1,975
Views
2
CrossRef citations to date
0
Altmetric
Articles

Strengthening data privacy: the obligation of organisations to notify affected individuals of data breaches

, &
Pages 271-284 | Received 17 Apr 2017, Accepted 11 Sep 2017, Published online: 25 Sep 2017

References

  • Allen, A. 1999. “Coercing Privacy.” William and Mary Law Review 40 (3): 723.
  • Australian Law Reform Commission. 2008. For Your Information: Australian Privacy Law and Practice, Report No. 108.
  • Australian Office of the Information Commissioner. 2015. Australian Privacy Principles Guidelines, Chapter 11: Australian Privacy Principle 11 – Security of Personal Information, 2015.
  • Australian Productivity Commission. 2016. Data Availability and Use, November 2016.
  • Bamberger, K. B. 2010. “Technologies of Compliance: Risk and Regulation in a Digital Age.” Texas Law Review 88 (4): 669.
  • Burdon, M., J. Reid, and R. Low. 2010. “Encryption Safe Harbours and Data Breach Notification Laws.” Computer Law & Security Review 26 (5): 520. doi: 10.1016/j.clsr.2010.07.002
  • Garcia, F. 2007. “Data Protection, Breach Notification, and the Interplay Between State and Federal Law: The Experiments Need More Time.” Fordham Intellectual Property Media and Entertainment Law Journal 17: 693.
  • Hardesty, L. 2013. “How Hard Is It to ‘De-anonymize’ Cellphone Data?” MIT News Office, March 27.
  • Heimes, R. 2016. Top 10 Operational Impacts of the GDPR: Part 1 – Data Security and Breach Notification. Portsmouth: Westin Research Center.
  • IBM. 2016. What is Big Data? Accessed March 26, 2017. https://www-01.ibm.com/software/data/bigdata/what-is-big-data.html
  • Kang, J. 1998. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (4): 1193. doi: 10.2307/1229286
  • Leonard, P. 2016. A Mandatory Data Breach Notification Scheme for AUSTRALIA? Gilbert + Tobin.
  • Lindsay, D. 2005. “An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law.” Melbourne University Law Review 29: 131.
  • Moor, J. 1997. “Towards a Theory of Privacy in the Information age.” Computers and Society 27 (3): 27. doi: 10.1145/270858.270866
  • Needles, S. 2010. “The Data Game: Learning to Love the State-based Approach to Data Breach Notification Law.” North Carolina Law Review 88: 267.
  • Paterson, M. 2004. “HealthConnect and Privacy: A Policy Conundrum.” Journal of Law and Medicine 12: 80.
  • Pavolotsky, P. 2013. “Privacy in the Age of Big Data.” The Business Lawyer 69: 217.
  • PJCIS (Parliamentary Joint Committee on Intelligence and Security, Australian Attorney-General's Department). 2015. Inquiry into Potential Reforms of National Security Legislation.
  • Ponemon Institute LLC. 2014. “Ponemon Institute Research Report.” Exposing the Cybersecurity Cracks: A Global Perspective Part 1, April 2014.
  • Protiviti Inc. 2015. IT Security and Privacy Survey. The Battle Continues: Working to Bridge the Data Security Chasm, September 2015.
  • PwC, Turnaround and Transformation in Cybersecurity: Key Findings from the Global State of Information Security Survey 2016.
  • Reidenberg, J. 2001. “Resolving Conflicting International Data Privacy Rules in Cyberspace.” Stanford Law Review 52: 1315. doi: 10.2307/1229516
  • Rosen, J. 2000. The Unwanted Gaze: The Destruction of Privacy in America. New York: Random House.
  • Selvadurai, N. 2013. “Protecting Online Information Privacy in a Converged Digital Environment – The Merits of the New Australian Privacy Principles.” Journal Information and Communications Technology Law 22 (3): 299. doi: 10.1080/13600834.2013.856125
  • Sicular, S. 2013. “Gartner’s Big Data Definition Consists of Three Parts, Not to Be Confused with Three V’s.” Forbes, March 27.
  • Smyth, S. 2012. “Does Australia Really Need Mandatory Data Breach Notification Laws – and If So, What Kind?” Journal of Law, Information & Science 22 (2): 159.
  • Smyth, S., and J. K. Winn. 2009. “Are Better Security Breach Notification Laws Possible?” Berkley Technology Law Journal 24 (3): 1133.
  • Solove, D. 2002. “Conceptualizing Privacy.” California Law Review 90 (4): 1099–1116. doi: 10.2307/3481326
  • Telstra Corporation Limited. 2014. Telstra Cyber Security Report.
  • Wu, X. 2014. “Data Mining with big Data.” IEEE Transactions on Knowledge and Data Engineering 26 (1): 27–29.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.