41-50 of 425 results
Why everyone is talking about AI safety and cybersecurity
The Australian Signals Directorate, together with 19 other global partners, published Guidelines for secure AI system development. We've distilled the themes emerging from these latest developments and the top 9 steps organisations should take to address AI security risks. ...
Balancing act: establishing and preserving legal professional privilege in a cyber incident
This guide has been designed to assist companies incorporate legal professional privilege preservation measures into their cyber readiness activities. ...
Get verified: The Digital ID Bill offering verification efficiencies with increased privacy and security
An overview of the Proposed Digital ID System under the Digital ID Bill 2023, including its accreditation and participation requirements, increased overlap of privacy obligations and proposed regulatory powers. ...
Federal Government signals broad support for significant Privacy Act reforms
The Federal Government has agreed or agreed in-principle with the majority of the proposals outlined in the Privacy Act Review Report. ...
Allens advises AirTree Ventures on its investment in HEO
AirTree Ventures led the $12 million Series A round alongside new and returning investors, including Salus VC, Y Combinator, In-Q-Tel, David Harding and Steve Baxter. 'We are very pleased to have h ...
IP Australia releases new guidance on classifying emerging technology trade marks
IP Australia recently released new guidance on how to classify trade mark goods and services that relate to the emerging technologies of virtual goods, the metaverse, non-fungible tokens (NFTs) and blockchains. We outline how the guidance may be relevant to your business and also provide some practical suggestions for dealing with applications and registrations affected by it. ...
In Touch: Delta's bid rigging on full display; and other developments
The latest in competition and consumer law. ...
A step-by-step guide to assessing compromised data after a cyber incident
This guide is designed to help you address compromised data after a cyber incident, and includes 11 key steps that cover what to do before, and after, an incident. ...