Contact us on (02) 8445 2300
For all customer service and order enquiries

Woodslane Online Catalogues

Big Data, Big Responsibilities

A Guide to Privacy & Data Security For Australian Business
Description
Author
Biography
Table of
Contents
Sales
Points
Reviews
Google
Preview
Cyber security and privacy is a critical issue for Australian businesses. Privacy & cyber law experts, Nick Abrahams and Jim Lennon, have written this book which provides an essential summary of Australian privacy laws, including recent mandatory data breach notification obligations. This practical and easy-to-read book includes: an explanation of the main privacy and cyber security regulations; helpful compliance checklists; and an analysis of the differences between Australia's privacy laws and the GDPR (the General Data Protection Regulation in the EU). It also has a useful guide to what organisations can do if they are the subject of a ransomware attack. This is increasingly important as cyber security firm, Norton has found that one in ten business operators in Australia have been affected by a ransomware attack. Nick and Jim have acted on some of the most high profile privacy breach cases in Australia. Nick is the Global Head of Technology & Innovation for international law firm, Norton Rose Fulbright and Jim Lennon is a Special Counsel in their Technology & Privacy practice. Profits from the book will go to charity.
Nick Abrahams is the Global Head of Technology & Innovation for international law firm, Norton Rose Fulbright. In addition to his tech & privacy law practice, co-created Parker, the world’s first AI-powered privacy chatbot. He is a disruptor in his own right, having co-founded successful online legal service LawPath. He is on the boards of: ASX300 software company, Integrated Research; global genomic medicine leader, the Garvan Foundation; the Sydney Film Festival; and the Vodafone Foundation. He is the author of the Kindle best-selling book Digital Disruption in Australia and produced the mockumentary Searching for Alison Porchnik featuring Woody Allen and Carol Kane. Nick is a Futurist, Speaker & Facilitator. Please see www.nickabrahams.com for more information. Jim Lennon is a commercial lawyer with over 25 years’ experience in privacy, information technology and intellectual property (IT/IP). His main expertise is in privacy, data breaches and cyber security, spam, cloud services and IT procurement. He also regularly advises on cross-border data protection and data breach issues. Jim has been a volunteer advisor for the Arts Law Centre of Australia since 1993. He is also the Specialist Editor for the chapters on Information Technology, E-commerce and Intellectual Property in the Australian Encyclopedia of Forms and Precedents published by LexisNexis.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Part 1: Privacy Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 At a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Background and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Key privacy compliance requirements . . . . . . . . . . . . . . . . . . . . . . . 10 Other important provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Part 2: Data Breach Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 At a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Data breaches in Australia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 The mandatory data breach notification scheme . . . . . . . . . . . . . . 26 Eligible data breaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Mandatory notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Practical implications and next steps . . . . . . . . . . . . . . . . . . . . . . . . 39 Incidents that might require notification . . . . . . . . . . . . . . . . . . . . . 45 Other reporting considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Ransomware and strategies for responding . . . . . . . . . . . . . . . . . . 72 Part 3: GDPR & Privacy Act Gap Analysis 79 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background to the GDPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Comparison with the Privacy Act . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 How to use this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Appendix 1 – Complying with the Australian Privacy Principles . 114 Appendix 2 – APP Compliance Checklist . . . . . . . . . . . . . . . . . . . . 137 Appendix 3 – Privacy Policy Compliance Checklist . . . . . . . . . . . . 147 Appendix 4 – The Australian Privacy Principles – full text . . . . . . 151 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
* Cyber security and privacy is a critical issue for Australian businesses. * This book which provides an essential summary of Australian privacy laws, including recent mandatory data breach notification obligations. * It also includes helpful compliance checklists; and an analysis of the differences between Australia's privacy laws and the GDPR (the General Data Protection Regulation in the EU). * The book contains a useful guide to what organisations can do if they are the subject of a ransomware attack. * Ongoing digital and social media campaign to promote the book in Kindle and paperback version, along with use at corporate events.
Testimonials for the book: “This book provides a very useful summary of the privacy and cyber issues that all of us involved in the oversight and management of Australian companies need to consider.” David Gonski, Chairman, Australia and New Zealand Banking Group “A helpful resource for anyone wanting to know more about cyber risks for Australian organisations.” Gordon Cairns, Chairman of Origin Energy & Woolworths Group “For organisations today, whether large or small, there is no greater threat to corporate governance & reputation than cyber mismanagement. This book outlines some of these looming threats but also provides valuable insights and strategies about how to identify and manage these risks to corporate advantage.” Julie Inman-Grant, Australian eSafety Commissioner
Google Preview content