Data, metadata & personal information: landmark Federal Court ruling

The Privacy Act 1988 (Cth) places legal obligations on businesses and government agencies. These obligations are triggered when data meets the definition of ‘personal information’….

By - 7 min read

Cyber security and the legal profession

Law firms are desirable targets for cyber attacks and have a lot to lose from a successful data raid. By THOMAS KALDOR.

By - 6 min read

Health records privacy: contemporary issues, complaints and claims

The ‘big data revolution’ in healthcare has increased the demand for access to identifying health information without consent. By ALISON CHOY FLANNIGAN.

By - 6 min read

When is metadata personal information? The Federal Privacy Commissioner decides

In his most recent determination made under section 52 of the Privacy Act 1988 (Cth), the Australian Privacy Commissioner has found that customer metadata held by Telstra…

By - 6 min read

National security reforms stage three: metadata (part three)

The Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) would establish a mandatory data retention regime requiring communications service providers to retain metadata…

By and - 6 min read

Tweets, texts, forged emails and changing web pages: the admissibility of electronic evidence (part one)

There is rarely a civil case in which an email, text, Facebook entry or webpage snapshot doesn’t feature, yet electronic evidence is often tendered without…

By and - 6 min read

National security reforms stage two: foreign fighters (part two)

Three controversial counter-terrorism powers – control orders, preventative detention orders, and ASIO’s questioning and detention warrant powers – were due to expire under sunset clauses…

By and - 6 min read

National security reforms stage one: intelligence gathering and secrecy (part one)

The National Security Legislation Amendment Act (No 1) 2014 (Cth) allows ASIO officers operating under a single ‘computer access warrant’ to access data held on multiple computers…

By and - 6 min read