Feeds

Oz cybercrime bill passes on the nod, unchanged

Amendments recommended but ignored

Reducing security risks from open source software

While the surface of Australian politics is a roiling maelstrom of spite and hatred, the government and opposition manage to agree on some things – like the need to have spooks and police snooping Internet and telephones with as little hindrance as possible.

In spite of a bipartisan committee which recommended changes to the proposed cybercrime laws, the government and opposition have joined their votes to pass the Cybercrime Amendment Bill 2011 in its original form.

If it were to pass the Senate without amendment, the bill would mandate data retention by ISPs, and could allow international agencies to demand retention and hand-over of Australian data.

Greens Senator Scott Ludlam has said he will seek amendments to the bill when it comes before the Senate to try and improve the privacy and human rights protections offered under the new Act.

The committee that recommended changes to the bill noted, for example, that the huge amount of stored data mandated for ISPs and carriers posed an increased risk of data theft. ®

Maximizing your infrastructure through virtualization

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.