211-220 of 327 results
How to create a cyber resilient supply chain
What do the Australian Department of Defence Target Verizon and the Australian Red Cross Blood Service have in common They all suffered massive data breaches linked to a failure in their supply chain These breaches are a good reminder that with so much attention directed at securing your ...
OAIC concludes investigation of Australian Red Cross data breach
OAIC concludes investigation of Australian Red Cross data breach where a one-off human error by a third party provider's employee led to a massive data breach that hit the Australian Red Cross Blood Service ...
Worth the wait? Release of draft mandatory data breach notification laws
Following a period of industry consultation the Federal Government has introduced updated legislation that will introduce a mandatory data breach notification scheme The new Bill will amend the Privacy Act 1988 Cth when it comes into force and will apply to all Australian companies currently subject ...
Predictive coding gets green light from an Australian court
The Victorian Supreme Court recently handed down the first decision of an Australian court to specifically consider and approve the use of predictive coding technology in a large-scale discovery exercise Partner Nick Rudge Managing Associate Kate Austin and Applied Legal Technology Manager Lisa ...
NSW to bolster cyber security
The NSW Government has recently announced a new $11.4 million investment to address emerging technology challenges including cyber security. ...
Data deal - mandatory data breach notification laws to be introduced as trade-off for controversial metadata retention regime
The Federal Government in a surprising and highly significant move for companies in Australia has committed to enacting a mandatory data breach notification scheme before the end of 2015 which will apply to all Australian companies currently subject to the Privacy Act The proposal is not limited to ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
Should you pay a cyber criminal's ransom?
With ransomware attacks affecting six out of 10 Australian organisations1 businesses are being forced to decide whether to concede to the ransom demands of cyber criminals in order to regain access to critical data However with no guarantee that payment of a ransom will release their data businesses ...
Fact sheet: Starting-up smart: How to get the most out of your lawyer, for less
If youre focused on testing your idea developing your product and scraping together enough funds to talk to foundation customers engaging a lawyer could be the last thing on your mind ...
Fact sheet: The term sheet decoded
The term sheet is the key document that determines the basis on which VCs and other investors will invest in your startup This means that its crucial to get the basics right from the outset ...


