{"id":475,"date":"2015-02-11T14:00:00","date_gmt":"2015-02-11T13:00:00","guid":{"rendered":"https:\/\/hub.findingsimple.com\/au\/cybercrime-risks-avoid\/"},"modified":"2022-08-03T16:04:36","modified_gmt":"2022-08-03T05:04:36","slug":"cybercrime-risks-avoid","status":"publish","type":"post","link":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid","title":{"rendered":"Cyber Crime: The Risks and How to Avoid it"},"content":{"rendered":"<p class=\"intro-paragraph\">When Willie Sutton, infamous American bank robber, was asked why he robbed banks, he replied: \u201cBecause that\u2019s where the money is.\u201d Banks may still have the money, but law firms have the information. And in the online world, information is the new gold mine.<\/p>\n<p>With computer-related fraud, identity theft, hacking and violations of network security now commonplace in our globalised society, how do we deal with online security risks?<\/p>\n<p>We spoke with Alec Christie, privacy and cyber-law specialist and partner at international law firm DLA Piper, about the launch of its new cybersecurity tool, <a title=\"Cybercrime: the risks and how to avoid it\" href=\"https:\/\/www.blueedgelab.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">CyberTrak<\/a>, and how the legal industry can fight the good fight against online crime.<\/p>\n<p><strong><span style=\"color: #ff9900\">What is cyber crime?<\/span><\/strong><\/p>\n<p>In Australia, the term \u201ccyber crime\u201d is used to describe:<\/p>\n<ul>\n<li>Crimes directed at computers or other information communications technologies (ICTs, such as hacking networks to steal sensitive business information and denial of service attacks)<\/li>\n<li>Crimes where computers or ICTs are an integral part of an offence (such as online fraud and identity theft).<\/li>\n<\/ul>\n<p>The dangers that cyber crime presents to law firms are obvious: the risk of sensitive, confidential client information or privileged lawyer\/client communications being leaked and the risk of unauthorised, external access to the personal and financial data of employees, clients and third parties.<\/p>\n<p>Christie says that cyber attacks on businesses are now a question of when, not if. And it seems the Australian federal government agrees with the launch of its <a title=\"Cybercrime: the risks and how to avoid it\" href=\"http:\/\/www.ag.gov.au\/CrimeAndCorruption\/Cybercrime\/Documents\/National%20Plan%20to%20Combat%20Cybercrime.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">National Plan to Combat Cyber Crime.<\/a><\/p>\n<p>The government has also passed new laws (the Cyber Crime Legislation Amendment Bill 2011 amended a number of acts) to make it easier for police to track down cyber criminals around the world and allow Australia to accede to the Council of Europe Convention on Cyber Crime, joining 34 other nations in the global fight against cyber crime.<\/p>\n<p>In a world of increased connectivity and heavy reliance on digital technologies, what extra measures can lawyers and law firms take to protect firm and client data and minimise the risk of a breach?<\/p>\n<p><strong><span style=\"color: #ff9900\">CyberTrak and cyber crime challenges<\/span><\/strong><\/p>\n<p>In a volatile online environment, knowledge and information is power. DLA Piper is forging its own path with its wholly owned subsidiary company, Blue Edge Lab, in partnership with the Internet Security Alliance (ISA).<\/p>\n<p>Aimed at multinational companies, businesses that work online and those that are required to navigate complex international laws and cyber crime regulations, the lab\u2019s CyberTrak tool provides instant online access to credible information about laws and policy developments in 23 key markets across the Americas, Asia-Pacific, Europe and the Middle East.<\/p>\n<p>\u201c[The tool] provides current links to laws and regulations,\u201d Christie says. \u201cIt can be used as a comprehensive guide to analysing security issues and standards in a wide range of areas, or as a starting point to find the right information and then seek further legal advice if necessary.\u201d<\/p>\n<p>Access to that information is designed to help people in key company positions make better risk-management decisions and reduce the costs associated with keeping abreast of changing regulatory requirements.<\/p>\n<p>\u201cLaw firms are now global businesses. Even national firms have global reach. Everyone is online and, in my view, law firms often seriously underestimate the threat of cyber attacks in this environment.\u201d<\/p>\n<p>With new tools like CyberTrak on the rise, it appears the market is responding to clear concerns about security. What else can law firms do to protect their data?<\/p>\n<p><strong><span style=\"color: #ff9900\">Risk minimisation: Easy steps to combat cyber crime<\/span><\/strong><\/p>\n<p>According to Christie, 80 per cent of cyber attacks can be avoided with the most basic level of security. \u201cStudies show that 65 per cent of cyber attacks occur because of \u2018insiders\u2019. Situations like employees losing unencrypted laptops. These types of risks can be avoided with the use of careful security layers so that people within firms have different levels of access to information on the server, and by computer users changing passwords more often.\u201d<\/p>\n<p>Christie recommends that lawyers and law firms:<\/p>\n<ul>\n<li>Check the security set-up and access of service providers<\/li>\n<li>Consider how the organisation is exposed to risk and put together a clear cybersecurity strategy, addressing technology issues, personnel training and other risk-management steps<\/li>\n<li>Avoid seeing cybersecurity as an \u2018IT issue\u2019 alone and take a more holistic approach in order to combat cyber attacks.<\/li>\n<\/ul>\n<p>In addition to CyberTrak, lawyers can also access helpful online information from a range of government websites, which is part of the federal government\u2019s plan to partner with industry to promote a safer and more secure digital environment, and to empower businesses to look after themselves.<\/p>\n<p>Some of these resources include:<\/p>\n<ul>\n<li>The <a title=\"Cybercrime: the risks and how to avoid it\" href=\"http:\/\/www.asd.gov.au\/infosec\/acsc.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Australian Cyber Security Centre<\/a> website (the 2015 ACSC conference will be held in Canberra on 22-23 April)<\/li>\n<li><a title=\"Cybercrime: the risks and how to avoid it\" href=\"http:\/\/www.staysmartonline.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stay Smart Online<\/a>, which offers information for small and medium enterprises on steps they can take to protect themselves and their customers online<\/li>\n<li>The Australian Signals Directorate\u2019s <a title=\"Cybercrime: the risks and how to avoid it\" href=\"http:\/\/www.asd.gov.au\/infosec\/mitigationstrategies.htm\" target=\"_blank\" rel=\"noopener noreferrer\">top four strategies<\/a> to mitigate targeted cyber intrusions, which can assist businesses to form their own mitigation strategies.<\/li>\n<\/ul>\n<p>Don\u2019t wait for your firm\u2019s first breach. Be diligent, be prepared and have a serious plan in place to fight the good fight against cyber crime.<\/p>\n<p>To find out more about how technology is influencing the legal profession, <a title=\"Cybercrime: the risks and how to avoid it\" href=\"http:\/\/insight.thomsonreuters.com.au\/resources\/resource\/future-law-digital-law-firm-revolution\/\" target=\"_blank\" rel=\"noopener noreferrer\">download our free whitepaper.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We spoke with Alec Christie, privacy and cyber-law specialist and partner at international law firm DLA Piper, about the launch of its new cybersecurity tool, CyberTrak, and how the legal industry can fight the good fight against online crime. <a href=\"\/cybercrime-risks-avoid\/\">Read more&#8230;<\/a><\/p>\n","protected":false},"author":9,"featured_media":477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[645,602],"tags":[170,171,462],"insight_job_role":[614,627],"insight_practice_area":[579],"class_list":["entry","author-jacquiwalker","has-excerpt","post-475","post","type-post","status-publish","format-standard","has-post-thumbnail","category-innovation-and-disruption-in-law","category-innovation-and-technology","tag-cyber-crime","tag-cybersecurity","tag-risk-management","insight_job_role-partner","insight_job_role-senior-executive","insight_practice_area-commercial-law","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Crime: The Risks and How to Avoid it | Legal Insight<\/title>\n<meta name=\"description\" content=\"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime: The Risks and How to Avoid it | Legal Insight\" \/>\n<meta property=\"og:description\" content=\"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\" \/>\n<meta property=\"og:site_name\" content=\"TR - Legal Insight Australia\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-11T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-03T05:04:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime-1024x817.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"817\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jacqueline Jubb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jacqueline Jubb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#article\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\"},\"author\":{\"name\":\"Jacqueline Jubb\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2\"},\"headline\":\"Cyber Crime: The Risks and How to Avoid it\",\"datePublished\":\"2015-02-11T13:00:00+00:00\",\"dateModified\":\"2022-08-03T05:04:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\"},\"wordCount\":872,\"image\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg\",\"keywords\":[\"cyber crime\",\"cybersecurity\",\"risk management\"],\"articleSection\":[\"Innovation and Disruption in Law\",\"Innovation and Technology\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\",\"name\":\"Cyber Crime: The Risks and How to Avoid it | Legal Insight\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg\",\"datePublished\":\"2015-02-11T13:00:00+00:00\",\"dateModified\":\"2022-08-03T05:04:36+00:00\",\"author\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2\"},\"description\":\"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?\",\"breadcrumb\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg\",\"contentUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg\",\"width\":1551,\"height\":1238,\"caption\":\"Cybercrime: the risks and how to avoid it\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime: The Risks and How to Avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\",\"name\":\"TR - Legal Insight Australia\",\"description\":\"Just another Legal Hub site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2\",\"name\":\"Jacqueline Jubb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g\",\"caption\":\"Jacqueline Jubb\"},\"description\":\"Jacqueline Jubb is a Sydney-based lawyer, freelance writer, copywriter and entrepreneur. Jacqueline's legal career has allowed her to enjoy diverse roles such as In-House Legal Adviser for the Law Society of London and Wales, criminal prosecutor at the Office of the Director of Public Prosecutions in Sydney and corporate litigator in Newcastle. In 2015, Jacqueline launched her copywriting consultancy, Florence in Heels, to help transport brands from 'blah' to 'beautiful'. Jacqueline now writes for a range of online and print publications such as Mamamia and White Magazine as well as a host of corporate clients including Owners Collective, LinkedIn, Thomson Reuters and Travel Your Way. You can connect with Jacqueline at www.florenceinheels.com or on Instagram @florenceinheels. &nbsp;\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/contributors\/jacquiwalker\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Crime: The Risks and How to Avoid it | Legal Insight","description":"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime: The Risks and How to Avoid it | Legal Insight","og_description":"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?","og_url":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid","og_site_name":"TR - Legal Insight Australia","article_published_time":"2015-02-11T13:00:00+00:00","article_modified_time":"2022-08-03T05:04:36+00:00","og_image":[{"width":1024,"height":817,"url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime-1024x817.jpg","type":"image\/jpeg"}],"author":"Jacqueline Jubb","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jacqueline Jubb","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#article","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid"},"author":{"name":"Jacqueline Jubb","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2"},"headline":"Cyber Crime: The Risks and How to Avoid it","datePublished":"2015-02-11T13:00:00+00:00","dateModified":"2022-08-03T05:04:36+00:00","mainEntityOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid"},"wordCount":872,"image":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage"},"thumbnailUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg","keywords":["cyber crime","cybersecurity","risk management"],"articleSection":["Innovation and Disruption in Law","Innovation and Technology"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid","name":"Cyber Crime: The Risks and How to Avoid it | Legal Insight","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage"},"image":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage"},"thumbnailUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg","datePublished":"2015-02-11T13:00:00+00:00","dateModified":"2022-08-03T05:04:36+00:00","author":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2"},"description":"With computer-related fraud, identity theft, hacking and network security violations now commonplace in society, how do we deal with online security risks?","breadcrumb":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#primaryimage","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg","contentUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/Cybercrime.jpg","width":1551,"height":1238,"caption":"Cybercrime: the risks and how to avoid it"},{"@type":"BreadcrumbList","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/cybercrime-risks-avoid#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime: The Risks and How to Avoid it"}]},{"@type":"WebSite","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/","name":"TR - Legal Insight Australia","description":"Just another Legal Hub site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/bb88ba44d67ab9361fff1053770425f2","name":"Jacqueline Jubb","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ba2dfbdc2d61e77aa9f547fa1e7aa212deed14bba1c87ca0a227b158a64c4f07?s=96&d=mm&r=g","caption":"Jacqueline Jubb"},"description":"Jacqueline Jubb is a Sydney-based lawyer, freelance writer, copywriter and entrepreneur. Jacqueline's legal career has allowed her to enjoy diverse roles such as In-House Legal Adviser for the Law Society of London and Wales, criminal prosecutor at the Office of the Director of Public Prosecutions in Sydney and corporate litigator in Newcastle. In 2015, Jacqueline launched her copywriting consultancy, Florence in Heels, to help transport brands from 'blah' to 'beautiful'. Jacqueline now writes for a range of online and print publications such as Mamamia and White Magazine as well as a host of corporate clients including Owners Collective, LinkedIn, Thomson Reuters and Travel Your Way. You can connect with Jacqueline at www.florenceinheels.com or on Instagram @florenceinheels. &nbsp;","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/contributors\/jacquiwalker"}]}},"_links":{"self":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":0,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts\/475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/tags?post=475"},{"taxonomy":"insight_job_role","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_job_role?post=475"},{"taxonomy":"insight_practice_area","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_practice_area?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}