N

Our legal experts will keep you up to date on all relevant and current developments.

AI and Facial Identification Technology – the Face of the Future?
Friday 14 February 2020 / by Tal Williams and Maggie Maloney posted in Technology Law

Last week The New York Times released an article focussed on facial recognition technology. The piece examined Clearview AI, a company which whilst being virtually unknown, is, according to the New York Times, already being used by over 600 law enforcement agencies internationally. The company is reported to have already scraped over 3 billion images from across the internet.


Mandatory Data Breach Reporting: Employees Continue to be a Major Contributing Factor
Wednesday 25 September 2019 / by Tal Williams posted in Business, Corporate & Commercial Technology Law

Many readers will be aware that the mandatory data breach reporting requirements in Australia have been in operation since February of 2018. In September last year Holman Webb reported on the statistics provided by the Office of the Australian Information Commissioner relating to the quarter ending July 2018.


Are Cryptocurrencies considered ‘property’ for legal purposes?

It is often thought that the law is slow, and unable to keep up with technological change - although it is important to note that this is not always the case.


Google Fined €50m for Breaches of General Data Protection Regulation
Friday 25 January 2019 / by Tal Williams and Sabrina Ebrahimi posted in Business, Corporate & Commercial Technology Law Media & Communications

On 21 January 2019,  France’s data protection regulator, CNIL fined Google €50m ($80 million AUD) for breaches of the European Union’s General Data Protection Regulation (GDPR).


PODCAST: E-Signatures, Fingerprinting and Retina Scans: The Future of Signing Your Name
Wednesday 17 October 2018 / by Holman Webb posted in Business, Corporate & Commercial Technology Law

Holman Webb Partner Tal Williams talks to Lawyers Weekly about the future of signing your name, discussing various possibilities such as e-sigs, fingerprinting and retina scans. 


Investment in the United States: Review of Transaction Where Critical Technology Investment is Involved

On October 10, 2018, the U.S. Department of the Treasury took the first step toward implementing the recently enacted Foreign Investment Risk Review Modernization Act (FIRRMA) by publishing new regulations that empower the Committee on Foreign Investment in the United States (CFIUS) to review transactions that were not previously subject to CFIUS scrutiny.


Unauthorised Accessing of Data is Not Just a Breach of Civil Rights
Tuesday 25 September 2018 / by Tal Williams posted in Business, Corporate & Commercial Technology Law

Even if you are, or were, an employee, the Criminal Law deals with such interference quite seriously.


Ipso Facto Reforms and the Need to Review Contractual Terms Dealing with Insolvency
The Treasury Laws Amendment (2017 Enterprise Incentives No. 2) Act 2017 (Cth) amended the Corporations Act 2001 (Cth) from 1 July 2018 to impose a prohibition on the enforcement of rights against a company including contractual termination rights arising on the occurrence of an insolvency event in relation to that company.

Mandatory Reporting: Statistics From the First Few Months, and the First GDPR Movement
Thursday 20 September 2018 / by Tal Williams posted in Business, Corporate & Commercial Technology Law

Readers will be aware that the mandatory data breach reporting requirements in Australia have been in operation since February this year. The Office of the Australian Information Commissioner has since produced two quarterly reports on the matters notified. Some interesting statistics emerge.


The Essential Eight: What Your Business Must Do To Protect Against Cyber Crime
Thursday 26 July 2018 / by Tal Williams posted in Business, Corporate & Commercial Technology Law

When it comes to mitigating cyber security incidents, there is no single step that organisations can take that will guarantee the safety of their data or system performance. The Australian Cyber Security Centre has recommended eight mitigation strategies that organisation should implement as a baseline defence against targeted cyber intrusions, ransomware and malicious insiders. These strategies are known as the ‘Essential Eight’.


Recent Posts






1

2 3 4