• Background check

Employee Background Checks

September 28th, 2021|0 Comments

Engaging in employee background checks for potential candidates is a common practice amongst Australian businesses and organisations. This is even more important when businesses are working in a hybrid/work from home environment. It is important

Calls for amendments to the Telecommunications Bill

August 2nd, 2021|0 Comments

In March 2020, the Australian Federal Government introduced the Telecommunications Legislation Amendment (International Production Orders) Bill 2020 (Telecommunications Bill). The Telecommunications Bill expands Australia’s current national security laws by amending the current Telecommunications (Interception and

Diversity Surveys: What Employers Need to Know

April 22nd, 2021|0 Comments

In 2019, Diversity Council Australia conducted a survey of 3,000 Australian workers which revealed that 75% of those surveyed support their employer taking action to create a diverse and inclusive workplace. Diversity surveys have become

The News Media Bargaining Code and Privacy

April 11th, 2021|0 Comments

The Treasury Laws Amendment (News Media and Digital Platforms Mandatory Bargaining Code) Bill (2021) (Bill) was introduced in 2020 to address concerns about bargaining power imbalances between digital platforms and Australian news media businesses. The

2020 – Year in Review

December 21st, 2020|0 Comments

2020 – Year in Review 2020 was a rollercoaster of a year. Despite the disruption of COVID-19 much was achieved. Here’s a breakdown of some of the major legal developments of the year. Ad Tech

Encryption Law in Australia

November 12th, 2020|0 Comments

In July 2020, the Independent National Security Legislation Monitor (INSLM) issued a report recommending changes to the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) (Encryption Act).   Encryption Act The Encryption Act was introduced in

Security Tips for Video Conferencing

October 27th, 2020|0 Comments

When any technology sees its popularity increase quickly, the number of malicious actors seeking to take advantage of new and untrained users also grows. Video Conferencing is one such technology. It has become an essential

Cybersecurity Resilience during COVID-19

October 21st, 2020|0 Comments

Organisations and individuals are increasingly harnessing the opportunities presented by technology in the current COVID-19 climate. The pandemic has placed a growing reliance on data, cloud systems and online communications as organisations combat the

  • Digital Platforms

Australia Digital Platforms Inquiry

May 4th, 2020|0 Comments

Calls for sweeping changes to the regulatory landscape governing digital platforms were made with the release of the Australian Competition and Consumer Commission’s (ACCC) Digital Platform’s Inquiry (Inquiry) Report earlier this year. The Inquiry

  • Consumer Data

Consumer Data Right

May 4th, 2020|0 Comments

The Australian Consumer Data Right will empower consumers but will increase regulatory burden and compliance for businesses. What privacy and data systems will your business need to comply with the new regime? On 1

What is the value of data privacy?

May 4th, 2020|0 Comments

The prevalence and value of data, particularly personal data, is continuing to grow exponentially. Data has become an increasingly valuable resource for businesses. But businesses need to be aware of, and balance the increasing

  • Cookies


September 5th, 2019|0 Comments

Cookies – the aptly named ‘bite sized’ text files which reside in a user’s device can be helpful tools for both businesses and web users. Whether it’s to remember what’s in a shopping basket

My Health Record

January 17th, 2019|0 Comments

The new deadline for opting-out of My Health Record is fast approaching. If you don't already have a My Health Record, and do not want one created for you, you will need to opt-out

Medical Records Trust & Transparency

November 19th, 2018|0 Comments

Download Article Data use and an individual’s rights have become very topical with the increasing number of data breaches that impact us as individuals, including reports on data issues in

  • Board Cyber Resilience

Board Principles for Cyber Resilience

February 22nd, 2017|0 Comments

Increased use of technology is a key source of competitive advantage, but it is also a key driver of cyber risk.  An organisation that hesitates to protect its information assets will likely fall behind

The Cost of Cyber Complacency

February 6th, 2017|0 Comments

Within the rapidly globalising and integrated global community, the evolution and rationalisation of technology has presented the real and present danger of cyber-attacks, creating a threat environment for all businesses. With malware becoming more sophisticated

  • Spam

Know Your Obligations: Telemarketing and Spam

January 13th, 2017|0 Comments

The Federal Court penalised travel agency Getaway Escapes over $300,000 and its director $25,000 for breaching their obligations under the Do Not Call Register Act 2006 (Cth) (‘Act’) and the Telemarketing and Research Calls

Electronic Voting: The Way of the Future?

October 20th, 2016|0 Comments

The administration of our lives has become increasingly digitised. We bank on the Internet, complete our tax returns online, shop electronically, conduct business over e-mail. There is little that we don’t do online. So given

Blockchain in Action: Smart Contracts

October 7th, 2016|0 Comments

Sainty Law examines smart contracts in our second blog in this series on blockchain.  While smart contracts are a hot topic, are they really a viable alternative to traditional methods of contracting and transacting?

Blockchain Explained

September 14th, 2016|0 Comments

An unavoidable consequence of our time is that an understanding of how technology works, and at the very least what it does and how to use it, is critical to running a dynamic business. In

Cloudy with a Chance of Rain: Best Practice Tips for Cloud Computing

August 3rd, 2016|0 Comments

Cloud computing has many benefits for business and government – it is cost-effective, easily accessible and scalable and infinitely customisable. However, the growth of cloud computing has also created new security challenges. An understanding of what the cloud actually is and how it works is crucial to understanding the security risks which it poses and how these risks can be managed.

The PirateBay Enables Free Streaming Through Torrents Time Plug-In

May 16th, 2016|0 Comments

As of this year, The Pirate Bay, the notorious torrent-sharing site, offers free streaming via the plug-in Torrents Time (TT). This plug-in has transformed The Pirate Bay overnight into the largest video streaming website on the net, making it easier than ever before for users to access copyright-infringing content online. Will the Copyright Amendment (Online Infringement) Act 2015 apply to these new online innovations? And what does this mean for ISPs, copyright holders and web-surfers?