Technology-facilitated stalking and abuse: putting our legal framework to the test

Technology-assisted stalking and abuse is a form of domestic violence (DV) that is rapidly on the rise. By CHARISSA SUN.

By - 2 min read

Tweets, texts, forged emails and changing webpages: emerging issues and practical examples (part two)

The first article of this two-part series considered general admissibility issues relating to electronically stored information (ESI) under the Evidence Act NSW and tips to overcome objections….

By and - 1 min read

National security reforms stage three: metadata (part three)

The Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) would establish a mandatory data retention regime requiring communications service providers to retain metadata…

By and - 2 min read

Tweets, texts, forged emails and changing web pages: the admissibility of electronic evidence (part one)

There is rarely a civil case in which an email, text, Facebook entry or webpage snapshot doesn’t feature, yet electronic evidence is often tendered without…

By and - 3 min read

National security reforms stage one: intelligence gathering and secrecy (part one)

The National Security Legislation Amendment Act (No 1) 2014 (Cth) allows ASIO officers operating under a single ‘computer access warrant’ to access data held on multiple computers…

By and - 2 min read

Search engine optimisation: how much is too much?

The case of Lift Shop Pty Ltd v Easy Living Home Elevators Pty Ltd [2014] FCAFC 75 provides new guidance on the legality of search engine optimisation…

By - 2 min read

Protecting software in the digital age

Obtaining evidence of end-user copyright infringement is the major challenge of the digital age, as there is no point of sale where evidence can be…

By - 2 min read