Abstract This article explores how Australian courts are using social media to disclose information about decisions as well as to advise about court appointments, media reports, and administrative matters. It examines how the social media channels are being used...
Cybersecurity is a growing concern for businesses of all sizes. Hacks and data breaches are becoming more common and more complex. While no business is expected to be invincible against cyber attack, they are expected to be fully prepared and to take all practicable...
Data is now the most valuable commodity in the world. Still, few businesses outside the tech sphere have fully come to terms with the value of the data they hold - and the legal industry is no different. Knowledge Managers undertake a number of data-intensive...
There is no single way of responding to a personal information security breach. Each breach must be dealt with on its own merits. This will require the business to assess the breach, the risks involved and the possible consequences that may flow from the breach...
It’s becoming increasingly obvious that in order to mitigate cyber security risk, companies need to train their staff in how to identify and respond to IT threats. When over 90% of IT breaches are via staff, it would be prudent to accept this as major risk. In...
Introduction Many entities operating online acquire large quantities of data through various means, whether it be through payment details, subscriptions or online surveys. A lot of this data is acquired by entities online. This article discusses a recent determination...
Over the last 18 months, there has been a rise in ransomware attacks, impacting businesses both domestically and globally. Dudley Kneller, Partner at Gadens, defines what is ransomware, outlines what does an attack look like, cites recent examples and concludes...
As Australia undergoes significant changes to its privacy laws, it’s crucial for businesses of all sizes to prepare. Following a multi-year review, the government is proposing amendments to the Privacy Act that could reshape how organisations manage personal information...
After nearly a week, the details of the Optus cyber attack are still unclear. At one point, it was thought that confidential data relating to 10,000 unlucky Optus customers had potentially been leaked by the now infamous Optus hackers. Passport details, dates of...
Newsletter subscribers can read the full article here . Introduction New technologies are making it easier to collect and use the images and biometrics of individuals. This article examines the types of biometric technologies being used, their legal ramifications...
In-house lawyers used to operate like independent advisors – there to answer any pressing legal questions you might have or to run a document past before signing the dotted line. But a few years back we saw this change. In-house legal teams transitioned into high...
Inside the June 2022 edition of the Financial Services Newsletter, three legal experts from Clyde & Co analyse the fast-moving developments in cybersecurity and privacy affecting the financial services industry. Here, we present their top 10 predictions for cyber...
Should Australian organisations, even those that don’t have a Chinese market for their products or services, care about China’s new privacy law? On 1 November 2021, China’s Personal Information Protection Law (PIPL) commenced in the People’s Republic of China...
As 2022 cyber events have shown us, few crises have the potential to impact an organisation’s reputation as negatively as a cyber incident. When not handled correctly, the damage to an organisation’s reputation from a cyber event can be severe and long lasting...
Recent major data breaches in Australia, suffered by telecom operator Singtel Optus, health insurer Medibank Private and financial services company Latitude Financial have led to a wave of class-action lawsuits exploring new ground in the country’s legal system...