Subscribe to CIO Magazine »

Telecommunications Amendment Bill passes

Widens scope for private entities to protect networks from cyber attacks

The Federal Government’s Telecommunications (Interception and Access) Amendment Bill 2009 has passed the Senate, widening the range of options for private entities to protect their IT networks from cyber attack.

Prior to the amendment, existing telecommunications interception legislation only allowed national security and law enforcement agencies to protect their networks from malicious software

The changes mean private computer networks may now be lawfully protected also.

Private network protection activities will only remain lawful, however, if they are carried out for a legitimate network protection function, according to the Federal Attorney-General, Robert McClelland.

“In this way, the Government is seeking to balance the need for network integrity with an individual’s right to privacy,” McClelland said in a statement.

James Turner, an advisor at analyst firm IBRS, said how the definition of ‘protecting’ a network evolved over time would be an important factor in the effectiveness of the bill.

“I can imagine that the legal counsel of an ISP could take the view that it is entitled to protect its network from activities which expose the ISP to being taken to court, as recently happened with iiNet,” Turner said.

“From this perspective, it would seem feasible that an ISP could monitor and block a wide range of customer activities, particularly those which involve copyrighted material. The customer may not actually be doing anything harmful, for instance transmitting malware, but the ISP may consider that the information being transferred expands its risk profile. So, I think this will be a classic case of ‘we'll see what it means when it gets tested in court’.”

The Greens raised similar concerns in November, calling for greater clarification around "network protection duties" and "disciplinary actions" of the Amendment. The political party also sought tighter requirements around destroying copies of intercepted communications.

The Bill is part of a wider cyber security initiative, which includes the January opening of the Cyber Security Operations Centre (CSOC), which was announced as part of the Defence White Paper released in 2009.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Attorney-General, Bill, Federal Government, IBRS, iiNet
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: robert mclelland, federal government, cert, attorney general, telecommunications interception act, Cyber Security Operations Centre (CSOC), cyber security, privacy
Latest Blog Posts
  • Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
    Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
    Learn more »
  • How to Successfully Select an ERP System
    An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.
    Learn more »
  • Delphix and Pure Storage Team to Super-Charge Database Deployments
    This webcast presentation, prepared by Delphix and Pure storage, explores super-charge database deployments and how they can aid business strategy. The presentation details the main features of a new flash solution – high performance, inline data reduction, resilience and scalability, and the value of simplicity. Viewers can learn how to put an end to inefficient or delayed QA, Sharing DB environments, using DB subsets and slow environment builds.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments