You may be interested in:
- 1. The perils of big data without strong privacy management processes
Given the increasing use of big data, organisations and agencies should take proactive steps to ensure their big data processes are privacy compliant.
Article, 12 Apr 2018
- 2. Comply or be prepared to pay: China's new Cybersecurity Law
Australian entities might have to comply with not only their domestic cybersecurity laws but those in trading partners, such as the new Cybersecurity Law in China.
Article, 7 Dec 2017
- 3. OAIC guidance to get privacy right for big data
The OAIC’s draft guide encourages entities to take a risk management approach and use existing privacy tools to manage privacy risks while maximising the benefits of big data activities, say Sharon Segal and Byron Moore.
Article, 12 Jul 2016
- 4. When bright lines blur: when is personal information "de-identified" and why does it matter?
Even if you de-identify personal information, you must minimise or manage the risk of others putting the pieces together and identifying individuals.
Article, 12 May 2016
- 5. Pulling up the drawbridge: protecting yourself against cyber attacks Part 2: Cloud computing
With the rise of cloud computing comes risks as well as opportunities. But what are those risks? Alexandra Wedutenko sets out the basic steps to risk assessment and mitigation.
Article, 17 Sep 2015
- 6. Pulling up the drawbridge: protecting yourself against cyber attacks Part 1
How serious are the risks of cyber attacks? And what are cyber attacks anyway? Alexandra Wedutenko looks at the current (and future) size of the problem, and how you can protect yourself.
Article, 17 Sep 2015
- 7. Is the Statement of Requirements or Statement of Work really that important?
A Statement of Work isn't just a tricky technicality – it's a vital tool not just for your tender process, but for the entire project implementation, say Alexandra Wedutenko and Lucinda Watson.
Article, 21 Aug 2014
- 8. Cyber security: Risk management
Criminality and fraud, quite apart from terrorist activity, have gone digital, along with other business disruptors, so a cyber security governance framework with relevant compliance monitoring is essential. How do you check if yours works? Alexandra Wedutenko sets out the important steps to building a robust cyber barricade.
Article, 24 Jul 2014
- 9. Big data and the public sector
Big data analytics can improve government decision making, targeting and delivery of services, but they can be a technical and legal challenge to implement. Alexandra Wedutenko and Lisa Keeling set out the latest Government guidance for agencies.
Article, 29 May 2014