Big Data, Big Responsibilities: A Guide to Privacy & Data Security for Australian Business

Author:   Nick Abrahams ,  Jim Lennon
Publisher:   Totalu Pty Ltd
ISBN:  

9780994251558


Pages:   158
Publication Date:   20 March 2019
Format:   Paperback
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Our Price $15.00 Quantity:  
Add to Cart

Share |

Big Data, Big Responsibilities: A Guide to Privacy & Data Security for Australian Business


Add your own review!

Overview

Cyber security and privacy is a critical issue for Australian businesses. Privacy & cyber law experts, Nick Abrahams and Jim Lennon, have written this book which provides an essential summary of Australian privacy laws, including recent mandatory data breach notification obligations. This practical and easy-to-read book includes: an explanation of the main privacy and cyber security regulations; helpful compliance checklists; and an analysis of the differences between Australia's privacy laws and the GDPR (the General Data Protection Regulation in the EU). It also has a useful guide to what organisations can do if they are the subject of a ransomware attack. This is increasingly important as cyber security firm, Norton has found that one in ten business operators in Australia have been affected by a ransomware attack. Nick and Jim have acted on some of the most high profile privacy breach cases in Australia. Nick is the Global Head of Technology & Innovation for international law firm, Norton Rose Fulbright and Jim Lennon is a Special Counsel in their Technology & Privacy practice. Profits from the book will go to charity.

Full Product Details

Author:   Nick Abrahams ,  Jim Lennon
Publisher:   Totalu Pty Ltd
Imprint:   Totalu Pty Ltd
ISBN:  

9780994251558


ISBN 10:   0994251556
Pages:   158
Publication Date:   20 March 2019
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Table of Contents

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Part 1: Privacy Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 At a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Background and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Key privacy compliance requirements . . . . . . . . . . . . . . . . . . . . . . . 10 Other important provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Part 2: Data Breach Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 At a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Data breaches in Australia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 The mandatory data breach notification scheme . . . . . . . . . . . . . . 26 Eligible data breaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Mandatory notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Practical implications and next steps . . . . . . . . . . . . . . . . . . . . . . . . 39 Incidents that might require notification . . . . . . . . . . . . . . . . . . . . . 45 Other reporting considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Ransomware and strategies for responding . . . . . . . . . . . . . . . . . . 72 Part 3: GDPR & Privacy Act Gap Analysis 79 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background to the GDPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Comparison with the Privacy Act . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 How to use this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Appendix 1 – Complying with the Australian Privacy Principles . 114 Appendix 2 – APP Compliance Checklist . . . . . . . . . . . . . . . . . . . . 137 Appendix 3 – Privacy Policy Compliance Checklist . . . . . . . . . . . . 147 Appendix 4 – The Australian Privacy Principles – full text . . . . . . 151 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Reviews

Testimonials for the book: This book provides a very useful summary of the privacy and cyber issues that all of us involved in the oversight and management of Australian companies need to consider. David Gonski, Chairman, Australia and New Zealand Banking Group A helpful resource for anyone wanting to know more about cyber risks for Australian organisations. Gordon Cairns, Chairman of Origin Energy & Woolworths Group For organisations today, whether large or small, there is no greater threat to corporate governance & reputation than cyber mismanagement. This book outlines some of these looming threats but also provides valuable insights and strategies about how to identify and manage these risks to corporate advantage. Julie Inman-Grant, Australian eSafety Commissioner


Author Information

Nick Abrahams is the Global Head of Technology & Innovation for international law firm, Norton Rose Fulbright. In addition to his tech & privacy law practice, co-created Parker, the world’s first AI-powered privacy chatbot. He is a disruptor in his own right, having co-founded successful online legal service LawPath. He is on the boards of: ASX300 software company, Integrated Research; global genomic medicine leader, the Garvan Foundation; the Sydney Film Festival; and the Vodafone Foundation. He is the author of the Kindle best-selling book Digital Disruption in Australia and produced the mockumentary Searching for Alison Porchnik featuring Woody Allen and Carol Kane. Nick is a Futurist, Speaker & Facilitator. Please see www.nickabrahams.com for more information. Jim Lennon is a commercial lawyer with over 25 years’ experience in privacy, information technology and intellectual property (IT/IP). His main expertise is in privacy, data breaches and cyber security, spam, cloud services and IT procurement. He also regularly advises on cross-border data protection and data breach issues. Jim has been a volunteer advisor for the Arts Law Centre of Australia since 1993. He is also the Specialist Editor for the chapters on Information Technology, E-commerce and Intellectual Property in the Australian Encyclopedia of Forms and Precedents published by LexisNexis.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List