notice, and Privacy Consent Form make transparency and consent simple and auditable.
- The OAIC can pursue enforcement, and civil penalties are imposed by the courts. Good privacy practice protects your customers and your brand-and is far less costly than a breach.
If you’d like a consultation on sensitive information compliance for your Australian business, reach out to us at 1800 730 617 or team@sprintlaw.com.au for a free, no‑obligations chat.








