Katherine Sainty2024-03-28T12:43:13+11:00The UNESCO Recommendation on the Ethics of Artificial IntelligenceKatherine Sainty2024-03-28T12:43:13+11:0028 March 2024|Blog|
Katherine Sainty2024-01-24T12:22:34+11:00Responding to Cyber Attacks – Crisis CommunicationsKatherine Sainty2024-01-24T12:22:34+11:0025 December 2023|Privacy, Data, and Cybersecurity|
Katherine Sainty2024-01-24T12:21:22+11:00Responding to Data Breaches – Notification & Reporting ObligationsKatherine Sainty2024-01-24T12:21:22+11:0024 December 2023|Privacy, Data, and Cybersecurity|
Katherine Sainty2023-12-20T15:15:43+11:00Mitigating Cyber Attack Risks – Data GovernanceKatherine Sainty2023-12-20T15:15:43+11:0020 December 2023|Privacy, Data, and Cybersecurity|0 Comments
Katherine Sainty2023-12-20T15:17:22+11:00Mitigating Cyber Attack Risks – Data MinimisationKatherine Sainty2023-12-20T15:17:22+11:0019 December 2023|Privacy, Data, and Cybersecurity|0 Comments
Katherine Sainty2023-12-20T15:35:08+11:00Mitigating Cyber Attack Risks – Data De-identificationKatherine Sainty2023-12-20T15:35:08+11:0019 December 2023|Privacy, Data, and Cybersecurity|0 Comments
Katherine Sainty2023-12-20T15:39:11+11:00Mitigating Cyber Attack Risks – TrainingKatherine Sainty2023-12-20T15:39:11+11:0015 December 2023|Blog|0 Comments
SaintyLaw2023-12-14T17:54:20+11:00Types of Cyberattacks to watch out forSaintyLaw2023-12-14T17:54:20+11:0014 December 2023|Privacy, Data, and Cybersecurity|0 Comments
SaintyLaw2023-12-20T15:38:00+11:00Why should Australian businesses care about their cybersecurity?SaintyLaw2023-12-20T15:38:00+11:0013 December 2023|Privacy, Data, and Cybersecurity|0 Comments