Sunday, April 11, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

New Bill to prepare Australian law enforcement for the US CLOUD Act

March 5, 2020
in Internet Security
Human Rights Commission wants data retention period limited to six months
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

The Australian government has on Thursday introduced a Bill into Parliament that would prepare the nation for accessing the US Clarifying Lawful Overseas Use of Data Act (the CLOUD Act).

The CLOUD Act creates a legal framework regulating how law enforcement can access data across borders.  

You might also like

Washington State educational organizations targeted in cryptojacking spree

Critical Zoom vulnerability triggers remote code execution without user input

Nation-state cyber attacks targeting businesses are on the rise

The Telecommunications Legislation Amendment (International Production Orders) Bill 2020 [PDF] would amend the Telecommunications (Interception and Access) Act 1979 (TIA Act) to establish a new framework that seeks to assist Australia’s international crime cooperation efforts by “improving Australian agencies’ access to overseas communications data for law enforcement and national security purposes”.

Under the proposed amendment, providers in Australia and the US would be able to respond to lawful orders from the other country for access to “electronic evidence”.

It also puts Australian in position to enter into a bilateral CLOUD Act agreement, which would enable Australian law enforcement to serve domestic orders for communications data needed to combat serious crime directly on US-based companies, and vice versa.

“The global connectivity of the internet means evidence once stored in Australia and available under a domestic warrant is now distributed over many different services, in different countries,” Home Affairs Minister Peter Dutton said.

“Investigations of serious crimes such as terrorism and child exploitation are too important to be stalled, or even derailed, by outdated, cumbersome processes when evidence includes communication data held in a different country.”

The Bill also proposes three International Production Orders (IPOs) to allow Commonwealth, state and territory law enforcement, and national security agencies to “more efficiently acquire data held in a foreign country by a designated communications provider”.

“Almost every crime type and national security concern has an online element — agencies require electronic information and communications data not only for cyber investigations but also for investigations and prosecutions regarding violent crimes, human trafficking and people smuggling, drug trafficking, financial crimes, terrorism, and child sexual abuse,” the Bill’s explanatory memorandum [PDF] states.

“The exponential rise of global connectivity and reliance on cloud computing means that intelligence and evidence that was once stored within Australia and available under a domestic warrant or authorisation is now distributed over different services, providers, locations and jurisdictions, and is often only obtainable through international cooperation.”

The document touts the Bill as providing the legislative framework for Australia to give effect to future bilateral and multilateral agreements for cross-border access to electronic information and communications data.

It is also reciprocal, with Australia looking to deal with “like-minded foreign governments” for cross-border access to communications data.

“It is anticipated that these agreements would allow law enforcement and national security agencies in each participating country to issue orders, through a competent authority, for the production of data directed to communications and technology companies in the other country’s jurisdiction,” the document explains.

“These agreements would significantly reduce the time it currently takes to acquire communications data that is vital to law enforcement and security efforts.”

Schedule one of the Bill would introduce a regime for Australian agencies to obtain independently-authorised international production orders for interception, stored communications, and telecommunications data directly to designated communications providers in foreign countries with which Australia has a designated international agreement.

International production orders could also be sought by agencies under an amended TIA Act through a warrant; by law enforcement agencies for the purposes of investigating a serious criminal offence or monitoring a person subject to a control order; or by the Australian Security Intelligence Organisation (ASIO) for the purpose of it carrying out its functions.

“The United States, where many of the world’s biggest communication providers are based, paved the way for much more efficient international crime cooperation with the CLOUD Act,” Dutton said.

“A CLOUD Act agreement with the United States will significantly benefit our law enforcement and national security agencies by allowing orders for communication data to be directed at those providers, with robust privacy and civil liberty protections.

“There will be no trade-off of Australia’s existing privacy and civil liberty protections to achieve this most welcome boost to our agencies’ ability to keep Australians safe.”  

The establishment of an Australian Designated Authority (ADA) to review international production orders for compliance would also occur under the Bill, with the ADA to act as an intermediary between Australian law enforcement and national security agencies and designated communications providers, including giving international production orders to designated communications providers and, in some cases, receiving data back from designated communications providers pursuant to international production orders.

The Schedule, however, does not place any obligations on Australian communications providers under Australian law to respond to incoming requests for information from foreign countries.

“Designated communications providers will be required to comply with international production orders to the extent they are capable of doing so, and subject to the provider meeting a particular enforcement threshold,” the document explains.

An “appropriate enforcement mechanism” with civil penalties would also be established.

The Bill would also make consequential amendments to the Freedom of Information Act 1982, International Criminal Court Act 2002, Law Enforcement Integrity Commissioner Act 2006 and Mutual Assistance in Criminal Matters Act 1987, and would need to adhere to provisions already within the Privacy Act 1988.

Updated at 12:35 pm AEST, 4 March 2020: added comments from Home Affairs Minister Peter Dutton.  

RELATED COVERAGE

Credit: Zdnet

Previous Post

Kubeflow 1.0 Machine Learning Toolkit for Kubernetes Goes Live -- ADTmag

Next Post

Burning Questions Live Virtual Panel: Demand Gen & RevTech

Related Posts

Washington State educational organizations targeted in cryptojacking spree
Internet Security

Washington State educational organizations targeted in cryptojacking spree

April 10, 2021
Critical Zoom vulnerability triggers remote code execution without user input
Internet Security

Critical Zoom vulnerability triggers remote code execution without user input

April 10, 2021
Nation-state cyber attacks targeting businesses are on the rise
Internet Security

Nation-state cyber attacks targeting businesses are on the rise

April 10, 2021
These are the terrible passwords that people are still using. Here’s how to do better
Internet Security

These are the terrible passwords that people are still using. Here’s how to do better

April 9, 2021
Why do phishing attacks work? Blame the humans, not the technology
Internet Security

Why do phishing attacks work? Blame the humans, not the technology

April 9, 2021
Next Post
Burning Questions Live Virtual Panel: Demand Gen & RevTech

Burning Questions Live Virtual Panel: Demand Gen & RevTech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Leveraging SAP’s Enterprise Data Management tools to enable ML/AI success
Data Science

Leveraging SAP’s Enterprise Data Management tools to enable ML/AI success

April 11, 2021
Machine Learning in Finance Market is exclusively demanding in forecast 2029 | Ignite Ltd, Yodlee, Trill A.I., MindTitan, Accenture, ZestFinance – KSU
Machine Learning

Machine Learning in Finance Market is exclusively demanding in forecast 2029 | Ignite Ltd, Yodlee, Trill A.I., MindTitan, Accenture, ZestFinance – KSU

April 10, 2021
Vue.js vs AngularJS Development in 2021: Side-by-Side Comparison
Data Science

Vue.js vs AngularJS Development in 2021: Side-by-Side Comparison

April 10, 2021
IBM releases Qiskit modules that use quantum computers to improve machine learning
Machine Learning

IBM releases Qiskit modules that use quantum computers to improve machine learning

April 10, 2021
Hackers Tampered With APKPure Store to Distribute Malware Apps
Internet Privacy

Hackers Tampered With APKPure Store to Distribute Malware Apps

April 10, 2021
5 Dominating IoT Trends Positively Impacting Telecom Sector in 2021
Data Science

5 Dominating IoT Trends Positively Impacting Telecom Sector in 2021

April 10, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Leveraging SAP’s Enterprise Data Management tools to enable ML/AI success April 11, 2021
  • Machine Learning in Finance Market is exclusively demanding in forecast 2029 | Ignite Ltd, Yodlee, Trill A.I., MindTitan, Accenture, ZestFinance – KSU April 10, 2021
  • Vue.js vs AngularJS Development in 2021: Side-by-Side Comparison April 10, 2021
  • IBM releases Qiskit modules that use quantum computers to improve machine learning April 10, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates