iTnews
  • Home
  • News
  • Technology
  • Security

Pirate Party guns for cybercrime treaty

By Staff Writers on Mar 23, 2011 11:08AM
Pirate Party guns for cybercrime treaty

Human rights at risk from international crime fighters, says PPAu president Rodney Serkowski.

The Pirate Party of Australia has slammed the proposed international Cybercrime treaty as "fundamentally imbalanced" and likely to do more harm than good.

In submissions to the Attorney-General and the Joint Standing Committee on Treaties, the party said that although there was "no doubt" that issues such as copyright infringement, fraud, child pornography and network security offences addressed in the treaty needed airing, "serious flaws" in its wording meant Australia should reject it.

"Greater cross-border law enforcement co-operation is necessary however the Cybercrime Convention contains serious flaws that demand we reject the proposition that Australia should accede to this treaty," said Pirate Party president Rodney Serkowski (pictured).

"It is a fundamentally imbalanced treaty that detracts from the good intentions and benefits the treaty may carry within it."

Serkowski said freedoms should not be sacrificed to crime fighting. 

"We agree with the proposition that law enforcement require a coordinating mechanism to enable those agencies to tackle online criminal elements globally, however we should be very mindful that these mechanisms do not throw fundamental freedoms and respect for individual rights and democratic institutions to the wind.

"We do not accept that combating cybercrime must lead to erosion of fundamental protection of privacy and the protection of personal data."

Pirate Party acting secretary Simon Frew said the European experience showed a chilling of free expression as people were fearful of how their data would be used.

"The systematic monitoring of communications has a real effect on peoples' civil liberties and should not be implemented in Australia." Frew said.

The party submitted an earlier report to the Senate Privacy Inquiry on human rights and data retention.

Online civil rights organisation Electronic Frontiers Australia has also warned that the Cybercrime Treaty may violate the Privacy Act.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
cybercrimefrewmcclellandsecurityserkowskitreaty

Partner Content

The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Staff Writers
Mar 23 2011
11:08AM
0 Comments

Related Articles

  • Victorians lost $31.9 million to business email compromise in 2021
  • White House plans 30-country meeting on cybercrime and ransomware
  • Collins Foods puts IT focus on security controls, cloud services
  • OpenSSL subject to remote memory corruption
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.