{"id":8395,"date":"2022-09-29T16:07:40","date_gmt":"2022-09-29T05:07:40","guid":{"rendered":"https:\/\/insight.thomsonreuters.com.au\/legal\/?post_type=insight_resource&#038;p=8395"},"modified":"2022-10-04T16:17:18","modified_gmt":"2022-10-04T05:17:18","slug":"navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","status":"publish","type":"insight_resource","link":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","title":{"rendered":"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">A toolkit to guide users through Practical Law&#8217;s content relating to the legal, practical and commercial issues associated with cybersecurity.<\/h4>\n\n\n\n<p>Scams and fraud continue to rise, with $33 billion of self-reported financial losses from cyber-crime reported in Australia last financial year alone (ACSC Annual Cyber Threat Report 2020-21).<\/p>\n\n\n\n<p>Are you equipped on the latest reporting requirements? With one of the largest data breaches in Australia currently unfolding, your clients will be thinking on their cybersecurity preparedness and data breach response plans.<\/p>\n\n\n\n<p>Get a head start on the key issues with Practical Law\u2019s Cybersecurity toolkit, and learn more on:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What is cybersecurity and what are the threats?<\/li><li>Legislative and regulatory framework<\/li><li>Cybersecurity threat assessment<\/li><li>What are the specific cybersecurity risks?<\/li><li>What type of transactions involve cybersecurity risks?<\/li><li>Australian Privacy Principles (APPs) and cybersecurity<\/li><li>What to do when a data breach incident occurs?<\/li><li>Data protection and security issues in specific sectors<\/li><li>Cybersecurity and corporate governance<\/li><li>International legislative frameworks for data protection<\/li><\/ul>\n\n\n\n<p>Access your copy of the cybersecurity toolkit by Practical Law Toolkit via the form on this page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A toolkit to guide users through Practical Law&#8217;s content relating to the legal, practical and commercial issues associated with cybersecurity.<\/p>\n","protected":false},"author":46,"featured_media":8399,"template":"","categories":[1319,644,1325],"tags":[171,179,181,1700,425],"resource_type":[633],"insight_job_role":[598,1455,1573,1457,614],"insight_practice_area":[1577],"class_list":["entry","author-practicallawwritingteam","has-excerpt","post-8395","insight_resource","type-insight_resource","status-publish","has-post-thumbnail","category-data-privacy","category-data-security","category-legal","tag-cybersecurity","tag-data-privacy","tag-data-security","tag-fraud","tag-practical-law","resource_type-toolkit","insight_job_role-in-house-lawyer","insight_job_role-it-technology-manager","insight_job_role-lawyer","insight_job_role-managing-partner","insight_job_role-partner","insight_practice_area-data-privacy-law","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia\" \/>\n<meta property=\"og:description\" content=\"A toolkit to guide users through Practical Law&#039;s content relating to the legal, practical and commercial issues associated with cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"TR - Legal Insight Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-04T05:17:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2-1024x576.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity\",\"name\":\"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg\",\"datePublished\":\"2022-09-29T05:07:40+00:00\",\"dateModified\":\"2022-10-04T05:17:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg\",\"contentUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg\",\"width\":2309,\"height\":1299,\"caption\":\"Navigate legal, practical and commercial issues associated with cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\",\"name\":\"TR - Legal Insight Australia\",\"description\":\"Just another Legal Hub site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","og_locale":"en_US","og_type":"article","og_title":"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia","og_description":"A toolkit to guide users through Practical Law's content relating to the legal, practical and commercial issues associated with cybersecurity.","og_url":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","og_site_name":"TR - Legal Insight Australia","article_modified_time":"2022-10-04T05:17:18+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2-1024x576.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity","name":"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity - TR - Legal Insight Australia","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage"},"image":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg","datePublished":"2022-09-29T05:07:40+00:00","dateModified":"2022-10-04T05:17:18+00:00","breadcrumb":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#primaryimage","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg","contentUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2022\/09\/cybersecurity-2.jpg","width":2309,"height":1299,"caption":"Navigate legal, practical and commercial issues associated with cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/navigate-legal-practical-and-commercial-issues-associated-with-cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources"},{"@type":"ListItem","position":3,"name":"Navigate Legal, Practical and Commercial Issues Associated with Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/","name":"TR - Legal Insight Australia","description":"Just another Legal Hub site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"}]}},"_links":{"self":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource\/8395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource"}],"about":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/types\/insight_resource"}],"author":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/users\/46"}],"version-history":[{"count":0,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource\/8395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media\/8399"}],"wp:attachment":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media?parent=8395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/categories?post=8395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/tags?post=8395"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/resource_type?post=8395"},{"taxonomy":"insight_job_role","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_job_role?post=8395"},{"taxonomy":"insight_practice_area","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_practice_area?post=8395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}