Digital ID in your practice: a guide for firms and their clients
New national Digital ID laws will change the game for data holders and be in force by December. Are you ready?
By Simone Herbert-Lowe - 1 min readNew national Digital ID laws will change the game for data holders and be in force by December. Are you ready?
By Simone Herbert-Lowe - 1 min readDespite appearing watered down, the long-awaited privacy reforms still impose new and stronger obligations.
By Anna Johnston - 2 min readFollowing the review of the Privacy Act, key reforms have been proposed to bring the Act into the digital age and minimise human rights risks.
By Lorraine Finlay, Patrick Hooton and Wendy Lam - 1 min readFrom early 2018, new privacy legislation will require the mandatory reporting of certain data breaches for organisations which are required to comply with the Privacy…
By Simone Herbert-Lowe - 3 min readThe introduction of mandatory data breach notification obligations may ultimately lead to an increase in privacy-related litigation (including class actions). By NICK ABRAHAMS and JAMIE…
By Nick Abrahams and James Griffin - 2 min readThe Privacy Act 1988 (Cth) places legal obligations on businesses and government agencies. These obligations are triggered when data meets the definition of ‘personal information’….
By Anna Johnston - 1 min readLaw firms are desirable targets for cyber attacks and have a lot to lose from a successful data raid. By THOMAS KALDOR.
By Thomas Kaldor - 2 min readThe ‘big data revolution’ in healthcare has increased the demand for access to identifying health information without consent. By ALISON CHOY FLANNIGAN.
By Alison Choy Flannigan - 2 min readIn his most recent determination made under section 52 of the Privacy Act 1988 (Cth), the Australian Privacy Commissioner has found that customer metadata held by Telstra…
By Caren Whip - 1 min readThe Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) would establish a mandatory data retention regime requiring communications service providers to retain metadata…
By Keiran Hardy and Professor George Williams - 2 min readThere is rarely a civil case in which an email, text, Facebook entry or webpage snapshot doesn’t feature, yet electronic evidence is often tendered without…
By Julie Soars and Carmel Lee - 3 min readThree controversial counter-terrorism powers – control orders, preventative detention orders, and ASIO’s questioning and detention warrant powers – were due to expire under sunset clauses…
By Keiran Hardy and Professor George Williams - 3 min readThe National Security Legislation Amendment Act (No 1) 2014 (Cth) allows ASIO officers operating under a single ‘computer access warrant’ to access data held on multiple computers…
By Professor George Williams and Keiran Hardy - 2 min read