Tag Archives for " Australia "

Google and Facebook join rights groups to fight Australia’s encryption bill

Google and Facebook have joined civil and digital rights groups in an unusual alliance aimed at defeating Australia’s planned encryption laws. The bill gives law enforcement new powers to conduct covert surveillance on electronic devices and compel technology companies to assist in decrypting private communications.

Source: Google and Facebook join rights groups to fight Australia’s encryption bill | Technology | The Guardian

Australia’s spyware law could expose phones to exploitation

Peter Dutton’s proposed legislation to expand the government’s surveillance capabilities into telecommunication devices through the inclusion of spyware risks could create “systemic weakness or vulnerability” that would be open to exploitation, Australia’s peak industry group has warned.

The Australian Industry Group has responded to the call for consultation on the assistance and access bill by warning of unintended consequences from the home affairs minister’s push to force telcos and tech giants, including Apple, Samsung, Google and Facebook, to include concealed “backdoors” into devices and messaging platforms.

Source: Australia’s spyware law could expose phones to exploitation, business group warns

Tech industry told ‘privacy is not absolute’ and end-to-end encryption ‘should be rare’

An international network of intelligence agencies, so-called Five Eyes nations – the US, UK, Canada, Australia and New Zealand, in a joint communiqué and statement of principles has told the tech industry that ‘privacy is not an absolute’ and that the use of end-to-end encryption ‘should be rare’.

The statement on privacy contains a veiled threat to tech companies that they may face legislation if they don’t take steps to ensure that they can allow access to ‘appropriate government authorities.’

Source: Tech industry told ‘privacy is not absolute’ and end-to-end encryption ‘should be rare’ | 9to5Mac

Australian Law Draft Requires Companies to share Encryption Data

The Australian government has proposed a new law that would force tech companies that have encrypted data relevant to an investigation to hand over the information they have stored when requested by law enforcement. Companies that don’t comply could face fines up to $7.3 million and people involved in not complying could face jail time.

Source: Proposed Australian Law Threatens Apple and Facebook’s Privacy Policies | Fortune

Australian bill to create back door into encrypted apps in ‘advanced stages’

The Australian government is pushing ahead with controversial legislation it says will create “back doors” into encrypted communication services – but still can’t say when it will introduce the bill.

After originally aiming to have the legislation before parliament in the first quarter of this year, the government has delayed its introduction. A spokesman for the acting attorney general, Marise Payne, would only say it was in “the advanced stages of development”.

Source: Australian bill to create back door into encrypted apps in ‘advanced stages’ | Technology | The Guardian

Data management isn’t just about compliance

The Australian business landscape is awash with new regulations and obligations surrounding privacy and data use.

Between the mandatory data breach notification scheme, new EU data protection regulations and the Australian government’s announcement of a new consumer data right, chief technology officers and in-house counsel could be forgiven for hiding underneath their desks with a stiff drink.

Source: Data management isn’t just about compliance: it can be the difference between success and failure | Business Insider

GDPR: A guide for marketers in Australia

The management and use of consumer data is experiencing an influx of regulation globally, with the implementation of Australia’s Notifiable Data Breach (NDB) legislation just last month being no exception.

The European Union’s General Data Protection Regulation (GDPR) that will come into effect in May is set to follow suite. These changes are necessary in more ways than one for the protection of consumers, but they also have far-reaching implications. Data-driven decisions are central to the daily activities and success of marketers, so it’s essential to consider what these changes will mean.

Source: GDPR: A guide for marketers in Australia | The Drum

Aussie law enforcement worried about limited access to data due to new technologies

Australia’s law enforcement agencies say 5G and IPv6 technologies will make it significantly more difficult to access communications and warn this could result in an “exponential burden” for telcos and government.

The technologies present a big challenge to the traditional way law enforcement accesses communications in investigations and may require a reworking of existing legislation, they say.

Source: Aussie law enforcement warns telcos of 5G, IPv6 data access ‘burden’ – Software – iTnews

UK and Australia Are Now Monitoring Their Government Domains on Have I Been Pwned

If I’m honest, I’m constantly surprised by the extent of how far Have I Been Pwned (HIBP) is reaching these days. This is a little project I started whilst killing time in a hotel room in late 2013 after thinking “I wonder if people actually know where their data has been exposed?”

I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft’s Azure. I ran it on a coffee budget (the goal was to keep the operating costs under what a couple of cups from a cafe each day would cost) and I made it freely accessible. And then it took off.

Source: Troy Hunt: The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Australia’s DPA releases data breach response

The Office of the Australian Information Commissioner (OAIC) has prepared this guide to assist Australian Government agencies and private sector organisations (entities) prepare for and respond to data breaches in line with their obligations under the Privacy Act 1988 (Cth) (Privacy Act).

The guide is in five parts:

  1. Data breaches and the Australian Privacy Act
  2. Preparing a data breach response plan
  3. Responding to data breaches — Four key steps
  4. Notifiable Data Breaches
  5. Other sources of information

Download guide

Source: Data breach preparation and response — A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth)| Office of the Australian Information Commissioner – OAIC

1 2 3 4