A-G's Dept hides names of telcos in data retention probe

Powered by SC Magazine
 

Identities stay secret.

The Attorney-General's Department has reneged on revealing the identities of telcos that participated in early data retention consultations in 2009.

The department had left the door open to disclosing the identity of "commercial participants" at the consultation meetings during a Senate Estimates hearing on May 29.

Details of those consultations were first revealed under Freedom of Information earlier this year.

Greens Senator Scott Ludlam used the most recent Senate Estimates to seek more details of the consultations.

Assistant secretary of telecommunications and surveillance law branch of the Attorney-General's department — and the consultation lead — Catherine Smith had told the committee she had no problem with providing on notice the names of commercial participants of the meetings.

But in answers to questions on notice the Department said it would not disclose any names.

"While it was suggested that the Department may be able to provide the names of commercial participants, on reflection it is considered that identifying the private sector organisations that participated would jeopardise industry's willingness to participate in further consultative forums," it said. (pdf)

Copyright © iTnews.com.au . All rights reserved.


A-G's Dept hides names of telcos in data retention probe
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 624

Vote