- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Michaels says breach at its stores affected nearly 3M payment cards
- DDoS Attackers Change Techniques To Wallop Sites
- IT security is national security -- but you're not alone
- NBN Co hits 105Mbps in limited FTTN trial
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- TPG should pay rural levy for each FTTB service: NBN Co
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- USB Type-C: Simpler, faster and more powerful
State privacy commissioners around Australia have backed the federal government’s Privacy Act changes, saying that the Act will encourage organisations to be transparent about their management of people’s information.
The Office of the Australian Information Commissioner (OAIC) has released an updated privacy impact assessment (PIA) guide for public consultation following the Privacy Act changes which came into law today.
Some Australian IT professionals have admitted that their organisation won’t be prepared for the Privacy Act amendments which come into effect today, according to the results of a new survey.
The Privacy Act amendments come into law in Australia tomorrow (12 March), with serious fines of up to $1.7 million for companies and up to $340,000 for individuals who breach the Act.
An investigation by the Australian Privacy Commissioner, Timothy Pilgrim, and the Australian Communications and Media Authority (ACMA) has concluded that Telstra breached three National Privacy Principles (NPPs) after 15,775 phone numbers, names and home addresses contained in spreadsheets were found online via a Google search in May 2013.
Whitepapers about privacy act
The proposed amendments to the Privacy Act, due to come into effect in 2014, reinforce both the importance and significance of upholding data security. Data protection has long been a priority for many businesses, but the rise in technology trends only create challenges in security protection. This research looks at how businesses are more likely to encounter breaches due to lack or awareness from employees rather than from malicious intent.
Existing IT operational models and an ageing infrastructure are CIOs back from their full potential. This paper reveals the three IT imperatives for a CIO-led transformation, and details how CIOs are adopting strategies to change IT and assert their organisations as business leaders and innovators.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size