The array of judicial policies on AI use in and by courts

Generative AI has raised the ire of some, but not all, common law jurisdictions. What can we learn from their respective policies?

By - 1 min read

Algorithmic price personalisation: everything you need to know

Using algorithms to tailor prices to consumers is more common than you think, and presents various legal challenges.

By - 2 min read

Generative AI: uses and abuses in litigation

After the Supreme Court’s practice note, find out the best practice for using generative AI in an ethical, compliant and effective way.

By - 2 min read

Navigating lodgment support services in electronic conveyancing

E-conveyancing tools can be tricky and a recent decision shows how PEXA misuse can lead to caveats being overlooked.

By - 2 min read

Digital ID in your practice: a guide for firms and their clients

New national Digital ID laws will change the game for data holders and be in force by December. Are you ready?

By - 1 min read

Cybersecurity and legal regulation: why it’s crucial to stay on top of cyber risk

In a 2022 Federal Court case, the court made it clear that regulators consider inadequate cyber security as a regulatory issue.

By and - 1 min read

Is IT the dominant purpose? Legal privilege and cyber attacks

Discussion of legal privilege use in the context of cyber attacks, how practitioners and clients are adapting, and how the courts are responding.

By , and - 2 min read

Reforming the Privacy Act for the modern era

Following the review of the Privacy Act, key reforms have been proposed to bring the Act into the digital age and minimise human rights risks.

By , and - 1 min read

Data breaches: Must dos for prevention and notification

Regulated entities are expected to know their obligations under the Notifiable Data Breaches scheme and act in a timely manner.

By - 2 min read

Prevention, notification, compensation: Lessons from a government data breach

Recent NCAT decision provides a timely reminder for organisations sharing personal information by email to implement more secure methods for transmitting records.

By - 2 min read