Feeds

Australia giving snoop powers to employers

No consent needed for reading staff emails

Secure remote control for conventional and virtual desktops

The Australian government is considering extending email snooping powers currently restricted to security services to all employers.

Using the usual canard of terrorism, Australia's deputy prime minister Julia Gillard said today the government was considering giving employers the right to snoop on staff emails without consent.

Gillard said the move was about protecting "critical infrastructure", but not about "who did what at the Christmas party".

She said: "When we think of infrastructure, we think of roads and bridges and big things. But our technology is a big infrastructure issue these days. If our banking system collapsed, if our government electronic systems collapsed obviously that would have huge implications for society."

Australian civil liberties groups were less impressed, saying there was a danger of losing the balance between maintaining freedoms and providing law enforcement with sufficient powers to fight terrorism.

Legal restrictions on Australian firms reading staff emails vary from state to state. In New South Wales companies are free to read their staff emails at the moment - as long as they notify them first. If you are using a work address, work PC and a work server, then some form "ownership" is usually assumed.

From Gillard's comments it is unclear whether the changes would be limited to infrastructure companies such as utilities or apply for all businesses.

In the UK employers have full access to staff emails and phone calls and many larger companies have full-time staff to monitor staff communications.®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?