MEDICOLEGAL

Breaches of confidentiality

When are you legally allowed or obliged to breach patient confidentiality?

Think of three concentric rings:

RingLegal triggerStatutory / common‑law source
1. Patient says “yes”Express or implied consent

example:
– Referral letter
– shared‑care plan
– workers‑comp certificate the patient has asked you to complete.
APP 6.1(a) – Privacy Act 1988
2. Law or policy says “you may / must” even without consentAuthorised or required by lawa. Public‑health notification of a notifiable disease (state Public Health Acts) ACT Government

b. Mandatory child‑abuse report (state Child‑Protection Acts)

c. AHPRA mandatory notification about another practitioner’s impairment, intoxication, sexual misconduct or gross departure from standards Medical Council NSWA HPRA

d. Court / tribunal order or subpoenaOAIC

e. Police report of certain crimes (e.g. concealing child sexual abuse in NSW/Vic/Qld).

f. Transport / firearms laws (e.g. WA Firearms Act; SA Motor Vehicle Act) when a statutory form is prescribed.
3. Privacy Act “permitted situations” (APP 6.2‑6.4)You reasonably believe disclosure is necessary and it is impracticable to obtain consenta. Serious & imminent threat to life, health or safety (APP s 16A, Item 1) OAIC

b. Medico‑legal defence or insurance – giving notes to your MDO/lawyer/insurer OAIC

c. Genetic relatives at serious risk of a heritable condition (APP s 16B).

d. Quality‑assurance / research / teaching where de‑identified or ethics‑approved.

If none of these apply → keep it confidential and seek the patient’s consent.


## 1. What counts as a “breach”?

Breach typeTypical clinical scenarioWhy it matters
Unauthorised disclosureDiscussing a patient by name in a lift; emailing results to the wrong address; handing a script to the wrong parent.Contravenes APP 6 of the Privacy Act 1988 unless an exception applies. OAIC
Unauthorised accessStaff member opens their neighbour’s EMR out of curiosity; cyber‑criminal hacks the PMS.Triggers OAIC Notifiable Data Breach obligations if “likely to cause serious harm”. OAIC
Loss of dataMisplaced USB with backups; pathology results left on café table.Still a breach even if no‑one is known to have seen the data.
Failure to protectLeaving consult room PC unlocked; talk‑back radio audible on speakerphone telehealth consult.APP 11 duty to take “reasonable steps” to secure personal information. OAIC

## 2. When disclosure is lawful without consent

Australian Privacy Principle 6 allows a secondary use/disclosure only if one of these applies (health‑service highlights): OAIC

  1. Patient consent (best practice — written wherever practicable).
  2. Reasonable expectation (patient would expect the disclosure and it is directly related to care, e.g. referral letter).
  3. Required or authorised by law  → subpoenas, mandatory disease notification, child‑abuse reports, AHPRA notifications.
  4. Permitted general situation (s 16A)
    • Serious & imminent threat to life/health/safety and impracticable to get consent. OAIC
    • Location of a missing person, etc.
  5. Permitted health situation (e.g. informing genetic relatives of a serious heritable condition). OAIC
  6. Medico‑legal defence (disclosing notes to insurers/lawyers to respond to a claim).
  7. Quality‑assurance / teaching (with ethics approval or de‑identification).

If none apply → seek consent or keep it confidential.


## 3. Step‑wise risk‑mitigation framework
(“The four C’s”)

StepKey actionsTools / tips
Collect only what you needMinimum necessary information; avoid social media trawling.Periodic audit of intake forms.
Consent & communicateObtain specific, informed consent for non‑routine disclosures (e.g. workers’ comp insurer).Use template consent forms in EMR.
Control accessRole‑based log‑ins,
2‑FA
screen‑timeout ≤ 2 min
locked cabinets.
IT security policy; regular password updates.
Contain & report breaches4‑step OAIC plan: Contain → Assess → Notify → Review.Notifiable Data Breach form within 30 days if serious harm likely. OAIC

## 4. Common medico‑legal pitfalls (with fixes)

PitfallHow to fix
“Discussing cases in corridors / on social media”Adopt a “no patient identifiers outside consult room” rule; staff training; signage in staff areas.
Emails with unencrypted attachmentsUse secure messaging (Argus, Medical‑Objects) or password‑protected PDFs; obtain consent if standard email.
Copy‑all fax to shared deviceMove to secure e‑fax integrated with EMR; audit fax logs.
Cloud storage outside AustraliaEnsure provider signs APP‑compliant agreement or get informed patient consent.
Staff access for curiosityAutomatic EMR audit trails; immediate investigation & disciplinary action (case law shows reception breach led to HCC complaint). Med Indemnity Solutions

## 5. Quick decision tree

Need to share info?
1 . Can I de‑identify? → Do that.
2 . Do I have valid consent? → Disclose.
3 . Is it required/authorised by law or a serious threat? → Disclose minimal details, document legal basis.
4 . Otherwise → Don’t disclose. Ask the patient first.


### Take‑home

  1. Consent first wherever practicable.
  2. Know the APP 6 exceptions — especially serious threat, legal compulsion, and quality‑assurance.
  3. Breach = any unauthorised access, disclosure or loss — respond with the OAIC 4‑step plan.
  4. Good documentation & robust systems are your best medico‑legal defence.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.