Helios Salinger

  • About
    • About Salinger Privacy – now Helios Salinger
    • Meet our team
    • Work with us
    • Videos, Podcasts and Media Mentions
    • Privacy Awareness Week
  • Consulting
    • Overview – Our Consulting Services
    • Privacy Impact Assessment
    • Privacy Maturity Assessment
    • Privacy by Design advice
    • Privacy Compliance and Gap Analysis
    • Algorithmic Impact Assessment
    • Re-identification Risk Assessment
    • Data ethics
    • Privacy Helpdesk
  • Training
    • Overview – Our Training Services
    • Privacy Compliance Training
    • Privacy Professionals Training
    • All Online Modules
    • Training Calendar
    • Public Courses and Workshops
    • In-house Privacy Training and Workshops
    • Webinars
    • IAPP Certifications
    • Training Advisory Services
    • Login
  • Resources
    • Overview – Our Resources
    • THE PRIVACY PULSE
    • Privacy Act Reforms
    • Compliance Kits
    • Resources on key privacy topics
    • Free Handbook
    • Newsletter
    • Login
  • Case Study
  • Blog
  • Calendar
  • Contact
  • Compliance Kits
    • For Business & Non-profits
    • For Peak Bodies
    • For Australian Government
    • For NSW Public Sector
    • For VIC Public Sector
    • For QLD Public Sector
    • For WA Public Sector
    • Login

Archives for 2015

Smile! You’re on someone’s facial recognition database

December 11, 2015, Anna Johnston

Hooray, December! A time for work Christmas parties, end-of-year school concerts, days at the cricket and holidays at the beach. So many Instagram-worthy moments. But wait just a tinsel-hanging second – have you got consent to take or post that photo?…

Read More >

A bridge too far: 85% of the world ignored at ‘international’ conference

November 3, 2015, Anna Johnston

Ah, Amsterdam. You can ride a bike, you can travel the canals by boat, you can walk around happily by yourself (ideally scoffing from a paper cone of hot frites doused in mayonnaise) or you can catch a tram with the locals, but you cannot escape one th…

Read More >

Creepiness is in the eye of the beholder

October 15, 2015, Anna Johnston

Happy Halloween dear readers! As you carve your pumpkins, decorate your house with plastic spiders and work on your scary costumes, it seems an apposite time to reflect on … creepiness. Privacy practitioners are often called upon to determine whether o…

Read More >

Don’t throw out the baby with the bath water on donor privacy

September 9, 2015, Anna Johnston

There is a debate going on in Victoria about when it is acceptable to override the wishes of someone who has explicitly refused their consent for their identity and information to be shared. Or in other words – when it is OK to break a privacy promise….

Read More >

There’s more than one way to bake a pia

September 1, 2015, Anna Johnston

Although it is great to see Privacy Impact Assessment (PIA) being discussed in mainstream media, the recent Lateline program on ABC TV was also depressing in its conclusion: that PIAs are not being done routinely (and if done, are mostly not being done…

Read More >

Let’s take a ride on the privacy law reform merry-go-round

August 25, 2015, Anna Johnston

So, I have been approached by a NSW Parliamentary committee to make a submission on whether or not we need a statutory cause of action for serious invasions of privacy. My first thought was: why bother? We’ve been on this merry-go-round before. The ink…

Read More >

Is Barbie the new Big Brother? The Internet of Things is here

July 28, 2015, Anna Johnston

Is it just me, or are things starting to get genuinely creepy around here? I’m not just talking about the trailer for the new TV show Humans, which looks like a gripping piece of sci-fi drama set in the not-too-distant future. I’m talking about the her…

Read More >

Man made software in His own image

July 23, 2015, Stephen Wilson

In 2002, a couple of Japanese visitors to Australia swapped passports with each other before walking through an automatic biometric border control gate being tested at Sydney airport. The facial recognition algorithm falsely matched each of them to the…

Read More >

Privacy in the age of the algorithm: a primer in ethics for using Big Data

June 2, 2015, Anna Johnston

Brrr, winter is here! Time to crack open a red to enjoy with a lovely rich home-cooked lasagna. Except hang on – your pasta-buying habits have you marked down as a poor car insurance risk. You’d better hope you have a nice strong handshake to compensat…

Read More >

Where’s Wally? Geolocation and the challenge of privacy protection

May 26, 2015, Anna Johnston

Those pesky little digital breadcrumbs are starting to catch up with us. A recent article in Wired noted that it’s not just your telephony provider who knows where you are – plenty of smartphone apps use a mixture of GPS, Bluetooth and Wi-Fi signals to…

Read More >

That’s a wrap: Privacy Awareness Week 2015

May 25, 2015, Anna Johnston

I think I am suffering indigestion, but it’s not from the delicious breakfast served at the opening event to mark Privacy Awareness Week this year.  It’s more like mental indigestion, as my brain tries to absorb all the nutrients found in the smorgasbo…

Read More >

Bradley Cooper’s taxi ride: a lesson in privacy risk

April 19, 2015, Anna Johnston

Hollywood heartthrob Bradley Cooper is a bad tipper.  That was the conclusion drawn by media – though denied by his PR rep – when data about 173 million New York taxi trips became public. But I drew a different and more disturbing conclusion, which was…

Read More >

Free search, free speech, and the Right To Be Forgotten

March 12, 2015, Stephen Wilson

Search engines are wondrous things. I myself use Google search umpteen times a day. I don’t think I could work or play without it anymore. And yet I am a strong supporter of the contentious “Right to be Forgotten”. The “RTBF” is hotly contested, and I…

Read More >

Hard or soft? The skills needed for a risk-based approach to privacy

February 13, 2015, Anna Johnston

This week I had the pleasure of attending a seminar on the Risk-Based Approach to Privacy.  The keynote speaker was Richard Thomas, the former UK Data Protection Commissioner – although as he pointed out in his speech, he never liked the European term…

Read More >

The Tribunal is curious: is your privacy program up to scratch?

January 29, 2015, Anna Johnston

Does your organisation have a program to train staff about their privacy obligations?  Have you identified technical or procedural ways to minimise the risk of privacy breaches such as unauthorised access to records? If you can’t point to demonstrable…

Read More >

Recent Posts

  • How dark patterns can land you in hot water: new case offers lessons for all
  • How to sniff out the landmines that can ruin your AI project
  • Privacy reforms to impact over 100,000 small businesses
  • The view from the summit: trust and hope, caution and concern, and plenty of hard work
  • Is identifiability in the eye of the beholder?  EU case tests limits of pseudonymisation
  • Mind the gap: when legal permission is not enough to ensure compliance
  • Why “Don’t worry it’s de-identified” should (still) be a red flag when considering privacy risk
  • How to get ahead of the new ADM rules before they rule you
  • Helios Salinger launches ground-breaking report on privacy maturity
  • Productivity or privacy … why not both?
  • How are other organisations really managing their privacy? You’re about to find out
  • A new enforcement era is here: will your projects pass the OAIC’s privacy pub test?
  • Smart to secure: Australia’s new cyber rules for everyday devices
  • Australians now have a direct right of action under the Privacy Act. So what’s the catch?
  • What happens when the west coast leaps ahead of the east?
  • The face off over facial recognition: The Bunnings determination
  • The tort(oise) and the hare: a common law tort for invasion of privacy is recognised in historic case
  • How to prepare for Privacy Act reforms: what to do now, and what can wait
  • Tighten up practices ahead of Tranche 1 Privacy Act reforms
  • Moving at the speed of light – which AI risk assessment framework should you use?
  • HPX Group’s Helios is joining forces with Salinger Privacy
  • Counting the Costs of Not Reforming the Privacy Act
  • After 20 years, what we’ve learned, what has changed … and what’s next
  • In praise of Privacy by Design, not Privacy Busywork
  • What if the OAIC peered inside data clean rooms … and found they were dirty?
  • How privacy immaturity leads to cyber risk
  • “It’s now or never” – the future of the internet and your privacy could be decided this month
  • Insider risk: 15 examples of why training and controls matter
  • Truth, peace and privacy: what the Government does next matters
  • Glass half empty, or glass half full? How to read the Privacy Act reform proposals
  • Thought your doctor’s visit was private? Australian data brokers have your data, and they’re not afraid to use it.
  • Prevention, notification, compensation: lessons from a government data breach managed badly
  • The great con job: how the media and marketing industry is getting away with tracking Australians
  • Keeping it fake: the legal and ethical implications of synthetic data
  • To fix the Privacy Act, we need one extra sentence
  • Privacy Act reforms – the devil is in the details
  • So you want to host a hackathon
  • We need a new right to regulate algorithms – but ‘transparency’ ain’t it
  • Back to the drawing board: PIAs need a framework too
  • In the search for solutions, privacy theatre is the last thing we need
  • Finger scanning kids demonstrates weaknesses in privacy law
  • What your C-suite needs to know about the Privacy Act
  • The seven habits of effective Privacy Impact Assessments
  • Would you like fries with that? A quick guide to notice and consent in privacy law
  • OAIC determinations shed light on when data is regulated as ‘personal information’
  • Big Tech, Individuation, and why Privacy must become the Law of Everything
  • Should birds of a feather be FLoC’d together?
  • Why can’t Aunty get the ABCs of privacy right?
  • Privacy law reform in Australia – the good, the bad and the ugly
  • Between 7 and 11 lessons you can learn from the latest OAIC privacy case
  • Privacy and gender: what to ask, when and why
  • What covid apps can teach us about privacy, utility and trust in tech design
  • Cat or carrot? Assessing the privacy risks from algorithmic decisions
  • Not too much identity technology, and not too little
  • For all the privacy officers caught in the middle of a tug of war
  • How to earn your social licence: the role of trust in project design
  • Representative redress required to mop up after asylum seeker data breach
  • Design jam leaves customers in a privacy pickle
  • What’s in store for privacy law in Australia?
  • Location, location, location: online or offline, privacy matters
  • The Data-Sharing Dilemma
  • Putting a price tag on privacy
  • Why privacy is a public good in need of better protection
  • Re-thinking transparency: If notice and consent is broken, what now?
  • Should I download the COVID-Safe app? The privacy pros and cons
  • Privacy in a pandemic: Keep calm, and remember first principles
  • Privacy in design: Tranquil spaces to be ‘let alone’
  • What should we do about facial recognition?
  • PIAs: Eight lessons to learn from the myki data debacle
  • Training is key to avoiding liability for rogue employees
  • Stand in their shoes: Privacy by Design is needed everywhere
  • You say potato: The meaning and causes of data breaches
  • Top 10 Privacy Risks to Lose Sleep Over
  • Privacy 101, for people who are new to privacy
  • The ethics of artificial intelligence: start with the law
  • My Privacy String: Tie up loose threads to avoid privacy risks
  • It’s the data breach countdown: the top 10 risks to avoid
  • PPIPA turns 21: should we celebrate?
  • Why “opt out consent” is an oxymoron
  • How to corrode your social licence in nine easy steps
  • Why you’ve been drafting your Privacy Policy all wrong
  • How do you solve a problem like Facebook?
  • Investing in Privacy: Does privacy need to be quantifiable to be valued?
  • Stormy seas ahead as TfNSW loses critical Opal Card privacy case
  • Too much cyber, not enough privacy 101
  • Yet another broken anonymity promise
  • Better than Santa, your IoT device will know who’s naughty and nice
  • Preventing and responding to data breaches: are you ready for 2018?
  • Looking forward, looking back: privacy challenges past and future
  • Why the marriage equality poll is a privacy issue
  • What technology designers need to know to understand privacy
  • Balancing the ledger: accounting for the year in privacy
  • The privacy paradox: We want to have our data and eat it too
  • GDPR & PbD: what Aussies need to know about new privacy laws
  • Just because you can disclose, doesn’t mean you should
  • Hashing, Beyonce & rainbows: a lay person’s guide to de-identification
  • Mobiles, metadata and the meaning of ‘personal information’
  • Happy New Year! The Privacy Officer’s guide to 2017
  • Social licence and pragmatic tools: how to unlock public data
  • Dear Diary: Should you be public or private, personal or Ministerial?
  • Individuation – Re-thinking the scope of privacy laws
  • Why I’m taking leave of my Census: a privacy expert’s reluctant boycott
  • What’s in the bag: data analytics or social surveillance?
  • Magic and rocket science: de-identification is the new black
  • Woolly thinking & knotty problems: how to untangle the Disclosure rules
  • Cash for data? Ownership of personal information not a solution
  • Why you might want to become a Jedi Knight for this year’s Census
  • Will the new Transborder principle become an April fool’s joke?
  • How Stephanie’s broken down car is undermining your privacy
  • Find your friends … and then invade their privacy
  • Smile! You’re on someone’s facial recognition database
  • A bridge too far: 85% of the world ignored at ‘international’ conference
  • Creepiness is in the eye of the beholder
  • Don’t throw out the baby with the bath water on donor privacy
  • There’s more than one way to bake a pia
  • Let’s take a ride on the privacy law reform merry-go-round
  • Is Barbie the new Big Brother? The Internet of Things is here
  • Man made software in His own image
  • Privacy in the age of the algorithm: a primer in ethics for using Big Data
  • Where’s Wally? Geolocation and the challenge of privacy protection
  • That’s a wrap: Privacy Awareness Week 2015
  • Bradley Cooper’s taxi ride: a lesson in privacy risk
  • Free search, free speech, and the Right To Be Forgotten
  • Hard or soft? The skills needed for a risk-based approach to privacy
  • The Tribunal is curious: is your privacy program up to scratch?

Archive

  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015

Search

Helios Salinger can help you navigate the complexity of the regulatory environment, and ensure the trust of your customers.

CONTACT US

T: 02 9043 2632
Level 37, 180 George Street
Sydney NSW 2000
Email Enquiry

© Helios Salinger Pty Ltd
ACN 655 748 593
ABN 59 655 748 593

Our Privacy Policy

Terms of Engagement

Subscribe to our newsletter.

These details will be added to our mailing list to receive the Helios Salinger eNews and Product News newsletters. You can unsubscribe or adjust your preferences at any time, from the bottom of any newsletter.