Feeds

Data retention a very hot potato says Oz parl't commitee

Update: A-G shelves the idea, for now

Securing Web Applications Made Simple and Scalable

Data retention – something that governments around the world have scrambled to defend in the face of a daily diet of new revelations courtesy of whistleblower / leaker / traitor / hero Edward Snowden – doesn't have so many friends in the Australian Parliament.

Update: Since the report was released, federal Attorney General Mark Dreyfus has shelved data retention for now, in a statement saying "the Government will not pursue a mandatory data retention regime at this time and will await further advice from the departments and relevant agencies and comprehensive consultation."

In tabling its 321-page Report of the Inquiry into Potential Reforms of Australia's National Security Legislation, here, the Parliamentary Joint Committee on Intelligence and Security appears to be bucking a trend. In a world in which parliaments are being constantly urged by spooks and law enforcement towards greater intrusions in the name of national security, the PJCIS has made a raft of recommendations that would improve the transparency and accountability of access to telecommunication intercepts.

One of the most contentious aspects of the review, the Attorney-General's department's two-year-long barracking for a data retention regime, is treated as a serious issue rather than a lay-down misere for law enforcement. Noting that there was a “diversity of views” in the committee on the topic, the report also criticises the A-G's department for its reluctance to provide a detailed definition of what it actually wanted.

“One of the most controversial topics canvassed in the discussion paper —data retention—was only accorded just over two lines of text,” the report states.

“This lack of information from the Attorney-General [then Nicola Roxon - The Register] and her Department had two major consequences. First, it meant that submitters to the Inquiry could not be sure as to what they were being asked to comment on. Second, as the Committee was not sure of the exact nature of what the Attorney-General and her Department was proposing it was seriously hampered in the conduct of the inquiry and the process of obtaining evidence from witnesses.

“Importantly the Committee was very disconcerted to find, once it commenced its Inquiry, that the Attorney-General’s Department (AGD) had much more detailed information on the topic of data retention. Departmental work, including discussions with stakeholders, had been undertaken previously. Details of this work had to be drawn from witnesses representing the AGD.”

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK.gov's Open Source switch WON'T get rid of Microsoft, y'know
What do you mean, we've ditched Redmond in favour of IBM?!
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.