Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Australia Leads with Controversial Cyber Laws
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Australia Leads with Controversial Cyber Laws

4 years ago Tripwire Guest Authors
Australia Leads with Controversial Cyber Laws

The Australian government is looking to pass the Security Legislation Amendment (Critical Infrastructure) Bill 2020, an overhaul which is aimed to help Australian businesses fend off cyberattacks. The Bill expands the business sectors that were previously defined as critical infrastructure by adding, amongst others, Food and Grocery, Finance and Banking, Universities, Communications, Defense, Energy, and Transportation to the list. It would also impose strict 12-hour reporting requirements for cyberattacks as well as allow the Australian Signals Directorate to ‘step in’ to protect networks during or following a significant cyberattack.

In a letter to a member of the Australian Parliament, the Information Technology Industry Council, the Australian Information Industry Association, and the Cybersecurity Coalition, which represent multiple technology firms including  Google, Microsoft, Intel, Adobe, and Amazon, said, “Without significant revision, the Bill will create an unworkable set of obligations and set a troubling global precedent.” Also, “We are also concerned by the global impact that such a Bill will have and how it undermines the values that Australia promotes internationally.” The letter goes on to declare that, “This undermines the government’s good work internationally on these issues and sets a disturbing precedent for other governments facing similar national security challenges”.

Government Intervention or Market Systems

This is not the only instance of Australia setting a global precedent in opposition to technology leaders. In early 2021, Australia became the first country to require Facebook and Google to pay for news content provided by media companies under a royalty-style system. In her statement to the Senate Economics Committee, Melanie Silva, managing director of Google Australia and New Zealand, said, “in its current form, the Code remains unworkable.” “The principle of unrestricted linking between websites is fundamental to Search. Coupled with the unmanageable financial and operational risk if this version of the Code were to become law it would give us no real choice but to stop making Google Search available in Australia.”

In response to that proposed digital media law, Facebook removed news content from Australian users. This lasted a full week before Facebook stated that “it had been reassured by recent discussions with the Australian government” and would restore news content to its users in Australia. It looks increasingly likely that Australia’s critical infrastructure overhaul will unfold in a similar way with the three industry bodies stating that “the Bill remains highly problematic and largely unchanged despite extensive feedback from our organizations.”

While the Australian government claims that the power to forcibly enter networks would be used only as a last resort, tech groups are concerned this provides “unprecedented and far-reaching powers, which should be subject to a statutorily prescribed mechanism.” The industry bodies have also been critical of the reporting deadlines. Stating that these should be extended from “within 12 hours” to “at least 72 hours” or “without undue delay.”

What Does This All Mean

The Bill is unlikely to become law as it is drafted. A bipartisan Bill with similar requirements, the Infrastructure Investment and Jobs Act, recently passed the U.S. Senate. This Bill, while not for critical infrastructure organizations that already have strict 12-hour reporting requirements to the Department of Homeland Security, would afford more reasonable reporting requirements of 24-hours and the continued sharing of information for 72-hours after the breach is reported. The legislation includes the provision of a secure mechanism allowing the government to receive these reports within 180 days as well as liability protections for businesses that come forward with data breach reports, exempting them from lawsuits. Such considerations are not appropriately encapsulated in the Australian Bill.

If the Australian government attempts to progress without genuinely considering and addressing issues shared by the tech industry, it is likely that we will see similar push-back from these bodies and subsequent closed-door negotiations. Inevitably, the two parties – government and tech – will meet somewhere in the middle, with the government possibly extending the reporting deadlines and agreeing to more conservative directives around if, when, and how they will enter networks. As a consequence of any concessions, the government could seek to impose larger fines and the loss of government contracts for organizations that fail to comply with reporting requirements. It could also compound the fines against businesses that it deems to have failed to be proactive with their cyber security.


About the Author: Jack Lindsay’s primary focus is on management, sales, and technology issues in industry focusing on software and security. Jack brings expertise in learning, coaching, and software options at every level to ensure the company is successful at people, strategy, execution, and finance.

When Jack isn’t working, he is a Board member at the women’s international cycling union (The Cyclists’ Alliance), contributor to various cycling websites, hockey player in the Bundesliga, and involved in various InfoSec and FinTech conferences.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Australia Leads with Controversial Cyber Laws” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Critical Severity, Encryption, Facebook, Finance, Google, Goverment, Medium Severity, Microsoft, TripWire

Continue Reading

Previous Canadian Ransomware Arrest Is a Meaningful Flex, Experts Say
Next Russia Blocks Tor Privacy Service in Latest Censorship Move

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)

Recent Posts

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT