School Governance

Human Resources Firm Security Incident Exposes Data From Coles, Telstra, CBA and More: Is Your School at Risk of a Data Breach?

Just under four months ago, the Australian Notifiable Data Breach (NDB) Scheme commenced. The NDB Scheme requires organi...

Effective Permission Slips: Part Two

This is the second part of a two part series on permission notes. The first part dealt with the purpose of permission no...

Effective Permission Slips: Part One

This is the first part of a two part series on permission notes. The first part deals with the purpose of permission not...

Drone Laws Under CASA's Microscope: Will Schools Be Affected?

Human history is an ongoing record of reaching for the sky, literally and figuratively. From the legend of Icarus, to Le...

Privacy Awareness Week: From Principles to Practice

  Schools may be forgiven for thinking that 2018 is the year of privacy and not just a week!  Given the introduction of ...

Student Consent: (Part Two) – Permission Forms, Medical Treatment and Privacy: What can students agree to?

This is the second article in a two-part series on issues of student consent in schools. In this series, Kieran Seed, Le...

Ransomware still a Top Cyber Security Threat for Schools

Ransomware is described by the BBC as computer viruses that threaten to delete your files unless you pay a ransom. Like ...

New VIC Child Information Sharing Laws Passed - Do they really protect children?

The Victorian Parliament's recent passing of the Children Legislation Amendment (Information Sharing) Act 2018 (Informat...

What's in a watch: How a school board's gift giving practices can result in misuse of funding

Consider this scenario: Two long serving members of the school board retire and the board determines that it should than...