271-280 of 374 results
Double trouble: How to handle a data breach involving more than one organisation
Where multiple entities jointly hold personal information compromised in a data breach only one of those entities will need to comply with the assessment and notification requirements under the Notifiable Data Breaches Scheme NDB Scheme That is compliance by one entity will be taken to constitute ...
Five things you didn't know about the NDB Scheme
Five things you didnt know about the NDB Scheme ...
Your data breach response plan should...
Your data breach response plan should ...
Your guide to notifying an eligible data breach
Your guide to notifying an eligible data breach ...
Hot off the press: Key takeaways from the OAIC's Data breach preparation and response guide
On Tuesday 20 February the Office of the Australian Information Commissioner OAIC published a comprehensive new guide to the Notifiable Data Breaches NDB Scheme The Data breach preparation and response guide consolidates information from the OAICs Data breach notification - A guide to handling ...
How to determine whether you have suffered an eligible data breach
From 22 February 2018 the Notifiable Data Breaches Scheme NDB Scheme will require all entities covered by the regime to notify the Office of the Australian Information Commissioner OAIC and affected individuals of an eligible data breach ...
Corporate law developments
Welcome to our monthly snapshot of regulatory updates and other developments in corporate law We know you are busy so our focus is on capturing key issues ...
New restrictions on foreign persons acquiring Australian land and agribusinesses
The Federal Treasurer has today announced material changes to Australias foreign investment regime which will significantly impact transactions undertaken by foreign persons of Australian land particularly agricultural land and agribusinesses Partner Wendy Rae and Senior Associate Nick Kefalianos ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
OAIC concludes investigation into Precedent Communications
The OAIC has concluded its investigation into Precedent Communications following a massive data breach that rocked the Australian Red Cross Blood Service ...


