Search
Searching Content indexed under IT and Internet by Tal Williams ordered by Published Date Descending.
Links to Result pages
 
1  
 
Title
Country
Organisation
Author
Date
1
Mandatory data breach reporting: Employees continue to be a major contributing factor
The lesson to take from statistics about mandatory data breach reporting is that staff are still key to data security.
Australia
30 Sep 2019
2
Cyber squatting – How to challenge someone using your name as a domain name
Some domain names are only registered in order to extract money and/or to ruin the reputation of the trademark holder.
Australia
30 May 2019
3
Update on Online Contracts: How binding is a "click"? How binding is a reference to a set of terms?
Australian courts apply general contract law principles to determine if terms and conditions on the website are binding.
Australia
24 Feb 2017
4
SPAM - It's still happening
Two recent and quite significant penalties were imposed for organisations that failed to comply with the Spam Act.
Australia
6 Sep 2016
5
Strategies to minimise cyber breaches and their consequences
This OAIC Guide gives some examples of reasonable steps and strategies you should take to protect personal information.
Australia
6 Apr 2016
6
Legal Frontiers in Cyber-Security
Recent high-profile data breaches highlight the increasing importance of hyper-vigilance in relation to cyber-security.
Australia
23 Nov 2015
7
When, where and to whom you send emails will now be recorded…
Metadata will be required to be retained by telecommunications carriers and ISPs for a mandatory period of two years.
Australia
13 Nov 2015
8
Technology Update: Outsourcing involving Shared Computing Services for APRA regulated institutions (including Cloud services)
This APRA Information paper outlines notification, consultation and risk management requirements related to outsourcing.
Australia
22 Sep 2015
9
Use of photos from another Twitter or internet page: copyight issues
The publication of photos on Twitter or on other web pages does not entitle anyone to use or republish those photos.
Australia
7 Sep 2015
10
Technology Law - Email correspondence found to form a binding agreement in relation to the purchase of land
The intentions of the parties must be very clear – either there is or there is not an agreement at that particular time.
Australia
12 Aug 2015
11
The Importance of Cyber Security to business
If hackers or ex-staff can obtain access to computer systems, they can steal IP and cause significant commercial damage.
Australia
18 May 2015
12
Cyber Resilience - ASIC Report
This ASIC report on cyber resilience may help regulated organisations improve their ability to respond to cyber-attacks.
Australia
12 May 2015
13
Cloud storage, personal data and privacy - Make sure your company is protected!
Cloud storage and the protection of personal information is a vexed and difficult issue for companies to deal with.
Australia
1 Dec 2014
14
Five things to know about electronic communications
These are five points about electronic communications, via email and the internet, that you should be familiar with.
Australia
1 Dec 2014
Links to Result pages
 
1