Digital Life: The Law Playing Catch Up on Privacy

more_vert
Digital Life: The Law Playing Catch Up on Privacy

Privacy + CyberSecurity

How to Use Signal Without Giving Out Your Phone Number

A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal.

Setback in the outback [From the Signal.org BLOG]

Like many others, we [Signal] have been following the latest developments in Australia related to the Assistance and Access bill with a growing sense of frustration. The widespread adoption of strong cryptography and end-to-end encryption has given people around the world the ability to protect their personal information and communicate securely.

Why does an industry I've never heard of know so much about me?

Data enrichment companies build sprawling profiles about millions of individuals. Last week, I had a creepy feeling — one familiar to almost anyone on the internet. My personal information had been exposed online, again. My name, email address and information about my work history had turned up in an online database for anyone to find — my details along with those of millions of other people. I received a notification about the incident from Have I Been Pwned?, an online service that lets me

Contract for the Web

A global plan of action to make our online world safe and empowering for everyone.

DuckDuckGo — Privacy, simplified.

The Internet privacy company that empowers you to seamlessly take control of your personal information online, without any tradeoffs.

Encryption laws to run up against CLOUD Act and GDPR: Law Council

Laws show the different path Australia is taking to privacy, the Law Council of Australia has said.

Virtual identities in Hubs

Identity is a complicated concept—who are we really? Virtual spaces make this even harder. Having control over our representation and identity online is a critical component of safety and privacy, and platforms should prioritize user agency.

Firefox Monitor

Most people have about 100 online accounts. Have any of yours been exposed in a data breach? Find out.

Incognito Mode Won't Keep Your Browsing Private. Do This Instead.

Browser compartmentalization can help you escape the clutches of the data-gathering machine By Michael Grothaus The big tech giants, online advertising companies, and data brokers use a ton of tricks to track you around the web. These include things like cookies...

URL Screenshot -> create evidence of the existence of specific content at a specific time.

Use URL Screenshot to create evidence of: -illegal Internet content / non-repudiation of certain content. -Deleted / Edited controversial news. -Slander, threats or insults on Internet (social networks) / Scams. -Misuse of intellectual property: articles, photographs, plagiarism, etc. -Publication of unauthorized information -Simply demonstrate the existence of a specific content at a specific time.

Creating privacy-centric virtual spaces

As immersive devices become more affordable, social spaces in virtual reality (VR) will become more integrated into our daily lives. If social VR is the next evolution of this, what approaches will result in spaces that respect user identities, autonomy, and safety?

New Australian Law Threatens Prison For Tech Execs Who Allow Violent Content On Their Platforms

In the wake of the terrorist attack in Christchurch, New Zealand last month, Australia is putting major pressure on Big Tech to prevent the spread of hateful and violent content on their platforms, with a new law that threatens major fines and imprisonment. The law positions Australia at the extreme end of a growing push to police the digital gatekeepers. On Thursday, Australia’s parliament passed legislation that carries penalties of up to 10 per cent of annual global net sales over the 12

Did Australia Poke a Hole in Your Phone's Security?

SYDNEY — A new law in Australia gives law enforcement authorities the power to compel tech-industry giants like Apple to create tools that would circumvent the encryption built into their products.

BlueOceanLawGroup

Identity Theft Protection -> Smart List

All about protection from Identity Theft (and what to do if you become a victim).

Avast | Download Free Antivirus & VPN | 100% Free & Easy

Join 435 million others and get award-winning free antivirus for PC, Mac & Android. Surf safely & privately with our VPN. Download Avast today!

Privacy Policies and Australian Law

– by James D. Ford, GAICD innovative Counsel [iC]™, Founder M.D. of Blue Ocean Law Group (iubenda Legal Network partner in Australia New Zealand).

BlueOceanLawGroup

Digital Legacy Plan -> Smart List

Who wants to live forever? In the past, only famous people, authors artists could live on for eternity... Now you can too! or you can at least decide to have your online presence safely removed....

Committee asks for more transparency over Australia's face-matching system | ZDNet

In addition to asking for more transparency on privacy and false matches regarding biometric databases, a Parliamentary Joint Committee has made recommendations on how to tackle the IoT age, the dark web, artificial intelligence, and data-sharing from an Australian law enforcement lens.

How do I make a privacy complaint?| Office of the Australian Information Commissioner - OAIC

We will use the information you have provided to assess your complaint, conduct the investigation and conciliate. If we makes inquiries into or investigate your complaint, we will usually disclose the information you give us, including a copy of your complaint, to the entity you have complained about (the respondent).

'Alexa, is someone else listening to us?' Sometimes, someone is

Unknown to many, Amazon employs thousands of people around the world to listen to voice recordings captured by its devices.

Opt-in register -> Privacy Act

Small businesses/not-for-profits opting-in to be covered by the Privacy Act are making a public commitment to good privacy practice.

Data breach preparation and response

This guide is primarily targeted at entities that have obligations under the Privacy Act to protect personal information. These entities are required to take reasonable steps to protect the personal information that they hold and may be required to notify affected individuals and the Australian Information Commissioner (Commissioner) of a data breach under the NDB scheme.

Bringme Box protects privacy, anticipating GDPR

We're shopping online en masse. All of those parcels end up at our neighbours' houses or are left unguarded at company reception desks...

BlueOceanLawGroup

Augmented Reality: Law, Privacy Ethics -> Smart List

Enhancing Human Decision Making Safety using Augmented Reality (AR) raises new legal issues including: Intellectual Property, User-Generated Content (UGR), Privacy Ethics

If You Want to Protect Online Privacy, You Need to Hit the Data Brokers Where It Hurts

DeleteMe does exactly what its name suggests. When you sign up, their trained internet privacy experts search for and delete your personal information from dozens of leading data broker sites. DeleteMe then sends you a detailed removal report within seven days, giving you a comprehensive rundown of exactly what information was removed as well as the databases which it was removed from. After that, they monitor and remove your information on a quarterly basis for the duration of your subscription.

Law Firms (and any business particularly those handling funds on behalf of clients) are targets for increasingly sophisticated phishing scams.

Posted January 28, 2019 on LInkedIn by James D. Ford, GAICD: Here is an example I have encountered recently. Initial legal enquiry through our FindLaw listing. By taking this approach, the phishing email arrived in our inbox rather than our... Photo courtesy of David Clode: Unsplash

How do I know if my small business is covered by the Privacy Act?

Generally speaking, most small businesses will not have to comply with the Privacy Act 1988 (Privacy Act). However, there are exceptions. If you are unsure this Checklist can help!

Friends don't let friends run a website/app without a privacy policy

Blue Ocean Law Group is innovative Counsel and Australian Legal Network Partner for iubenda. We use iubenda for our own Globally compliant Privacy Policy, and are an Affiliate -> Get 10% off yours with this link! Contact us if you need a legal review of your compliance with Australian Privacy laws.

Godfather of Deep Learning: China’s AI Tech Is “1984 Big Brother”

Yoshua Bengio opened up in a new interview about his anxiety about how China is using deep learning to surveil and manipulate large populations.

Glenn Greenwald: Why privacy matters

Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you're not doing anything you need to hide.

Let's Encrypt - Free SSL/TLS Certificates

Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Tide.org: Decentralised Personal Data Economy.

A community driven, global, decentralised personal data economy. Privacy is more than a human right, it’s an asset.

Do you know what your phone is up to while you sleep?

When reporter Simon Elvery turned the spotlight on his spying devices, he was surprised at how busy they were — even when he was sleeping.

Christopher Soghoian: Your smartphone is a civil rights issue

The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on Apple and Android devices and urges us to pay attention to a growing digital security divide. If the only people who can protect themselves from the gaze of the government are the rich and powerful, that's a problem, he says. It's not just a cybersecurity problem -- it's a civil rights problem.

James Veitch: This is what happens when you reply to spam email

Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, weeks-long exchange with a spammer who offered to cut him in on a hot deal.

Ai may be used to impersonate a person using facial recognition data!

We set out to see if we could fake Malcolm Turnbull. Researchers are warning that a new wave of artificial intelligence technology could make it so easy to create fake videos that it will undermine the public's ability to trust what they see.

MyEtherWallet.com: Your Key to Ethereum

Free, open-source, client-side Ethereum wallet. Enabling you to interact with the blockchain easily & securely.

Almost 1 million Australians have opted out of My Health Record (if you want to join them you now have until 15 November 2018)

The medical database system has been plagued by concerns about patient privacy, the system's security design and access by third parties, a Senate inquiry was told.

The new data retention law seriously invades our privacy – and it's time we took action

Australia’s data retention law is one of the most comprehensive and intrusive data collection schemes in the Western world, and should be challenged.

CBA and ANZ caught in fake banking apps scam

Thousands of banking customers have been caught in a fake banking app scam, prompting questions about Google Play’s app authentication process.

Ledger - Hardware wallets - Securing your crypto assets

Ledger offers smartcard-based crypto asset hardware wallets bringing optimal protection level to your bitcoins, ethereums, ripple and more - without sacrificing usability or control.

Send a digitally signed or encrypted message

Learn how to use digital signatures and encryption in Outlook for Mac. Both the sender and recipient must have a mail application that supports the S/MIME standard. Outlook supports that standard.

Visual Contracts -> Terms Conditions

In the visualisation above you will find all [of the] elements, which you can use to navigate. You can click on the buttons 'legal' (the scale), Time, Money, Services & Liability...

Digital Life: The Law Playing Catch-Up

What happens to a person’s digital assets after they die or become incapacitated.

Blue Ocean Law Group use Secured2

It's no longer a question of if you will be hacked - but when. Enter Secured² patented data security technology - your revolutionary new solution that promises unhackable data security.

eClosure Wishes - eClosure

Decide what happens to your online information after you pass away. Create your eClosure Wishes now.

eClosure Online - eClosure

Close or memorialise social network and email accounts of your deceased loved ones. Create an eClosure Online account now.

Privacy Policy of blueocean.law

This is the Privacy Policy of Blue Ocean Law Group. It was generated using iubenda (a globally compliant Privacy Cookie Solution).

Blue Ocean Law Group use NetDocs

A trusted and mature global cloud platform combining security, usability, and innovative productivity tools for today's leading law firms and corporations.

How small businesses can stay cyber safe

With the global cyber threat growing rapidly, the Federal Government is calling on small businesses to take protective measures.

A VPN will not save you from government surveillance | ZDNet

Privacy is a multi-faced topic, and so to protect it, you need to take more than a single precaution.

Essential Eight Explained

8 essential strategies to Mitigate Cyber Security Incidents against a range of cyber threats.

Obtain instant feedback on your Privacy Policy

Service provided by our strategic alliance partner: Compliance Quarter

Privacy
CyberSecurity
Digital Assets
Digital Life
DataLife
Tide.org
Privacy Law
Data Retention Law
MetaData
iubenda
Privacy Policy
MyEtherWallet
Data Breach
Data Breach Notification Scheme
Privacy Act 1988
OAIC
Facial recognition
My Health Record
SPAM
SPAM Act
Encryption
EU Cookie Law
Ledger Nano S
Secured2
CyberLaws
PactSafe
APP
Australian Privacy Principles
VPN
VOI
expand_less