Author: admin

  • Defining Next Generation Data Management

    Defining Next Generation Data Management

    Next-generation data management encompasses a broad set of principles, technologies, and strategies designed to handle the increasingly complex and large volumes of data generated in modern organisations. Several aspects play a crucial role in enabling organisations to manage, process, and leverage their data effectively in the era of big data and increased digital transformation. Organisations…

  • Update on the Privacy Law Changes Proposed for Australia in 2024/2025

    Update on the Privacy Law Changes Proposed for Australia in 2024/2025

    *** News Flash *** Long-awaited changes to Australian privacy laws were due to be tabled on 20th August. Due to legislative priorities this has now been revised to early September and is therefore unlikely to pass before the end of the 2024 legislative year. In addition, the government will not release the proposed legislation framework…

  • The Business Case for Data Privacy

    The Business Case for Data Privacy

    Data Privacy refers to the protection of private, personal and sensitive information that companies collect from their customers, employees, vendors and other stakeholders. It is crucial for maintaining trust, complying with regulations, and may create a competitive advantage and therefore can be considered a cost-of-business and a potential business opportunity. With the increasing amount of…

  • Why the NIST Privacy Framework is Worthy of Adoption

    Why the NIST Privacy Framework is Worthy of Adoption

    As privacy regulations tighten globally and consumers become more aware of how their data is used, organisations are under increasing pressure to ensure robust privacy practices. Among the various frameworks and models available, the NIST Privacy Framework stands out as a powerful tool for guiding privacy strategy. Here’s a look at why it’s worth adopting,…

  • Secure-By-Design … It’s an Attitude !!

    Secure-By-Design … It’s an Attitude !!

    When my father first taught me to drive a motor car, I used to have trouble with all the levers (brakes, accelerator, steering wheel, indicators and gear lever) and how to use them in a synchronised way to get the car moving along smoothly and more importantly stopping. Being able to drive, he used to…

  • Privacy law reform in Australia, an update by Corrs Chambers Westgarth

    Privacy law reform in Australia, an update by Corrs Chambers Westgarth

    First published 12 August, 2024, sighted on LinkedIn, corrs.com.au and lexology.com Corrs Chambers Westgarth, a leading commercial law firm that advises major Australian corporations and government agencies has published an article on LinkedIn and on their website, https://www.corrs.com.au/, that discusses impending privacy law reforms in Australia and advises businesses on how to prepare. The article…

  • The Cloud’s Double-Edged Sword: Managing Data in the Era of Scalability, Flexibility and Risk

    The Cloud’s Double-Edged Sword: Managing Data in the Era of Scalability, Flexibility and Risk

    The advent of cloud computing has revolutionised how businesses operate, promising unparalleled scalability, flexibility, and efficiency. However, with these advancements come significant data management challenges that can undermine the very benefits the cloud aims to deliver. This article explores the complexities that arise in data management due to the promises of cloud technology, focusing on…

  • OAIC Data Breach Report: July – December 2023

    OAIC Data Breach Report: July – December 2023

    The OAIC’s “Notifiable Data Breaches Report: July to December 2023” provides an overview of data breaches reported during this period under the Notifiable Data Breaches (NDB) scheme. The report notes a total increase in reported breaches compared to the previous six months, with malicious or criminal attacks remaining the primary cause, responsible for 67% of…

  • The future of CISOs in APAC

    The future of CISOs in APAC

    First published 09 January, 2024, ComputerWeekly.com Republished 11 January 2024, The International Association of Privacy Professionals   In an op-ed with Computer Weekly, Veritas Technologies Chief Technology Officer for Asia-Pacific Geoffrey Coley, CIPM, said chief information security officers play a vital role in limiting the threat of cyberattacks. Coley said an increased focus on cybersecurity…