<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Monique Mann &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/monique-mann/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Wed, 14 Sep 2022 04:58:24 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>Monique Mann &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Report Launch: Securing Australian Journalism from Surveillance</title>
		<link>https://www.eventbrite.com.au/e/report-launch-securing-australian-journalism-from-surveillance-tickets-416496410977</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Wed, 14 Sep 2022 04:58:24 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[External Links]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=5119</guid>

					<description><![CDATA[Drawing upon interviews with 19 journalists and 2 media lawyers, Dr Diarmaid Harkin and Dr Monique Mann report on how whistle-blowers and sources are more reluctant to cooperate with journalists. Journalists also express “very low confidence” that they are prepared for the threats of electronic surveillance and experience a general lack of support on crucial matters of cyber-security. The implications for press freedom, democracy, and law reform will be explored. <span class="excerpt-more"><a href="https://www.eventbrite.com.au/e/report-launch-securing-australian-journalism-from-surveillance-tickets-416496410977">Read More</a></span>]]></description>
										<content:encoded><![CDATA[Drawing upon interviews with 19 journalists and 2 media lawyers, Dr Diarmaid Harkin and Dr Monique Mann report on how whistle-blowers and sources are more reluctant to cooperate with journalists. Journalists also express “very low confidence” that they are prepared for the threats of electronic surveillance and experience a general lack of support on crucial matters of cyber-security. The implications for press freedom, democracy, and law reform will be explored.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MEDIA RELEASE: Civil Society Submission to Surveillance Law Reform</title>
		<link>https://privacy.org.au/2022/02/08/media-release-civil-society-submission-to-surveillance-law-reform/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Tue, 08 Feb 2022 03:37:36 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4970</guid>

					<description><![CDATA[The Australian Privacy Foundation, Queensland Council of Civil Liberties and Liberty Victoria have made a detailed submission to the Reform of Australia’s electronic surveillance framework discussion paper.

We recognise the importance of ensuring security of Australians’ and their freedoms. The rationale for national security law comes from the importance of ensuring that freedoms are protected. We are concerned to ensure that the ‘forest isn’t lost for the trees’ in this reform process and that the guiding and predominant principle in this reform is that our national security framework serves to protect the freedoms that ought to be enjoyed by all Australians. <span class="excerpt-more"><a href="https://privacy.org.au/2022/02/08/media-release-civil-society-submission-to-surveillance-law-reform/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span>The </span><b>Australian Privacy Foundation, Queensland Council of Civil Liberties and Liberty Victoria </b><span>have <a href="https://privacy.org.au/wp-content/uploads/2022/02/080222_QCCL-APF-LIBERTY-VIC-Submission-to-Home-Affairs-Reform-of-Electronic-Surveillance-Framework.pdf">made a detailed submission</a> to the </span><a href="https://www.homeaffairs.gov.au/reports-and-publications/submissions-and-discussion-papers/reform-of-australias-electronic-surveillance-framework-discussion-paper"><span>Reform of Australia’s electronic surveillance framework discussion paper</span></a><span>.</span></p><p><span>We recognise the importance of ensuring security of Australians’ and their freedoms. The rationale for national security law comes from the importance of ensuring that freedoms are protected. We are concerned to ensure that the ‘forest isn’t lost for the trees’ in this reform process and that the guiding and predominant principle in this reform is that our national security framework serves to protect the freedoms that ought to be enjoyed by all Australians. <br /></span></p><p><span>Key points from the submission (<a href="https://privacy.org.au/wp-content/uploads/2022/02/080222_QCCL-APF-LIBERTY-VIC-Submission-to-Home-Affairs-Reform-of-Electronic-Surveillance-Framework.pdf">please see here for complete details</a>)</span><span>:</span></p><ul><li aria-level="1"><b>Time for Consultation with Experts, Stakeholders and the Community</b></li></ul><p><span>The timeframe for introduction of a Bill repealing the </span><i><span>Telecommunications (Interception and Access) Act 1979</span></i><span> (“the TIA”), the </span><i><span>Surveillance Devices Act 2004 </span></i><span>(“the SD Act”) and aspects of the </span><i><span>Australian Security Intelligence Organisation Act 1979 Act</span></i><span> (“the ASIO Act”) be delayed by at least twelve (12) months to allow for consultation with experts, stakeholders and the community. <br /></span></p><ul><li aria-level="1"><b>Compliant with Human Rights</b></li></ul><p><span>The objects of a simplified Act ought to be coupled with clear requirements that the use of national security and surveillance powers are expressly balanced with Australia’s obligations pursuant to international human rights law.</span></p><ul><li aria-level="1"><b>Warrants and Judicial Oversight </b></li></ul><p><span>Warrants for access to information should only be authorised by the Federal Court of Australia or a Supreme Court of a State or Territory. <br /></span></p><ul><li aria-level="1"><b>Decision Records of Judicial Authorisation</b></li></ul><p><span>A redacted form of judicial decision records for the issue of warrants ought to be published. Transparency, accountability and oversight of the operation of warrants is possible by publicizing the legal principles (rather than the specific facts) of warrants issued and would enhance public confidence in the oversight of such Australia’s electronic surveillance regime.</span></p><ul><li aria-level="1"><b>Revised Definition of ‘Communication’</b></li></ul><p><span>A simplified definition of communication could be introduced as “any exchange or record of information in any form between two or more locations”. This would ensure that the definition of ‘communication’ is widened, simplified and technology neutral.  This definition of communication would only be acceptable with an enhanced focused on the protection of human rights and with judicial oversight and increased reporting obligations. </span></p><p>&nbsp;</p><p><strong>Media Contacts:</strong></p><table style="width: 769px;"><tbody><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;"><span><strong>Monique Mann<br /></strong>Australian Privacy Foundation &amp; Liberty Victoria</span><br /></span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;"><span>0475 348 700</span></span></td><td style="width: 334px;">vicechair2@privacy.org.au</td></tr><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;"><strong>Angus Murry<br />Queensland Council for Civil Liberties<br /></strong></span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;"><strong><span>0405 715 427</span></strong></span></td><td style="width: 334px;"><span style="font-family: arial, helvetica, sans-serif;"><strong></strong></span></td></tr><tr><td style="width: 196px;" colspan="3"><p><span style="font-family: arial, helvetica, sans-serif;"><strong><span><a href="https://privacy.org.au/wp-content/uploads/2022/02/080222_QCCL-APF-LIBERTY-VIC-Submission-to-Home-Affairs-Reform-of-Electronic-Surveillance-Framework.pdf">Joint Submission in PDF format</a><br /></span></strong></span></p></td></tr></tbody></table><p><span> </span></p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Regulatory arbitrage and transnational surveillance: Australia’s extraterritorial assistance to access encrypted communications</title>
		<link>https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 03:58:47 +0000</pubDate>
				<category><![CDATA[External Links]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4405</guid>

					<description><![CDATA[This article examines developments regarding encryption law and policy within ‘Five Eyes’ (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically and internationally because of its extraterritorial reach, allowing the development of new ways for Australian law enforcement and security agencies to access encrypted telecommunications via transnational designated communications providers, and allowing for Australian authorities to assist foreign counterparts in both enforcing and potentially circumventing their domestic laws. We argue that Australia is the ‘weak link’ in the FVEY alliance as - unlike other FVEY members - has no comprehensive enforceable human rights protections. Given this, there is a possibility for regulatory arbitrage in exploiting these new surveillance powers to undermine encryption via Australia.  <span class="excerpt-more"><a href="https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial">Read More</a></span>]]></description>
										<content:encoded><![CDATA[This article examines developments regarding encryption law and policy within ‘Five Eyes’ (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically and internationally because of its extraterritorial reach, allowing the development of new ways for Australian law enforcement and security agencies to access encrypted telecommunications via transnational designated communications providers, and allowing for Australian authorities to assist foreign counterparts in both enforcing and potentially circumventing their domestic laws. We argue that Australia is the ‘weak link’ in the FVEY alliance as - unlike other FVEY members - has no comprehensive enforceable human rights protections. Given this, there is a possibility for regulatory arbitrage in exploiting these new surveillance powers to undermine encryption via Australia.  <span class="excerpt-more"><a href="https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial">Read More</a></span>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How [NOT] to earn public trust for the Contact Tracing App?</title>
		<link>https://privacy.org.au/2020/04/27/how-not-to-earn-public-trust-for-the-contact-tracing-app/</link>
					<comments>https://privacy.org.au/2020/04/27/how-not-to-earn-public-trust-for-the-contact-tracing-app/#comments</comments>
		
		<dc:creator><![CDATA[David Vaile]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 01:56:14 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4217</guid>

					<description><![CDATA[“This public health crisis is too important to risk a repeat of recent personal data disasters that undermined community trust in governments&#8217; use of IT. The last Census, council exploitation of metadata retention, ‘Robodebt’, laws undermining encryption, and compulsory registration for an empty My Health Record loom large in public memory. The way this app&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2020/04/27/how-not-to-earn-public-trust-for-the-contact-tracing-app/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: arial, helvetica, sans-serif;">“This public health crisis is too important to risk a repeat of recent personal data disasters that undermined community trust in governments&#8217; use of IT. The last Census, council exploitation of metadata retention, ‘Robodebt’, laws undermining encryption, and compulsory registration for an empty My Health Record loom large in public memory. The way this app has been released, with incomplete information, incomplete protections and no consultation, is very disappointing,” said David Vaile, chair of the Australian Privacy Foundation.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
&#8220;The limited information until Sunday was released by poorly-briefed Ministers with little understanding of the problem and of the proposed solution. Sunday’s incomplete documents raise more questions than they answer. Public trust has been undermined rather than earned. We need an open, independent Privacy Impact Assessment based on wide public and expert consultation,&#8221; said board member Dr Monique Mann.</span></p><h2><span style="font-family: arial, helvetica, sans-serif;">

What would be the basis for trust in an app like this?</span></h2><p><span style="font-family: arial, helvetica, sans-serif;">

APF recently encouraged the federal government to approach the proposed virus app in a way that supports, rather than undermines, trust and confidence in their bona fides and competence:</span><br /><span style="font-family: arial, helvetica, sans-serif;">

    </span></p><ol><li><span style="font-family: arial, helvetica, sans-serif;">Publish the <strong>Design Specifications</strong>, so many more than just &#8216;Five Eyes&#8217; can check them for effectiveness and vulnerabilities, and assess whether they are best practice ‘Privacy by Design’.</span></li><li><span style="font-family: arial, helvetica, sans-serif;">
    Conduct an <strong>open, independent Privacy Impact Assessment process, consulting</strong> not just public service and security interests, but appropriate representatives of the public interest from health, privacy, civil liberties, research and technical perspectives to help address all issues.</span></li><li><span style="font-family: arial, helvetica, sans-serif;">    Before a working prototype is released, publish <strong>Technical Details</strong>, including source-code, data model and communications protocols, to help review conformance with design and squash bugs.</span></li><li><span style="font-family: arial, helvetica, sans-serif;">    Do this <strong>before release</strong>, so serious concerns can be addressed and resolved before v1.0.</span></li></ol><p><span style="font-family: arial, helvetica, sans-serif;">
On Sunday afternoon the app was released, along with a regulatory direction and a PIA.
What score out of 4 did they get for releasing the virus app in a way worthy of trust?</span></p><ol><li><span style="font-family: arial, helvetica, sans-serif;">    <strong>No Design Specifications</strong>. <strong>&#8211; 0</strong></span></li><li><span style="font-family: arial, helvetica, sans-serif;">    A <strong><a href="https://www.health.gov.au/resources/publications/covidsafe-application-privacy-impact-assessment">Privacy Impact Assessment</a></strong> (PIA) dated Friday appeared on Sunday. It does not appear to have been conducted in a consultative fashion, just federal agencies talking to each other; nor to have involved a robust risk assessment on a quantitative basis. See comments below. <strong>&#8211;    0.5</strong></span></li><li><span style="font-family: arial, helvetica, sans-serif;">    No Technical Details except a brief undated flow illustration from the law firm doing the PIA. <strong>&#8211; 0.5</strong></span></li><li><span style="font-family: arial, helvetica, sans-serif;">    None of this available before the app was released, so there has been no opportunity to help spot and avoid <a href="https://www.abc.net.au/news/2020-04-26/coronavirus-tracing-app-covidsafe-apple-iphone-covid-19/12187448">overlooked mistakes</a>, unintended consequences or foreseeable risks. <strong>&#8211;    0</strong></span></li></ol><p><span style="font-family: arial, helvetica, sans-serif;">
So at best 1 out of 4. Not a promising start, however glossy the ads.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">While the absence of this key information makes further analysis of other material which was released more difficult and painstaking, it’s useful to look briefly at the PIA.</span></p><h2><span style="font-family: arial, helvetica, sans-serif;">
The PIA?</span></h2><p><span style="font-family: arial, helvetica, sans-serif;">
The Privacy Impact Assessment released Sunday is a dense 78 pages. It does not identify which version of the app it refers to. It was not done using ‘a rigorous risk assessment methodology to identify the magnitude of each of the identified risks’, so it is of limited use for any ‘necessity’ or ‘proportionality’ analysis (is level of risk worth the benefits)?</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
For outside input, the documents cited are mostly foreign material, none from the now-failed Singapore experiment from which the code apparently originated, and only two documents from Australia were mentioned. The only other outside input appears to be second hand, via Health, comments from two other federal agencies, OAIC and Australian Human Rights Commission (there is no longer an independent dedicated Privacy Commissioner). It is unacceptable that a PIA for a critical app that could affect every Australian and their attitude to trusting government at this time did not seek independent expert or community input.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
Most of the PIA is instead a painstaking analysis of formal legal compliance with the Australian Privacy Principles (APPs). The APPs have been weakened over the years to become a very complex wish list of permissive exceptions, loopholes, get-outs and exemptions. While necessary, privacy impact assessment needs to start with a close understanding of the actual impacts on and concerns of those affected by the proposal, and of those in an informed position to independently scrutinise the design and technical information. This has not been done.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
(NB: APP breaches are in any case not enforceable by Australians, since unlike NZ, UK, and most other countries, we still have no right to sue for breach of privacy. The only option is a complaint to the OAIC which has endured years of government attempts to abolish or nobble it. Complaints to OAIC need not be investigated, or decided, and decisions are rare and not enforceable. So if anything goes wrong, this is not a remedy which encourages trust.)</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
Apparent technical input last week from government-funded entities closely linked to security agencies may have contributed something, but for many Australians the continual encroachment of these surveillance agencies into our digital lives is part of the problem, so the fact that they have apparently found nothing they are concerned about offers little comfort, and may raise concerns for some.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
The PIA has 9 pages of recommendations. Without time for close analysis, without many of the core documents, and without the input from other outside entities to flush out the full range of issues, it is not possible to assess the degree to which they identify or remedy any of the problems which may arise from the app. Further inquiry is also needed to confirm what action will be taken on them, whether they would have real impact on the design or operational aspects of concern, and when anything will happen. For all its detail the PIA is flawed, somewhat reminiscent of the secretive Census 2016 PIA which failed to identify the problems or the nature and depth of public concern, and set the scene for controversy rather than trust.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">
This could be avoided by proper and open consultation, which APF joins many others in calling for, starting with the provision of the missing information.
</span></p><span style="font-family: arial, helvetica, sans-serif;">
<strong>Media Contacts for Australian Privacy Foundation board members:</strong></span><table style="width: 769px;"><tbody><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;">David Vaile</span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;">0414 731 249<br /></span></td><td style="width: 334px;"><span style="font-family: arial, helvetica, sans-serif;">chair@privacy.org.au</span></td></tr><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;"><strong>Monique Mann</strong></span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;"><strong>0475 348 700<br /></strong></span></td><td style="width: 334px;"><span style="font-family: arial, helvetica, sans-serif;"><strong></strong></span></td></tr><tr><td style="width: 196px;" colspan="3"><p><span style="font-family: arial, helvetica, sans-serif;"><strong><a href="https://privacy.org.au/wp-content/uploads/2020/04/MR-APF-COVID-200427.pdf">Press Release in PDF format</a><br /></strong></span></p></td></tr></tbody></table><p><span style="font-family: arial, helvetica, sans-serif;">
</span></p>]]></content:encoded>
					
					<wfw:commentRss>https://privacy.org.au/2020/04/27/how-not-to-earn-public-trust-for-the-contact-tracing-app/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>MEDIA RELEASE: How to earn public trust before the Contact Tracing App</title>
		<link>https://privacy.org.au/2020/04/23/media-release-how-to-earn-public-trust-before-the-contact-tracing-app/</link>
		
		<dc:creator><![CDATA[David Vaile]]></dc:creator>
		<pubDate>Thu, 23 Apr 2020 10:23:59 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4208</guid>

					<description><![CDATA[The Australian public is attracted by the idea of using technology to assist tracing contacts of people diagnosed with COVID-19. A proximity logging app is proposed.The Australian public, along with scientists and researchers around the world, are also very concerned about gifting future governments the power to impose contact tracing on the populace through the&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2020/04/23/media-release-how-to-earn-public-trust-before-the-contact-tracing-app/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: arial, helvetica, sans-serif;">The Australian public is attracted by the idea of using technology to assist tracing contacts of people diagnosed with COVID-19. A proximity logging app is proposed.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">The Australian public, along with scientists and researchers around the world, are also very concerned about gifting future governments the power to impose contact tracing on the populace through the use of apps, or having surveillance embedded within their mobile devices, as Apple and Google are proposing.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">The Australian Privacy Foundation (APF) argued today that the government must earn trust in its project, and avoid emotive marketing appeals to use the app before providing full information.</span></p><ul><li><span style="font-family: arial, helvetica, sans-serif;">The first requirement is publication of <strong>Design Specifications</strong>, so many more than just &#8216;Five Eyes&#8217;<br />can check them for both effectiveness and vulnerabilities, and assess whether they are best<br />practice for ‘Privacy by Design’.</span></li><li><span style="font-family: arial, helvetica, sans-serif;">The next essential is an open independent <strong>Privacy Impact Assessment process</strong>, consulting<br />not just within the public service and security interests, but with appropriate representatives of the<br />public interest from health, privacy, civil liberties and technical perspectives.</span></li><li><span style="font-family: arial, helvetica, sans-serif;">Once a working prototype exists, but before it is released, the <strong>Technical Details</strong> need to be<br />published, including source-code, data model and communications protocols, so that<br />conformance of the implementation with the design can be reviewed.</span></li></ul><p><span style="font-family: arial, helvetica, sans-serif;">“This public health crisis is too important to risk a repeat of recent personal data disasters that<br />undermined community trust in governments&#8217; use of IT. The last Census, council exploitation of<br />metadata retention, ‘Robodebt’, laws undermining encryption, and compulsory registration for an empty My Health Record loom large in public memory,” said David Vaile, chair of the Australian Privacy Foundation.<br />“One core concern is that, like the My Health Record, the app could creep from an &#8216;opt-in&#8217; consent arrangement to an effectively mandatory imposition. This could arise as simply as a demand for its use as a condition of entry to workplaces or shopping malls, or being out on the street. We need rock solid <a href="https://newsroom.unsw.edu.au/news/business-law/australia%E2%80%99s-covid-19-contact-tracing-app-must-not-be-pseudo-voluntary">legislative protection</a>,&#8221; said longstanding board member Prof Graham Greenleaf.</span></p><p><span style="font-family: arial, helvetica, sans-serif;">&#8220;The limited information to date has been released by poorly-briefed Ministers with little understanding of the problem and of the proposed solution. Public trust has been undermined rather than earned. We need an open, independent Privacy Impact Assessment based on wide consultation, and strong legal safeguards in place,&#8221; said board member Dr Monique Mann.</span></p><p><strong>Media Contacts for Australian Privacy Foundation board members:</strong></p><table style="width: 769px;"><tbody><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;">David Vaile</span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;">0414 731 249<br /></span></td><td style="width: 334px;"><span style="font-family: arial, helvetica, sans-serif;">chair@privacy.org.au</span></td></tr><tr><td style="width: 196px;"><p><span style="font-family: arial, helvetica, sans-serif;"><strong>Monique Mann</strong></span></p></td><td style="width: 239px;"><span style="font-family: arial, helvetica, sans-serif;"><strong>0475 348 700<br /></strong></span></td><td style="width: 334px;"><span style="font-family: arial, helvetica, sans-serif;"><strong></strong></span></td></tr><tr><td colspan="3"><p><span style="font-family: arial, helvetica, sans-serif;"><strong>Graham Greenleaf&#8217;s <a href="https://newsroom.unsw.edu.au/news/business-law/australia%E2%80%99s-covid-19-contact-tracing-app-must-not-be-pseudo-voluntary">paper for the UNSW Newsroom</a></strong></span></p><p><span style="font-family: arial, helvetica, sans-serif;"><strong> </strong></span></p></td></tr><tr><td style="width: 196px;" colspan="3"><p><span style="font-family: arial, helvetica, sans-serif;"><strong><span><a href="https://privacy.org.au/wp-content/uploads/2020/04/MR-COVID-19-200422.pdf">Press Release in PDF format</a><br /></span></strong></span></p></td></tr></tbody></table>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Report on the International Implications of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018</title>
		<link>https://privacy.org.au/2019/06/04/report-on-the-international-implications-of-the-telecommunications-and-other-legislation-amendment-assistance-and-access-act-2018/</link>
		
		<dc:creator><![CDATA[Dylan Ford]]></dc:creator>
		<pubDate>Mon, 03 Jun 2019 22:44:58 +0000</pubDate>
				<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3991</guid>

					<description><![CDATA[The Australian Privacy Foundation (“APF”), have prepared a report in response to the Telecommunications and Other Legislation Amendment Act (Assistance and Access) Act 2018 (Cth) (‘AA Act’), which amends the Telecommunications Act 1997 (‘TA’). In this report, we provide an analysis of the international ramifications of the AA Act, evaluating the legal obligations that could&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2019/06/04/report-on-the-international-implications-of-the-telecommunications-and-other-legislation-amendment-assistance-and-access-act-2018/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>The Australian Privacy Foundation (“APF”), have prepared a report in response to the Telecommunications and Other Legislation Amendment Act (Assistance and Access) Act 2018
(Cth) (‘AA Act’), which amends the Telecommunications Act 1997 (‘TA’). In this report, we provide an analysis of the international ramifications of the AA Act, evaluating the legal obligations that could be imposed upon “designated communication providers” offering services or systems that are accessible by Australian internet and telecommunications users. The report outlines how service providers located anywhere in the world could be compelled to develop technology to assist Australian security agencies to access encrypted information with very limited oversight, and how foreign governments may be able to use the legislation for their own investigatory purposes under the purview of a joint investigation with Australia.</p>
<p>The AA Act has wide implications for the international community as it has been enacted despite:<br />
</p><ul>
    <li>Vague and unclear limits on ill defined, wide reaching powers;</li>
    <li>Involving Australia’s enforcement of laws of foreign countries including countries with the death penalty or offences not recognised in Australia (lack of dual criminality);</li>
    <li>Limited transparency and a lack of detailed reports accessible to Australians seeking to assess threats impacting on their information security;</li>
    <li>The removal of judicial review; and,</li>
    <li>Enhanced capability for information sharing among ‘Five Eyes’ (intelligence services from Australia, New Zealand, Canada, the UK and the US) nations, with no effective protections from abuse or misuse due to a lack of human rights protections for Australians.</li>
</ul>
The full report can be read <a href="https://privacy.org.au/wp-content/uploads/2019/06/APF_AAAct_FINAL_040619.pdf">here</a>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Submission in response to the Human Rights and Technology Issues Paper</title>
		<link>https://privacy.org.au/2018/10/02/submission-in-response-to-the-human-rights-and-technology-issues-paper/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Tue, 02 Oct 2018 04:09:03 +0000</pubDate>
				<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3776</guid>

					<description><![CDATA[The Australian Privacy Foundation (“APF”), along with the Queensland Council for Civil Liberties (“QCCL”) and Electronic Frontiers Australia (“EFA”) have made a submission in response to the Human Rights and Technology Issues Paper released in July 2018. The rapid development of technology in the Australia human rights context requires careful consideration as technology can be&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/10/02/submission-in-response-to-the-human-rights-and-technology-issues-paper/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>The Australian Privacy Foundation (“APF”), along with the Queensland Council for Civil Liberties (“QCCL”) and Electronic Frontiers Australia (“EFA”) have made a submission in response to the Human Rights and Technology Issues Paper released in July 2018.</p><p>

The rapid development of technology in the Australia human rights context requires careful consideration as technology can be used for both the benefit and detriment of society. The lack of human rights legislation in Australia makes this consideration particularly important.</p><p>

It is our submission that many of the concerns contained in this submission may be able to be alleviated with an increased focused on human rights education and the introduction of a comprehensive and enforceable federal human rights legislative framework.
</p><p>
The APF, QCCL and EFA appreciate the Commissioner’s Issues Paper and the opportunity to provide this submission on this important issue.</p>
<p>The full submission can be read <a href="https://privacy.org.au/wp-content/uploads/2018/10/300918_APFQCCLEFA-Human-Rights-Commissioner-Issues-Paper-Submissions_FINAL.pdf">here</a></p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The devil is in the detail of government bill to enable access to communications data</title>
		<link>https://privacy.org.au/2018/08/17/the-devil-is-in-the-detail-of-government-bill-to-enable-access-to-communications-data/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 01:37:01 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3662</guid>

					<description><![CDATA[Monique Mann, Queensland University of Technology The Australian government has released a draft of its long awaited bill to provide law enforcement and security agencies with new powers to respond to the challenges posed by encryption. According to the Department of Home Affairs, encryption already impacts 90% of Australian Security Intelligence Organisation’s (ASIO) priority cases,&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/08/17/the-devil-is-in-the-detail-of-government-bill-to-enable-access-to-communications-data/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></span>

<p>The Australian government has released a draft of its long awaited <a href="https://www.homeaffairs.gov.au/about/consultations/assistance-and-access-bill-2018">bill</a> to provide law enforcement and security agencies with new powers to respond to the challenges posed by <a href="https://theconversation.com/worried-your-emails-might-be-spied-on-heres-what-you-can-do-66574">encryption</a>.</p>

<p>According to the <a href="https://www.homeaffairs.gov.au/consultations/Documents/explanatory-document.pdf">Department of Home Affairs</a>, encryption already impacts 90% of Australian Security Intelligence Organisation’s (ASIO) priority cases, and 90% of data intercepted by the Australian Federal Police. The measures aim to counteract estimates that communications among terrorists and organised crime groups are <a href="https://www.homeaffairs.gov.au/about/consultations/assistance-and-access-bill-2018">expected</a> to be entirely encrypted by 2020.</p>

<p>The Department of Home Affairs and ASIO <a href="https://www.homeaffairs.gov.au/consultations/Documents/explanatory-document.pdf">can</a> already access encrypted data with specialist decryption techniques – or at points where data are not encrypted. But this takes time. The new bill aims to speed up this process, but these broad and ill-defined new powers have significant scope for abuse.</p>

<p>The Department of Home Affairs <a href="https://www.homeaffairs.gov.au/consultations/Documents/explanatory-document.pdf">argues</a> this new framework will not compel communications providers to build systemic weaknesses or vulnerabilities into their systems. In other words, it is not a backdoor.</p>

<p>But it will require providers to offer up details about technical characteristics of their systems that could help agencies exploit weaknesses that have not been patched. It also includes installing software, and designing and building new systems.</p>

<h2>Compelling assistance and access</h2>

<p>The draft <a href="https://www.homeaffairs.gov.au/consultations/Documents/the-assistance-access-bill-2018.pdf">Assistance and Access Bill</a> introduces three main reforms.</p>

<p>First, it increases the obligations of both domestic and offshore organisations to assist law enforcement and security agencies to access information. Second, it introduces new computer access warrants that enable law enforcement to covertly obtain evidence directly from a device (this occurs at the endpoints when information is not encrypted). Finally, it increases existing powers that law enforcement have to access data through search and seizure warrants.</p>

<p>The bill is modelled on the UK’s <a href="http://www.legislation.gov.uk/ukpga/2016/25/contents/enacted">Investigatory Powers Act</a>, which introduced mandatory decryption obligations. Under the UK Act, the UK government can order telecommunication providers to remove any form of electronic protection that is applied by, or on behalf of, an operator. Whether or not this is technically possible is another question.</p>

<p>Similar to the UK laws, the Australian bill puts the onus on telecommunication providers to give security agencies access to communications. That might mean providing access to information at points where it is not encrypted, but it’s not immediately clear what other requirements can or will be imposed.</p>

<p>For example, the bill allows the <a href="https://www.asio.gov.au/director-general-security.html">Director-General of Security</a> or the chief officer of an interception agency to compel a provider to do an unlimited range of <em>acts or things</em>. That could mean anything from removing security measures to deleting messages or collecting extra data. Providers will also be required to conceal any action taken covertly by law enforcement.</p>

<p>Further, the <a href="https://www.australia.gov.au/directories/australia/attorney-generals">Attorney-General</a> may issue a “technical capability notice” <em>directed towards ensuring that the provider is capable of giving certain types of help</em> to ASIO or an interception agency.</p>

<p>This means providers will be required to develop new ways for law enforcement to collect information. As in the UK, it’s not clear whether a provider will be able to offer true end-to-end encryption and still be able to comply with the notices. Providers that breach the law risk facing $10 million fines.</p>

<h2>Cause for concern</h2>

<p>The bill puts few limits or constraints on the assistance that telecommunication providers may be ordered to offer. There are also concerns about transparency. The bill would make it an offence to disclose information about government agency activities without authorisation. Anyone leaking information about data collection by the government – as Edward Snowden did in the US – could go to jail for five years.</p>

<p>There are limited oversight and accountability structures and processes in place. The Director-General of Security, the chief officer of an interception agency and the Attorney-General can issue notices without judicial oversight. This differs from how it works in the UK, where a specific judicial oversight regime was established, in addition to the introduction of an Investigatory Powers Commissioner.</p>

<p>Notices can be issued to enforce domestic laws and assist the enforcement of the criminal laws of foreign countries. They can also be issued in the broader interests of national security, or to protect the public revenue. These are vague and unclear limits on these exceptional powers.</p>

<p>The range of services providers is also extremely broad. It might include telecommunication companies, internet service providers, email providers, social media platforms and a range of other “<a href="https://www.techopedia.com/definition/29145/over-the-top-application-ott">over-the-top</a>” services. It also covers those who develop, supply or update software, and manufacture, supply, install or maintain data processing devices.</p>

<p>The enforcement of criminal laws in other countries may mean international requests for data will be funnelled through <a href="http://journals.sagepub.com/doi/abs/10.1177/1748048518757141">Australia as the “weakest-link”</a> of our Five Eyes allies. This is because Australia has no enforceable human rights protections at the federal level.</p>

<p>It’s not clear how the government would enforce these laws on transnational technology companies. For example, if Facebook was issued a fine under the laws, it could simply withdraw operations or refuse to pay. Also, $10 million is a drop in the ocean for companies such as Facebook whose <a href="https://www.prnewswire.com/news-releases/facebook-reports-fourth-quarter-and-full-year-2017-results-300591468.html">total revenue last year</a> exceeded US$40 billion.</p>

<h2>Australia is a surveillance state</h2>

<p>As I have <a href="https://www.policyforum.net/undermining-encryption-wont-work-police-enough-powers-anyway/">argued elsewhere</a>, the broad powers outlined in the bill are neither necessary nor proportionate. Police already have existing broad powers, which are further strengthened by this bill, such as their ability to covertly <a href="https://theconversation.com/spyware-merchants-the-risks-of-outsourcing-government-hacking-80891">hack devices</a> at the endpoints when information is not encrypted.</p>

<p>Australia has limited human rights and privacy protections. This has enabled a constant and steady expansion of the powers and capabilities of the surveillance state. If we want to protect the privacy of our communications we must <a href="https://secureaustralia.org.au/">demand</a> it.</p>

<p>The <em>Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018</em> (Cth) is still in a draft stage and the Department of Home Affairs invites public comment up until 10th of September 2018. Submit any comments to assistancebill.consultation@homeaffairs.gov.au.</p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/the-devil-is-in-the-detail-of-government-bill-to-enable-access-to-communications-data-96909">original article</a>.</p>

<!-- Below is The Conversation's page counter <img> tag, which we are required to include as per their republishing guidelines -<span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"> </span> More information about this can be found at https://theconversation.com/au/republishing-guidelines - Please DO NOT REMOVE. -->
<img decoding="async" src="https://counter.theconversation.com/content/96909/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" height="1" width="1" />
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australian Privacy Foundation provides background brief on all the privacy omnishambles to UN Special Rapporteur on Privacy</title>
		<link>https://privacy.org.au/2018/08/15/australian-privacy-foundation-provides-background-brief-on-all-the-privacy-omnishambles-to-un-special-rapporteur-on-privacy/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Wed, 15 Aug 2018 06:46:32 +0000</pubDate>
				<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3616</guid>

					<description><![CDATA[The Australian Privacy Foundation has prepared a background brief on all the privacy omnishambles at the request of the UN Special Rapporteur on Privacy Professor Joseph Cannataci. This request arose following a meeting of civil society representatives in Sydney in late July 2018, where issues of privacy in Australia were discussed. In the brief, we&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/08/15/australian-privacy-foundation-provides-background-brief-on-all-the-privacy-omnishambles-to-un-special-rapporteur-on-privacy/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>The Australian Privacy Foundation has prepared a background brief on all the privacy omnishambles at the request of the UN Special Rapporteur on Privacy Professor Joseph Cannataci. This request arose following a meeting of civil society representatives in Sydney in late July 2018, where issues of privacy in Australia were discussed.
</p><p>
In the brief, we first provide an overview of some of the systemic issues in Australia’s human rights and privacy framework, followed by an examination of some of the recent symptomatic manifestations of these systemic issues. We conclude the brief with a list of key recommendations for the UN Special Rapporteur on Privacy to consider in the Australian context.</p>
<a href="https://privacy.org.au/wp-content/uploads/2018/08/Privacy-in-Australia-Brief.pdf">A copy of the brief can be downloaded here</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>APF joins a coalition of human rights groups and experts in calling on the Australian government to protect encryption</title>
		<link>https://privacy.org.au/wp-content/uploads/2018/07/Australia-Encryption-Coalition-Letter.pdf</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Tue, 17 Jul 2018 04:11:36 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3231</guid>

					<description><![CDATA[Today, the Australian Privacy Foundation joins with Electronic Frontiers Australia, Digital Rights Watch, Future Wise, and other domestic and international human rights organisations in asking the Australian government to not pursue legislation undermining encryption, and other tools, policies and technologies critical to protecting individual rights. The 76 organisations, companies, and individuals signatory to this open letter call on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era.

This letter was been initiated by global digital rights organisation Access Now. “Australia is facing a choice on cybersecurity and encryption: real security or false,” said Nathan White, Senior Legislative Manager at Access Now. “The country can either be the testing ground for policies that undermine privacy and security in the digital era, or it can be a champion for human rights, leveraging its relationships to raise cybersecurity standards for the next generation. The world is watching.” <span class="excerpt-more"><a href="https://privacy.org.au/wp-content/uploads/2018/07/Australia-Encryption-Coalition-Letter.pdf">Read More</a></span>]]></description>
										<content:encoded><![CDATA[Today, the Australian Privacy Foundation joins with Electronic Frontiers Australia, Digital Rights Watch, Future Wise, and other domestic and international human rights organisations in asking the Australian government to not pursue legislation undermining encryption, and other tools, policies and technologies critical to protecting individual rights. The 76 organisations, companies, and individuals signatory to this open letter call on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era.

This letter was been initiated by global digital rights organisation Access Now. “Australia is facing a choice on cybersecurity and encryption: real security or false,” said Nathan White, Senior Legislative Manager at Access Now. “The country can either be the testing ground for policies that undermine privacy and security in the digital era, or it can be a champion for human rights, leveraging its relationships to raise cybersecurity standards for the next generation. The world is watching.”



]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
