Results for "consumer data right"
361-370 of 826 results for 'consumer data right'
Why every company should have a structured cyber simulation program
The single most determinative factor in how an organisation emerges from a cyberattack is how it conducts itself during the crisis. And the biggest determinant of how an organisation conducts itself during a crisis is how prepared it is. Here are five tips to keep in mind. ...
Ever-expanding jurisdiction: Clearview AI's appeal and extra-territorial application of the Privacy Act
A landmark ruling in Australia confirms that Clearview AI breached the Privacy Act despite lacking a physical presence or supplying products or services in the country, emphasising the extraterritorial reach of privacy laws and the consequences for companies. ...
The hack back: The legality of retaliatory hacking
In circumstances where government departments and law enforcement agencies are unable or unwilling to effectively respond to cybercrime, organisations are increasingly questioning whether or not they have or ought to have a a right to 'hack back' as an offensive retaliatory measure. ...
Why organisations must embed mental health and wellbeing support into cyber incident response planning
Mental health and wellbeing support for cyber professionals, incident response teams and staff targeted in cyber incidents, is now essential to cyber risk management and incident response planning. ...
Lessons from the Australian Intellectual Property Report 2020
The Office of the Chief Economist of IP Australia published its flagship annual publication, the Australian Intellectual Property Report 2020. The report identifies some key trends, which will assist businesses' understanding of current trends in IP filings in Australia. ...
Balancing act: establishing and preserving legal professional privilege in a cyber incident
This guide has been designed to assist companies incorporate legal professional privilege preservation measures into their cyber readiness activities. ...
Ambush marketing: traders beware!
Everyone knows the famous adage that 'the enemy of my enemy is my friend'. But can the friend of my friend be my enemy? In the context of ambush marketing, the answer can be yes. ...
Bold and sometimes radical - the final Murray report
The Financial System Inquirys final report has been released We havent tested this with Word Cloud but we think the report can best be encapsulated in the word however The financial system has held up well however And what follows the however is often bold and sometimes radical There are five ...
United States implements novel sanctions regime to combat cyber threats
President Barack Obama has issued an Executive Order enabling the US Department of Treasury to implement targeted sanctions against foreign individuals or entities whose cyber-enabled activities result in significant threats to the national security foreign policy economic health or financial ...
Risky business: What regulators want you to know about managing cyber risk
Following the Optus and Medibank incidents, companies have (quite rightly!) been scrambling to refresh their cyber incident response plans, run cyber simulations and update boards on their incident re ...


