New data access rights for Californian data subjects have been created by the California Consumer Privacy Act (CCPA), which came into force on 1 January 2020. Like the General Data Protection Regulation (EU) 2016/679
Every other day we hear about a privacy issue, whether that be a data breach, the misuse of personal information by companies, or new privacy legislation. Privacy compliance is on everyone’s mind – which
The Corporations Amendment (Crowd-sourced Funding) Act 2017 which commenced operation on 29 September 2017, aims to bridge the ‘capital gap’ experienced by many small businesses and start-ups as they struggle to finance further development
It’s no secret that constantly evolving security threats pose dangers to your organisation, but you may not be aware of the high rate of occurrence of cyber attacks and the likelihood that your organisation’s
In February 2017, the Australian Signals Directorate (ASD) expanded its Top Four cyber threat mitigation measures to the “Essential Eight”. What are the measures, what has changed, what is new and what do they
In 2012, Robert Mueller, FBI Director famously said that he was “convinced that there are only two types of companies: those that have been hacked and those that will be.” The statement’s relevance in
The unfair contract terms protections under the Australian Consumer Law was extended to protect small businesses from 12 November 2016. In this blog, we will examine the far reaching implications of this change on
Blockchain technology is vulnerable to the same malicious hackers that target business and government - when things go wrong millions of dollars are at stake.
In March 2016 the NSW Legislative Council’s Standing Committee on Law and Justice (Committee) released a report titled ‘Remedies for the Serious Invasion of Privacy in New South Wales’ (Report), recommending the adoption of a
In 2013 we did a series of blogs demystifying big data. We looked at what big data is, how big data is used and recommended some big data best practices. Since 2013 the big data
Cloud computing has many benefits for business and government – it is cost-effective, easily accessible and scalable and infinitely customisable. However, the growth of cloud computing has also created new security challenges. An understanding of what the cloud actually is and how it works is crucial to understanding the security risks which it poses and how these risks can be managed.
The Australian Government released its Australian Cyber Security Strategy (“Strategy”) on 21 April 2016. In our last cyber security blog (2/3), we provided our analysis on the Strategy. It is clear that the Strategy places
Cyber Security Blog #2 – An ‘Open, Free and Secure’ Internet – The Australian Government’s Approach to Cyber Security
The Australian Government released its much anticipated Australian Cyber Security Strategy on 21 April 2016 (“Strategy”). The Strategy, which was commissioned in 2014, takes a top-down approach to cyber-security, with an emphasis on arming
As of this year, The Pirate Bay, the notorious torrent-sharing site, offers free streaming via the plug-in Torrents Time (TT). This plug-in has transformed The Pirate Bay overnight into the largest video streaming website on the net, making it easier than ever before for users to access copyright-infringing content online. Will the Copyright Amendment (Online Infringement) Act 2015 apply to these new online innovations? And what does this mean for ISPs, copyright holders and web-surfers?
Cyber-attacks are a real and present threat for all businesses. With malware becoming more sophisticated and capable of outsmarting traditional anti-virus technologies, it is important for businesses to stay abreast of new security threats and methods of mitigating them.
As of the 11th of February 2016 the infamous proceedings between Dallas Buyers Club LLC (DBC) and iiNet (as well as five other Australian Internet Service Providers) came to an end, when DBC failed to
The Administrative Appeals Tribunal (AAT) has upheld an appeal by Telstra against a decision of the Privacy Commissioner, denying Ben Grubb access to metadata attaching to his Telstra account, such as his IP addresses, web browsing history and cell tower location information. Such information however is readily available to government agencies without a warrant. So what does this decision mean for individual privacy and for companies storing customer metadata?
Last October the CJEU invalidated the Safe-Harbour agreement – the mechanism which allowed the lawful transfer of personal data from the EU to the US. You can read our blog post about that first decision here. Swift action has been taken to put together a new agreement – one that prioritises privacy, accountability and transparency.
In December last year, the Federal Government released an exposure draft of the Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 (the Bill) for public consultation. The draft Bill, which was promised by
UPDATE: On 16 October 2015 the Article 29 Data Protection Working Party released a statement in the wake of the CJEU’s landmark declaration that the US – EU Safe Harbour is invalid. The Working
Starting a business is hard, and if the biggest challenge is coming up with a product or service that people actually want, the next challenge is finding the money to get the business off
If your organisation handles personal information in any way, shape or form, you will by now be familiar with the Australian Privacy Principles (APPs). Introduced in March 2014, the APPs were designed to act as
This month, the Australian Attorney-General’s Department officially released its Online Copyright Infringement Discussion Paper, seeking comments from the public on how best to develop a legal framework to reduce online copyright infringement in Australia.
New Oil? In our recent “Demystifying Big Data” series, we have tried to do just that – chip away at some of the mystique that surround the phrase “Big Data” – a phrase that is
Everyone is racing for a bite of the Big Data pie; they want to gain the benefits of “nowcasting” – real time insights from the instream analysis of data. How are Organisations using Big