Cybersecurity Resilience during COVID-19

October 21st, 2020|0 Comments

Organisations and individuals are increasingly harnessing the opportunities presented by technology in the current COVID-19 climate. The pandemic has placed a growing reliance on data, cloud systems and online communications as organisations combat the

  • Digital Platforms

Australia Digital Platforms Inquiry

May 4th, 2020|0 Comments

Calls for sweeping changes to the regulatory landscape governing digital platforms were made with the release of the Australian Competition and Consumer Commission’s (ACCC) Digital Platform’s Inquiry (Inquiry) Report earlier this year. The Inquiry

  • Consumer Data

Consumer Data Right

May 4th, 2020|0 Comments

The Australian Consumer Data Right will empower consumers but will increase regulatory burden and compliance for businesses. What privacy and data systems will your business need to comply with the new regime? On 1

What is the value of data privacy?

May 4th, 2020|0 Comments

The prevalence and value of data, particularly personal data, is continuing to grow exponentially. Data has become an increasingly valuable resource for businesses. But businesses need to be aware of, and balance the increasing

  • Cookies


September 5th, 2019|0 Comments

Cookies – the aptly named ‘bite sized’ text files which reside in a user’s device can be helpful tools for both businesses and web users. Whether it’s to remember what’s in a shopping basket

My Health Record

January 17th, 2019|0 Comments

The new deadline for opting-out of My Health Record is fast approaching. If you don't already have a My Health Record, and do not want one created for you, you will need to opt-out

Medical Records Trust & Transparency

November 19th, 2018|0 Comments

Download Article Data use and an individual’s rights have become very topical with the increasing number of data breaches that impact us as individuals, including reports on data issues in

  • Board Cyber Resilience

Board Principles for Cyber Resilience

February 22nd, 2017|0 Comments

Increased use of technology is a key source of competitive advantage, but it is also a key driver of cyber risk.  An organisation that hesitates to protect its information assets will likely fall behind

The Cost of Cyber Complacency

February 6th, 2017|0 Comments

Within the rapidly globalising and integrated global community, the evolution and rationalisation of technology has presented the real and present danger of cyber-attacks, creating a threat environment for all businesses. With malware becoming more sophisticated

  • Spam

Know Your Obligations: Telemarketing and Spam

January 13th, 2017|0 Comments

The Federal Court penalised travel agency Getaway Escapes over $300,000 and its director $25,000 for breaching their obligations under the Do Not Call Register Act 2006 (Cth) (‘Act’) and the Telemarketing and Research Calls

Electronic Voting: The Way of the Future?

October 20th, 2016|0 Comments

The administration of our lives has become increasingly digitised. We bank on the Internet, complete our tax returns online, shop electronically, conduct business over e-mail. There is little that we don’t do online. So given

Blockchain in Action: Smart Contracts

October 7th, 2016|0 Comments

Sainty Law examines smart contracts in our second blog in this series on blockchain.  While smart contracts are a hot topic, are they really a viable alternative to traditional methods of contracting and transacting?

Blockchain Explained

September 14th, 2016|0 Comments

An unavoidable consequence of our time is that an understanding of how technology works, and at the very least what it does and how to use it, is critical to running a dynamic business. In

Cloudy with a Chance of Rain: Best Practice Tips for Cloud Computing

August 3rd, 2016|0 Comments

Cloud computing has many benefits for business and government – it is cost-effective, easily accessible and scalable and infinitely customisable. However, the growth of cloud computing has also created new security challenges. An understanding of what the cloud actually is and how it works is crucial to understanding the security risks which it poses and how these risks can be managed.

The PirateBay Enables Free Streaming Through Torrents Time Plug-In

May 16th, 2016|0 Comments

As of this year, The Pirate Bay, the notorious torrent-sharing site, offers free streaming via the plug-in Torrents Time (TT). This plug-in has transformed The Pirate Bay overnight into the largest video streaming website on the net, making it easier than ever before for users to access copyright-infringing content online. Will the Copyright Amendment (Online Infringement) Act 2015 apply to these new online innovations? And what does this mean for ISPs, copyright holders and web-surfers?

Metadata Stored by Telecommunication Companies Held to Not Be ‘about’ an Individual

April 7th, 2016|0 Comments

The Administrative Appeals Tribunal (AAT) has upheld an appeal by Telstra against a decision of the Privacy Commissioner, denying Ben Grubb access to metadata attaching to his Telstra account, such as his IP addresses, web browsing history and cell tower location information. Such information however is readily available to government agencies without a warrant. So what does this decision mean for individual privacy and for companies storing customer metadata?

The EU-US Privacy Shield: Content

April 7th, 2016|0 Comments

Last October the CJEU invalidated the Safe-Harbour agreement – the mechanism which allowed the lawful transfer of personal data from the EU to the US. You can read our blog post about that first decision here. Swift action has been taken to put together a new agreement – one that prioritises privacy, accountability and transparency. Privacy Breach Complaints

March 1st, 2016|0 Comments

Lessons to be learned from about Privacy The way that companies deal with personal information is increasingly scrutinised, as individuals become more wary about to whom they give their information and how that information


May 6th, 2015|0 Comments

Privacy Awareness Week (PAW) is here again. Sainty Law has been involved in PAW events for a number years now, but we have to say that PAW2015 feels quite different. It has often been said

Revised Guide to Information Security

September 3rd, 2014|0 Comments

Last month, the OAIC released a Revised Guide to Information Security for public consultation. The Guide was originally published in April 2013, to de-mystify the obligation under the Privacy Act 1988 (the Act) to take

EU Right to Be Forgotten

May 19th, 2014|0 Comments

In a landmark decision, the Court of Justice of the European Union has ruled in favour of a right to be forgotten - an enormous win for privacy, and anyone who has google-searched their own

Image Rights for Young Athletes

April 24th, 2014|0 Comments

Managing the Image Rights for Young Athletes Just as children are educated at school to manage their social media interactions, young athletes should be conscious of the way they use social media. There are certainly

Why Image Rights Matter

April 17th, 2014|0 Comments

Image rights and sporting talent Endorsements, commercialisation and merchandise have long been an important component of the income stream of athletes and sports players. The evolution and growth of social media has meant this is