131-140 of 206 results
Using third party brands in video games: issues and opportunities
One of the emerging battlegrounds for brand owners is video games, particularly with the growth of virtual reality applications. A recent claim made in the US illustrates how having your brand featured in a video game can be a problem - but depending on the circumstances, it could also present a com ...
What you need to know about mandatory data breach notification
In response to the rising number of cyberattacks, new legislation has been introduced that proposes a mandatory notification regime that will take effect from February next year. ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
Double trouble: How to handle a data breach involving more than one organisation
Where multiple entities jointly hold personal information compromised in a data breach only one of those entities will need to comply with the assessment and notification requirements under the Notifiable Data Breaches Scheme NDB Scheme That is compliance by one entity will be taken to constitute ...
Five things you didn't know about the NDB Scheme
Five things you didnt know about the NDB Scheme ...
Your data breach response plan should...
Your data breach response plan should ...
Your guide to notifying an eligible data breach
Your guide to notifying an eligible data breach ...
Federal Government passes wide-ranging data retention laws
Telecommunications and internet service providers will incur significant new compliance costs under the Federal Government's controversial new data retention laws. ...
ASIC highlights importance of cyber resilience
Key cyber risks faced by ASICs regulated population as well as the legal and compliance obligations to manage those risks are highlighted in a new ASIC report ASIC also identifies steps entities can take to address the risks The report marks a growing focus on cyber security issues by ASIC which is ...
Your 'Metadata' as Personal Information
In a decision published this week the Australian Privacy Commissioner has clarified that metadata may be personal information when an organisation has the capacity and resources to link that information to an individual Partner Michael Pattison Associate Priyanka Nair and Law Graduate Leah Wickman ...


