Search for:
Author

Anne Petterd

Browsing
Anne has been with Baker McKenzie since 2001. Prior to that, she spent four years with the Australian Attorney-General's Department/Australian Government Solicitor mostly working on large IT projects.
In her time at Baker McKenzie, Anne has spent 18 months working in London (2007-2008) and, more recently, three years working in Singapore (2017-2020).

On 2 December 2021, the Australian Parliament passed the Autonomous Sanctions Amendment (Magnitsky-style and Other Thematic Sanctions) Act 2021 (Cth). The new laws are intended to modernise Australia’s autonomous sanctions regime by creating a framework to facilitate the establishment of a thematic sanctions regime to enable Australia to respond flexibly and swiftly to a range of situations of international concern. A key difference to the current sanctions regime is that the new laws will not be restricted in their operation to any particular country / jurisdiction.

This series of four reports features key considerations and action points for business leaders and decision-makers in the region as they make strategic decisions, pursue growth and secure lasting success. Based on a custom survey of 800 respondents, in partnership with Acuris, this series spans four main areas of business: Supply Chains, New M&A Landscape, Digital Transformation and ESG.

This report, the third in our Asia Pacific Business Renewal Series, explores how digital transformation (DX) has become a driving force in business decision making, and how it will shape the business landscape over the decade to come. As companies respond to shifting demand patterns and propel their DX agenda, the conversation turns to areas such as managing emerging risks, creating value from new technologies and aligning DX efforts with business renewal.

On 22 May 2019, the Personal Data Protection Commission (“PDPC”) launched a guide titled “Guide to Managing Data Breaches 2.0” (the “Guide”) that refreshes an earlier guide on the topic that was published in 2015. The refreshed Guide retains some of the best practices for managing data breaches in the earlier guide and…