Helios Salinger

  • About
    • About Salinger Privacy – now Helios Salinger
    • Meet our team
    • Work with us
    • Videos, Podcasts and Media Mentions
    • Privacy Awareness Week
  • Consulting
    • Overview – Our Consulting Services
    • Privacy Impact Assessment
    • Privacy Maturity Assessment
    • Privacy by Design advice
    • Privacy Compliance and Gap Analysis
    • Algorithmic Impact Assessment
    • Re-identification Risk Assessment
    • Data ethics
    • Privacy Helpdesk
  • Training
    • Overview – Our Training Services
    • Privacy Compliance Training
    • Privacy Professionals Training
    • All Online Modules
    • Training Calendar
    • Public Courses and Workshops
    • In-house Privacy Training and Workshops
    • Webinars
    • IAPP Certifications
    • Training Advisory Services
    • Login
  • Resources
    • Overview – Our Resources
    • THE PRIVACY PULSE
    • Privacy Act Reforms
    • Compliance Kits
    • Resources on key privacy topics
    • Free Handbook
    • Newsletter
    • Login
  • Case Study
  • Blog
  • Calendar
  • Contact
  • Compliance Kits
    • For Business & Non-profits
    • For Peak Bodies
    • For Australian Government
    • For NSW Public Sector
    • For VIC Public Sector
    • For QLD Public Sector
    • For WA Public Sector
    • Login

Archives for 2019

PIAs: Eight lessons to learn from the myki data debacle

November 20, 2019, Melanie Casley

As you might expect, the recent investigation by the Office of the Victorian Information Commissioner (OVIC) into the public release of data about myki card users includes important insights into de-identification and re-identification, which were pick…

Read More >

Training is key to avoiding liability for rogue employees

October 1, 2019, Anna Johnston

A recent case illustrates the importance of robust, mandatory privacy training for staff, to avoid privacy breaches – or, if a breach does happen, in order to avoid liability for when a rogue employee goes off on a privacy-invading frolic of their own….

Read More >

Stand in their shoes: Privacy by Design is needed everywhere

September 6, 2019, Anna Johnston

A recent case illustrates the need to think about privacy in both system design and human decision-making.  Plus, how keeping user experience (UX) front of mind when designing systems or processes should result in better privacy outcomes too – and mayb…

Read More >

You say potato: The meaning and causes of data breaches

August 27, 2019, Anna Johnston

You say data breach, I say cybersecurity incident You say privacy breach, I say an individual sending out emails Potato, potahto, tomato, tomahto Let’s call the whole thing off (With apologies to Ella Fitzgerald)   What is a data breach?  Is it th…

Read More >

Top 10 Privacy Risks to Lose Sleep Over

July 10, 2019, Anna Johnston

We’ve written before about the common causes of data breaches, but what about all the other types of privacy risks your organisation might face? This month we have helpfully compiled for you a list of Ten Things To Do or Not to Do or Privacy Risks to A…

Read More >

Privacy 101, for people who are new to privacy

May 3, 2019, Anna Johnston

Hey get ready people, it’s almost Privacy Awareness Week! OAIC’s theme for 2019 is ‘Don’t be in the dark about privacy’, while OPC NZ and OVIC’s theme is ‘Protecting privacy is everyone’s responsibility’.  No matter which slogan you prefer, the point i…

Read More >

The ethics of artificial intelligence: start with the law

April 27, 2019, Anna Johnston

Imagine reading an ethical framework for organising birthday parties, which says that it will be important to meet legal requirements in terms of not making too much noise, that matching napkins and paper plates are fundamental to planning your party,…

Read More >

My Privacy String: Tie up loose threads to avoid privacy risks

March 18, 2019, Kobby Agyei

If a year ago I had attached a piece of string to the personal information I provided in order to enter an online competition, would I be surprised how many organisations had my string threading through them by now? Almost certainly my string would by…

Read More >

It’s the data breach countdown: the top 10 risks to avoid

February 25, 2019, Anna Johnston

February marks 12 months since the start of the notifiable data breach scheme here in Australia, and nine months since the European notification scheme started under the GDPR.  American notification laws have been running for years now. All of which me…

Read More >

PPIPA turns 21: should we celebrate?

January 21, 2019, Anna Johnston

If 21 is the age at which a person is considered to have matured, what are we to make of a law when it turns 21? 2019 marks the 21st birthday of PPIPA (aka the Privacy and Personal Information Protection Act 1998), the key privacy statute in my home st…

Read More >

Recent Posts

  • How dark patterns can land you in hot water: new case offers lessons for all
  • How to sniff out the landmines that can ruin your AI project
  • Privacy reforms to impact over 100,000 small businesses
  • The view from the summit: trust and hope, caution and concern, and plenty of hard work
  • Is identifiability in the eye of the beholder?  EU case tests limits of pseudonymisation
  • Mind the gap: when legal permission is not enough to ensure compliance
  • Why “Don’t worry it’s de-identified” should (still) be a red flag when considering privacy risk
  • How to get ahead of the new ADM rules before they rule you
  • Helios Salinger launches ground-breaking report on privacy maturity
  • Productivity or privacy … why not both?
  • How are other organisations really managing their privacy? You’re about to find out
  • A new enforcement era is here: will your projects pass the OAIC’s privacy pub test?
  • Smart to secure: Australia’s new cyber rules for everyday devices
  • Australians now have a direct right of action under the Privacy Act. So what’s the catch?
  • What happens when the west coast leaps ahead of the east?
  • The face off over facial recognition: The Bunnings determination
  • The tort(oise) and the hare: a common law tort for invasion of privacy is recognised in historic case
  • How to prepare for Privacy Act reforms: what to do now, and what can wait
  • Tighten up practices ahead of Tranche 1 Privacy Act reforms
  • Moving at the speed of light – which AI risk assessment framework should you use?
  • HPX Group’s Helios is joining forces with Salinger Privacy
  • Counting the Costs of Not Reforming the Privacy Act
  • After 20 years, what we’ve learned, what has changed … and what’s next
  • In praise of Privacy by Design, not Privacy Busywork
  • What if the OAIC peered inside data clean rooms … and found they were dirty?
  • How privacy immaturity leads to cyber risk
  • “It’s now or never” – the future of the internet and your privacy could be decided this month
  • Insider risk: 15 examples of why training and controls matter
  • Truth, peace and privacy: what the Government does next matters
  • Glass half empty, or glass half full? How to read the Privacy Act reform proposals
  • Thought your doctor’s visit was private? Australian data brokers have your data, and they’re not afraid to use it.
  • Prevention, notification, compensation: lessons from a government data breach managed badly
  • The great con job: how the media and marketing industry is getting away with tracking Australians
  • Keeping it fake: the legal and ethical implications of synthetic data
  • To fix the Privacy Act, we need one extra sentence
  • Privacy Act reforms – the devil is in the details
  • So you want to host a hackathon
  • We need a new right to regulate algorithms – but ‘transparency’ ain’t it
  • Back to the drawing board: PIAs need a framework too
  • In the search for solutions, privacy theatre is the last thing we need
  • Finger scanning kids demonstrates weaknesses in privacy law
  • What your C-suite needs to know about the Privacy Act
  • The seven habits of effective Privacy Impact Assessments
  • Would you like fries with that? A quick guide to notice and consent in privacy law
  • OAIC determinations shed light on when data is regulated as ‘personal information’
  • Big Tech, Individuation, and why Privacy must become the Law of Everything
  • Should birds of a feather be FLoC’d together?
  • Why can’t Aunty get the ABCs of privacy right?
  • Privacy law reform in Australia – the good, the bad and the ugly
  • Between 7 and 11 lessons you can learn from the latest OAIC privacy case
  • Privacy and gender: what to ask, when and why
  • What covid apps can teach us about privacy, utility and trust in tech design
  • Cat or carrot? Assessing the privacy risks from algorithmic decisions
  • Not too much identity technology, and not too little
  • For all the privacy officers caught in the middle of a tug of war
  • How to earn your social licence: the role of trust in project design
  • Representative redress required to mop up after asylum seeker data breach
  • Design jam leaves customers in a privacy pickle
  • What’s in store for privacy law in Australia?
  • Location, location, location: online or offline, privacy matters
  • The Data-Sharing Dilemma
  • Putting a price tag on privacy
  • Why privacy is a public good in need of better protection
  • Re-thinking transparency: If notice and consent is broken, what now?
  • Should I download the COVID-Safe app? The privacy pros and cons
  • Privacy in a pandemic: Keep calm, and remember first principles
  • Privacy in design: Tranquil spaces to be ‘let alone’
  • What should we do about facial recognition?
  • PIAs: Eight lessons to learn from the myki data debacle
  • Training is key to avoiding liability for rogue employees
  • Stand in their shoes: Privacy by Design is needed everywhere
  • You say potato: The meaning and causes of data breaches
  • Top 10 Privacy Risks to Lose Sleep Over
  • Privacy 101, for people who are new to privacy
  • The ethics of artificial intelligence: start with the law
  • My Privacy String: Tie up loose threads to avoid privacy risks
  • It’s the data breach countdown: the top 10 risks to avoid
  • PPIPA turns 21: should we celebrate?
  • Why “opt out consent” is an oxymoron
  • How to corrode your social licence in nine easy steps
  • Why you’ve been drafting your Privacy Policy all wrong
  • How do you solve a problem like Facebook?
  • Investing in Privacy: Does privacy need to be quantifiable to be valued?
  • Stormy seas ahead as TfNSW loses critical Opal Card privacy case
  • Too much cyber, not enough privacy 101
  • Yet another broken anonymity promise
  • Better than Santa, your IoT device will know who’s naughty and nice
  • Preventing and responding to data breaches: are you ready for 2018?
  • Looking forward, looking back: privacy challenges past and future
  • Why the marriage equality poll is a privacy issue
  • What technology designers need to know to understand privacy
  • Balancing the ledger: accounting for the year in privacy
  • The privacy paradox: We want to have our data and eat it too
  • GDPR & PbD: what Aussies need to know about new privacy laws
  • Just because you can disclose, doesn’t mean you should
  • Hashing, Beyonce & rainbows: a lay person’s guide to de-identification
  • Mobiles, metadata and the meaning of ‘personal information’
  • Happy New Year! The Privacy Officer’s guide to 2017
  • Social licence and pragmatic tools: how to unlock public data
  • Dear Diary: Should you be public or private, personal or Ministerial?
  • Individuation – Re-thinking the scope of privacy laws
  • Why I’m taking leave of my Census: a privacy expert’s reluctant boycott
  • What’s in the bag: data analytics or social surveillance?
  • Magic and rocket science: de-identification is the new black
  • Woolly thinking & knotty problems: how to untangle the Disclosure rules
  • Cash for data? Ownership of personal information not a solution
  • Why you might want to become a Jedi Knight for this year’s Census
  • Will the new Transborder principle become an April fool’s joke?
  • How Stephanie’s broken down car is undermining your privacy
  • Find your friends … and then invade their privacy
  • Smile! You’re on someone’s facial recognition database
  • A bridge too far: 85% of the world ignored at ‘international’ conference
  • Creepiness is in the eye of the beholder
  • Don’t throw out the baby with the bath water on donor privacy
  • There’s more than one way to bake a pia
  • Let’s take a ride on the privacy law reform merry-go-round
  • Is Barbie the new Big Brother? The Internet of Things is here
  • Man made software in His own image
  • Privacy in the age of the algorithm: a primer in ethics for using Big Data
  • Where’s Wally? Geolocation and the challenge of privacy protection
  • That’s a wrap: Privacy Awareness Week 2015
  • Bradley Cooper’s taxi ride: a lesson in privacy risk
  • Free search, free speech, and the Right To Be Forgotten
  • Hard or soft? The skills needed for a risk-based approach to privacy
  • The Tribunal is curious: is your privacy program up to scratch?

Archive

  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015

Search

Helios Salinger can help you navigate the complexity of the regulatory environment, and ensure the trust of your customers.

CONTACT US

T: 02 9043 2632
Level 37, 180 George Street
Sydney NSW 2000
Email Enquiry

© Helios Salinger Pty Ltd
ACN 655 748 593
ABN 59 655 748 593

Our Privacy Policy

Terms of Engagement

Subscribe to our newsletter.

These details will be added to our mailing list to receive the Helios Salinger eNews and Product News newsletters. You can unsubscribe or adjust your preferences at any time, from the bottom of any newsletter.