Feeds

Data retention means telcos risk Privacy Act breach, Pilgrim warns

Comish says metadata could be considered 'personal' under reformed Act

Choosing a cloud hosting partner with confidence

Australia's privacy watchdog Timothy Pilgrim has warned that indiscriminate metadata collection would place personal information at risk of privacy breaches.

Under the presently broad and opaque proposal, telcos could be required to at least hold data on Australians that would link them to their internet protocol addresses in a move aimed to help law enforcement nail lengthy investigations.

That collected data might be considered to be personally identifiable, and therefore place the holders of it -- be it government agencies or telcos -- at risk of breaching the national Privacy Act, Pilgrim said in a statement.

"At this stage, it is unclear exactly what type of information would be retained," Pilgrim said.

"However, there is the potential for the retention of large amounts of data to contain or reveal a great deal of information about people’s private lives, and that this data could be considered 'personal information' under the Privacy Act.

"The retention of large amounts of personal information for an extended period of time increases the risk of a data breach. Organisations holding this information need to comply with all their obligations under the Privacy Act, including the requirements to protect personal information from misuse, interference, loss, and unauthorised access, modification or disclosure."

He said the privacy interests of Australians was key to the data retention debate and flagged the need to ensure any scheme was "effective, proportional [and] the least privacy invasive option".

It should be transparent, accountable and have appropriate independent oversight, he added.

Precisely what data the Federal Government wants telcos to collect was unclear and the subject of a series of embarrassing bungled explanations by politicians. If telcos were required to capture and store additional metadata, which appeared entirely likely, they would need under Australia's reformed Privacy Act to be able to prove that the information was 'reasonably' secured in the event of a breach.

At minimum, telco and other data fondlers would still be placed at additional risk given the requirement to store already captured metadata for a longer period of time.

Pilgrim was not consulted before the oft-shelved proposal was brought back for consideration. ®

Intelligent flash storage arrays

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.