Showing 1 - 5 of 5
How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We...
Persistent link: https://www.econbiz.de/10012300503
This article examines developments regarding encryption law and policy within 'Five Eyes' (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically...
Persistent link: https://www.econbiz.de/10012292730
Computer Network Operations (CNOs) refers to government intrusion and/or interference with networked information communication infrastructures for the purposes of law enforcement and security intelligence. The following article explores how CNOs are lawfully authorised in Australia, and...
Persistent link: https://www.econbiz.de/10012164367
This article examines developments regarding encryption law and policy within 'Five Eyes' (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically...
Persistent link: https://www.econbiz.de/10012288493
In this paper we analyze some of the practical realities around deleting personal data on social networks with respect to the Canadian regime of privacy protection. We first discuss the extent to which Canadian privacy law imposes access, deletion, and retention requirements on data brokers....
Persistent link: https://www.econbiz.de/10014161478