Save Search

Note: Where available, the PDF/Word icon below is provided to view the complete and fully formatted document
Telecommunications (Interception and Access) Amendment Bill 2010

Bill home page  


Download WordDownload Word


Download PDFDownload PDF

6011

2008-2009

 

The Parliament of the

Commonwealth of Australia

 

THE SENATE

 

 

 

 

 

Telecommunications (Interception and Access) Amendment Bill 2009

 

 

(1)     Schedule 1, page 3 (line 14), after “network”, insert “, including:

                              (i)  measures to protect the technical integrity and security of the network such as intrusion detection or responding to denial of service attacks; and

                             (ii)  automatic monitoring to ensure network traffic operates as intended and any misconfiguration, failure or user error is readily identified and rectified; and

                            (iii)  automatic or manual copying or recording of communications for purposes such as quarantining, analysing and filtering for malicious content, virus and Trojan protection; and

                            (iv)  installation of automated solutions for network maintenance and protection;

                            but does not include activities not directly related to maintaining the technical integrity or security of the network, such as:

                             (v)  screening or altering the content of communications other than to remove malicious code; and

                            (vi)  monitoring the contents of communications other than to identify threats to the network; and

                           (vii)  gathering non-anonymised statistical usage information;”.

 [network protection duties]

(2)     Schedule 1, item 9 (line 19), before “For”, insert “(1)”.

[appropriate use]

(3)     Schedule 1, item 9 (line 25), after “conditions”, insert “relating to network security”.

[appropriate use]

(4)     Schedule 1, item 9 (after line 29), at the end of section 6AAA, add:

             (2)  The Minister may, by legislative instrument, determine guidelines to assist in the application of this section, including guidelines on the definition of network security.

 [appropriate use]

(5)     Schedule 1, item 15, page 6 (line 27), after “authority”, insert “that is not an appropriate use of the network”.

[appropriate use]

(6)     Schedule 1, page 8 (after line 9), after item 20, insert:

20A  Paragraph 79(1)(a)

After “restricted record”, insert “or a copy of a restricted record”.

20B  Paragraph 79(1)(b)

After “record”, insert “or copy”.

20C  Subsection 79(1)

After “record”, insert “or copy”.

[destruction requirements to include copies—general]

(7)     Schedule 1, item 21, page 8 (lines 12 and 13), omit subsection 79(3), substitute:

             (3)  This section does not apply to a restricted record to which section 79A applies.

[limits the application of section 79—existing requirements

continue to apply to records communicated to other agencies]

(8)     Schedule 1, item 22, page 8 (line 21), after “record”, insert “or a copy of the record”.

[destruction requirements to include copies—network operators]

(9)     Schedule 1, item 22, page 8 (line 29), after “record”, insert “or copy”.

[destruction requirements to include copies—network operators]

(10)   Schedule 1, item 22, page 9 (line 6), after “authority”, insert “that is not an appropriate use of the network”.

[appropriate use]