Strata Law Reforms As you are aware, the Strata Schemes Management Bill 2016 will commence on 30th of November 2016. The reforms cover a wide range of topics with a number of them related to Strata Managers, of note are the following...

CRM Brokers' Claims Team is here to assist We hope your weekend did not result in your properties experiencing any damage. However, if you have had an unfortunate experience with flooding or storm damage, then please contact us immediately on 1300 880 494 or fill out CRM Brokers'...

Councils Cannot Escape Liability for Building Defects Defect claims are always complex and nuances reign supreme.  In a recent case Grace Lawyers have successfully argued for an Owners Corporation of a small residential strata scheme that a Council is a developer The Owners – Strata Plan No 151721 –v-...

The Importance of Product Disclosure Statements We draw your attention to all the Product Disclosure Statements that currently apply to those Strata Insurers with whom we place business, on your behalf. This Product Disclosure Statement (PDS) is an important document. You should read it carefully before making...

Worst Passwords of 2015 Since 2011, SplashData has published a list of the most commonly used passwords compiled from analysing password breaches during that year. The result is known as the "Worst Password List", which highlights common passwords that potentially put people and businesses at risk of a...

Mandatory Data Breach Notifications The Government has released draft legislation that will introduce mandatory data breach notifications in 2016. The legislation aims to make it compulsory for organisations regulated by the Privacy Act, to notify regulators and affected individuals, if there are reasonable grounds to believe...

Primary Sources of Data Breaches Ponemon Institute conducts independent research on privacy, data protection and information security policy. Results from Ponemon’s “2015 Cost of Data Breach Study: Australia” classified data breaches into three primary sources…   Malicious or criminal cyber attacks Not only are malicious attacks the most widespread...