Professional Documents
Culture Documents
M6 Listening Table AUS Minister For Home Affairs-1
M6 Listening Table AUS Minister For Home Affairs-1
A Conversation on Cybersecurity with the Hon. Karen Andrews MP, Australian Minister for
Home Affairs
Watch the video. As you listen, fill out the table below. Turn on the closed captions or open
the transcript if you need extra support while listening.
National Policies
What’s included in the “Surveillance Three-pronged approach:
Legislation Amendment Identify and Disrupting data to frustrate offenders,
Disrupt Act”? Collecting intelligence and taking control of
alleged offenders online accounts for the
puspose of gathering evidence
International Cooperation
How will the “Cloud Act Agreement” help Modernized approach to international data
the US and Australia work more efficiently access and trusted foreign partners. Giving
to combat cybercrime? them timely access to the evidence the
need to uphold the laws and to protect
communities as is right and proper
Source
A Conversation on Cybersecurity with the Hon. Karen Andrews MP, Australian Minister for Home Affairs.
https://www.youtube.com/watch?v=XdH615jENAI (19:50-28:50). Accessed 18 February 2022.
National Policies
What does the Telecommunications Sector Give the social capital to start a wider
have the authority to do? How will it benefit conversation about how citizen can
Australian citizens? improve their own safety online and also
can empower each and every citizen to
take their own cyber security seriously
Discuss
Describe one of the measures, policies, or agreements that you believe is relevant to
your region. Explain why it's relevant
Collecting intelligence and taking control of alleged offenders online accounts are the most
relevant. A lot of cases in our region such as defamation using their online account or social
media and to conduct investigation or to collect evidence that cases which is could be
human right violation if the authority use their online account. It will be very dificult if there
is no legislation or policies to collecting evidence. In order to collect evidence, online
account could be confiscated, but of course there must be procedure and permission to
take that action. With the confiscation of the account, efforts are made to not delete or
change the upload in question. Thus, the material requirements for the validity of the
evidence can be maintained, which includes information on the evidence that must be
accessible, displayed, guaranteed for its integrity, and can be accounted for. So, this pollicy
is very important to make new power for our law enforcement.