• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TechEngage®

Connecting mankind with technology

  • News
  • Reviews
  • Cryptocurrency
  • How-to
  • Roundups
  • Science
    • Energy
    • Environment
    • Health
    • Space
  • Apps
  • More
    • Opinion
    • Noteworthy
    • Culture
    • Events
    • Deals
    • Startups
      • Startup Submissions
  • Videos
  • Tools

The new Australian encryption law is alarming

Areen Zahra Areen Zahra Follow Areen Zahra on Twitter December 12, 2018

New encryption law in Australia is alarming
FacebookTweetPinLinkedInPrintEmail

The Australian government has passed a law that gives Australian law enforcement agencies, every right to access users’ encrypted data. The law bounds the technology companies operating in or out of Australia to reveal the encrypted data for the users present in Australia.

Last week, the Australian government signed a bill that allows the law enforcement agencies to get every encrypted data of users from the technology companies. This law was introduced under the Telecommunications and Other Legislation Amendment Bill 2018. This bill has successfully received assent from both the houses and is applicable as a law.

Under this Bill, the technology companies are bound to cooperate with the Australian law enforcement Agencies to give them access to the user’s encrypted messages and other data. The technology companies that are forced to abide by this law does not necessarily belong to Australia. It could be any company, website or any entity that has an end user located in Australia. No matter from where the company operates in the world.

Also, it doesn’t necessarily need to be a company or an organization; it could be any individual designated as a communication provider. A communication provider can be anyone who is the provider for an electronic service which has either one or more users in Australia. Also, the person who develops, supplies or updates any software that was used, is being used or is likely to be used in Australia in connection to:

  • A carriage service that is listed.
  • An electronic service having one or more users in Australia.

The approval of this bill has led the entire definition of Systemic Vulnerability and Systemic weakness to change in the legislation. As the notice cannot force a service provider to build up a decryption possibility or make the system security less effective so that a third party can get on-demand access to the user’s data for whatever reasons. The new definition in the legislation are:

  • Systemic vulnerability means a vulnerability that affects a whole class of technology but does not include a vulnerability that is selectively introduced to one or more target technologies that are connected with a particular person. For this purpose, it is immaterial whether the person can be identified.
  • Systemic weakness means a weakness that affects a whole class of technology but does not include a weakness that is selectively introduced to one or more target technologies that are connected with a particular person. For this purpose, it is immaterial whether the person can be identified.

The three notices that can be generated are:

  1. Technical Assistance Notice: These notices are sent to companies that can avoid encryption, give access to user logs or decrypt the given messages. These are essentials and any entity refusing to this can be penalized financially.
  2. Technical Capability Notices: These notices urge the companies to modify, redesign or build infrastructures that allow law enforcement agencies to have access to the users’ data.
  3. Technical Assistance Requests: These are the voluntary ones, which means that they won’t be penalized in case they refuse to provide data. However, they have to fulfill the mandatory requests according to the rules which include an inclusion to insight reports.

This law has been enforced as a dire need to protect child abuse and keep an eye on the terrorist activities. However, a lot of statements in the bill are not explanatory enough and have left the room to diversify the meaning and implementation of this law, which is alarming!

As of now, the bill has been unanimously passed and became a law, and can be implemented anytime by any law enforcement agency in the country. However, the independent National Security Legislation will monitor the implementation of the law till 2020 and can anytime ask for a review of its effectiveness and implementation.

Filed Under: Security Tagged With: Australia, Encryption, Law, Legal

Related Stories

  • Hackers are using an unpatched flaw to attack Windows 10 users

    Hackers are using an unpatched flaw to attack Windows 10 users

  • NASA got hacked, says hackers stole employee information

    NASA got hacked, says hackers stole employee information

  • 4 most popular social media apps and the security risks associated with them

    4 most popular social media apps and the security risks associated with them

FacebookTweetPinLinkedInPrintEmail

About Areen Zahra

IT professional and a passionate writer who enjoys putting my love of technology into words for a general audience.

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or published anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Become a contributor

We are accepting contributor applications. All applications will be decided in 3 days after applying. To learn more visit the contributors page.
TextSheet Alternative

6 Top Alternatives to Textsheet for 2025

Muhammad Zeshan Sarwar October 5, 2024

battery draining apps

Top 10 battery draining apps to avoid 2025

Muhammad Abdullah October 5, 2024

Recent Stories

  • 6 Top Alternatives to Textsheet for 2025
  • Top 10 battery draining apps to avoid 2025
  • The Benefits of Having a Small Air Compressor for Flat Tires
  • 4 Best Free VPNs for 2025
  • 9 Best Calendar Apps in 2025

Discover

  • About us
  • Newsroom
  • Staff
  • Advertise
  • Send us a tip
  • Startup Submission Questionnaire
  • Brand Kit
  • Contact us

© 2025 TechEngage®. All Rights Reserved. TechEngage® is a project of TechAbout LLC.

TechEngage® is a registered trademark in the United States under Trademark Number 6823709 and in the United Kingdom under Trademark Number UK00003417167. It is also ISSN protected under ISSN 2690-3776 and has OCLC Number 1139335774.

  • Terms & Conditions
  • Privacy Policy