Feeds

Data retention means telcos risk Privacy Act breach, Pilgrim warns

Comish says metadata could be considered 'personal' under reformed Act

Beginner's guide to SSL certificates

Australia's privacy watchdog Timothy Pilgrim has warned that indiscriminate metadata collection would place personal information at risk of privacy breaches.

Under the presently broad and opaque proposal, telcos could be required to at least hold data on Australians that would link them to their internet protocol addresses in a move aimed to help law enforcement nail lengthy investigations.

That collected data might be considered to be personally identifiable, and therefore place the holders of it -- be it government agencies or telcos -- at risk of breaching the national Privacy Act, Pilgrim said in a statement.

"At this stage, it is unclear exactly what type of information would be retained," Pilgrim said.

"However, there is the potential for the retention of large amounts of data to contain or reveal a great deal of information about people’s private lives, and that this data could be considered 'personal information' under the Privacy Act.

"The retention of large amounts of personal information for an extended period of time increases the risk of a data breach. Organisations holding this information need to comply with all their obligations under the Privacy Act, including the requirements to protect personal information from misuse, interference, loss, and unauthorised access, modification or disclosure."

He said the privacy interests of Australians was key to the data retention debate and flagged the need to ensure any scheme was "effective, proportional [and] the least privacy invasive option".

It should be transparent, accountable and have appropriate independent oversight, he added.

Precisely what data the Federal Government wants telcos to collect was unclear and the subject of a series of embarrassing bungled explanations by politicians. If telcos were required to capture and store additional metadata, which appeared entirely likely, they would need under Australia's reformed Privacy Act to be able to prove that the information was 'reasonably' secured in the event of a breach.

At minimum, telco and other data fondlers would still be placed at additional risk given the requirement to store already captured metadata for a longer period of time.

Pilgrim was not consulted before the oft-shelved proposal was brought back for consideration. ®

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.