Generally speaking, most small businesses will not have to comply with the Privacy Act 1988 (Privacy Act). However, there are exceptions. If you are unsure this Checklist can help!
If you think our privacy is compromised now, just wait.
When reporter Simon Elvery turned the spotlight on his spying devices, he was surprised at how busy they were — even when he was sleeping.
Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you're not doing anything you need to hide.
Australia’s data retention law is one of the most comprehensive and intrusive data collection schemes in the Western world, and should be challenged.
Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, weeks-long exchange with a spammer who offered to cut him in on a hot deal.
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on Apple and Android devices and urges us to pay attention to a growing digital security divide. If the only people who can protect themselves from the gaze of the government are the rich and powerful, that's a problem, he says. It's not just a cybersecurity problem -- it's a civil rights problem.
The medical database system has been plagued by concerns about patient privacy, the system's security design and access by third parties, a Senate inquiry was told.
We set out to see if we could fake Malcolm Turnbull. Researchers are warning that a new wave of artificial intelligence technology could make it so easy to create fake videos that it will undermine the public's ability to trust what they see.
Learn how to use digital signatures and encryption in Outlook for Mac. Both the sender and recipient must have a mail application that supports the S/MIME standard. Outlook supports that standard.
Ledger offers smartcard-based crypto asset hardware wallets bringing optimal protection level to your bitcoins, ethereums, ripple and more - without sacrificing usability or control.
It's no longer a question of if you will be hacked - but when. Enter Secured² patented data security technology - your revolutionary new solution that promises unhackable data security.
Note: This website is in Italian (you may need to use google to translate)
In the visualisation above you will find all [of the] elements, which you can use to navigate. You can click on the buttons 'legal' (the scale), Time, Money, Services & Liability...
Even with end-to-end encryption Big Brother is still in your phone: metadata
Service provided by our strategic alliance partner: Compliance Quarter
Privacy is a multi-faced topic, and so to protect it, you need to take more than a single precaution.