<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bruce Baer Arnold &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/bruce-arnold/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Sat, 18 Feb 2023 22:05:11 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>Bruce Baer Arnold &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Government’s privacy review has some strong recommendations – now we really need action</title>
		<link>https://privacy.org.au/2023/02/17/governments-privacy-review-has-some-strong-recommendations-now-we-really-need-action/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Fri, 17 Feb 2023 05:51:50 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=5272</guid>

					<description><![CDATA[Attorney-General Mark Dreyfus yesterday released a report with 30 proposals for updating Australia’s privacy regime. The proposals are practical, necessary and overdue. However, they are just proposals, which have been made several times in the past before disappearing into the “too hard basket” of the Australian, state and territory governments.
We can expect to see lots of noise about specific proposals and hope the Albanese government (copied by state/territory counterparts) gives us the legislation we need. <span class="excerpt-more"><a href="https://privacy.org.au/2023/02/17/governments-privacy-review-has-some-strong-recommendations-now-we-really-need-action/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>Attorney-General Mark Dreyfus yesterday <a href="https://www.ag.gov.au/rights-and-protections/publications/privacy-act-review-report">released a report</a> with 30 proposals for updating Australia’s privacy regime. The proposals are practical, necessary and overdue. However, they are just proposals, which have been made several times in the past before disappearing into the “too hard basket” of the Australian, state and territory governments.</p><p>We can expect to see lots of noise about specific proposals and hope the Albanese government (copied by state/territory counterparts) gives us the legislation we need.</p><h2>Making sense of the report</h2><p>At a superficial level, the report gives effect to an election commitment – a promise to do something about federal privacy law, which is centred on public/private data collection and use (often online), rather than <a href="https://www.oaic.gov.au/privacy/privacy-in-your-state">state/territory</a> law dealing with activity such as strip searches, public hospital records, hidden cameras in toilets or senior figures distributing nude <a href="https://www.theguardian.com/australia-news/2023/feb/15/nsw-premier-stands-by-mp-peter-poulos-who-leaked-explicit-photos-of-female-rival">photos</a> of rivals.</p><p>More deeply, it is a recognition that, as part of the global economy where data and investment flow across borders, Australia continues to limp behind law and administration where protecting privacy is concerned. Updating the <a href="https://www.oaic.gov.au/privacy/the-privacy-act">Privacy Act</a> also reflects recognition of challenges facing business and government in the world of ransomware, big data and artificial intelligence.</p><p>Unhappiness with the “she’ll be right, mate” approach of some large organisations and the failure of the key national privacy regulator (under-resourced, under-skilled and slow to act) was evident in the recent Optus and Medibank data breaches.</p><p>The proposals are not new. They have been voiced in detailed law reform commission reports, national and state parliamentary committee reports, statements by independent bodies such as the Law Council and academics over the past 20 years. The lack of action to date means Australians might be sceptical about what will happen once the government is lobbied by those whose interests are served by keeping things as they are, and it is again tempted to kick the can down the road.</p><h2>What do the proposals cover?</h2><p>It is important to remember that states and territories have significant responsibilities regarding privacy. The proposal to set up a working party involving those governments provokes thought about why that hasn’t been done already.</p><p>The initial proposal calls for changing the <a href="https://www.oaic.gov.au/privacy/the-privacy-act">1988 Privacy Act</a> to explicitly recognise that privacy is in the public interest, something that shouldn’t be controversial and offsets the absence of a human rights framework in the national constitution. After that, we are into some positive steps forward. However, these are tempered by a lot of “let’s wait and see the administration” before starting to celebrate.</p><p>The report retains the overall structure of the 1988 Act but, crucially, extends its coverage, in particular on what is “personal information”. It calls for consultation about criminal penalties and for prohibiting some of the ways organisations have got around restrictions.</p><p>It proposes consultation about removing the exemption for small businesses (those under A$3million) and about the handling of employee records. The major <a href="https://www.alrc.gov.au/publication/for-your-information-australian-privacy-law-and-practice-alrc-report-108/41-political-exemption/exemption-for-registered-political-parties-political-acts-and-practices/">exclusion</a> of political parties – a common source of unhappiness – would be modified. Journalists would be expected to behave better.</p><p>The report emphasises meaningful consent. In the collection of personal information, consent must be</p><blockquote><p>voluntary, informed, current, specific and unambiguous.</p></blockquote><p>This would bring Australia into line with Europe and indeed with much of our existing law, such as that administered by the Australian Competition and Consumer Commission.</p><p>We can expect controversy about a proposed right of “erasure” and about “de-indexing”. This is referred to as the “right to obscurity” in Europe, and means some personal information stays online but is not highlighted in search engine results. Individuals would need to ask for that obscurity, and it would not be granted for serious criminal offences.</p><p>There have been recurrent proposals for a “privacy tort”: this means people whose privacy has been seriously invaded could take action in a court to stop the invasion and/or gain compensation.</p><p>The report endorses <a href="https://www.alrc.gov.au/publication/serious-invasions-of-privacy-in-the-digital-era-alrc-report-123/4-a-new-tort-in-a-new-commonwealth-act-2/">this</a> recommendation by the Australian Law Reform Commission. It also proposes a “direct right of action” under the current act. This implicitly offsets the weakness of the Office of the Australian Information Commissioner (OAIC), one of the two national information privacy watchdogs.</p><p>The report grapples with data breaches such as the recent Optus and Medibank incidents. Proposals regarding mandatory reporting of such breaches tweak the current regime.</p><p>There is likely to be more push-back from business and public sector organisations regarding a proposed requirement for those bodies to “identify, mitigate and redress actual and reasonably foreseeable loss”. This is a first step towards persuading organisations to meaningfully lift their game and compensate for harms.</p><h2>It’s too soon to cheer</h2><p>On the surface, the report is a major step forward, something that business and the community should strongly endorse. In practice, we need to look beyond the headlines and see the details of how the proposals would be written into law, and whether the attorney-general can harness support in the face of the usual strong lobbying.</p><p>Proposals that there will be discussion, yet again, don’t provide much comfort. More worryingly, the proposals centre on the development and implementation of guidelines and standards by the OAIC.</p><p>In practice, the report proposes to perpetuate existing problems involving a regulator with a <a href="https://www.sciencedirect.com/science/article/abs/pii/S0167739X20329940">timid</a> corporate culture and a commitment to interpreting the legislation through the eyes of the bodies it is meant to <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4083468">regulate</a>. Change is better than good intentions.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding="async" src="https://counter.theconversation.com/content/200079/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" referrerpolicy="no-referrer-when-downgrade" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p><p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/governments-privacy-review-has-some-strong-recommendations-now-we-really-need-action-200079">original article</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>I’ve given out my Medicare number. How worried should I be about the latest Optus data breach?</title>
		<link>https://privacy.org.au/2022/09/29/ive-given-out-my-medicare-number-how-worried-should-i-be-about-the-latest-optus-data-breach/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Thu, 29 Sep 2022 09:02:23 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=5140</guid>

					<description><![CDATA[Medicare card numbers are the latest personal details to be exposed as part of the Optus data breach. Optus has confirmed this affects 14,900 valid Medicare numbers that have not expired, and a further 22,000 expired card numbers. But this isn’t the first time Australians’ Medicare numbers have been exposed. And some privacy and cybersecurity experts have long been concerned about the security of our health data. Here’s what you can do if you’re concerned about the latest Medicare breach, and what needs to happen next. <span class="excerpt-more"><a href="https://privacy.org.au/2022/09/29/ive-given-out-my-medicare-number-how-worried-should-i-be-about-the-latest-optus-data-breach/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span><a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, Associate Professor, School of Law, <em><a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em></span></p>

<p>Medicare card numbers are the latest personal details to be exposed as part of the <a href="https://www.theguardian.com/business/2022/sep/29/optus-data-breach-everything-we-know-so-far-about-what-happened">Optus data breach</a>.</p>

<p>Optus <a href="https://www.optus.com.au/support/cyberattack/medicare-card-number-information">has confirmed</a> this affects 14,900 valid Medicare numbers that have not expired, and a further 22,000 expired card numbers.</p>

<p>But this isn’t the first time Australians’ Medicare numbers have been exposed. And some privacy and cybersecurity experts have <a href="https://theconversation.com/after-the-medicare-breach-we-should-be-cautious-about-moving-our-health-records-online-80472">long been concerned</a> about the security of our health data.</p>

<p>Here’s what you can do if you’re concerned about the latest Medicare breach, and what needs to happen next.</p>

<h2>What’s the big deal?</h2>

<p>Your Medicare number gives you access to subsidised services across Australia’s health system. Most Australians have a number, whether or not they use these services.</p>

<p>Your Medicare card (as a plastic card or digitally, on your phone) is an official identifier. So alongside a driver’s licence, tax file number, birth certificate and passport, it can also be used as “proof of identity”. You may have supplied your Medicare number when opening a bank account, or signing up for a phone plan.</p>

<p>The idea is to minimise the chance people are using fake identities to wrongfully gain benefits from governments and business, including taking part in criminal activities such as money laundering.</p>

<p>Businesses and agencies are not meant to match your Medicare number with other data (eroding your privacy) other than in <a href="https://www.health.gov.au/sites/default/files/documents/2021/08/data-matching-notice.pdf">exceptional</a> circumstances.</p>

<p>But they commonly accept sight of the physical/digital card bearing the number as proof of who you claim to be and risk data breaches by retaining copies of what they saw. Optus was such a business.</p>



<h2>What should happen to protect your Medicare number?</h2>

<p>In theory, your Medicare number is protected by a number of different types of legislation – both national and at the state/territory level.</p>

<p>There are <a href="https://www.servicesaustralia.gov.au/your-right-to-privacy?context=1">privacy laws</a>. These are meant to prevent businesses and government agencies from <a href="https://www.oaic.gov.au/privacy/other-legislation">unauthorised</a> use of Medicare and other official identifiers for profiling people. These laws are also meant to prevent undisclosed sharing with other entities, such as individuals or businesses.</p>

<p>Then there are <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/strengthening-australias-cyber-security-regulations-and-incentives">cybersecurity</a> and other <a href="http://www.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/cca1995115/sch1.html">criminal laws</a>. These also aim to prevent unauthorised access, sale and sharing of your <a href="https://www.sciencedirect.com/science/article/pii/S1045235421001155#b0160">Medicare</a> number and other data (known as <a href="https://eprints.qut.edu.au/101958/">metadata</a>) stored by telecommunication providers.</p>



<h2>Has this happened before?</h2>

<p>Medicare numbers have been breached before, <a href="https://theconversation.com/after-the-medicare-breach-we-should-be-cautious-about-moving-our-health-records-online-80472">in 2017</a>. An official <a href="https://www.servicesaustralia.gov.au/sites/default/files/2017/10/final-report.pdf">inquiry</a> noted trade in stolen Medicare numbers on the dark web.</p>

<p>The 2017 breach was apparently much larger, but the Optus numbers may grow as the investigation continues.</p>

<p>Experts have also <a href="https://pursuit.unimelb.edu.au/articles/the-simple-process-of-re-identifying-patients-in-public-health-records">raised concern</a> about the government’s authorised release in 2016 of apparently de-identified health data. In fact, patient details could be identified, using a number of simple steps.</p>

<p>These two earlier examples should have meant both health agencies and businesses have taken extra care about their obligations to safeguard health data.</p>



<h2>What if your Medicare number has been exposed?</h2>

<p>Unauthorised use of a Medicare number doesn’t necessarily result in large-scale identity crime.</p>

<p>For instance, Minister for Government Services Bill Shorten <a href="https://twitter.com/billshortenmp/status/1574688878510100480">has said</a> a Medicare number alone cannot unlock access to someone’s myGov account (and therefore access to someone’s welfare or tax details).</p>



<p>However, the Optus data breach – and future data breaches in the public and private sector – does provide Australian and overseas criminals with a set of identifiers (including passport and driver’s licence numbers), that can be used for a range of identity crimes, such as impersonating someone else.</p>

<p>Optus is <a href="https://www.optus.com.au/support/cyberattack/medicare-card-number-information">advising affected customers</a> to replace their Medicare card, at no cost, via their Medicare online account at myGov, the Express Plus Medicare mobile app, or by calling Medicare on 132 011.</p>

<p>Further details are available via <a href="https://www.servicesaustralia.gov.au/what-to-do-if-youve-been-affected-recent-optus-data-breach">Services Australia</a>.</p>



<h2>What else needs to happen?</h2>

<p>As with many data breaches, details about what happened at Optus, how and who is affected are only slowly trickling out.</p>

<p>The <a href="https://www.oaic.gov.au">Office of the Australian Information Commission</a> – the national privacy regulator – needs to run a rigorous and detailed investigation and release its findings publicly.</p>

<p>This needs to be accompanied by a hard-hitting independent inquiry of what happened at Optus. This requires IT expertise, which the Office of the Australian Information Commission may not have. Such an inquiry would also demonstrate Optus’ commitment to learn from any failures.</p>

<p>As we have seen before, businesses and government agencies cannot assume a data breach “won’t happen to them”. We need to find out what happened at Optus to ensure the future privacy of some of our most personal data.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding="async" src="https://counter.theconversation.com/content/191575/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" referrerpolicy="no-referrer-when-downgrade" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>

<p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/ive-given-out-my-medicare-number-how-worried-should-i-be-about-the-latest-optus-data-breach-191575">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Towards a post-privacy world: proposed bill would encourage agencies to widely share your data</title>
		<link>https://privacy.org.au/2020/09/17/towards-a-post-privacy-world-proposed-bill-would-encourage-agencies-to-widely-share-your-data/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 07:27:43 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4409</guid>

					<description><![CDATA[The federal government has announced a plan to increase the sharing of citizen data across the public sector.

This would include data sitting with agencies such as Centrelink, the Australian Tax Office, the Department of Home Affairs, the Bureau of Statistics and potentially other external “accredited” parties such as universities and businesses.

The draft Data Availability and Transparency Bill released today will not fix ongoing problems in public administration. It won’t solve many problems in public health. It is a worrying shift to a post-privacy society.

It’s a matter of arrogance, rather than effectiveness. It highlights deficiencies in Australian law that need fixing. <span class="excerpt-more"><a href="https://privacy.org.au/2020/09/17/towards-a-post-privacy-world-proposed-bill-would-encourage-agencies-to-widely-share-your-data/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span><a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, Assistant Professor, School of Law, <em><a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em></span></p>

<p>The federal government has <a href="https://www.abc.net.au/news/2020-09-16/government-draft-law-share-personal-data-between-agencies/12666792">announced a plan</a> to increase the sharing of citizen data across the public sector.</p>

<p>This would include data sitting with agencies such as Centrelink, the Australian Tax Office, the Department of Home Affairs, the Bureau of Statistics and potentially other external “accredited” parties such as universities and businesses.</p>

<p>The draft <a href="https://www.datacommissioner.gov.au/data-sharing/legislation">Data Availability and Transparency Bill</a> released today will not fix ongoing problems in public administration. It won’t solve many problems in public health. It is a worrying shift to a post-privacy society.</p>

<p>It’s a matter of arrogance, rather than effectiveness. It highlights deficiencies in Australian law that need fixing.</p>

<h2>Making sense of the plan</h2>

<p>Australian governments on all levels have built huge silos of information about us all. We supply the data for these silos each time we deal with government.</p>

<p>It’s difficult to exercise your rights and responsibilities without providing data. If you’re a voter, a director, a doctor, a gun owner, on welfare, pay tax, have a driver’s licence or Medicare card – our governments have data about you.</p>

<p>Much of this is supplied on a legally mandatory basis. It allows the federal, state, territory and local governments to provide pensions, elections, parks, courts and hospitals, and to collect rates, fees and taxes.</p>

<p>The proposed Data Availability and Transparency Bill will authorise large-scale sharing of data about citizens and non-citizens across the public sector, between both public and private bodies. Previously called the “<a href="https://www.datacommissioner.gov.au/sites/default/files/2019-09/Data%20Sharing%20and%20Release%20Legislative%20Reforms%20Discussion%20Paper%20-%20Accessibility.pdf">Data Sharing and Release</a>” legislation, the word “transparency” has now replaced “release” to allay public fears.</p>

<p>The legislation would allow sharing between Commonwealth government agencies that are currently constrained by a range of acts overseen (weakly) by the <a href="https://www.zdnet.com/article/senators-concerned-oaic-will-remain-under-resourced-despite-hiring-31-staff/">under-resourced</a> Australian Information Commissioner (OAIC).</p>

<p>The acts often only apply to specific agencies or data. Overall we have a threadbare patchwork of law that is supposed to respect our privacy but often isn’t effective. It hasn’t kept pace with law in <a href="https://theconversation.com/data-privacy-stricter-european-rules-will-have-repercussions-in-australia-as-global-divisions-grow-142980">Europe</a> and elsewhere in the world.</p>

<p>The plan also envisages sharing data with trusted third parties. They might be universities or other research institutions. In future, the sharing could extend to include state or territory agencies and the private sector, too.</p>

<p>Any public or private bodies that receive data can then share it forward. Irrespective of whether one has anything to hide, this plan is worrying.</p>

<h2>Why will there be sharing?</h2>

<p>Sharing isn’t necessarily a bad thing. But it should be done accountably and appropriately.</p>

<p>Consultations over the past two years have highlighted the value of inter-agency sharing for law enforcement and for research into health and welfare. Universities have identified a range of uses regarding urban planning, environment protection, crime, education, employment, investment, disease control and medical treatment.</p>

<p>Many researchers will be delighted by the prospect of accessing data more cheaply than doing onerous small-scale surveys. IT people have also been enthusiastic about money that could be made helping the databases of different agencies talk to each other.</p>

<p>However, the reality is more complicated, as researchers and <a href="https://www.datacommissioner.gov.au/sites/default/files/2019-11/79_0.pdf">civil society</a> advocates have pointed out.</p>

<h2>Why should you be worried?</h2>

<p>The plan for comprehensive data sharing is founded on the premise of accreditation of data recipients (entities deemed trustworthy) and oversight by the Office of the National Data Commissioner, under the proposed act.</p>

<p>The draft bill announced today is open for a short period of public comment before it goes to parliament. It features a <a href="https://www.datacommissioner.gov.au/exposure-draft/accreditation">consultation paper</a> alongside a disquieting consultants’ report about the bill. In this <a href="https://www.datacommissioner.gov.au/sites/default/files/2020-09/Privacy%20Impact%20Assessment_exposure%20draft%20Data%20Availability%20and%20Transparency%20Bill%202020.pdf">report</a>, the consultants refer to concerns and “high inherent risk”, but unsurprisingly appear to assume things will work out.</p>

<p>Federal Minister for Government Services Stuart Roberts, who presided over the tragedy known as the <a href="https://www.sbs.com.au/news/nothing-to-apologise-for-minister-backs-stuart-robert-over-failed-robodebt-scheme">RoboDebt scheme</a>, is optimistic about the bill. He dismissed critics’ concerns by <a href="https://www.abc.net.au/news/2020-09-16/government-draft-law-share-personal-data-between-agencies/12666792">stating</a> consent is implied when someone uses a government service. This seems disingenuous, given people typically don’t have a choice.</p>

<p>However, the bill does exclude some data sharing. If you’re a criminologist researching law enforcement, for example, you won’t have an open sesame. Experience with the national Privacy Act and other Commonwealth and state legislation tells us such exclusions weaken over time</p>

<p>Outside the narrow exclusions centred on law enforcement and national security, the bill’s default position is to share widely and often. That’s because the accreditation requirements for agencies aren’t onerous and the bases for sharing are very broad.</p>

<p>This proposal exacerbates ongoing questions about day-to-day privacy protection. Who’s responsible, with what framework and what resources?</p>

<p>Responsibility is crucial, as national and state agencies recurrently experience data breaches. Although as RoboDebt revealed, they often stick to denial. Universities are also often wide open to <a href="https://www.theguardian.com/australia-news/2019/jun/04/australian-national-university-hit-by-huge-data-breach">data breaches</a>.</p>

<p>Proponents of the plan argue privacy can be protected through robust de-identification, in other words removing the ability to identify specific individuals. However, <a href="https://pursuit.unimelb.edu.au/articles/the-simple-process-of-re-identifying-patients-in-public-health-records">research</a> has recurrently shown “de-identification” is no silver bullet.</p>

<p>Most bodies don’t recognise the scope for re-identification of de-identified personal information and lots of sharing will emphasise data matching.</p>

<h2>Be careful what you ask for</h2>

<p>Sharing <em>may</em> result in social goods such as better cities, smarter government and healthier people by providing access to data (rather than just money) for service providers and researchers.</p>

<p>That said, our history of aspirational statements about privacy protection without meaningful enforcement by watchdogs should provoke some hard questions. It wasn’t long ago the government <a href="https://www.theguardian.com/australia-news/2020/sep/10/service-nsw-hack-could-have-been-prevented-with-simple-security-measures">failed</a> to prevent hackers from accessing sensitive data on more than 200,000 Australians.</p>

<p>It’s true this bill would ostensibly provide transparency, but it won’t provide genuine accountability. It shouldn’t be taken at face value.<img decoding="async" src="https://counter.theconversation.com/content/146292/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>

<p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/towards-a-post-privacy-world-proposed-bill-would-encourage-agencies-to-widely-share-your-data-146292">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keep calm, but don’t just carry on: how to deal with China’s mass surveillance of thousands of Australians</title>
		<link>https://privacy.org.au/2020/09/14/keep-calm-but-dont-just-carry-on-how-to-deal-with-chinas-mass-surveillance-of-thousands-of-australians/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 10:29:44 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4396</guid>

					<description><![CDATA[Recent news that Chinese company Zhenhua Data is profiling more than 35,000 Australians isn’t a surprise to people with an interest in privacy, security and social networks. We need to think critically about this, knowing we can do something to prevent it from happening again.

The company operates under Chinese law and doesn’t appear to have a presence in Australia. That means we can’t shut it down or penalise it for a breach of our law. Also, Beijing is unlikely to respond to expressions of outrage from Australia or condemnation by our government – especially amid recent sabre-rattling.

Zhenhua is reported to have data on more than 35,000 Australians – a list saturated by political leaders and prominent figures. Names, birthdays, addresses, marital status, photographs, political associations, relatives and social media account details are among the information extracted. <span class="excerpt-more"><a href="https://privacy.org.au/2020/09/14/keep-calm-but-dont-just-carry-on-how-to-deal-with-chinas-mass-surveillance-of-thousands-of-australians/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span><a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, Assistant Professor, School of Law, <em><a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em></span></p>

<p>National security is like sausage-making. We might enjoy the tasty product, but want to look away from the manufacturing.</p>

<p><a href="https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668">Recent news</a> that Chinese company Zhenhua Data is profiling more than 35,000 Australians isn’t a surprise to people with an interest in privacy, security and social networks. We need to think critically about this, knowing we <em>can</em> do something to prevent it from happening again.</p>

<p><a href="https://www.afr.com/policy/foreign-affairs/china-s-social-media-warfare-database-lists-key-australians-20200910-p55u95">Reports indicate</a> Zhenhua provides services to the Chinese government. It may also provide services to businesses in China and overseas.</p>

<p>The company operates under Chinese law and doesn’t appear to have a presence in Australia. That means we can’t shut it down or penalise it for a breach of our law. Also, Beijing is unlikely to respond to expressions of outrage from Australia or condemnation by our government – especially amid recent sabre-rattling.</p>

<p>Zhenhua is <a href="https://www.sbs.com.au/news/personal-details-of-more-than-35-000-australians-included-in-leaked-chinese-database">reported to</a> have data on more than 35,000 Australians – a list saturated by political leaders and prominent figures. Names, birthdays, addresses, marital status, photographs, political associations, relatives and social media account details are among the information extracted.</p>

<p>It seems Zhenhua has data on a wide range of Australians, including public figures such as Victorian supreme court judge Anthony Cavanough, Australia’s former ambassador to China Geoff Raby, former NSW premier and federal foreign affairs minister Bob Carr, tech billionaire Mike Cannon-Brookes and singer Natalie Imbruglia.</p>

<p>It’s not clear how individuals are being targeted. The profiling might be systematic. It might instead be conducted on the basis of a specific industry, academic discipline, public prominence or perceived political influence.</p>

<p>It’s unlikely Zhenhua profiles random members of the public. That means there’s no reason for average citizens without a China connection to be worried.</p>

<p>Still, details around the intelligence gathering elude us, so best practise for the public is to maintain as much online privacy as possible, whenever possible.</p>

<p>Overall, we don’t know much about Zhenhua’s goals. And what we do know came from a leak to a US academic <a href="https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668">who sensibly fled</a> China in 2018, fearing for his safety.</p>

<h2>Pervasive surveillance is the norm</h2>

<p>Pervasive surveillance is now a standard feature of all major governments, which often rely on surveillance-for-profit companies. Governments in the West buy services from <a href="https://theconversation.com/how-the-shady-world-of-the-data-industry-strips-away-our-freedoms-143823">big data analytic</a> companies such as <a href="https://www.palantir.com/">Palantir</a>.</p>

<p>Australia’s government gathers information outside our borders, too. Take the <a href="https://www.theguardian.com/australia-news/2019/aug/10/witness-k-and-the-outrageous-spy-scandal-that-failed-to-shame-australia">bugging</a> of the Timor-Leste government, a supposed <a href="https://www.dfat.gov.au/geo/timor-leste/development-assistance/Pages/development-assistance-in-timor-leste">friend</a> rather than enemy.</p>

<h2>How sophisticated is the plot?</h2>

<p>Revelations about Zhenhua have referred to the use of artificial intelligence and the “<a href="https://scholarship.law.columbia.edu/cgi/viewcontent.cgi?article=1527&#038;context=faculty_scholarship">mosaic</a>” method of intelligence gathering. But this is probably less exciting than it sounds.</p>

<p>Reports indicate much of the data was extracted from online open sources. Access to much of this would have simply involved using algorithms to aggregate targets’ names, dates, qualifications and work history data found on publicly available sites.</p>

<p>The algorithms then help put the individual pieces of the “mosaic” together and fill in the holes on the basis of each individual’s relationship with others, such as their as peers, colleagues or partners.</p>

<p>Some of the data for the mosaic may come from hacking or be gathered directly by the profiler. <a href="https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668">According to</a> the ABC, some data that landed in Zhenhua’s lap was taken from the dark web.</p>

<p>One seller might have spent years copying data from university networks. For example, last year the Australian National University <a href="https://www.abc.net.au/news/2019-06-04/anu-data-hack-bank-records-personal-information/11176788">acknowledged</a> major personal data breaches had taken place, potentially extending back 19 years.</p>

<p>This year there was also the unauthorised (and <a href="https://www.theguardian.com/australia-news/2020/sep/10/service-nsw-hack-could-have-been-prevented-with-simple-security-measures">avoidable</a>) access by cybercriminals to NSW government data on <a href="https://ia.acs.org.au/article/2020/3-8m-documents-stolen-from-nsw-govt.html">200,000</a> people.</p>

<p>While it may be confronting to know a foreign state is compiling information on Australian citizens, it should be comforting to learn sharing this information can be avoided – if you’re careful.</p>

<h2>What’s going on in the black box?</h2>

<p>One big question is what Zhenhua’s customers in China’s political and business spheres might do with the data they’ve compiled on Australian citizens. Frankly, we don’t know. National security is often a black box and we are unlikely ever to get verifiable details.</p>

<p>Apart from distaste at being profiled, we might say being watched is no big deal, especially given many of those on the list are already public figures. Simply having an AI-assisted “Who’s Who” of prominent Australians isn’t necessarily frightening.</p>

<p>However, it is of concern if the information collected is being used for disinformation, such as through any means intended to erode trust in political processes, or subvert elections.</p>

<p>For instance, a report published in June by the Australian Strategic Policy Institute detailed how Chinese-speaking people in Australia were being <a href="https://theconversation.com/chinas-disinformation-threat-is-real-we-need-better-defences-against-state-based-cyber-campaigns-141044">targeted</a> by a “persistent, large-scale influence campaign linked to Chinese state actors”.</p>

<p>Deep fake videos are another form of subversion of increasing concern to governments and academics, particularly <a href="https://edition.cnn.com/interactive/2019/01/business/pentagons-race-against-deepfakes/">in the US</a>.</p>

<h2>Can we fix this?</h2>

<p>We can’t make Zhenhua and its competitors disappear. Governments think they are too useful.</p>

<p>Making everything visible to state surveillance is now the ambition of many law enforcement bodies and all intelligence agencies. It’s akin to Google and its competitors <a href="https://theconversation.com/the-ugly-truth-tech-companies-are-tracking-and-misusing-our-data-and-theres-little-we-can-do-127444">wanting to know</a> (<a href="https://theconversation.com/the-accc-is-suing-google-for-misleading-millions-but-calling-it-out-is-easier-than-fixing-it-143447">and sell</a>) everything about us, without regard for privacy as a human right.</p>

<p>We can, however, build resilience.</p>

<p>One way is to require government agencies and businesses to safeguard their databases. That hasn’t been the case with the NSW government, <a href="https://www.sbs.com.au/news/medicare-data-breach-is-the-tip-of-the-iceberg-in-the-world-of-australian-dark-web-fraud">Commonwealth</a> governments, <a href="https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloud-server/">Facebook</a>, <a href="https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/">dating services</a> and major hospitals.</p>

<p>In Australia, we need to adopt recommendations by law reform inquiries and establish a national right to privacy. The associated privacy tort would incentivise data custodians and also encourage the public to avoid oversharing online.</p>

<p>In doing so, we might be better placed to condemn both China and other nations participating in unethical intelligence gathering, while properly acknowledging our own <a href="https://www.theguardian.com/australia-news/2019/aug/10/witness-k-and-the-outrageous-spy-scandal-that-failed-to-shame-australia">wrongdoings</a> in Timor-Leste.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading="lazy" decoding="async" src="https://counter.theconversation.com/content/146103/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>

<p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/keep-calm-but-dont-just-carry-on-how-to-deal-with-chinas-mass-surveillance-of-thousands-of-australians-146103">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Advocacy Groups Oppose Google Takeover of Fitbit</title>
		<link>https://privacy.org.au/2020/06/30/advocacy-groups-oppose-google-takeover-of-fitbit/</link>
		
		<dc:creator><![CDATA[David Vaile]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 02:00:06 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4325</guid>

					<description><![CDATA[Consumer and citizen groups have significant concerns that Google’s proposed takeover of wearables manufacturer Fitbit would be a game-changer not only for how people interact with the online world but also for digital and related health markets. Regulators around the world –in particular those concerned with antitrust compliance and data privacy –must therefore give it&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2020/06/30/advocacy-groups-oppose-google-takeover-of-fitbit/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>Consumer and citizen groups have significant concerns that Google’s proposed takeover of wearables manufacturer Fitbit would be a game-changer not only for how people interact with the online world but also for digital and related health markets. Regulators around the world –in particular those concerned with antitrust compliance and data privacy –must therefore give it their utmost attention. This will be a test case for how regulators address the immense power the tech giants exert over the digital economy and their ability to expand their ecosystems unchecked.</p><p>More specifically, this merger is a test of regulators’ resolve to analyse the effects on competition of a tech giant acquiring a vast amount of highly valuable data through a takeover. Google could exploit Fitbit’s exceptionally valuable health and location datasets, and data collection capabilities, to strengthen its already dominant position in digital markets such as online advertising. Google could also use Fitbit’s data to establish a commanding position in digital and related health markets, depriving competitors of the ability to compete effectively. This would reduce consumer welfare (including degrading data privacy options), limit innovation and raise prices.</p><p>Past experience shows that regulators must be very wary of any promises made by merging parties about restricting the use of the acquisition target’s data. Regulators must assume that Google will in practice utilise the entirety of Fitbit’s currently independent unique, highly sensitive data set in combination with its own, particularly as this could increase its profits, or they must impose strict and enforceable limitations on data use.</p><p>Wearable devices could replace smartphones as the main gateway to the internet, just as smartphones replaced personal computers. Google’s expansion into this market, edging out other competitors would thus be significant. Wearables like Fitbit’s could in future give companies details of essentially everything consumers do 24/7 and allow them to feed digital services back to consumers. The way wearables are being used to track COVID-19 infections and give access to doctors and health information is a timely illustration of this. Although, perhaps justified, subject to strong safeguards, in a public health emergency, the exploitation of such data in a commercial context is an important concern that demands close scrutiny by regulators both for its anticompetitive effects (where huge bundles make it near-impossible for entrants to compete against incumbents) and anti-consumer effects (creating ever bigger bundles that undermine consumer choice).</p><p>The acquisition of Fitbit could expand Google’s immense power in digital markets into the $8.7 trillion global healthcare market1through its strength in data and data analytics. Google has already made significant inroads into healthcare. Regulators must carefully assess the proposed deal’s implications for innovation and its potential to undermine the ability of companies to bring new products to consumers in the area of digital healthcare.</p><p>The results of unfortunate merger control decisions in the past have likely contributed to the rise of tech giants. Subsequent concerns now have to be addressed through more costly and lengthy ex-postantitrust enforcement proceedings and other competition interventions. Such harms to consumers are far better prevented than cured. Therefore, before deciding whether this takeover can proceed or not, regulators must carefully analyse its full implications for consumers and consider its potential for far-reaching and dynamic effects on digital and health markets.</p><p><span style="text-decoration: underline;"><strong>Signatory Organisations</strong></span></p><ul><li>AccessNow, <em>EU</em></li><li>Australian Privacy Foundation, <em>Australia</em></li><li>BEUC –The European Consumer Organisation, <em>EU</em></li><li>Centerfor Digital Democracy, <em>US</em></li><li>Centre for Responsible Technology, <em>Australia</em></li><li>Color of Change, <em>US</em></li><li>Consumer Federation of America, <em>US</em></li><li>Derechos Digitales, <em>Latin America</em></li><li>EDRi (European Digital Rights), <em>EU</em></li><li>Idec – Brazilian Institute of Consumer Defense, <em>Brazil</em></li><li>New America&#8217;s Open Technology Institute, <em>US</em></li><li>Omidyar Network, <em>US</em></li><li>Open Markets Institute, <em>US</em></li><li>Open Society European Policy Institute, <em>EU</em></li><li>Privacy International (PI), <em>Global</em></li><li>Public Citizen, <em>US</em></li><li>Public Interest Advocacy Centre, <em>Canada</em></li><li>Public Knowledge, <em>US</em></li><li>Red en Defensa de los Derechos Digitales (R3D), <em>Mexico</em></li><li>Trans-Atlantic Consumer Dialogue, <em>EU-US</em></li></ul><p>
</p><p>
<span style="text-decoration: underline;"><strong>Download the media release:</strong></span>
</p><p>
<a href="https://privacy.org.au/wp-content/uploads/2020/07/beuc-x-2020-060_joint_ngo_statement_on_google_fitbit_merger.pdf">Consumer and Citizen Groups Have Serious Concerns About Google Fitbit Takeover &#8211; Common Statement</a>
</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>My Health Record: the case for opting out</title>
		<link>https://privacy.org.au/2018/07/17/my-health-record-the-case-for-opting-out/</link>
		
		<dc:creator><![CDATA[Katharine Kemp]]></dc:creator>
		<pubDate>Tue, 17 Jul 2018 03:48:17 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3225</guid>

					<description><![CDATA[Katharine Kemp, UNSW; Bruce Baer Arnold, University of Canberra, and David Vaile, UNSW Unless you take action to remove yourself from the My Health Record (MHR) system, the federal government will make a digital copy of your medical record, store it centrally, and, as the default, provide numerous people with access to it. If you&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/07/17/my-health-record-the-case-for-opting-out/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, <em><a href="http://theconversation.com/institutions/unsw-1414">UNSW</a></em>; <a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, <em><a href="http://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em>, and <a href="https://theconversation.com/profiles/david-vaile-20548">David Vaile</a>, <em><a href="http://theconversation.com/institutions/unsw-1414">UNSW</a></em></span>

<p>Unless you take action to remove yourself from the My Health Record (MHR) system, the federal government will make a digital copy of your medical record, store it centrally, and, as the default, provide numerous people with access to it.</p>

<p>If you don’t opt out during this period and later choose to cancel your record, you will no longer be able to access that record but the government will continue to store it until 30 years after your death. You will need to trust that it will not be breached.</p>

<p>There are three main problems with the MHR scheme.</p>

<h2>1. It can’t be relied upon as a clinical record</h2>

<p>Contrary to what many Australians may believe, MHR is <em>not</em> a clinically-reliable medical record, and was not designed to be. It is not up-to-date and comprehensive. As the Office of the Australian Information Commissioner (OAIC) <a href="https://www.oaic.gov.au/resources/agencies-and-organisations/business-resources/privacy-business-resource-23-handling-personal-information-in-the-my-health-record-system.pdf">points out</a>:</p>

<blockquote>
<p>The My Health Record system contains an online summary of a patient’s key health information; not a complete record of their clinical history.</p>
</blockquote>

<p>If, for example, a doctor were treating a child in an emergency, the doctor could <em>not</em> rely on an MHR to know what medications the child has been prescribed up to that date. In an emergency, an unreliable record is a distraction, not a help.</p>

<p>Many doctors have in fact objected to the incompleteness and lack of utility of the MHR. A <a href="https://aushealthit.blogspot.com/2018/07/looks-like-adha-has-lot-of-work-to-do.html">recent poll on the AMA’s doctors portal</a> suggests 76% of respondents think the MHR will not improve patient outcomes while 12% think it will.</p>

<p>Notwithstanding this fundamental deficiency, the government is pushing ahead with an inherently risky scheme.</p>

<h2>2. It creates a security risk</h2>

<p>If you read the very long (7,800 words) <a href="https://www.myhealthrecord.gov.au/about/privacy-policy">privacy policy for MHR</a>, you’ll see that the Australian Digital Health Agency (ADHA) itself states there are risks from the online transmission and storage of our personal information in this system.</p>

<h3>Health data is prized by hackers</h3>

<p>We have witnessed a stream of health data breaches in <a href="http://www.abc.net.au/news/science/2018-04-18/healthcare-target-for-hackers-experts-warn/9663304">Australia</a> and <a href="http://www.ep.liu.se/ecp/article.asp?issue=145&#038;article=009&#038;volume=">overseas</a>, and the incentives for these breaches are only increasing.</p>

<p>Storing records digitally with online access greatly increases their accessibility for criminals, hackers and snoopers. Health records are valuable as a means of <a href="http://www.abc.net.au/news/science/2018-04-18/healthcare-target-for-hackers-experts-warn/9663304">identity theft</a> due to the wealth of personal information they contain. They are a huge prize for hackers, fetching a high price on <a href="https://www.afr.com/business/insurance/insurance-companies/medical-data-more-valuable-than-credit-card-details-on-the-dark-web-20170707-gx6na4">the Dark Web</a>.</p>

<h3>You won’t know who has seen it</h3>

<p>It won’t just be your doctor who has access to this centralised digital record of your personal health information. The default position is that numerous people will have access – doctors, pharmacists, physiotherapists, nurses, and unidentified staff of various organisations.</p>

<p>MHR’s access-logging system does not track which individuals are accessing records, only institutions, which means you won’t be able to tell who has seen it. Even without a technical hack, that will make it almost impossible to keep your information secure in this system.</p>

<h3>De-identification is risky</h3>

<p>The government is also planning to allow access to your health information for research purposes by “de-identifying” your information. That means the data should not be able to be linked to a particular individual.</p>

<p>But the national government has a <a href="https://www.itnews.com.au/news/health-breached-privacy-law-in-open-data-bungle-oaic-487936">bad record</a> for successfully de-identifying health information.</p>

<p>In <a href="https://www.itnews.com.au/news/govt-releases-billion-line-de-identified-health-dataset--433814">2016</a>, the government released a data set that included information on a large number of patients spanning 30 years. It was meant to be de-identified.</p>

<p>IT researchers at Melbourne University quickly demonstrated it could be <a href="https://privacy.org.au/2018/01/07/media-release-open-data-too-much-sharing-too-little-care-whos-reading-your-health-information-now/">re-identified</a> and linked to the individuals concerned. Such <a href="https://pursuit.unimelb.edu.au/articles/the-simple-process-of-re-identifying-patients-in-public-health-records">re-identification</a> risk will only grow, as data sets proliferate and tools get smarter.</p>

<h3>Third-party access jeopardises security</h3>

<p>MHR also permits external health apps to access your records. According to the legislation, this should only be done with your consent.</p>

<p>Unfortunately, and predictably, health apps are already securing “consent” through <a href="https://developer.digitalhealth.gov.au/sites/default/files/accan_final_report_-_finding_peace_of_mind.pdf">obscure, standard form contracts</a> so you might not be aware the app owner could sell your sensitive medical information to others.</p>

<p>Last month, the ABC <a href="http://www.abc.net.au/news/2018-06-25/healthengine-sharing-patients-information-with-lawyers/9894114">revealed</a> one such health app (HealthEngine) was selling patient information to law firms, so patients with serious conditions and injuries were contacted repeatedly by strangers pushing them to pursue legal claims. Many didn’t know how their sensitive medical information was revealed.</p>

<p>The ADHA’s website has published a report on the woefully inadequate privacy policies of <a href="https://developer.digitalhealth.gov.au/sites/default/files/accan_final_report_-_finding_peace_of_mind.pdf">mental health apps</a>, and yet these apps might be authorised to access your MHR data with your supposed consent.</p>

<h2>3. An ‘opt-out’ scheme goes against best practice</h2>

<p>Critically, the opt-out consent mechanism for MHR flies in the face of global best practice for informed consent – and our own federal privacy regulator’s guidelines on the sort of consent necessary for use of health information.</p>

<p>Consent for use of personal information <a href="https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/consent/what-is-valid-consent/">should be</a> express, fully informed, easy to understand, and should require action on the part of the individual.</p>

<p>MHR disregards all of those principles.</p>

<p>MHR does not seek your <em>express</em> consent. Instead, if you do not take the necessary steps before 15 October, your health records will automatically be copied, stored and shared.</p>

<p>You will also not be <em>fully informed</em>. There will be <a href="https://www.healthcareit.com.au/article/%E2%80%9Cthere-no-big-brother%E2%80%9D-tim-kelsey-sells-my-health-record-innovation-consumer-empowerment">no national television</a>, radio or print media campaign to advertise the MHR scheme, which many Australians have <a href="http://www.health.gov.au/internet/main/publishing.nsf/content/A892B3781E14E1B3CA25810C000BF7C6/%24File/Evaluation-of-the-My-Health-Record-Participation-Trials-Report.pdf">misunderstood</a> in the past. The government will not even send you a <a href="https://www.computerworld.com.au/article/641549/digital-heath-agency-no-conspiracy-keep-my-health-record-opt-out-quiet/">letter</a> to tell you about this scheme, let alone its very serious risks.</p>

<p>By contrast, the OAIC says organisations seeking <a href="https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-b-key-concepts#consent">individual consent</a> to use personal information should generally:</p>

<blockquote>
<p>… ensure that an individual is properly and clearly informed about how their personal information will be handled, so they can decide whether to give consent.</p>
</blockquote>

<p>and:</p>

<blockquote>
<p>… seek express consent from an individual before handling the individual’s sensitive information, given the greater privacy impact this could have.</p>
</blockquote>

<p>Even if implied consent were acceptable (and it is not), the OAIC states further that an organisation:</p>

<blockquote>
<p>… should not assume that an individual has consented to a collection, use or disclosure that appears to be advantageous to that person. Nor can an entity establish implied consent by asserting that if the individual knew about the benefits of the collection, use or disclosure, they would probably consent to it.</p>
</blockquote>

<h2>The time to opt-out is now</h2>

<p>MHR is likely to create very limited benefits for many, if not most, Australians. It creates unacceptable security risks for our most sensitive personal information. And the government’s method of obtaining “consent” goes against international best practice.</p>

<p>If the MHR scheme were properly advertised, fully explained and Australians given a choice whether to opt-in, Australians could make an informed choice about whether the limited benefits justify the substantial risks to their sensitive information.</p>

<p>Those concerned about the security of their health information will need to <a href="https://www.myhealthrecord.gov.au/for-you-your-family/howtos/opt-out">take steps now</a> to remove themselves from the MHR system.</p>

<hr />

<p><img loading="lazy" decoding="async" src="https://counter.theconversation.com/content/99302/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" height="1" width="1" /><em>This article has been updated to reflect that the ADHA report on the privacy policies of health apps focused on mental health apps.</em></p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/my-health-record-the-case-for-opting-out-99302">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MEDIA RELEASE: Time To Stop The Privacy Trainwrecks</title>
		<link>https://privacy.org.au/2018/04/06/media-release-time-to-stop-the-privacy-trainwrecks/</link>
		
		<dc:creator><![CDATA[David Vaile]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 06:14:00 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3088</guid>

					<description><![CDATA[News that Facebook has given away personal information about many Australians is a reminder that we need businesses, governments and political parties to be accountable. Australians need better privacy protection. They can get that without a lot of pain, money or fuss. The Australian Privacy Foundation – on behalf of all Australians – calls on&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/04/06/media-release-time-to-stop-the-privacy-trainwrecks/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>News that Facebook has given away personal information about many Australians is a reminder that we need businesses, governments and political parties to be accountable.
</p><p>
Australians need better privacy protection. They can get that without a lot of pain, money or fuss. The Australian Privacy Foundation – on behalf of all Australians – calls on the national Government to act without delay. The trainwrecks are going to keep happening until organisations are persuaded that they must be responsible.
</p><p>
You don’t need to leave Facebook (although many are doing so). You don’t need to despair about privacy. You do need to tell your MP and Senators that enough is enough.
</p><p>
A good start for fixing Australian law is to introduce the privacy tort that has been recommended by a succession of law reform bodies. The tort enables people whose privacy has been wrongly disregarded to take the offender to court and gain compensation. There’s nothing like the prospect of being shamed and handing over money to persuade lazy big business and arrogant government.</p><p>

Another start is to strengthen the national Privacy Commissioner. It&#8217;s taken 15 days for the OAIC to move in response to this privacy trainwreck. It’s an under-resourced and timid agency that responds slowly and weakly whenever there’s a problem. In a world where Facebook and other businesses disregard their responsibilities it’s time to put a tiger in the privacy tank. Time for the Commissioner to do what Australians expect it to do: Protect everyone from abuses. Carry a big stick (and use it, quickly, on big cheaters who don&#8217;t respond to anything less).</p><p>

We can look overseas, where the New Zealand Privacy Commissioner has strongly condemned Facebook for disregarding New Zealand privacy law. New Zealand isn’t frightened of the biggest bully on the social media block. Nor should we. Problems are going to keep happening until we do something to prevent them.</p><p>

Facebook makes money in Australia. Lots of money. It makes money using the friendliness, interest and curiosity of people like you. The Australian Privacy Foundation is happy for Facebook and its competitors to make money. It insists, however, that Facebook takes care with information about Australians.</p>

<p>The scale of Facebook&#8217;s breach of the public trust is still not yet fully known. First we were told that 50 million users data had been harvested. NThen we’re told the figure is closer to 87 million, including over 300,000 Australians. What figure will we be told next week, when Zuckerberg testifies before the US Congress? Now we hear it could be thousands of millions who were exposed to the deliberate flaws that allowed capture and exfiltration by third parties, with who knows how many Australians affected.</p>

<p>It’s time for Facebook to recognise that it is a custodian rather than owner of data. That recognition involves a meaningful acknowledgement of wrongdoing when it has failed in its duty as a responsible custodian. It also requires regulators and politicians to say enough is enough.</p>

<p><strong>Contacts:</strong></p><table><tbody><tr><td>David Vaile, Chair</td><td>0414 731 249</td><td>David.Vaile@privacy.org.au</td></tr><tr><td>Liam Pomfret</td><td>(07) 3346 1654</td><td>Liam.Pomfret@privacy.org.au</td></tr><tr><td>Bruce Baer Arnold</td><td>(02) 6201 2710</td><td>Bruce.Arnold@privacy.org.au</td></tr></tbody></table>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Let’s face it, we’ll be no safer with a national facial recognition database</title>
		<link>https://privacy.org.au/2017/10/08/lets-face-it-well-be-no-safer-with-a-national-facial-recognition-database/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Sun, 08 Oct 2017 00:38:19 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1354</guid>

					<description><![CDATA[A commitment to share the biometric data of most Australians – including your driving licence photo – agreed at Thursday’s Council of Australian Governments (COAG) meeting will result in a further erosion of our privacy.
That sharing is not necessary. It will be costly. But will it save us from terrorism? Not all, although it will give people a false sense of comfort. <span class="excerpt-more"><a href="https://privacy.org.au/2017/10/08/lets-face-it-well-be-no-safer-with-a-national-facial-recognition-database/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, <em><a href="http://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em></span>

<p>A commitment to share the biometric data of most Australians – including your driving licence photo – agreed at Thursday’s Council of Australian Governments (<a href="https://www.coag.gov.au">COAG</a>) meeting will result in a further erosion of our privacy.</p>

<p>That sharing is not necessary. It will be costly. But will it save us from terrorism? Not all, although it will give people a false sense of comfort.</p>

<p>Importantly, it will allow politicians and officials to show that they are doing something, in a climate where a hunt for headlines demands the appearance of action.</p>

<h2>Your biometric data</h2>

<p>Biometric data used in fingerprint and facial recognition systems is indelible. It can be used in authoritative identity registers, featured on identity documents such as passports and driver licences.</p>

<p>It can be automatically <a href="http://unswlawjournal.unsw.edu.au/sites/default/files/04-mannsmith-advance-access-final.pdf">matched</a> with data collected from devices located in airports, bus and train stations, retail malls, court buildings, prisons, sports facilities and anywhere else we could park a networked camera.</p>

<p>Australia’s state and territory governments have built large biometric databases through registration of people as drivers – every licence has a photograph of the driver. The national government has built large databases through registration for <a href="http://www.border.gov.au/Trav/Visa/Biom">passports</a>, aviation/maritime <a href="http://barnoldlaw.blogspot.com.au/2011/06/identity-privacy-and-aviation-security.html">security</a> and other purposes.</p>

<p>Irrespective of your consent to uses beyond those for which the picture was taken, the governments now have a biometric image of most Australians, and the ability to search the images.</p>

<p>COAG <a href="https://www.coag.gov.au/meeting-outcomes/special-meeting-council-australian-governments-counter-terrorism-communique">announced</a> that the governments will share that data in the name of security.</p>

<h2>Sharing data with who?</h2>

<p>Details of the sharing are very unclear. This means we cannot evaluate indications that images will be captured in both <a href="http://www.abc.net.au/radio/programs/am/we-target-terrorists,-absolutely:-malcolm-turnbull/9013620">public and private places</a>. For example, in <a href="https://www.theregister.co.uk/2017/10/03/australian_pm_malcolm_turnbull_hints_at_surveillance_expansion/">retail malls</a> and libraries or art galleries – soft targets for terrorism – rather than in streets and secure buildings such as Parliament House.</p>

<p>Prime Minister Malcolm Turnbull has <a href="http://www.abc.net.au/radio/programs/pm/facial-recognition-is-not-mass-surveillance-turnbull/9020418">responded</a> to initial criticism by clarifying that matching will not involve “live” CCTV.</p>

<p>But the history of Australian surveillance law has been a matter of creep, with step-by-step expansion of what might initially have been an innocuous development. When will law enforcement agencies persuade their ministers to include live public or private CCTV for image matching?</p>

<p>We cannot tell which officials will be accessing the data and what safeguards will be established to prevent misuse. Uncertainty about safeguards is worrying, given the history of police and other officials inappropriately <a href="http://www.couriermail.com.au/news/queensland/crime-and-justice/police-file-of-netball-star-laura-geitz-allegedly-hacked/news-story/0076d999f36106167c97bdf446821baf">accessing</a> law enforcement databases on behalf of criminals or to <a href="http://www.canberratimes.com.au/act-news/former-afp-agent-pleads-guilty-to-using-restricted-police-system-to-stalk-exgirlfriend-20150603-ghfk7r.html">stalk</a> a former partner.</p>

<p>The sharing occurs in a nation where Commonwealth, state and territory privacy law is inconsistent. That law is weakly enforced, in part because watchdogs such as the Office of the Australian Information Commissioner (<a href="https://www.oaic.gov.au/">OAIC</a>) are <a href="http://www.austlii.edu.au/au/journals/UNSWLJ/2015/43.html">under-resourced</a>, threatened with <a href="http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/rp/BudgetReview201617/Office-AIC">closure</a> or have <a href="https://www.themandarin.com.au/78938-victoria-an-information-policy-backwater-privacy-commission-abolition-bill-passes/">clashed</a> with senior politicians.</p>

<p>Australia does not have a coherent enforceable right to privacy. Instead we have a threadbare patchwork of law (including an absence of a discrete privacy statute in several jurisdictions).</p>

<p>The new arrangement has been foreshadowed by governments over several years. It can be expected to creep, further eroding privacy and treating all citizens as suspects.</p>

<p>Software and hardware providers will be delighted: there’s money to be made by catering to our fears. But we should be asking some hard questions about the regime and questioning <a href="https://www.coag.gov.au/node/339">COAG’s statement</a>.</p>

<h2>Let’s avoid a privacy car crash</h2>

<p>Will sharing and expansion of the biometric network – a camera near every important building, many cameras on every important road – save us from terrorism? The answer is a resounding no. Biometrics, for example, seems unlikely to have saved people from the Las Vegas <a href="http://www.abc.net.au/news/2017-10-03/las-vegas-shooting3a-lives-changed-forever/9009768">shooter</a>.</p>

<p>Will sharing be cost effective? None of the governments have a great track record with major systems integration. The landscape is littered with projects that went over budget, didn’t arrive on time or were quietly killed off.</p>

<p>Think the recent <a href="https://theconversation.com/senate-committee-on-abs-censusfail-still-points-to-basic-failures-on-ibms-part-67672">Census</a> and <a href="https://theconversation.com/errors-in-centrelinks-debt-recovery-system-were-inevitable-as-in-all-complex-systems-71409">Centrelink</a> problems, and the billion dollar bust up known as the <a href="https://theconversation.com/new-name-and-opt-out-policy-wont-save-the-personal-health-record-41601">Personally Controlled Electronic Health Record</a>.</p>

<p>It won’t be improved by a new <a href="https://theconversation.com/lets-kill-the-australian-identity-card-zombie-once-and-for-all-71328">national ID card</a> to fix the <a href="https://www.theguardian.com/australia-news/2017/jul/06/medicare-data-breach-tax-office-suspends-cards-as-id-before-u-turn">Medicare</a> problem.</p>

<p>Is the sharing proportionate? One answer is to look at experience in India, where the Supreme Court has comprehensively <a href="http://barnoldlaw.blogspot.com.au/2017/08/aadhaar.html">damned</a> that nation’s ambitious <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2800835">Aadhaar</a> biometric scheme that was meant to solve security, welfare and other problems.</p>

<p>The Court – consistent with decisions in other parts of the world – condemned the scheme as grossly disproportionate: a disregard of privacy and of the dignity of every citizen.</p>

<p>Is sharing likely to result in harms, particularly as the biometric network grows and grows? The answer again is yes. One harm, disregarded by our opportunistic politicians, is that all Australians and all visitors will be regarded as suspects.</p>

<p>Much of the data for matching will be muddy – some <a href="http://www.aic.gov.au/publications/current%20series/rip/1-10/08/04.html">street cameras</a>, for example, are <a href="http://www.securitynewsdesk.com/safeguarding-your-surveillance-system-an-introduction-to-the-siqura-camera-health-check/">fine resting places for pigeons</a> – and of little value.</p>

<p>As with the mandatory metadata retention scheme, the more data (and more cameras) we have the bigger trove of indelible information for hackers. Do not expect the OAIC or weak state privacy watchdogs (which in some jurisdictions do not exist) to come to the rescue.</p>

<p>As a society we should demand meaningful consultation about official schemes that erode our rights. We should engage in critical thinking rather than relying on headlines that reflect political opportunism and institutional self-interest.</p>

<p><img loading="lazy" decoding="async" src="https://counter.theconversation.com/content/85179/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="display: none !important;" width="1" hidden="" height="1" />The incoherent explanation and clarifications should concern everyone, irrespective of whether they have <a href="http://www.news.com.au/national/politics/new-counterterror-laws-wont-strengthen-existing-measures-legal-expert/news-story/84bd45a9b568b9d3b7e35406af21c2e8">chosen to be on Facebook</a> – and even if they have nothing to hide and will never be mistaken for someone else.</p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/lets-face-it-well-be-no-safer-with-a-national-facial-recognition-database-85179">original article</a>.</p>

]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Assassination by pacemaker: Australia needs to do more to regulate internet-connected medical devices</title>
		<link>https://privacy.org.au/2017/09/10/assassination-by-pacemaker-australia-needs-to-do-more-to-regulate-internet-connected-medical-devices/</link>
		
		<dc:creator><![CDATA[Bruce Baer Arnold]]></dc:creator>
		<pubDate>Sun, 10 Sep 2017 03:27:47 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1312</guid>

					<description><![CDATA[Wireless medical devices need greater security than, say, an internet-connected fridge. We need to ensure that information provided by the devices is safeguarded and that control of the devices – implantable or otherwise – is not compromised. Australia's Therapeutic Goods Administration must learn to deal with software and cybersecurity, rather than simply bits of metal and plastic. <span class="excerpt-more"><a href="https://privacy.org.au/2017/09/10/assassination-by-pacemaker-australia-needs-to-do-more-to-regulate-internet-connected-medical-devices/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/bruce-baer-arnold-1408">Bruce Baer Arnold</a>, <em><a href="http://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a></em></span>

<p>In the future, people are going to be just a little bit cyborg. We’ve accepted hearing aids, nicotine patches and spectacles, <a href="https://www.embs.org/about-biomedical-engineering/our-areas-of-research/wearable-implantable-technologies/">but implanted</a> medical devices that are internet-connected present new safety challenges. Are Australian regulators keeping up?</p>

<p>A global recall <a href="https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm">of pacemakers</a> has sparked new fears and splashy headlines about hacked medical devices. But the next 20 years of medicine will normalise the use of intelligent implants to control pain, provide data for diagnostic purposes and supplement ailing organs, which means we need proper security as well as access in case of emergency.</p>

<p>Pharmaceuticals and medical devices in Australia are regulated by the <a href="https://www.tga.gov.au/tga-basics">Therapeutic Goods Administration</a> (TGA), an arm of the national Health Department.</p>

<p>Can we rely on Australia’s medical devices regime? Recurrent criticisms by parliamentary committees and government inquiries suggest the regulator may be struggling.</p>

<h2>The job of the TGA</h2>

<p>The TGA regulates medical devices such as stents, pacemakers, joint implants, <a href="https://theconversation.com/victims-of-faulty-breast-implants-were-let-down-by-the-tga-13074">breast implants</a>, and the controversial <a href="https://theconversation.com/vaginal-mesh-controversy-shows-collective-failure-of-the-tga-and-australias-specialists-78605">vaginal mesh</a> that has featured recently in the media (and a <a href="http://www.smh.com.au/national/pelvic-mesh-victims-blamed-by-asleep-at-wheel-health-system-inquiry-to-hear-20170719-gxehqv.html">Senate inquiry</a>) over claims it seriously injured patients.</p>

<p>The role of the TGA is vital, because defective devices can result in injury or death. They have a major cost for the public health system and affect patient quality of life. They often result in litigation, sometimes with <a href="http://www.reuters.com/article/us-johnson-johnson-verdict-hipimplants-idUSKBN13Q5XF">billion-dollar</a> <a href="http://www.abc.net.au/news/2016-03-31/class-action-over-defective-hip-replacements-settles-for-%24250m/7288350">settlements</a>.</p>

<p>In undertaking its mission, the TGA looks to information from <a href="https://www.theguardian.com/australia-news/2017/jul/10/johnson-johnson-tried-to-prevent-report-about-pelvic-mesh-devices-court-hears">manufacturers</a> and distributors, from overseas regulators and its <a href="https://www.tga.gov.au/publication/therapeutic-product-vigilance">own staff</a>.</p>

<p>Like counterparts such as the US <a href="https://www.youtube.com/watch?v=UVUHEtrbL7A">Food and Drug Administration</a>, TGA staff are under pressure to get products into the marketplace and reduce “<a href="https://www.tga.gov.au/sites/default/files/tga-business-plan-2016-17.pdf">red tape</a>”.</p>

<h2>The TGA and cybersecurity</h2>

<p>Wireless medical devices need greater security than, say, an internet-connected fridge. It is axiomatic that they must work.</p>

<p>We need to ensure that information <a href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">provided</a> by the devices is safeguarded and that control of the devices – <a href="https://spqr.eecs.umich.edu/papers/b1kohFINAL2.pdf">implantable</a> or otherwise – is not compromised.</p>

<p>To do that, we can use existing tools such as robust passwords, encryption and systems design. It also requires product vendors and practitioners to avoid negligence. Regulators must proactively foster and enforce standards.</p>

<p>Put simply, bodies like the TGA need to deal with software rather than simply bits of metal and plastic. It is unclear whether the TGA has the expertise or means to do so.</p>

<h2>Solutions, not panic</h2>

<p>The past decade has seen a succession of inquiries into the TGA, including the 2015 <a href="https://www.tga.gov.au/mmdr">Sansom Review</a> and 2012 Senate <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Community_Affairs/Completed_inquiries/2010-13/implants2012/report/index">PIP Inquiry</a>. Each has demonstrated that the TGA is not always <a href="https://theconversation.com/consumers-lose-out-as-tga-reform-turns-into-a-hot-potato-13383">keeping up</a> with its task.</p>

<p>Problems are ongoing: think defective joint implants, <a href="https://theconversation.com/victims-of-faulty-breast-implants-were-let-down-by-the-tga-13074">breast implants</a> and <a href="http://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Community_Affairs/MeshImplants">vaginal mesh</a>. But there are some potential paths towards improvement.</p>

<h4>Accountability</h4>

<p>One solution is to ensure the TGA is more accountable.</p>

<p>Currently, if someone wishes to bring a claim alleging a device was improperly permitted, the TGA has <a href="https://www.legislation.gov.au/Series/C2004A03952">immunity</a> from civil litigation about regulatory failure.</p>

<p>Removal of immunity will force it to focus on outcomes. That can be reinforced by giving it independence from the Department of Health, making it report direct to Parliament and ensuring the openness emphasised by the <a href="http://pandora.nla.gov.au/pan/141595/20130902-0954/www.health.gov.au/internet/ministers/publishing.nsf/Content/mr-yr10-ck-ck005d526.htm?OpenDocument&#038;yr=2010&#038;mth=11">Pearce Inquiry</a>.</p>

<h4>Regulatory capture</h4>

<p>Medical products regulation in Australia has been a matter of penny wise, pound poor. The TGA is <a href="https://www.tga.gov.au/cost-recovery-implementation-statement-2016-17">funded</a> by fees from the manufacturers and distributors that it regulates, in addition to some government funding.</p>

<p>It needs a discrete budget that recoups costs but is not dependent on companies that complain regulation is expensive. It needs enough resources to do its job well in the emerging age of the internet of things, including access to independent expertise regarding cybersecurity and devices.</p>

<h4>A device register</h4>

<p>How many devices have been implanted and how many removed? The lack of data about medical devices is a problem.</p>

<p>The government has so far not embraced recommendations for a comprehensive device register, one allowing timely identification of what was implanted and by whom.</p>

<p>Such a register would provide a means for determining problems with devices or medical practice. We need timely, consistent reporting of problems on a mandatory basis, as well as recall and <a href="http://pandora.nla.gov.au/pan/141595/20130902-0954/www.health.gov.au/internet/ministers/publishing.nsf/Content/mr-yr10-ck-ck005d526.htm?OpenDocument&#038;yr=2010&#038;mth=11">transparent</a> investigation of what went wrong.</p>

<h4>Disclosure of interests</h4>

<p>The inquiry into vaginal mesh revealed the WA Branch of Australian Medical Association had a <a href="http://www.watoday.com.au/wa-news/australian-medical-association-president-confirms-ama-was-role-in-pelvic-mesh-scandal-20170822-gy1hzj.html">financial interest</a> in a device that may have seriously affected numerous women.</p>

<p>There must be full disclosure of such interests, with meaningful sanctions where disclosure has not been made. This requires action by the TGA, professional bodies and the government.</p>

<h2>So, what about assassination by wireless pacemaker?</h2>

<p>The cybersecurity of medical devices is a matter for everyone.</p>

<p>We need the TGA to work with manufacturers, distributors and health professionals to mandate best practice. Should, for example, manufacturers and practitioners ensure that implants do not rely on default passwords that are easily <a href="https://www.fastcompany.com/3061323/brainjacking-or-how-hackers-can-remote-control-your-medical-implants">crackable</a>? What about access by emergency services?</p>

<p><img loading="lazy" decoding="async" src="https://counter.theconversation.edu.au/content/83357/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="display: none !important;" width="1" hidden="" height="1" />There is a fundamental need to develop and enforce a national safety standard regarding all wireless implants. For that we need thoughtful policy, not just headlines.</p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/assassination-by-pacemaker-australia-needs-to-do-more-to-regulate-internet-connected-medical-devices-83357">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
