581-590 of 741 results
Bested by 'best method' requirement
Australias unique statutory best method requirement continues to get the better of patent applicants and patentees Associate Claire Gregg looks at two recent decisions that provide some insight into the requirement of disclosing the best method known to the applicant of performing the invention at ...
Employment & Safety
In this issue we look at the Fair Work Commissions support for unpaid domestic violence leave and casual conversion clauses an unfair dismissal following a breach of a zero tolerance drug and alcohol policy proposed WHS amendments in Queensland and another enterprise agreement is terminated ...
Competition news
In Touch looks at what's been happening in Competition this month and what it means for your business ...
Subpoenas under the IAA: Foreign-seated arbitrations need not apply
A recent Federal Court decision suggests a narrow approach to judicial support of international arbitrations limiting access to evidence located in Australia for parties of foreign-seated arbitrations Partner Nick Rudge and Overseas Lawyer Caroline Swartz-Zern report ...
APRA proposes cross-industry framework for management of information security
APRA has released for consultation its first prudential standard of information security Prudential Standard CPS 234 Information Security CPS 234 - a key response to the growing threat of cyber attacks ...
ASIC Corporate Plan puts cyber resilience high on the agenda
ASIC's latest Corporate Plan has put cyber resilience high on the agenda ...
OAIC concludes investigation into Precedent Communications
The OAIC has concluded its investigation into Precedent Communications following a massive data breach that rocked the Australian Red Cross Blood Service ...
Should you pay a cyber criminal's ransom?
With ransomware attacks affecting six out of 10 Australian organisations1 businesses are being forced to decide whether to concede to the ransom demands of cyber criminals in order to regain access to critical data However with no guarantee that payment of a ransom will release their data businesses ...
The hack back: The legality of retaliatory hacking
In circumstances where government departments and law enforcement agencies are unable or unwilling to effectively respond to cybercrime, organisations are increasingly questioning whether or not they have or ought to have a a right to 'hack back' as an offensive retaliatory measure. ...
The walking dread - fostering cyber awareness in the age of killer viruses
If the last decade of zombie movies and TV shows has taught us anything and it has its a check every bathroom stall before sitting down and b it only takes one idiot to leave a door open for a world of hurt to rush in Cybercrime is one of the top three threats in the world aside from natural ...


