SlideShare una empresa de Scribd logo
1 de 10
Tackling the Risks & Combatting the
                                   Underbelly of the Web
                                                          Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS
                                                                               Legal Practice Director




Disclaimer

The materials and presentation itself are general commentary on the law only. It is not legal
advice. Do not rely on the information in the materials without first confirming with Dundas
Lawyers that it applies to your exact circumstances.                                                1
Cyber risk tag cloud




                       2
Underbelly of the web

  Data security

  Privacy Act amendments

    Risks from employees and contractors




                                           3
Underbelly of the web
  Data security
    Cloud storage of personal and sensitive information;
    Confidential information;
    Privacy Act 1988 (Cth); breaches:
      Guide for dealing with data breaches (not mandatory)
    Data breaches occur when personal information is lost or subjected to
    unauthorised access, use, modification or disclosure - eg
      lost or stolen laptops, removable storage devices or paper recordings;
      hard drives and digital storage media being disposed without contents being
      erased first;
      Databases being hacked into or otherwise being illegally accessed; or
      paper records being taken from insecure recycling or garbage bins.
    Presently a Bill before Parliament to introduce changes….



                                                                               4
Privacy Act 1988 (Cth) (Privacy Act)
  Proposed changes
    Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth):
      new amendments may create obligations to comply with mandatory breach
      notifications;
      possible introduction of statutory cause of action for breach of privacy;
      introduction of civil penalties for privacy breaches;
      ALRC recommended removing the small business exemption.




                                                                                  5
Privacy Act 1988 (Cth) (Privacy Act)
  Data breaches – is there an obligation to comply?
    Law enforcement
      Only if there is a real risk of harm to an individual (identity crime, physical
      harm);
      Recommended steps if information is requested by Law-enforcement
      Police obtain a search warrant.




                                                                                        6
Underbelly of the web
  Obligation to comply with law enforcement (continued)…
       Apply to the court for an order that the information be sealed (s55 & 56
       of Criminal Rules); or
       refuse to provide the information and force law enforcement to obtain a
       subpoena provided that in essence the employee is committed or an
       indictment has been presented against the employee – see s29 of the
       Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld)
       (Criminal Rules)
       If the List is produced subject to a Subpoena, then section 29(6) of the
       Criminal Rules provides that:
         “The proper officer must hold the document or thing subject to the court’s direction and must not
         allow anyone to inspect the document or thing other than as directed by the court”:
         If provide Customer List, you should mark it “Confidential” and write Copyright using the ©,
         (regardless of whether copyright actually subsists in a computer generated list) - s56A of the
         Criminal Rules provides that the Court, in responding to an application to copy an exhibit will
         take into account:
              “the content of the exhibit and whether the exhibit contains information that is private,
              confidential or personally or commercially sensitive”.




                                                                                                      7
Underbelly of the web…             continued



  Office of Australian Information Commissioner (OAIC)
  - notification is not currently mandatory but recommended
  when a serious data breach warrants disclosure.
  Guide for dealing with data breaches.




                                                              8
Underbelly of the web…   continued




                                     9
Underbelly of the web…             continued

  Engage best practice technological measures to protect
  against viral and malware threats;
  Employee and contractor background checks if dealing with
  sensitive information;
  Engage a social media monitoring service;
  Develop and implement a Crisis Management Plan;
  Appoint a Privacy Officer and conduct a privacy audit;
  Cyber risk insurance.




                                                              10

Más contenido relacionado

Destacado

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioDavid Chavarri
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing SecretsBluewire Media
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCBluewire Media
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceBluewire Media
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessBluewire Media
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Bluewire Media
 

Destacado (9)

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual Studio
 
Photo Shop Certificate
Photo Shop CertificatePhoto Shop Certificate
Photo Shop Certificate
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing Secrets
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GC
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for Business
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Malcolm Burrows - Web Strategy Summit 2012 Presentation Slides

  • 1. Tackling the Risks & Combatting the Underbelly of the Web Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS Legal Practice Director Disclaimer The materials and presentation itself are general commentary on the law only. It is not legal advice. Do not rely on the information in the materials without first confirming with Dundas Lawyers that it applies to your exact circumstances. 1
  • 2. Cyber risk tag cloud 2
  • 3. Underbelly of the web Data security Privacy Act amendments Risks from employees and contractors 3
  • 4. Underbelly of the web Data security Cloud storage of personal and sensitive information; Confidential information; Privacy Act 1988 (Cth); breaches: Guide for dealing with data breaches (not mandatory) Data breaches occur when personal information is lost or subjected to unauthorised access, use, modification or disclosure - eg lost or stolen laptops, removable storage devices or paper recordings; hard drives and digital storage media being disposed without contents being erased first; Databases being hacked into or otherwise being illegally accessed; or paper records being taken from insecure recycling or garbage bins. Presently a Bill before Parliament to introduce changes…. 4
  • 5. Privacy Act 1988 (Cth) (Privacy Act) Proposed changes Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth): new amendments may create obligations to comply with mandatory breach notifications; possible introduction of statutory cause of action for breach of privacy; introduction of civil penalties for privacy breaches; ALRC recommended removing the small business exemption. 5
  • 6. Privacy Act 1988 (Cth) (Privacy Act) Data breaches – is there an obligation to comply? Law enforcement Only if there is a real risk of harm to an individual (identity crime, physical harm); Recommended steps if information is requested by Law-enforcement Police obtain a search warrant. 6
  • 7. Underbelly of the web Obligation to comply with law enforcement (continued)… Apply to the court for an order that the information be sealed (s55 & 56 of Criminal Rules); or refuse to provide the information and force law enforcement to obtain a subpoena provided that in essence the employee is committed or an indictment has been presented against the employee – see s29 of the Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld) (Criminal Rules) If the List is produced subject to a Subpoena, then section 29(6) of the Criminal Rules provides that: “The proper officer must hold the document or thing subject to the court’s direction and must not allow anyone to inspect the document or thing other than as directed by the court”: If provide Customer List, you should mark it “Confidential” and write Copyright using the ©, (regardless of whether copyright actually subsists in a computer generated list) - s56A of the Criminal Rules provides that the Court, in responding to an application to copy an exhibit will take into account: “the content of the exhibit and whether the exhibit contains information that is private, confidential or personally or commercially sensitive”. 7
  • 8. Underbelly of the web… continued Office of Australian Information Commissioner (OAIC) - notification is not currently mandatory but recommended when a serious data breach warrants disclosure. Guide for dealing with data breaches. 8
  • 9. Underbelly of the web… continued 9
  • 10. Underbelly of the web… continued Engage best practice technological measures to protect against viral and malware threats; Employee and contractor background checks if dealing with sensitive information; Engage a social media monitoring service; Develop and implement a Crisis Management Plan; Appoint a Privacy Officer and conduct a privacy audit; Cyber risk insurance. 10