Overview
View all Global privacy and data protection strategy guidance
Guidance
Developing a strategy for cross jurisdictional compliance
Your objectives in developing a strategy for cross jurisdictional compliance | Understanding the nature of cross border business operations
Analysing your data and data flows
What is data mapping? | Importance of data mapping | Global regulatory compliance
Anticipating issues and risks
Introduction | Protection measures | Risks to consider | Jurisdictional compliance
Selecting local experts and asking the right questions
Introduction | Step 1 - Engage a local expert | Step 2 - Ask the right questions | Step 3 - Other considerations
Checklists
Data Breach Assessment Guideline
P. Fair and S. Lee, Baker McKenzie
Checklist for Complying with both the Privacy Act and the GDPR
S. Sharma, S. Field and B. Tomlinson, Maddocks
Privacy - Checklist for Privacy policy
S. Sharma, Special Counsel, Maddocks
Cybersecurity strategy - Checklist for Overall cybersecurity strategy
P. Fair and S. Lee, Baker McKenzie
Workflow Checklist: Exceptions to notification obligations
D. Kneller, Madgwicks Lawyers
EU General Data Protection Regulation (GDPR) - Compliance checklist
S. Sharma, S. Field and B. Tomlinson, Maddocks
Data security - Checklist for De-identification of personal information
A. Mitchell, Unisys
Privacy - Internal privacy guidelines for staff
S. Sharma, Special Counsel, Maddocks
Checklist for Ensuring data protection compliance
P. Fair and S. Lee, Baker McKenzie
Cybersecurity strategy - Checklist for remote working
LexisNexis Legal Writer Team
Data security - Checklist for Data security audit plan
A. Mitchell, Unisys
Checklist for Transfers of personal data outside the European Economic Area
S. Sharma, S. Field and B. Tomlinson, Maddocks
Workflow Checklist: Assessing a suspected data breach
D. Kneller, Madgwicks Lawyers
Checklist for Data breach response guideline
P. Fair and S. Lee, Baker McKenzie
Privacy - Checklist for direct marketing
S. Sharma and E. Lau, Maddocks
Workflow Checklist: Identifying when a data breach is notifiable
D. Kneller, Madgwicks Lawyers
EU general data protection regulation (GDPR) - Checklist for controller versus processor
S. Sharma, Special Counsel and B. Tomlinson, Partner, Maddocks
Workflow Checklist: Content of notification
D. Kneller, Madgwicks Lawyers
Checklist for computer and device use
P. Fair and S. Lee, Baker McKenzie
Checklist for Staff training on data protection compliance
P. Fair and S. Lee, Baker McKenzie
Threshold compliance checklist - GDPR and the Privacy Act
S. Sharma, S. Field and B. Tomlinson, Maddocks
Privacy by design - practical checklist
S. Sharma, Maddocks
Data security - Checklist for Disaster recovery planning
A. Mitchell, Unisys

Legislation

Healthcare Identifiers Act 2010 (Cth)
Personally Controlled Electronic Health Records Act 2012 (Cth)
Privacy Act 1988 (Cth), s 6(1)
Freedom of Information Act 1982 (Cth)
Invasion of Privacy Act 1971 (Qld)
Listening and Surveillance Devices Act 1972 (SA)
Listening Devices Act 1991 (Tas)
Listening Devices Act 1992 (ACT)
Surveillance Devices Act 1998 (WA)
Surveillance Devices Act 1999 (Vic)
Surveillance Devices Act 2004 (Cth)
Surveillance Devices Act 2007 (NSW)
Surveillance Devices Act 2007 (NT)
Surveillance Devices Act 2016 (SA)