SlideShare une entreprise Scribd logo
1  sur  10
Tackling the Risks & Combatting the
                                   Underbelly of the Web
                                                          Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS
                                                                               Legal Practice Director




Disclaimer

The materials and presentation itself are general commentary on the law only. It is not legal
advice. Do not rely on the information in the materials without first confirming with Dundas
Lawyers that it applies to your exact circumstances.                                                1
Cyber risk tag cloud




                       2
Underbelly of the web

  Data security

  Privacy Act amendments

    Risks from employees and contractors




                                           3
Underbelly of the web
  Data security
    Cloud storage of personal and sensitive information;
    Confidential information;
    Privacy Act 1988 (Cth); breaches:
      Guide for dealing with data breaches (not mandatory)
    Data breaches occur when personal information is lost or subjected to
    unauthorised access, use, modification or disclosure - eg
      lost or stolen laptops, removable storage devices or paper recordings;
      hard drives and digital storage media being disposed without contents being
      erased first;
      Databases being hacked into or otherwise being illegally accessed; or
      paper records being taken from insecure recycling or garbage bins.
    Presently a Bill before Parliament to introduce changes….



                                                                               4
Privacy Act 1988 (Cth) (Privacy Act)
  Proposed changes
    Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth):
      new amendments may create obligations to comply with mandatory breach
      notifications;
      possible introduction of statutory cause of action for breach of privacy;
      introduction of civil penalties for privacy breaches;
      ALRC recommended removing the small business exemption.




                                                                                  5
Privacy Act 1988 (Cth) (Privacy Act)
  Data breaches – is there an obligation to comply?
    Law enforcement
      Only if there is a real risk of harm to an individual (identity crime, physical
      harm);
      Recommended steps if information is requested by Law-enforcement
      Police obtain a search warrant.




                                                                                        6
Underbelly of the web
  Obligation to comply with law enforcement (continued)…
       Apply to the court for an order that the information be sealed (s55 & 56
       of Criminal Rules); or
       refuse to provide the information and force law enforcement to obtain a
       subpoena provided that in essence the employee is committed or an
       indictment has been presented against the employee – see s29 of the
       Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld)
       (Criminal Rules)
       If the List is produced subject to a Subpoena, then section 29(6) of the
       Criminal Rules provides that:
         “The proper officer must hold the document or thing subject to the court’s direction and must not
         allow anyone to inspect the document or thing other than as directed by the court”:
         If provide Customer List, you should mark it “Confidential” and write Copyright using the ©,
         (regardless of whether copyright actually subsists in a computer generated list) - s56A of the
         Criminal Rules provides that the Court, in responding to an application to copy an exhibit will
         take into account:
              “the content of the exhibit and whether the exhibit contains information that is private,
              confidential or personally or commercially sensitive”.




                                                                                                      7
Underbelly of the web…             continued



  Office of Australian Information Commissioner (OAIC)
  - notification is not currently mandatory but recommended
  when a serious data breach warrants disclosure.
  Guide for dealing with data breaches.




                                                              8
Underbelly of the web…   continued




                                     9
Underbelly of the web…             continued

  Engage best practice technological measures to protect
  against viral and malware threats;
  Employee and contractor background checks if dealing with
  sensitive information;
  Engage a social media monitoring service;
  Develop and implement a Crisis Management Plan;
  Appoint a Privacy Officer and conduct a privacy audit;
  Cyber risk insurance.




                                                              10

Contenu connexe

En vedette

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iiiricardosyachriel
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioDavid Chavarri
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing SecretsBluewire Media
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCBluewire Media
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceBluewire Media
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessBluewire Media
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Bluewire Media
 

En vedette (9)

De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
De Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief IiiDe Kredietcisis Vanuit Islamitische Perspectief Iii
De Kredietcisis Vanuit Islamitische Perspectief Iii
 
Introducción WebComponents y Visual Studio
Introducción WebComponents y Visual StudioIntroducción WebComponents y Visual Studio
Introducción WebComponents y Visual Studio
 
Photo Shop Certificate
Photo Shop CertificatePhoto Shop Certificate
Photo Shop Certificate
 
Email Marketing Secrets
Email Marketing SecretsEmail Marketing Secrets
Email Marketing Secrets
 
Your Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GCYour Digital Presence AIM Open House GC
Your Digital Presence AIM Open House GC
 
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of CommerceThe Truth About Social Media for Business - Hervey Bay Chamber of Commerce
The Truth About Social Media for Business - Hervey Bay Chamber of Commerce
 
Countrywide - Truth about social media for Business
Countrywide - Truth about social media for BusinessCountrywide - Truth about social media for Business
Countrywide - Truth about social media for Business
 
Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1Suncorp The Truth about Social Media for Business v1
Suncorp The Truth about Social Media for Business v1
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Malcolm Burrows - Web Strategy Summit 2012 Presentation Slides

  • 1. Tackling the Risks & Combatting the Underbelly of the Web Malcolm Burrows B.Bus.,MBA.,LL.B.,GDLP.,MQLS Legal Practice Director Disclaimer The materials and presentation itself are general commentary on the law only. It is not legal advice. Do not rely on the information in the materials without first confirming with Dundas Lawyers that it applies to your exact circumstances. 1
  • 2. Cyber risk tag cloud 2
  • 3. Underbelly of the web Data security Privacy Act amendments Risks from employees and contractors 3
  • 4. Underbelly of the web Data security Cloud storage of personal and sensitive information; Confidential information; Privacy Act 1988 (Cth); breaches: Guide for dealing with data breaches (not mandatory) Data breaches occur when personal information is lost or subjected to unauthorised access, use, modification or disclosure - eg lost or stolen laptops, removable storage devices or paper recordings; hard drives and digital storage media being disposed without contents being erased first; Databases being hacked into or otherwise being illegally accessed; or paper records being taken from insecure recycling or garbage bins. Presently a Bill before Parliament to introduce changes…. 4
  • 5. Privacy Act 1988 (Cth) (Privacy Act) Proposed changes Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth): new amendments may create obligations to comply with mandatory breach notifications; possible introduction of statutory cause of action for breach of privacy; introduction of civil penalties for privacy breaches; ALRC recommended removing the small business exemption. 5
  • 6. Privacy Act 1988 (Cth) (Privacy Act) Data breaches – is there an obligation to comply? Law enforcement Only if there is a real risk of harm to an individual (identity crime, physical harm); Recommended steps if information is requested by Law-enforcement Police obtain a search warrant. 6
  • 7. Underbelly of the web Obligation to comply with law enforcement (continued)… Apply to the court for an order that the information be sealed (s55 & 56 of Criminal Rules); or refuse to provide the information and force law enforcement to obtain a subpoena provided that in essence the employee is committed or an indictment has been presented against the employee – see s29 of the Supreme Court of Queensland Act 1991 - Criminal Practice Rules 1999 (Qld) (Criminal Rules) If the List is produced subject to a Subpoena, then section 29(6) of the Criminal Rules provides that: “The proper officer must hold the document or thing subject to the court’s direction and must not allow anyone to inspect the document or thing other than as directed by the court”: If provide Customer List, you should mark it “Confidential” and write Copyright using the ©, (regardless of whether copyright actually subsists in a computer generated list) - s56A of the Criminal Rules provides that the Court, in responding to an application to copy an exhibit will take into account: “the content of the exhibit and whether the exhibit contains information that is private, confidential or personally or commercially sensitive”. 7
  • 8. Underbelly of the web… continued Office of Australian Information Commissioner (OAIC) - notification is not currently mandatory but recommended when a serious data breach warrants disclosure. Guide for dealing with data breaches. 8
  • 9. Underbelly of the web… continued 9
  • 10. Underbelly of the web… continued Engage best practice technological measures to protect against viral and malware threats; Employee and contractor background checks if dealing with sensitive information; Engage a social media monitoring service; Develop and implement a Crisis Management Plan; Appoint a Privacy Officer and conduct a privacy audit; Cyber risk insurance. 10