Guide - Digital Restart Fund - Assessing information access and privacy impacts
Read the document below or download it here: Guide - Digital Restart Fund - assessing information access and privacy impacts, updated September 2022
Overview
This regulatory advice is issued pursuant to section 17(b) of the Government Information (Public Access) Act 2009 (GIPA Act) and section 36(2)(g) of the Privacy and Personal Information Protection Act 1998 (PPIP Act). The advice represents general regulatory advice to complement the more specific statutory advice provided by Commissioners under section 10 of the Digital Restart Fund Act 2020 (DRF Act).
This advice provided to NSW government agencies sets out some of the commonly identified risks to information access and privacy rights across projects seeking funding from the Digital Restart Fund (DRF) and suggests mitigation strategies. In developing this advice, the Information and Privacy Commission (IPC) consulted with the Information and Privacy Advisory Committee (IPAC) NSW, who contributed to the development of the information access and privacy risks and risk mitigation strategies included in this advice. The IPC also consulted with Cyber Security NSW, with that advice reflected in the sections regarding cyber security.
The IPC is committed to sharing its expertise and this general advice will be reviewed and refined as our expertise evolves in response to technological advancement.
Digital Restart Fund: assessing information access and privacy impacts
The NSW government has allocated $2.1 billion over three years to invest in digital transformation projects through the DRF. Under section 10 of the DRF Act, before approving funding for a project, the Minister must obtain and have regard to advice from the Information Commissioner and the Privacy Commissioner. This advice is required at each stage of a project, prior to funding being released.
Since September 2020, the IPC has been assessing and applying a risk rating to all projects seeking funding from the DRF. With the widespread increase in digital service delivery by government, the IPC has reviewed diverse digital projects from a wide range of agencies involving both government and non-government providers. When engaging non-government providers contractual requirements should promote the preservation of rights and recognise that government remains accountable to citizens.
This advice sets out some of the commonly identified risks to information access and privacy rights across different types of digital projects and suggests mitigation strategies. It also provides information about the IPCâs processes for providing advice on projects, including the steps taken to close the feedback loop.
The IPCâs approach to provision of advice provides practical guidance to ensure that legal rights are preserved. Legal Design is encouraged as a methodology that reflects a contemporary approach to the development of technology to ensure the preservation of legal rights[1].
Legal Design methodology consists of five main steps:
- Understanding
- Synthesis
- Brainstorming and prototyping
- Testing
- Refinement.
Accordingly, the mitigation strategies recommended by Commissioners are calibrated to the relevant legislative requirement, the technology and fundamentally the citizen to achieve an outcome that reflects legal and human centred design. The Legal Design approach is iterative, and the advice provided by the IPC assists agencies in understanding the potential impact on rights and synthesising potential technical solutions.
Commissioners recognise that further prototyping, testing and refinement may be required to achieve a rights preserving outcome. This advice seeks to raise the level of understanding of the impact of technology on rights and empower agencies to understand and implement rights preserving features from the outset. More broadly the advice contributes to just and legal outcomes by promoting accessibility and digital inclusion. It may also assist citizens in understanding the information access and privacy impacts that may arise from digital projects and potential solutions.
In the context of the GIPA Act a responsive and representative democratic government is founded upon the right to access government information, to hold government to account and promote transparency and integrity.
When government uses technology to inform its decision-making the trustworthiness of the technology is paramount. In this context trustworthiness requires evidence to explain both the goals of the system and prove that the system meets those goals. That evidence or explanation must be accessible in a low cost and low complexity form.
This advice does not contain an exhaustive list of the types of DRF projects for which funding may be sought, nor does it identify all potential information access and privacy impacts. Every digital project will, in some way, involve the creation or use of government information. A significant proportion of DRF projects will also involve the collection and use of personal information.
Agencies are reminded that they will need to continue to comply with their obligations under the GIPA Act, PPIP Act and the Health Records and Information Privacy Act 2002 (HRIP Act) even as the nature of their service delivery evolves and makes increasing use of digital technology.
This advice aims to distil the knowledge acquired by the IPC in assessing DRF projects, identifying the risks they present to information access and privacy rights and recommending risk mitigation strategies. The advice is designed to share that knowledge with agencies in an accessible manner to build the capacity of NSW public sector agencies and ensure that information access and privacy rights are preserved.
Elizabeth Tydd IPC CEO, Information Commissioner NSW Open Data Advocate |
Samantha Gavel Privacy Commissioner |
September 2022
Closing the feedback loop at each project stage
Often with DRF projects, advice will be requested at each stage of the projectâs delivery. This is because funding is usually approved in tranches, with some projects having discovery, alpha, and beta stages, covering project design to implementation. Given this, the IPC will provide advice at each project stage, with each advice addressing any new information contained in each related business case. In these instances, the IPC aims to reach out to the projectâs product owner to âclose the loopâ on previous feedback provided. Closing the loop will usually consist of contacting the product owner, to seek to understand how the previous IPC advice provided has been considered and implemented by the project/product team. Once this communication has taken place, this feedback loop can help the IPC to formulate the new advice. For example, the IPC may reference the consultation and reiterate or tailor the information access and privacy advice accordingly. This process helps to ensure that the IPCâs advice remains relevant, meaningful, and helpful to the Minister and to NSW government agencies, whilst proactively contributing to agenciesâ compliance with information access and privacy laws.
Process for agencies considering advice
Assessing the project and addressing key considerations
When agencies receive IPC advice, project leads can take steps to address the key project privacy and information access considerations in a number of different ways. Project leads should undertake the following:
- Undertake wide consultation across their organisation, including legal experts, policy owners, digital and technology teams and data architecture experts, as well as program manager and delivery professionals. Internal resources are the best first starting point as they are likely to have the knowledge and expertise to support project owners in providing additional information through which to address recommendations arising from the IPCâs advice. For example, internal legal and policy teams are likely to direct project owners to internal resources such as pre-existing Agency Information Guides, or they may have experience in engaging professionals required to undertake a Privacy Impact Assessment (PIA).
- Assess whether the project being proposed in its existing form is likely to adhere to the information access and privacy laws and principles that are flagged in the IPCâs advice, following the engagement of subject matter experts. Familiarity with the principles of human centred design and privacy by design, as well as a broad understanding of NSW technology/ethics/cyber policies will support project leads in remaining alert to any critical project risks identified.
- Ensure that the project is responsive to the information access and privacy guidance and recommendations. This may require reconsideration of technical and policy issues and adjustments to preserve these rights. Likewise practical solutions may need to be implemented to ensure ongoing compliance.
- During the design phase of the project, agencies should also take additional precautions to ensure that better practice principles are adopted. Undertaking user and product testing to ensure that the project being delivered meets appropriate digital service standards. Following the design and delivery phase of the project, project leads should also ensure sustainable and ongoing monitoring of digital systems. The establishment of consistent review and audit cycles will ensure that digital projects remain compliant with NSW information and privacy legislation.
1. Portals, websites, and hubs
The IPC has reviewed projects involving the integration of government transactions, information, and services into single online platforms, in the form of portals, websites or hubs for citizens to access. These can take the form of transaction platforms, centralised information portals or even federated access models. A notable example of this is the increasing number of transactions with various government agencies (with the potential to extend this to Commonwealth agencies and other jurisdictions) available via Service NSWâs digital platforms. Likewise, government sectors/agencies are also establishing portals for storage and access to information by separate agencies with limited or no public access.
Impacts
Bringing information and transactions from different parts of government into a central location can enhance accessibility for citizens by streamlining application processes and grouping together relevant information. However, given that these projects involve the collation of information from multiple agencies, as well as the sharing of information between agencies and potentially third-party vendors, they can also create risks to information access and agenciesâ compliance with the GIPA Act. As citizens often need to provide their personal information to access digital portals, privacy risks also arise in relation to how this personal information is handled.
The following section sets out in more detail common risks to information access and privacy rights associated with centralised portals, with mitigation strategies also outlined.
Information access
Risks | Mitigation strategies |
---|---|
A lack of clarity around who holds the information and how it will be used In the context of a portal or website that brings together information from multiple sources, agencies will need to consider who holds information (for the purposes of the GIPA Act), in what format this information is held and what steps might be required to provide access to information in a variety of circumstances, as well as what types of information can be proactively released. |
|
Inability to access information held by third parties Third party vendors/contractors may include providers of new platforms, software and/or cloud storage solutions. These entities may hold government information but are not covered by the GIPA Act.
|
|
Digital exclusion, accessibility and explainability Some citizens may lack the digital literacy or necessary equipment to access digital-only services. |
|
Privacy
Risks | Mitigation strategies |
---|---|
A failure to comply with the Information Protection Principles (IPPs) and/or the Health Privacy Principles (HPPs) Portals that bring together services and transactions are likely to collect citizensâ personal information, often sensitive health and financial data. Where privacy impacts are not considered in the early stages of a project, agencies risk breaching the IPPs and/or HPPs. |
|
Unauthorised access, use or disclosure of personal information A common feature of centralised portals is the sharing of citizensâ personal information across multiple agencies, often through the availability of prefilled forms. It is important to ensure that wherever personal information is shared, that citizens are aware of this and have given their consent, and that access to personal information is minimised as far as possible.
|
|
Risk of data breaches Bringing together large amounts of information and transactions can create an attractive target for malicious actors.
|
|
Lack of compliance with privacy laws by third party vendors Third party vendors/contractors may include providers of new platforms, software and/or cloud storage solutions. These entities may have access to citizensâ personal information as part of their involvement with the project but are not covered by NSW privacy laws (and may not be subject to the Commonwealth Privacy Act 1998). |
|
Inability of affected citizens to access help, obtain resolution of complaints or obtain any remediation or recompense The involvement of multiple agencies can lead to confusion or diffusion of accountability etc from a citizen perspective |
|
2. Smart technology, machine learning, and AI
Several government digital solutions now involve the use of technology to capture information and data, which can then be analysed and used to develop government policy. Notable examples of this include the integration of technology into the built environment under the Smart Places strategy and the use of drones for purposes including environmental conservation.
Impacts
The IPC has observed the following common features of projects involving the use of these types of technology:
- the deployment of solutions developed by third party vendors
- the collection of large amounts of data (including personal information)
- the use of third-party cloud storage solutions
- the use of machine learning to analyse large volumes of data and to extract insights to inform decision-making.
- The use of smart technology and camera monitoring systems.
Each of these features gives rise to a range of information access and privacy risks, which are outlined below, along with mitigation strategies.
Information access
Risks | Mitigation strategies |
---|---|
Inability to review or explain decisions relying on AI models |
|
Inability to access information held by third parties Third party vendors/contractors may provide technological solutions to government and may hold government information. |
|
A lack of accountability in |
|
Technological âPsyopsâ/Manipulation:â The use of techniques such as AI, targeted digital advertising, and behavioural ânudgingâ to alter citizens beliefs, desires, or emotions. |
|
Privacy
Risks | Mitigation strategies |
---|---|
Inaccurate or inappropriate decision-making There is a risk that AI driven decision-making could lead to outcomes in which a lack of human oversight leads to adverse outcomes. |
|
Incidental collection of personal information Embedding smart technology into citiesâ infrastructure and the use of drones, for example, may lead to the incidental collection of citizensâ personal information. |
|
Risk of unauthorised access to personal information |
|
Data breaches The large volumes of data and insights collected by smart technology and drones could make information holdings a target for malicious actors. |
|
Lack of compliance with privacy laws by third party vendors
|
|
3. Single notification services
A number of DRF projects aim to ensure that citizens only need to provide the NSW Government with certain personal information once, in order to notify several agencies of a life event or to access a broad range of services.
Impacts
Single notification services commonly involve the establishment of new registers and/or databases, which multiple entities are then able to access or receive information from. Examples include the Seniors Energy Rebate and the Australian Death Notification Service. Both of these schemes involve the sharing of information between NSW Government agencies as well as with Commonwealth agencies and private sector entities. This type of information sharing gives rise to both information access and privacy risks, some of which are identified below.
Information access
Risks | Mitigation strategies |
---|---|
A lack of transparency around what information is held by agencies, who can access it and how[20]
|
|
Inability to access information held by third parties Third party vendors/contractors may include providers of new platforms, software and/or cloud storage solutions. These entities may hold government information but are not covered by the GIPA Act.
|
|
Digital exclusion Some citizens may lack the digital literacy or necessary equipment to benefit from digital-only single notification solutions. |
|
Privacy
Risks | Mitigation strategies |
---|---|
A failure to comply with the Information Protection Principles and/or the Health Privacy Principles
|
|
Unauthorised access, use or disclosure of personal information With personal information being shared with several entities, agencies will need to take steps to ensure that this information is managed in line with privacy laws and citizensâ consent.
|
|
Risk of data breaches Particularly where new databases or registers containing personal information are established, these can become attractive targets for malicious actors.
|
|
Lack of compliance with privacy laws by third party vendors Third party vendors/contractors may include providers of new platforms, software and/or cloud storage solutions. These entities may have access to citizensâ personal information as part of their involvement with the project but are not covered by NSW privacy laws (and may not be subject to the Commonwealth Privacy Act 1998). |
|
Increased risk of error when handling personal information Single notification services may increase error when handling personal information as inaccurate information becomes shared between multiple agencies across new databases |
|
Digital exclusion Some citizens may lack the digital literacy or necessary equipment to benefit from digital-only single notification solutions. |
|
4. Data analytics projects
Increasingly, government agencies are seeking to use data for the purposes of analytics to inform their decision-making and service delivery. These projects can involve the use of automation and machine learning systems, linkage of data from multiple agencies (and non-government entities) and the use of third-party analytics solutions. The NSW Spatial Digital Twin project, for example, is bringing together data from different agencies in this way, creating a digital real-world model of NSW cities and communities to facilitate better planning, design and modelling. The IPC has identified the following common information access and privacy risks in relation to data analytics projects:
Information access
Risk | Mitigation strategies |
---|---|
A lack of public access to new information created through a data analytics project It will be important to identify who holds any new information generated â what agency or other entity; in what format the information is held and under what arrangement (including contractual arrangements with third parties); and how access is to be provided.
|
|
Inability to access information held by third parties
|
|
A lack of accountability in decision-making and service provision |
|
Privacy
Risks | Mitigation strategies |
---|---|
Data analysis or data linkage breaches the IPPs or HPPs |
|
Unauthorised use or disclosure of personal information |
|
Data breaches Bringing together data from different sources could create a target for malicious actors. |
|
5. Digital identity projects
A significant feature of modern digital government involves the consideration of citizen identity and credential tracking technology, with governments increasingly investing resources in scoping, developing and rolling out digital identity projects. These projects have the possibility of featuring various identity related information such as driver licences and birth certificates, as well as credentials such as education and training certificates, or proof of vaccination status, with the intention of sharing these documents in digital form, and storing this information in digital wallets, with many NSW Government agencies taking a leading role in facilitating this transition into the future.
This technology has the ability to create greater convenience for citizens and reduce some existing risks, for example, by reducing the frequency that paper documents are scanned and emailed. Likewise digital identity projects can reduce the risk of lost documentation or even fraud. However, digital identities also give rise to a range of information access and privacy risks, which are outlined below, along with mitigation strategies.
Information access
Risks | Mitigation strategies |
---|---|
Unintended consequences as a result of machine learning or facial verification technology that may perpetuate discrimination or injustice |
|
Inability to access information held by third parties Third party vendors/contractors may provide technological solutions to government and may hold government information. |
|
A lack of accountability in decision-making and service provision |
|
Digital exclusion and accessibility Some citizens may lack the digital literacy or necessary equipment to access digital-only services. |
|
Digital surveillance The development of increasingly sophisticated modes of digital surveillance, including face, gait and other biometrics data. |
|
Privacy
Risks | Mitigation strategies | |
---|---|---|
Incidental collection of personal information Embedding smart technology into citiesâ infrastructure and the use of drones, for example, may lead to the incidental collection of citizensâ personal information. |
|
|
Inaccurate or outdated collection or storage of personal information and linked identity services |
|
|
Risk of unauthorised access to personal information The collection and use of personal information, including metadata, which includes names, location details, addresses, search terms and other sensitive information poses a privacy risk if incorrectly handled. |
|
|
Data breaches The large volumes of data and insights collected by smart technology and drones could make information holdings a target for malicious actors. |
|
|
Lack of compliance with privacy laws by third party vendors
|
|
|
A failure to comply with the Information Protection Principles and/or the Health Privacy Principles
|
|
|
Unauthorised access, use or disclosure of personal information With personal information being shared with several entities, agencies will need to take steps to ensure that this information is managed in line with privacy laws and citizensâ consent.
|
|
|
Declining citizen trust |
|
|
Digital exclusion and accessibility Some citizens may lack the digital literacy or necessary equipment to access digital-only services. |
|
|
Digital surveillance The development of increasingly sophisticated modes of digital surveillance, including face, gait and other biometrics data. |
|
6. Cyber security projects
Part of the DRF has been set aside for projects aimed at uplifting cyber security maturity. Cyber Security NSW plays a key role in reviewing the business cases for these projects, which are also reviewed by the IPC.
Most of the cyber security DRF projects that the IPC has reviewed aim to uplift agenciesâ maturity against the NSW Governmentâs Cyber Security Policy and the Australian Cyber Security Centreâs Essential Eight. While the Essential Eight focus on cyber security maturity, they also provide controls that preserve information access and privacy rights. For example, the restriction of administration privileges, access audit logs; multifactor authentication and daily backups will contribute to:
- improved capacity to ensure government information, including citizensâ personal information and government information broadly, is held appropriately and is accessible when requested
- improved protection of personal information under the PPIP Act and health information under the HRIP Act and preserve the strategic asset that is government information. Notably, improved cyber security maturity helps to mitigate the risk of data breaches.
Cyber security uplift projects regularly involve multiple third-party contractors, who may not be subject to the GIPA Act or NSW privacy laws. Strategies to protect and preserve information access and privacy rights under these contractual arrangements include:
- Ensuring that procurement contracts include provisions reflecting the requirements of section 121 of the GIPA Act and requiring compliance with privacy laws
- Incorporating preservation of information access and privacy rights into procurement evaluation
- Establishing a transparent authority framework to identify contractual issues that impact access to information and privacy.
In most instances, improving an agencyâs cyber security maturity will support and preserve information access and privacy rights, by keeping government information secure. Given this, the IPCâs advice on cyber security projects does not routinely apply a risk rating.
7. Other useful resources
- Guide to Privacy Impact Assessments in NSW
- Fact Sheet: Digital projects
- Fact Sheet: Digital records and the GIPA Act
- Fact Sheet: Privacy by design
- Guide: Data Sharing and Privacy
- NSW Cloud Policy
- NSW Cyber Security Policy
- NSW Government AI Strategy
- NSW Internet of Things Policy
- Smart Infrastructure Policy
- NSW AI Assurance Framework
NOTE: The information in this document is to be used as a guide only. Legal advice should be sought in relation to individual circumstances.
[1] Legal Design methodology underpins and is consistent with the Privacy by Design principles explained in the IPCâs Fact Sheet - Privacy by Design.
[2] Section 20, GIPA Act.
[3] Section 20, GIPA Act.
d), GIPA Act.
[4] Section 23, GIPA Act.
[5] Section 44(2), GIPA Act
[6] Part 4, Division 2, GIPA Act.
[7] GIPA Act section 74 and 75
[8] Section 121, GIPA Act.
[9] Section 27, GIPA Act.
[10] GIPA Act section 20(1)(b)
[11] Section 20, GIPA Act.
[12] Section 23, GIPA Act.
[13] Section 121, GIPA Act.
[14] Section 27, GIPA Act.
[15]AINOW Algorithmic Accountability Policy Toolkit â Toolkit 01, October 2018.
[16] Section 3 GIPA Act
[17] Section 20, GIPA Act.
[18] Section 20(1)(b) and (d), GIPA Act.
[19] Section 23, GIPA Act.
[20] Section 20(1)(c) â (g)
[21] Section 20, GIPA Act.
[22] Section 20(1)(b) and (d), GIPA Act.
[23] Section 23, GIPA Act.
[24] Section 121, GIPA Act.
[25] Section 27, GIPA Act.
[26] Section 3 GIPA Act
[27] Section 20, GIPA Act.
[28] Section 23, GIPA Act.
[29] Section 121, GIPA Act.
[30] Section 27, GIPA Act.
[31] AINOW Algorithmic Accountability Policy Toolkit â Toolkit 01, October 2018.
[32] Section 3 GIPA Act
[33] Section 20, GIPA Act.
[34] GIPA Act section 20(1)(b)
[35] Section 121, GIPA Act.
[36] Section 27, GIPA Act.
[37]AINOW Algorithmic Accountability Policy Toolkit â Toolkit 01, October 2018.
[38] Section 20, GIPA Act.
[39] Section 23, GIPA Act.
[40] Section 20(1)(b) and (d), GIPA Act.
[41] Section 23, GIPA Act.
[42]Section 14, PPIP Act
[43]Section 25, PPIP Act