Mass surveillance and data retention: do the means justify the ends?

The Attorney-General’s Department released the Telecommunications (Interception and Access) Act 1979 – Annual Report. By MICHELLE MEARES.

By - 6 min read

Is your practice secure? Client confidentiality and data breach

A data breach response plan is essential to being prepared for an eligible data breach. By HELEN BROWN.

By - 6 min read

Is your firm privacy compliant?

From early 2018, new privacy legislation will require the mandatory reporting of certain data breaches for organisations which are required to comply with the Privacy…

By - 4 min read

The end of a long road: mandatory data breach notification becomes law

The introduction of mandatory data breach notification obligations may ultimately lead to an increase in privacy-related litigation (including class actions). By NICK ABRAHAMS and JAMIE…

By and - 7 min read

Data, metadata & personal information: landmark Federal Court ruling

The Privacy Act 1988 (Cth) places legal obligations on businesses and government agencies. These obligations are triggered when data meets the definition of ‘personal information’….

By - 7 min read

Cyber security and the legal profession

Law firms are desirable targets for cyber attacks and have a lot to lose from a successful data raid. By THOMAS KALDOR.

By - 6 min read

Health records privacy: contemporary issues, complaints and claims

The ‘big data revolution’ in healthcare has increased the demand for access to identifying health information without consent. By ALISON CHOY FLANNIGAN.

By - 6 min read

When is metadata personal information? The Federal Privacy Commissioner decides

In his most recent determination made under section 52 of the Privacy Act 1988 (Cth), the Australian Privacy Commissioner has found that customer metadata held by Telstra…

By - 6 min read

National security reforms stage three: metadata (part three)

The Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) would establish a mandatory data retention regime requiring communications service providers to retain metadata…

By and - 6 min read

Tweets, texts, forged emails and changing web pages: the admissibility of electronic evidence (part one)

There is rarely a civil case in which an email, text, Facebook entry or webpage snapshot doesn’t feature, yet electronic evidence is often tendered without…

By and - 6 min read