McKell Cybersecurity Policy Luncheon

Join the McKell Institute for a panel and forum on data security, encryption and the Assistance and Access Act 2018. Panellists will speak about their involvement with the Bill and …

Security Planner

Hosted by the Citizen Lab, this tool asks a few simple questions to generate personalized online safety recommendations.

Open letter on the Terrorism Database

Digital Rights Watch has joined with dozens of organisations and academics in signing an open letter about the EU’s proposed Regulation on Preventing the Dissemination of Terrorist Content Online, and …

Defending Encryption

In December 2018, the Australian Parliament passed laws designed to compel device manufacturers and service providers to assist law enforcement in accessing encrypted information. Although apparently developed to allow government …

Charities welcome new electoral laws

The Hands Off Our Charities alliance has released the following statement on the Electoral Funding and Disclosure Reform Bill: Hands Off Our Charities welcomes the passing of this version of …

How much do political parties know about you?

Political parties know more about you than you may realise.Parties are looking for whatever edge they can get, and increasingly, that edge comes in the form of personal data. While …

Democratic processes trump Ministerial overreach

Image: Parliamentary Education Office

Privacy experts are calling on Prime Minister Scott Morrison and Home Affairs Minister Peter Dutton to respect democratic processes and stop attempting to coerce Parliament to push through increased law …

PJCIS hearings on Assistance and Access Bill

Featured Video Play Icon

Angus Murray, Dr Suelette Dreyfus and Justin Clacherty appear before the Australian Parliamentary Joint Committee on Intelligence and Security, to outline civil society concerns with the Telecommunications and Other Legislation …

Cyber attacks show need for robust encryption

Image: Brian Klug

Revelations by US, UK and Dutch authorities of the targeting of critical cyber systems and infrastructure by foreign nation state actors demonstrates the need for robust cybersecurity at all levels, …