The search found 135 results in 0.177 seconds.
This ASIC Enforcement Review Taskforce position paper outlines reforms to enhance ASIC’s access to telephone intercepts for the investigation and prosecution of serious corporate law offences.
While many technology companies continue to step up their privacy game by adopting best practices to protect sensitive customer information when the government demands user data, telecommunications companies are failing to prioritise user privacy when the government comes knocking.
The notion of personal privacy in a digital society may be out of date. While many of us say we still want it, we willingly share our data – and dislike paying to protect it. Governments and online businesses covet our personal information. Meanwhile, almost...
The Corporate Plan 2016–20 sets our course for the future, identifying our purpose, values, operating environment, strategic priorities, capability and risk oversight and management.
New technologies have changed the types of data that are routinely collected about citizens on a daily basis. For example, smart devices collect location and communication data, and fitness trackers and medical devices capture physiological and other data. As technology changes, new portable and connected...
Cyberattacks and data breaches are facts of life for government agencies, businesses and individuals alike in today’s digitized and networked world. Just a few of the most high-profile breaches in 2016 alone include the hacking and subsequent release of emails from members of the Democratic...
David Souter discusses some of the key topics explored at the Internet Governance Forum that was held on 17 November in London, including:the role that social media plays in young people’s relationships with one another, parents, schools and life experience; and political engagement...