Countering terrorism in Australia: What is the strategy?
Explore Australia’s counter-terrorism strategy and plan as detailed by the Department of Foreign Affairs and Trade.
DetailsCLICK HERE to
Contact a Lawyer
Explore Australia’s counter-terrorism strategy and plan as detailed by the Department of Foreign Affairs and Trade.
DetailsLearn about the reporting and compliance obligations that critical infrastructure providers have to the Cyber and Infrastructure Security Centre (CISC).
DetailsDiscover how the the Cyber and Infrastructure Security Centre (CISC) assists critical infrastructure providers to manage risks and protect Australians.
DetailsThe ATO explains who their “scrutineers” are and what role they play in reviewing, auditing and investigating the ATO.
DetailsAny time you travel with, send or receive $10,000 or more across Australia’s border, you must declare it to AUSTRAC. Discover why, and explore the key points.
DetailsThe Australian Taxation Office (ATO) details how it uses intelligence from tip-offs as part of its approach to dealing with the shadow economy.
DetailsExplore the actions of ASIC against eight auditors, five of which were deregistered and three of which had additional conditions imposed on their registrations.
DetailsExplore the ATO’s protocol for identifying communications covered by legal professional privilege (LPP) and making LPP claims.
DetailsThe ATO outlines its approach to information gathering, and situations in which it may use its formal access powers as opposed to taking a cooperative approach.
DetailsLearn about the operation recently launched by the ATO-led Serious Financial Crime Taskforce (SFCT) to crackdown on GST fraud.
Details