SlideShare una empresa de Scribd logo
1 de 10
Tackling the Risks & Combatting the
                                   Underbelly of the Web
                                                          Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS
                                                                               Legal Practice Director




Disclaimer

The materials and presentation itself are general commentary on the law only. It is not legal
advice. Do not rely on the information in the materials without first confirming with Dundas
Lawyers that it applies to your exact circumstances.                                                1
Cyber risk tag cloud




                       2
Underbelly of the web

  Data security

  Privacy Act amendments

    Risks from employees and contractors




                                           3
Underbelly of the web
  Data security
    Cloud storage of personal and sensitive information;
    Confidential information;
    Privacy Act 1988 (Cth); breaches:
      Guide for dealing with data breaches (not mandatory)
    Data breaches occur when personal information is lost or subjected to
    unauthorised access, use, modification or disclosure - eg
      lost or stolen laptops, removable storage devices or paper recordings;
      hard drives and digital storage media being disposed without contents being
      erased first;
      Databases being hacked into or otherwise being illegally accessed; or
      paper records being taken from insecure recycling or garbage bins.
    Presently a Bill before Parliament to introduce changes….



                                                                               4
Privacy Act 1988 (Cth) (Privacy Act)
  Proposed changes
    Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth):
      new amendments may create obligations to comply with mandatory breach
      notifications;
      possible introduction of statutory cause of action for breach of privacy;
      introduction of civil penalties for privacy breaches;
      ALRC recommended removing the small business exemption.




                                                                                  5
Privacy Act 1988 (Cth) (Privacy Act)
  Data breaches – is there an obligation to comply?
    Law enforcement
      Only if there is a real risk of harm to an individual (identity crime, physical
      harm);
      Recommended steps if information is requested by Law-enforcement
      Police obtain a search warrant.




                                                                                        6
Underbelly of the web
  Obligation to comply with law enforcement (continued)…
       Apply to the court for an order that the information be sealed (s55 & 56
       of Criminal Rules); or
       refuse to provide the information and force law enforcement to obtain a
       subpoena provided that in essence the employee is committed or an
       indictment has been presented against the employee – see s29 of the
       Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld)
       (Criminal Rules)
       If the List is produced subject to a Subpoena, then section 29(6) of the
       Criminal Rules provides that:
         “The proper officer must hold the document or thing subject to the court’s direction and must not
         allow anyone to inspect the document or thing other than as directed by the court”:
         If provide Customer List, you should mark it “Confidential” and write Copyright using the ©,
         (regardless of whether copyright actually subsists in a computer generated list) - s56A of the
         Criminal Rules provides that the Court, in responding to an application to copy an exhibit will
         take into account:
              “the content of the exhibit and whether the exhibit contains information that is private,
              confidential or personally or commercially sensitive”.




                                                                                                      7
Underbelly of the web…             continued



  Office of Australian Information Commissioner (OAIC)
  - notification is not currently mandatory but recommended
  when a serious data breach warrants disclosure.
  Guide for dealing with data breaches.




                                                              8
Underbelly of the web…   continued




                                     9
Underbelly of the web…             continued

  Engage best practice technological measures to protect
  against viral and malware threats;
  Employee and contractor background checks if dealing with
  sensitive information;
  Engage a social media monitoring service;
  Develop and implement a Crisis Management Plan;
  Appoint a Privacy Officer and conduct a privacy audit;
  Cyber risk insurance.




                                                              10

Más contenido relacionado

Destacado

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioDavid Chavarri
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing SecretsBluewire Media
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCBluewire Media
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceBluewire Media
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessBluewire Media
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Bluewire Media
 

Destacado (9)

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual Studio
 
Photo Shop Certificate
Photo Shop CertificatePhoto Shop Certificate
Photo Shop Certificate
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing Secrets
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GC
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for Business
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Malcolm Burrows - Web Strategy Summit 2012 Presentation Slides

  • 1. Tackling the Risks & Combatting the Underbelly of the Web Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS Legal Practice Director Disclaimer The materials and presentation itself are general commentary on the law only. It is not legal advice. Do not rely on the information in the materials without first confirming with Dundas Lawyers that it applies to your exact circumstances. 1
  • 2. Cyber risk tag cloud 2
  • 3. Underbelly of the web Data security Privacy Act amendments Risks from employees and contractors 3
  • 4. Underbelly of the web Data security Cloud storage of personal and sensitive information; Confidential information; Privacy Act 1988 (Cth); breaches: Guide for dealing with data breaches (not mandatory) Data breaches occur when personal information is lost or subjected to unauthorised access, use, modification or disclosure - eg lost or stolen laptops, removable storage devices or paper recordings; hard drives and digital storage media being disposed without contents being erased first; Databases being hacked into or otherwise being illegally accessed; or paper records being taken from insecure recycling or garbage bins. Presently a Bill before Parliament to introduce changes…. 4
  • 5. Privacy Act 1988 (Cth) (Privacy Act) Proposed changes Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth): new amendments may create obligations to comply with mandatory breach notifications; possible introduction of statutory cause of action for breach of privacy; introduction of civil penalties for privacy breaches; ALRC recommended removing the small business exemption. 5
  • 6. Privacy Act 1988 (Cth) (Privacy Act) Data breaches – is there an obligation to comply? Law enforcement Only if there is a real risk of harm to an individual (identity crime, physical harm); Recommended steps if information is requested by Law-enforcement Police obtain a search warrant. 6
  • 7. Underbelly of the web Obligation to comply with law enforcement (continued)… Apply to the court for an order that the information be sealed (s55 & 56 of Criminal Rules); or refuse to provide the information and force law enforcement to obtain a subpoena provided that in essence the employee is committed or an indictment has been presented against the employee – see s29 of the Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld) (Criminal Rules) If the List is produced subject to a Subpoena, then section 29(6) of the Criminal Rules provides that: “The proper officer must hold the document or thing subject to the court’s direction and must not allow anyone to inspect the document or thing other than as directed by the court”: If provide Customer List, you should mark it “Confidential” and write Copyright using the ©, (regardless of whether copyright actually subsists in a computer generated list) - s56A of the Criminal Rules provides that the Court, in responding to an application to copy an exhibit will take into account: “the content of the exhibit and whether the exhibit contains information that is private, confidential or personally or commercially sensitive”. 7
  • 8. Underbelly of the web… continued Office of Australian Information Commissioner (OAIC) - notification is not currently mandatory but recommended when a serious data breach warrants disclosure. Guide for dealing with data breaches. 8
  • 9. Underbelly of the web… continued 9
  • 10. Underbelly of the web… continued Engage best practice technological measures to protect against viral and malware threats; Employee and contractor background checks if dealing with sensitive information; Engage a social media monitoring service; Develop and implement a Crisis Management Plan; Appoint a Privacy Officer and conduct a privacy audit; Cyber risk insurance. 10