
Don’t bet on forgiveness: spam still on the ACMA’s slip in new financial year
elevenM’s Emma Mackenzie unpacks the ACMA’s recent spam ruling against TAB, highlighting key lessons in Spam Act compliance for all Australian organisations.
elevenM’s Emma Mackenzie unpacks the ACMA’s recent spam ruling against TAB, highlighting key lessons in Spam Act compliance for all Australian organisations.
elevenM’s Melanie Marks, Cassie Findlay and Rahul Prasad discuss the dangers of not including data governance in merger-planning, and set out steps to take to ensure you do.
This year for Privacy Awareness Week, we unpacked some current issues in privacy – from automated decision-making to facial recognition technology to pentesting-for-privacy and many other topics in between.
elevenM’s Nick Allen makes the case for privacy and cyber to start working together, and steps you through how to facilitate privacy-informed penetration testing.
elevenM Manager Piotr Debowski breaks down what is involved in an AI risk assessment, where they fit within an overall AI governance framework and why privacy professionals might find them more familiar than they first thought.
Australia is set to introduce a Children’s Online Privacy Code aimed at enhancing privacy protections for children engaging with digital platforms.
elevenM participated in a consultation to assist in workshopping the inclusions, exclusions and APP interpretations in the code.
The Australian Government’s 2025-26 budget was released on Tuesday. In this short blog post, elevenM’s Piotr Debowski has a look at some of the privacy, cyber security and tech wins and losses.
elevenM’s Brett Watson unpacks the whys and wherefores of the forthcoming children’s online privacy code, and looks at one of the biggest blind spots for children’s privacy.
elevenM’s Cassie Findlay on how hard, and how important, it is to formally and systematically delete unnecessary data and records.
elevenM’s Piotr Debowski and Georgia Brinkworth explain how facial recognition technology operates and highlight privacy challenges and opportunities in its use, specifically when used for building access or blacklisting.