HIV and the law – recent developments in public health and criminal laws

In an amendment to the Public Health Act 2010, the requirement to disclose HIV status was replaced with a requirement to take ‘reasonable precautions’ to…

By and - 6 min read

Section 32 Mental Health Act amendments fall short of recommended reform

Section 32 of the Mental Health (Forensic Provisions) Act 1990 was amended, extending the divisionary regime to those with cognitive impairment. By KAREN WEEKS.

By - 6 min read

Mass surveillance and data retention: do the means justify the ends?

The Attorney-General’s Department released the Telecommunications (Interception and Access) Act 1979 – Annual Report. By MICHELLE MEARES.

By - 6 min read

Preliminary discovery applications: don’t forget about the costs

NSW courts are prepared to make orders varying or delaying costs for preliminary discovery depending on the institution and outcome of subsequent proceedings. By NICHOLAS…

By - 4 min read

Family law: November 2017

Reporting and analysis of recent family law decisions. By ROBERT GLADE-WRIGHT.

By - 4 min read

Wills and estates: November 2017

Reporting and analysis of the latest judgments and news in wills & estates and elder law. By PAM SUTTOR.

By - 3 min read

Aboriginal cultural heritage reforms: a move towards genuine Aboriginal control?

A new government proposal for stand-alone cultural heritage legislation proposes to expand the definition of Aboriginal cultural heritage to include intangible aspects and confer upon…

By - 6 min read

An unholy trinity? Religion, employees and the workplace

Religious issues can arise in various workplace settings, including the contract of employment and religious discrimination. By JOHN WILSON and KIERAN PENDER.

By and - 7 min read

The latest from the High Court: November 2017

Reporting and analysis of the latest key judgments from the High Court of Australia. By ANDREW YUILE.

By - 6 min read

Is your practice secure? Client confidentiality and data breach

A data breach response plan is essential to being prepared for an eligible data breach. By HELEN BROWN.

By - 6 min read