this product is unavailable for purchase using a firm account, please log in with a personal account to make this purchase.

LIV offices remain closed.

Though we are working remotely to support our members.

Find out more
Select from any of the filters or enter a search term

Our changing relationship with software

Our changing relationship  with software

By Paul Gray

Practice & Procedure Technology 

All those promises of data security offered by software vendors might not be as ironclad as they appear. Public sensitivity about privacy and the protection of personal data is at an all-time high, fuelled by advancements in technology converging and the overlapping relationships between our devices, software and data (personal and otherwise). Adding to this sensitivity is the 2015 US Federal Court order made at the request of the FBI requiring Apple to write software that would enable federal law enforcement agents to bypass certain security features in Syed Farook’s iPhone. Farook and his wife were the perpetrators in a mass shooting in California in 2015, and the FBI was seeking access to communications data that had the potential to provide information about Farook’s movements in the time leading up to the crime.

The content you are trying to access is exclusive to LIV members*

To access your exclusive member content please click the 'Already a Member' button below and you will be redirected automatically.

Not a member but would like to find out about the value of LIV membership? Click the 'Become a Member' button below or call our membership team on (03) 9607 9470.

*Note that some content may be exclusive to specific types of members. If you would like to inquire about your access please contact the membership team on (03) 9607 9470.