skip to content
Law Institute Victoria
Library Resources
LIV Website - HOME
Practice Resources
Login
Library
Search Catalogue
Request Research
Home
>
Practice Resources
>
Library
>
Full Record
Print Friendly
Full Record
< Back To Results
|
Email Record
Relationship between privacy and information warfare in the Australian regulatory context
Author:
Leggat, Helaine ;
Pagination:
29-33
Subject:
Privacy
;
Disclosure of Information
;
Confidential Information
;
Data Protection
;
Regulation
;
War
;
Espionage
;
Governance
;
Cyberlaw
;
Security
;
Source:
Internet Law Bulletin, vol 22 no 3, August 2019
Date_of_entry:
10/10/2019
Section:
Intellectual Property & Technology
Year:
2019
Record ID:
81870
Format:
Library Article
Abstract:
Comment on privacy and personal information -- data protection -- surveillance -- weaponisation of data -- security-- Cambridge Analytica
Item Availability
Item Availability
Contact Library
Similar Items
Similar Items
Expand
|
Email
|
Save
Lessons learnt from the Red Cross Blood Service data breach investigation
Author:
Flannigan, Alison Choy
;
Year:
2018
Subject:
Privacy
;
Data Protection
;
Data Storage
;
Investigations
;
Confidential Information
;
Security
;
Now live: new information security requirements and Board responsibility for financial services entities
Author:
Fitzgerald, Lisa ; Almeida, Louise ;
Year:
2019
Subject:
Financial Services
;
Cyberlaw
;
Boards of Directors
;
Information Storage
;
Data Protection
;
Security
;
Australian Prudential Regulation Authority
;
Regulation
;
Review of the Privacy Act 1988 : rethinking core concepts of privacy harms
Author:
Leonard, Peter
;
Year:
2021
Subject:
Privacy
;
Law Reform
;
Australian Privacy Principles
;
Data Protection
;
Government Policy
;
Risk Assessment
;
Regulation
;
Governance
;
Does data sharing complement or challenge privacy law?
Author:
Kreltszheim, David
;
Year:
2018
Subject:
Privacy
;
Law Reform
;
Risk Management
;
Data Protection
;
Consumer Protection
;
Regulation
;
Prepare, practice, protect - cybersecurity and the law - law firm hacking
Author:
Carlin, John P. ; Litt, Robert S. ; Currey, Hayley R. ; Moore, R. Taj ;
Year:
2018
Subject:
Cyberlaw
;
Cybercrime
;
Confidential Information
;
Computer Hacking
;
Internet Regulation
;
Data Protection
;
Looking beyond the Privacy Act 1988 (Cth)
Author:
Arnold, Bruce Baer
;
Year:
2018
Subject:
Privacy
;
Data Protection
;
Banking
;
Commissions of Inquiry
;
Regulation
;
Law Reform
;
Securing the Internet of Things: a global overview of a global challenge
Author:
Yuen, Albert ; Chan, Erica ;
Year:
2018
Subject:
Internet
;
Technology
;
Data Protection
;
Privacy
;
Security
;
Comparative Law
;
Asia
;
European Law
;
Cyber duty of care - how to minimise cyber vulnerability in he practice of law
Author:
Wise, E.J.
;
Year:
2019
Subject:
Cyberlaw
;
Cybercrime
;
Law Practice Management
;
Law Firms
;
Security
;
Technology
;
Data Protection
;
Risk Management
;
Liability for data breaches in Australia
Author:
Alcock, Aaron ;
Year:
2019
Subject:
Privacy
;
Data Protection
;
Confidential Information
;
Risk Management
;
Comparative Law
;
What is real consent to data collection
Author:
Blyth, Toby
;
Yazbek, Jessica
;
Year:
2019
Subject:
Data Protection
;
Consent
;
Confidential Information
;
Informed Consent
;
Privacy
;
Australian Privacy Principles
;