Australasian University Safety Association 2016 Fiona Austin
|
|
- Estella Ellis
- 5 years ago
- Views:
Transcription
1 Managing global mobility legal issues for work safety and security Australasian University Safety Association 2016 Fiona Austin
2 Top legal issues for organisations in mobility transition Global jurisdictions Security Flexible work Privacy and cyber risk Safety and health risk New work models 1
3 Why? Technological development Exponential growth in computing power, device connectivity, data volumes, artificial intelligence 44% of jobs in Australia are at high risk of computerisation and automation Changed skill set required for work and raises the bar for entry Transition to a knowledge economy 2
4 Why? Increasing globalisation Global internet enabled workforce has no geographical barriers Increased global competition China and India lead in STEM education numbers 3
5 Why? Social change Ageing population Cultural diversification Health and wellbeing drivers Post mining boom 4
6 Why? Developing business models P2P marketplace + platform economics + digital natives emerging Transforming employment markets and organisational structures Flat organisational structures more desirable Jobs of the future will be more flexible, agile, networked and connected Anyone can participate but skills thresholds are high Industry boundaries may be crossed Office spaces will transform A market for co-working spaces is emerging Focus is on value of experience 5
7 Legal challenge: Global compliance Australian laws apply: Australian employment laws (Fair Work Act) applies to international work where the work is performed by an employee of an Australian Employer, unless that employee is engaged outside of Australia and the external territories to perform duties outside of Australia and the external Territories. Australian WHS laws will apply to international work where there is a relevant connection with the relevant Australian jurisdiction eg. so that an element of the offence is committed here (eg. work is under the direction or control of supervisors in the Australian jurisdiction or the employee often works in that jurisdiction). Offshore local laws apply: Local WHS employment laws where the work is done are very likely to apply. Local WHS laws where the work is done are very likely to have application. 6
8 Example: Hong Kong The Occupational Safety and Health Ordinance (Chapter 509) (1997) (Ordinance) imposes a duty on employers to ensure, so far as reasonably practicable the safety and health at work of all the employer's employees. This includes, providing and maintaining safe systems of work, handling storage or transport of plant or substances, information, instruction and training, safe access and egress to a workplace within the employers control and provide and maintain a safe working environment. Officer Liability Provision Section 33(1) of the Ordinance provides that in circumstances where the company is convicted of an offence against the Ordinance and it is proved that the offence was committed with the consent or connivance of or was attributable to any neglect on the part of any officer, the officer will also be guilty of the same offence. Officers are therefore individually liability for the same penalties as the company. Penalties include fines or up to 6 months imprisonment. 7
9 Legal challenge: Global compliance Universities should: Develop global due diligence and compliance programs for all jurisdictions this is important not just from the corporate perspective but because personal obligations also apply and the civil risks are real! Consider strategies for limiting double dipping or establishing in appropriate jurisdiction Develop individual mobility agreements for each case 8
10 Legal challenge: Privacy and cyber risk Mobility increases risk: information theft & fraud breach of privacy obligations (eg. information security and cross border obligations) Significant reputational damage The Office of the Privacy Commissioner can seek civil penalties of up to (or apply for civil penalty orders of up to) $340,000 for individuals and $1.7m for companies Recent decision in HW and Freelancer International Pty Limited [2015] AICmr 86 (18 December 2015) included aggravated damages 9
11 Legal challenge: Privacy and cyber risk Universities should: Plan for all related events and have clear rules and a planned response eg. hacking (consider University of Calgary ransomware), virus, cyber extortion, identity theft, unauthorised access, system error, theft of information, defamation, privacy breach, theft of IP Plan for notifications of breach Review cyber risk insurances now available 10
12 Legal challenge: Safety and security risk Safety - Mobility increases risk: workplaces are any places persons are likely to go while at work. This includes work at home and other mobile work environments including accommodation. Case example - consider De Silva v Secretary, Department of Finance, Services and Innovation [2015] NSWWCC 279 (7 October 2015) 11
13 Legal challenge: Safety and security risk Security - Emerging challenges: Working alone, travel and remote work Threats and violence Terrorism Emerging regulation: Criminal Code Act 1995 (Cth) under which a terrorist act is an act or threat intended to advance a political, ideological or religious cause by coercing or intimidating an Australian or foreign government or the public, by causing serious harm to people or property, endangering life, creating a serious risk to the health and safety of the public, or seriously disrupting certain types of critical infrastructure, electronic systems or trade State criminal laws eg. explosives or crimes WHS Regulation and civil litigation eg. Wright by his tutor Wright v Optus Administration Pty Limited [2015] NSWSC
14 Legal challenge: Safety and security risk Universities should: Focus on critical and catastrophic risks Integrate security planning with their WHS systems Prepare individual plans for remote, travel and mobile work scenarios but consider the placement of the notification functions Consider security in design Engagement and education is critical including systems for detection and prevention Testing and ability to adapt is vital for worst case scenarios 13
15 Legal challenge: Flexible work Flexible work must be considered: Flexible workspaces, co-working, hot-desking, non-traditional hours, part time and casual, compressed hours, working from home, alternative workplaces, flexi time, tailored leave, phasing a return from leave, employment mobility, travel, secondments, staging retirement...and more? Fair Work Act (s.65) right to request is open to employees who: are the parent, or have responsibility for the care, of a child who is of school age or younger are a carer (as defined in the Carer Recognition Act 2010) employees with a disability mature age employees (>55 years) workers experiencing family violence or supporting an immediate family member / household member who is experiencing family violence Subject to reasonable business grounds 14
16 Legal challenge: New work models Emerging entrepreneurial models in the new knowledge economy: eg. contractors, freelancers and share platforms Contractual relationships differ from employment relationships in the sense of content, rights and responsibilties 15
17 Legal challenge: new work models Universities should focus on: Project management Relationship definition and governance Interface planning Oversight delivery 16
18 Are you prepared? Global jurisdictions Security risk Flexible work Privacy and cyber risk Safety and health risk New work models 17
19 18 Further information
20 Partners Legal professionals worldwide Total Staff Offices across 6 continents Further advice should be taken before relying on the contents of this summary. Clyde & Co accepts no responsibility for loss occasioned to any person acting or refraining from acting as a result of material contained in this document. No part of this document may be reproduced without the prior permission of Clyde & Co. Clyde & Co Australia is a multi-disciplinary partnership registered with the Law Society of New South Wales. Clyde & Co
Mandatory data breach reporting comes to Australia new notification requirements under the Privacy Act (2018) 15(4) PRIVLB 54
Mandatory data breach reporting comes to Australia new notification requirements under the Privacy Act Privacy Law Bulletin (newsletter) Daniel Kovacs and Alex Garfinkel KCL LAW Editor s Note: This article
More informationCORRUPT CONDUCT AND PUBLIC INTEREST DISCLOSURE POLICY
CORRUPT CONDUCT AND PUBLIC INTEREST DISCLOSURE POLICY DOCUMENT CONTROL Document Name: Version: 002 Corrupt Conduct and Public Interest Disclosure Policy Approved by: Board Date approved: 27 August 2015
More informationPolicy: Notifiable Data Breach
DomaCom Limited Policy: Notifiable Data Breach Version 1.1 June 7, 2018 Author: Sean Crisp Contents 1. Version Control 2 2. Summary 3 3. What is a Data Breach 3 4. Process and Procedure 4 5. Updates to
More informationCounter-terrorism Laws, Offences and Other Provisions
Counter-terrorism Laws, Offences and Other Provisions CHAPTER CONTENTS Introduction 2 What is a Terrorist Act? 2 Preparatory and Group-based Terrorism Offences 2 Coercive Powers to Investigate and Prevent
More informationWork Health and Safety Act 2011 No 10
New South Wales Work Health and Safety Act 2011 No 10 Status information Currency of version Current version for 1 January 2014 to date (generated 17 October 2014 at 13:12). Legislation on the NSW legislation
More informationLegal Challenges in Digitalization and Privacy in Industry 4.0
1 Legal Challenges in Digitalization and Privacy in Industry 4.0 Dominic Wai, Partner, ONC Lawyers 23 June 2017 HKPC This presentation is not an exhaustive treatment of the area of law discussed and cannot
More informationWhite Paper - Employer Sanctions Act
White Paper - Employer Sanctions Act Migration Amendment (Reform of Employer Sanctions) Act 2013 Introduction The Government estimates that there are 100,000 people working in Australia illegally - people
More informationLAWS OF BRUNEI CHAPTER 197 ANTI-TERRORISM (FINANCIAL AND OTHER MEASURES) ACT
CHAPTER 197 ANTI-TERRORISM (FINANCIAL AND OTHER MEASURES) ACT S 41/02 REVISED EDITION 2008 B.L.R.O. 6/2008 2008 Ed. (Financial and Other Measures) CAP. 197 1 LAWS OF BRUNEI REVISED EDITION 2008 Section
More informationTERRORISM (SUPPRESSION OF FINANCING) ACT. Act 16 of 2002
TERRORISM (SUPPRESSION OF FINANCING) ACT Act 16 of 2002 Short title 1. This Act may be cited as the Terrorism (Suppression of Financing) Act. Interpretation 2. (1) In this Act, unless the context otherwise
More informationCybersecurity Counter-offensive. Asia Pacific Guide
Cybersecurity Counter-offensive Asia Pacific Guide Contents AUSTRALIA 1 CHINA 6 HONG KONG 12 INDIA 18 INDONESIA 22 JAPAN 25 MALAYSIA 30 PHILIPPINES 35 SINGAPORE 40 SOUTH KOREA 44 TAIWAN 49 THAILAND 54
More informationStatutory Frameworks. Safeguarding and Prevent. 1. Safeguarding
Safeguarding and Prevent Statutory Frameworks 1. Safeguarding The legal framework for the protection of children in the UK is set out in the Children Act 1989. A child is defined by this act as any person
More informationWork Health and Safety Act 2011 No 10
New South Wales Work Health and Safety Act 2011 No 10 Contents Part 1 Preliminary Page Division 1 Introduction 1 Name of Act 2 2 Commencement 2 Division 2 Object 3 Object 2 Division 3 Interpretation Subdivision
More informationInquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979
Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Northern Territory Police Submission to the Senate Legal and Constitutional Affairs Committee March 2014
More informationTerrorism Offences Definitive Guideline DEFINITIVE GUIDELINE
Terrorism Offences Definitive Guideline DEFINITIVE GUIDELINE Contents Applicability of guideline 4 Preparation of terrorist acts Terrorism Act 2006 (section 5) Explosive substances (terrorism only) Causing
More informationPolicies and Procedures No. 56
1255 Imperial Avenue, Suite 1000 San Diego, CA 92101-7490 619/231-1466 FAX 619/234-3407 Policies and Procedures No. 56 SUBJECT: Enacted: 9/13/07 FRAUD IN THE WORKPLACE PURPOSE: To establish policies and
More informationWorkplace Surveillance Act 2005
Workplace Surveillance Act 2005 As at 20 May 2014 Long Title An Act to regulate surveillance of employees at work; and for other purposes. Part 1 ñ Preliminary 1 Name of Act This Act is the Workplace Surveillance
More informationTerrorism Bill [AS AMENDED ON REPORT] CONTENTS PART 1 OFFENCES
[AS AMENDED ON REPORT] CONTENTS PART 1 OFFENCES Encouragement etc. of terrorism 1 Encouragement of terrorism 2 Dissemination of terrorist publications 3 Application of ss. 1 and 2 to internet activity
More information3. Competition begins at 09:00hrs on Saturday 12 November 2016 and closes at 23:59hrs on Friday 9 December 2016 (the Competition Period ).
LIFESTYLE S RATE MY PET COMPETITION TERMS AND CONDITIONS ENTRY INTO THE COMPETITION 1. Entry into Lifestyle s Rate My Pet competition (the Competition ) is open to all residents of Australia over the age
More informationGeorgia Computer System Protection Act
Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia
More informationInquiry into Work Health and Safety (Industrial Manslaughter) Amendment Bill 2015
Australian Industry Group Inquiry into Work Health and Safety (Industrial Manslaughter) Amendment Bill 2015 Submission to Parliament of South Australia Parliamentary Committee on Occupational Safety, Rehabilitation
More informationGuidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff
RM Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff The Association of Chief Police Officers has agreed to these guidelines being circulated to, and adopted
More informationOccupational Safety and Health Act 1984
Western Australia Occupational Safety and Health Act 1984 As at 29 Nov 2012 Version 07-e0-01 Western Australia Occupational Safety and Health Act 1984 CONTENTS Part I Preliminary 1. Short title 2 2. Commencement
More informationLEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA
LEGAL GUIDE TO APPREHENDED DOMESTIC VIOLENCE ORDERS LEGAL GUIDES WESTERN AUSTRALIA : Women s technology safety, legal resources, research & training LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN
More informationPractice Circular on Sale of Uncompleted Properties Situated Outside Hong Kong. Questions and Answers (Q&As)
Practice Circular on Sale of Uncompleted Properties Situated Outside Hong Kong Notes: Questions and Answers (Q&As) 1. All references to: a. EAA shall mean the Estate Agents Authority. b. EAO shall mean
More informationHacking and the Law. John MacKenzie
Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors
More informationBERMUDA ANTI-TERRORISM (FINANCIAL AND OTHER MEASURES) ACT : 31
QUO FA T A F U E R N T BERMUDA ANTI-TERRORISM (FINANCIAL AND OTHER MEASURES) ACT 2004 2004 : 31 TABLE OF CONTENTS 1 2 3 4 5 5A 5B 6 7 8 9 10 10A 11 12 12A 12B 12C 12D 12E 12F 12G Short title and commencement
More informationTechnology and the Law. Jackie Charles
Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy
More informationNORTHERN IRELAND SOCIAL CARE COUNCIL
NORTHERN IRELAND SOCIAL CARE COUNCIL BRIBERY POLICY FINAL SEPTMBER 2012 1. INTRODUCTION The Bribery Act 2010 (the Act) introduces a new, clearer regime for tackling bribery that applies to all commercial
More informationCyber Crime & Information Security A Legislative Regime. Dr. Adrian McCullagh Information Security Institute Queensland University of Technology
Cyber Crime & Information Security A Legislative Regime Dr. Adrian McCullagh Information Security Institute Queensland University of Technology Agenda Introduction Telecommunications Cyber crimes Act Federal
More informationAnti-Bribery and Corruption Policy
Anti-Bribery and Corruption Policy Policy # BW-GRP- ABC-01 Effective Date 30 September 2017 Email hilaryw@barloworld.com Version V2.2 Contact Hilary Wilton Phone 011 445 1168 Purpose... 1 Scope... 1 Regulatory
More informationthe general policy intent of the Privacy Bill and other background policy material;
Departmental Disclosure Statement Privacy Bill This departmental disclosure statement for the Privacy Bill seeks to bring together in one place a range of information to support and enhance the Parliamentary
More information6.23 Anti-Bribery Policy
6.23 Anti-Bribery Policy Message from the General Director At BMS World Mission we are committed to doing the right thing, the right way. This is more important than ever because of the strict new rules
More informationOFFICIAL MISCONDUCT AND PUBLIC INTEREST DISCLOSURE POLICY
OFFICIAL MISCONDUCT AND PUBLIC INTEREST DISCLOSURE POLICY DOCUMENT CONTROL Document Name: Version: 001 Official Misconduct and Public Interest Disclosure Policy Approved by: Board Date approved: 29 May
More informationTHE BAIL AMENDMENT ACT 2015-by Caroline Dobraszczyk-Barrister-Trust Chambers, Sydney
THE BAIL AMENDMENT ACT 2015-by Caroline Dobraszczyk-Barrister-Trust Chambers, Sydney INTRODUCTION The Bail Amendment Act 2015 ( the Act ) was passed on 27 October 2015 but at the time of writing is yet
More informationCCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations
CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations Presented by: Alison Choy Flannigan Partner (02) 9390 8338 alison.choyflannigan@holmanwebb.com.au
More informationAn Garda Síochána. Policing Plan 2017
An Garda Síochána Policing Plan 2017 Foreword I am pleased to announce An Garda Síochána s Policing Plan 2017 which sets out the policing priorities for the coming year. It demonstrates how we are changing
More informationCYBERCRIMES AND CYBERSECURITY BILL
REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 40487 of 9 December
More informationChapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses
Chapter 6 Business Torts and Online Crimes and Torts Disparagement of Property Slander of Title Slander of Quality (Trade Libel) Defenses Disparagement of Property Disparagement of property occurs when
More informationANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed
ANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed 1. 29 th March, 2012 Initial Issue 2. 5 th October 2015 Review and approval by Compliance Task Group
More informationThe UK Bribery Act 2010 How Will It Impact the Life Sciences Industry and How Does It Compare With the US Foreign Corrupt Practices Act?
The UK Bribery Act 2010 How Will It Impact the Life Sciences Industry and How Does It Compare With the US Foreign Corrupt Practices Act? 1 February 2011 Angela Hayes Andrew Legg Lynn Neils Partner, London
More informationLipikar Families Campaign
Lipikar Families Campaign Introduction 1 L Oréal Australia Pty Ltd (ABN 40 004 191 673) of 564 St Kilda Road, Melbourne VIC 3004 and its related bodies corporate (L Oréal) are conducting the Lipikar Families
More informationHackers in Hong Kong and the attitude of Hong Kong Courts towards hacking. David Leung, 11 November 2000
Hackers in Hong Kong and the attitude of Hong Kong Courts towards hacking David Leung, 11 November 2000 Introduction We will address the following: The known hacking problems in HK; The attitude of the
More informationPRIVACY MANAGEMENT PLAN
PRIVACY MANAGEMENT PLAN September 2015 Contents 1. Introduction... 3 1.2 Purpose... 3 1.3 Scope... 3 1.3 Section 41 Directions... 3 1.4 Complaints... 4 2. Definitions... 4 2.1 Personal Information... 4
More informationBJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures
BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures Version History and Document Approval Version History: Version Date Author Reason 1.0 31 st December 2017 Barry Wilson Document
More informationLex Mundi Data Privacy Guide: Focus on the Asia/Pacific Region
Lex Mundi Data Privacy Guide: Focus on the Asia/Pacific Region Prepared by Lex Mundi member firms in the Asia/Pacific Region This guide is part of the Lex Mundi Global Practice Guide Series which features
More informationChanges in Schengen visa application process
Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries
More informationDirector of Customer Care & Performance. 26 April The Board is asked to consider and approve the attached draft
To: From: Subject: Status: Date of Meeting: BSO Board Director of Customer Care & Performance Anti Bribery Policy For Approval 26 April 2012 The Board is asked to consider and approve the attached draft
More informationLegal Guide to Relevant Criminal Offences in Victoria
Legal Guide to Relevant Criminal Offences in Victoria A review of Victorian criminal offences relating to technology-facilitated family violence and abuse SOME NOTES Language of victim vs survivor Some
More informationLAW The Criminal Code of the Republic of Moldova. No. 985-XV dated
LAW The Criminal Code of the Republic of Moldova No. 985-XV dated 18.04.2002 Republished: Official Monitor of the Republic of Moldova No. 72-74/195 dated 14.04.2009 Official Monitor of the Republic of
More informationFederal Act on Data Protection (FADP) Section 1: Aim, Scope and Definitions
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Data Protection (FADP) 235.1 of 19 June
More information2018 OHS Act Post Implementation Update Presentation to Alberta Association for Safety Partnerships AGM & Conference September 2018
2018 OHS Act Post Implementation Update Presentation to Alberta Association for Safety Partnerships AGM & Conference September 2018 Key Concepts in Canadian OHS Law Internal responsibility Everyone in
More informationAggravating factors APPENDIX 2. Summary
APPENDIX 2 Aggravating factors Summary This guideline deals with those factors that may not be specifically identified in the applicable offencebased guideline, but may still be relevant to sentence depending
More informationDirectors Roles & Responsibilities Dealing with Dysfunctional Boards/Crises/Emergencies November 2012
Directors Roles & Responsibilities Dealing with Dysfunctional Boards/Crises/Emergencies November 2012 www.charltonslaw.com 0 THE LEGAL ISSUES 1 BACKGROUND 2 ROLE OF LAWYERS 3 Definition of Director : Directors
More informationOHS Prosecutions under the Work Health and Safety Act
OHS Prosecutions under the Work Health and Safety Act A better deal for NSW employers? SYDNEY LAW SCHOOL Belinda Reeve, PhD Candidate Relevant aspects of OHS law How will the model law change the use of
More informationDepartmental Disclosure Statement
Departmental Disclosure Statement Health Practitioners Competence Assurance Amendment Bill The departmental disclosure statement for a government Bill seeks to bring together in one place a range of information
More informationSTUDENT DISCIPLINARY PROCEDURE: NON-ACADEMIC MISCONDUCT
STUDENT DISCIPLINARY PROCEDURE: NON-ACADEMIC MISCONDUCT 1. INTRODUCTION Purpose 1.1 In order to operate effectively, all organisations need to set standards of conduct to which their members are expected
More informationDebating privacy and ICT
Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal
More informationTerms and Conditions Colour in Play-Doh and WIN!
Terms and Conditions Colour in Play-Doh and WIN! General 1. The Promoter is The Herald & Weekly Times Pty Ltd (ABN 49 004 113 937) HWT Tower, 40 City Road, Southbank VIC 3006. 2. Information on how to
More informationOccupational Safety and Health Convention, C155, and its Protocol of 2002
International Labour Organization Occupational Safety and Health Convention, C155, and its Protocol of 2002 Dr. Amin Al-Wreidat OSH and Labour Inspection Specialist ILO Decent Work Team for South Asia
More information1.4 This code does not attempt to replace the law. The University therefore reserves the right to refer some matters to the police (see section 4).
Code of Discipline for Students and Disciplinary Procedures 1. Overview 1.1 The University exists primarily to provide higher education, to carry out research and to provide the facilities and resources
More informationPrivacy. Purpose. Scope. Policy. Appendix A
Privacy NZQA Quality Management System Policy Appendix A Purpose To ensure NZQA and personnel meet the legal obligations under the Privacy Act 1993 and in relation to its functions under section 246A of
More informationAnalysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level
Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Lecturer Adrian Cristian MOISE, PhD. Postdoctoral researcher, Titu Maiorescu
More informationChild Protection. Working with Children Checks Policy
Child Protection Working with Children Checks Policy Working with Children Checks Source of Obligation The Working with Children Act 2005 (Victoria) (the Act) aims to protect children from harm by ensuring
More informationLiability under the Workplace Health and Safety Act 1995: Select issues for Management
Liability under the Workplace Health and Safety Act 1995: Select issues for Management Kristy Richardson School of Commerce and Marketing, Faculty of Business and Informatics, Central Queensland University,
More informationPUBLIC INTEREST DISCLOSURE POLICY
1 Policy Statement At Tourism and Events Queensland (TEQ), we believe that Public Interest Disclosures (PIDs) and the ability to make such disclosures without retaliation or reprisal is critically important,
More informationAPPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:
APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence
More informationORDINANCE 17 CODE OF STUDENT DISCIPLINE
CODE OF STUDENT DISCIPLINE DEFINITIONS In this Code: 'day' means a working day and excludes weekend days, public holidays and other days during which the offices of the University are not open for business.
More informationAIA Australia Limited
AIA Australia Limited Privacy policies & procedures May 2010 The Power of We AIA.COM.AU AIA Australia Limited Privacy policies & procedures Contents Purpose 3 Policy 3 National Privacy Principles Policy
More informationAnti- Bribery Policy. Date of Approval: 4 th February 2014 Date for Next Scheduled Review: February 2017 Review Body:
Anti-Bribery Policy Policy Title: Anti- Bribery Policy Policy Author: Kenny Stocks Date of Approval: 4 th February 2014 Date for Next Scheduled Review: February 2017 Review Body: MC Equality Impact Assessment
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Proposal for a Council Decision on the conclusion of an Agreement between the European Union and Australia on the processing and transfer of Passenger
More informationAccess to Personal Information Procedure
Purpose of The sixth principle of the Data Protection Act 1998 gives rights to individuals in respect of the personal data that organisations hold about them. The Act says that: Personal data shall be
More informationTertiary Education Quality and Standards Agency Act 2011
Tertiary Education Quality and Standards Agency Act 2011 Act No. 73 of 2011 as amended This compilation was prepared on 3 October 2012 taking into account amendments up to Act No. 136 of 2012 The text
More informationVII. AUSTRALIA 8 SUMMARY OF LEGISLATION OF AUSTRALIA RELATED TO TERRORISM Counter Terrorism Legislation package. (a)
VII. AUSTRALIA 8 SUMMARY OF LEGISLATION OF AUSTRALIA RELATED TO TERRORISM (a) 2002 Counter Terrorism Legislation package The Australian Government's 2002 Counter Terrorism Legislation package consisted
More informationInterpretive guideline Work Health and Safety Act 2011 (Qld) Workplace entry by work health and safety entry permit holders
Interpretive guideline Work Health and Safety Act 2011 (Qld) Workplace entry by work health and safety entry permit holders This document provides guidance on the interpretation and application of the
More informationLIFESTYLE S CARROL BOYES COMPETITION TERMS & CONDITIONS. 1. The following definitions apply to these Terms and Conditions:
LIFESTYLE S CARROL BOYES COMPETITION TERMS & CONDITIONS DEFINITIONS 1. The following definitions apply to these Terms and Conditions: Closing Date means 11:59 hrs on Wednesday 19 September, 2018. Commencement
More informationAnnex - Summary of GDPR derogations in the Data Protection Bill
Annex - Summary of GDPR derogations in the Data Protection Bill The majority of the provisions in the General Data Protection Regulation (GDPR) will automatically become UK law on 25 May 2018. However,
More informationFACT SHEET. Offences and Penalties under the Health & Safety at Work Act 2015
FACT SHEET s and Penalties under the Health & Safety at Work Act 2015 This information outlines the offences and penalties under the Health & Safety at work Act 2015 (HSWA) There are a range of offences
More informationPolice and Crime Needs Assessment. Karen Sleigh Chief Inspector Andy Burton
Police and Crime Needs Assessment Karen Sleigh Chief Inspector Andy Burton January 2015 Summary of Nottinghamshire s Police and Crime Needs Assessment Annual assessment of crime and community safety in
More informationYMCA NSW Whistle Blower Policy
1. Document control Overview A whistle-blower is any employee, volunteer, contractor or people associated with the YMCA NSW that detects wrongdoing, or has reasonable grounds for suspecting wrongdoing
More informationLegal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.
Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2. Disclaimer Notice 3. Copyright Notice Introduction Associated
More informationINTRODUCTION BY THE SECRETARY GENERAL
2 INTRODUCTION BY THE SECRETARY GENERAL I am pleased to introduce the 2018 OnePlan, which sets out the major priorities and objectives from the Department of Justice and Equality Strategy Statement 2016-2019
More informationDATA PROTECTION LAWS OF THE WORLD. South Korea
DATA PROTECTION LAWS OF THE WORLD South Korea Downloaded: 31 August 2018 SOUTH KOREA Last modified 26 January 2017 LAW In the past, South Korea did not have a comprehensive law governing data privacy.
More informationChildren and Young Persons (Care and Protection) Act 1998 No 157
New South Wales Children and Young Persons (Care and Protection) Act 1998 No 157 Status information Currency of version Current version for 10 May 2011 to date (generated 29 June 2011 at 15:21). Legislation
More informationANTI-CORRUPTION AND BRIBERY POLICY - INCLUDING CODE OF PRACTICE ON BUSINESS GIFTS AND HOSPITALITY
ANTI-CORRUPTION AND BRIBERY POLICY - INCLUDING CODE OF PRACTICE ON BUSINESS GIFTS AND HOSPITALITY Policy Number 5 July 2015 This Document is for the use of Scotmid Employees and their advisors only. No
More informationIntroduction. The highly anticipated text of the Irish Data Protection Bill 2018 has been published.
Key points of the recently published Data Protection Bill February 2018 00 Introduction The highly anticipated text of the Irish Data Protection Bill 2018 has been published. The Bill supplements and gives
More informationAnalysis of the Workplace Surveillance Bill 2005
Analysis of the Workplace Surveillance Bill 2005 16 May 2005 Introduction This paper sets out the Australian Privacy Foundation s analysis of the Workplace Surveillance Bill 2005 (NSW). The Workplace Surveillance
More informationTrends Shaping Education Highlights
Trends Shaping Education 219 Did you ever wonder whether education has a role to play in preparing our societies for an age of artificial intelligence? Or what the impact of climate change might be on
More informationA BILL. for. Enacted by the Parliament of the Bahamas. Short title. 1. This Act may be cited as the Anti-Terrorism Act, 2003.
A BILL for AN ACT TO IMPLEMENT THE UNITED NATIONS CONVENTION RESPECTING THE SUPPRESSION OF THE FINANCING OF TERRORISM, THE UNITED NATIONS SECURITY COUNCIL RESOLUTION 1373 ON TERRORISM AND GENERALLY TO
More informationData Protection Policy
Data Protection Policy Durrington High School as part of the Durrington Multi Academy Trust collects and uses personal information about staff, pupils, parents and other individuals who come into contact
More informationMAKING A PUBLIC INTEREST DISCLOSURE: POLICY AND PROCEDURE
MAKING A PUBLIC INTEREST DISCLOSURE: POLICY AND PROCEDURE 1. Foreword... 2 2. Purpose... 3 3. Background... 3 4. Definitions and Acronyms... 3 5. Policy... 4 6. What is a Public Interest Disclosure?...
More informationPrivacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.
Privacy Policy Law Society of South Australia Privacy Policy The Law Society of South Australia (Law Society or we, us or our) deals with information privacy in accordance with the Privacy Act 1988 (Cth)
More informationJames Phelps Australian Heist Competition
Terms and Conditions James Phelps Australian Heist Competition General 1. The Promoter is Nationwide News Pty Ltd (ABN 98 008 438 828) of 2 Holt Street, Surry Hills, NSW 2010. Telephone number 02 9288
More informationTERRORISM (JERSEY) LAW 2002
TERRORISM (JERSEY) LAW 2002 Revised Edition Showing the law as at 1 January 2012 This is a revised edition of the law Terrorism (Jersey) Law 2002 Arrangement TERRORISM (JERSEY) LAW 2002 Arrangement Article
More informationSubmission for Roger Wilkins AO and the NSW Electoral Commission. Review of the NSW ivote internet and telephone voting system
1 Submission for Roger Wilkins AO and the NSW Electoral Commission Review of the NSW ivote internet and telephone voting system Ellen Small Physical Disability Council of NSW 3/184 Glebe Point Road, Glebe
More informationUniversity of Gloucestershire Policy related to the UK Prevent Strategy
University of Gloucestershire Policy related to the UK Prevent Strategy 1. Introduction and Context The University of Gloucestershire is committed both to protecting freedom of speech and academic freedom
More informationDATED DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE
DATED ------------ DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE 1 CONTENTS DISCIPLINARY RULES AND PROCEDURE 1. Policy statement...3 2. Who is covered by the procedure?...3 3. What is covered
More informationTHE UNLAWFUL ACTIVITIES (PREVENTION) AMENDMENT BILL, 2011
1 TO BE INTRODUCED IN LOK SABHA Bill No. 138 of 2011 THE UNLAWFUL ACTIVITIES (PREVENTION) AMENDMENT BILL, 2011 A BILL further to amend the Unlawful Activities (Prevention) Act, 1967. BE it enacted by Parliament
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805
COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805 LEGISLATIVE ACTS AND OTHER INSTRUMENTS Subject : COUNCIL DECISION on the
More informationNORTHERN IRELAND PRACTICE AND EDUCATION COUNCIL FOR NURSING AND MIDWIFERY
NIPEC/12/12 NORTHERN IRELAND PRACTICE AND EDUCATION COUNCIL FOR NURSING AND MIDWIFERY Anti-Bribery Policy May 2012 Review date: April 2015 Centre House 79 Chichester Street BELFAST BT1 4JE Tel: (028) 9023
More informationTerms and Conditions Win tickets to the Grand Final ** Last Chance **
Terms and Conditions Win tickets to the Grand Final ** Last Chance ** General 1. The Promoter is The Herald & Weekly Times Pty Ltd (ABN 49 004 113 937) HWT Tower, 40 City Road, Southbank VIC 3006. 2. Information
More information