Validity and enforceability of electronic & digital signatures

Two decisions have prompted doubts amongst practitioners about electronic signatures. By TROY ROLLO.

By - 6 min read

Predictive coding: machine learning disrupts discovery

The Victoria decision in McConnell Dowell Constructions (Aust) Pty Ltd v Santam Ltd (No 1) signals the emerging judicial acceptance of predictive coding. By THOMAS…

By and - 10 min read

Where are we going? New media, technology and the law

New media is affecting the practice of law in many ways, from social media pages being tendered as evidence to live posting from court. By…

By and - 7 min read

How the Internet of Things will affect the future of litigation

The Internet of Things (IoT) is the latest phase in the evolution of the internet, bringing with it unprecedented access and insights into people’s lives….

By and - 7 min read

Navigating the blockchain and the law

Lawyers must be aware of regulatory debates surrounding blockchain or distributed ledger technology, and be in a position to advise clients about unique challenges created…

By - 8 min read

Technology-facilitated stalking and abuse: putting our legal framework to the test

Technology-assisted stalking and abuse is a form of domestic violence (DV) that is rapidly on the rise. By CHARISSA SUN.

By - 6 min read

Tweets, texts, forged emails and changing webpages: emerging issues and practical examples (part two)

The first article of this two-part series considered general admissibility issues relating to electronically stored information (ESI) under the Evidence Act NSW and tips to overcome objections….

By and - 7 min read

National security reforms stage three: metadata (part three)

The Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) would establish a mandatory data retention regime requiring communications service providers to retain metadata…

By and - 6 min read

Tweets, texts, forged emails and changing web pages: the admissibility of electronic evidence (part one)

There is rarely a civil case in which an email, text, Facebook entry or webpage snapshot doesn’t feature, yet electronic evidence is often tendered without…

By and - 6 min read

National security reforms stage one: intelligence gathering and secrecy (part one)

The National Security Legislation Amendment Act (No 1) 2014 (Cth) allows ASIO officers operating under a single ‘computer access warrant’ to access data held on multiple computers…

By and - 6 min read