Feeds

Oz cybercrime bill passes on the nod, unchanged

Amendments recommended but ignored

Intelligent flash storage arrays

While the surface of Australian politics is a roiling maelstrom of spite and hatred, the government and opposition manage to agree on some things – like the need to have spooks and police snooping Internet and telephones with as little hindrance as possible.

In spite of a bipartisan committee which recommended changes to the proposed cybercrime laws, the government and opposition have joined their votes to pass the Cybercrime Amendment Bill 2011 in its original form.

If it were to pass the Senate without amendment, the bill would mandate data retention by ISPs, and could allow international agencies to demand retention and hand-over of Australian data.

Greens Senator Scott Ludlam has said he will seek amendments to the bill when it comes before the Senate to try and improve the privacy and human rights protections offered under the new Act.

The committee that recommended changes to the bill noted, for example, that the huge amount of stored data mandated for ISPs and carriers posed an increased risk of data theft. ®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.