7 steps to handling a ransomware attack
The Australian Cyber Security Centre provides a guide to identifying, removing, and protecting yourself against ransomware. Explore the 7 key steps to follow.
DetailsCLICK HERE to
Contact a Lawyer
The Australian Cyber Security Centre provides a guide to identifying, removing, and protecting yourself against ransomware. Explore the 7 key steps to follow.
DetailsIf the ATO cannot obtain the documents required to support an audit under a cooperative approach, it may use its formal powers to access documents and evidence.
DetailsWhile the ATO has formal powers to access most documents, it takes the view that in all but exceptional circumstances, a certain class of documents should remain confidential to you and your accountant. This is known as accountants’ concession.
DetailsIf you are flagged by the Australian Taxation Office (ATO) for an audit, and you maintain electronic financial records, you may be subject to an e-Audit.
DetailsExplore the ATO’s cooperative approach to tax audits, as well as the formal information access powers it has available, and when it may use these.
DetailsThe ATO has reported on its findings from the Top 500 tax performance program. Review the key findings around tax compliance and transparency.
DetailsExplore the outcomes and key commitments emerging from the UN General Assembly against corruption held from from 2 to 4 June 2021.
DetailsThe International Criminal Court has jurisdiction over crimes against cultural heritage. Explore how the Court investigates and prosecutes such crimes.
DetailsExplore the results of ASIC’s review of the financial reports of 85 listed entities for the year ended 31 December 2020.
DetailsDiscover whether ATO tax dispute settlements provide protection from future criminal prosecution.
Details