Swiss Hacktivist was raided at the request of U.S. authorities for data theft and then publishing what was hacked.
Amazon has a special website that sets out its impact. The focus is on the impact of Amazon in the U.S. It is hard to find out what positive impact Amazon is having in Australia.
If you contract with AWS on their standard terms, unless you are located in one of a few listed countries, you are agreeing to U.S. law for the contract, and having to go to the U.S. for any disputes.
"Governing Laws" and “Governing Courts” mean, for each AWS Contracting Party, the laws and courts set forth in the following table: see https://aws.amazon.com/agreement/. I guess that provides jobs for U.S. lawyers!
The Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 has been subject to criticism It allows the government to hack into computers of people they think are bad people. Could innocent bystanders be impacted, just like when Microsoft did protective hacking about 8 years ago? See https://www.csoonline.com/article/2449572/microsoft-hammers-no-ip-collateral-damage-includes-hacking-teams-legal-malware.html
Details of the Bill are here:
The Law Council has released a 150 page criticism of the Bill.
Judge Robert Katzmann in a recent case wrote a 35-page dissent to part of the ruling, arguing that Facebook’s algorithmic recommendations shouldn’t be covered by the legal protections of Section 230.
Late last year, the U.S. Supreme Court rejected a call to hear a different case that would have tested the Section 230 shield. In a statement attached to the court’s decision, Justice Clarence Thomas called for the court to consider whether Section 230’s protections had been expanded too far, citing Judge Katzmann’s opinion.
Justice Thomas said the court didn’t need to decide in the moment whether to rein in the legal protections. “But in an appropriate case, it behooves us to do so,” he said.
It is hard to have a bad website taken down. In Australia, if the bad website is involved in copyright infringement, it is possible to have all Australian ISPs block the bad website, in effect making it disappear from the Internet as far as Australians are concerned.
That happened in recent Federal Court case, brought against Telstra and every other ISP in Australia, by a company that appears to operate a website for escort services. Someone hacked their website and made copies of it. The Federal Court blocked the copycat websites, using Section 115A of the Copyright Act.
See Gardner Industries Pty Ltd as trustee for the S M Gardner Family Trust v Telstra Corporation Limited  FCA 294 (25 March 2021) (Greenwood J)
Who really runs the Internet? A lot of companies you rarely hear about. A good article about the Internet and hate speech in the Washington Post.
A lawyer who is trying to track down the person who posted a bad review of her lost an application against Google, seemingly on the basis that she did not follow court proper procedures.
From The Age: Gangland lawyer Zarah Garde-Wilson says she will take a court fight directly to Google after the Federal Court dismissed her bid to force the search engine giant to reveal who was behind negative online reviews.
The Australian Privacy Commission made an award compensating individuals for non-economic loss for a privacy law breach. This was a first in Australia.
See https://www.oaic.gov.au/assets/privacy/privacy-decisions/privacy-determinations/WP-and-Secretary-to-the-Department-of-Home-Affairs-Privacy-2021-AICmr-2-11-January-2021.pdf and https://www.kwm.com/en/au/knowledge/insights/privacy-commissioner-hands-down-first-representative-award-20210203
The decision requires the Department of Home Affairs to compensate over 1,200 asylum seekers for inadvertently publishing their personal information online in 2014.
It is somewhat amazing that this case took seven years to reach this stage.
In response to the proliferation of ransomware attacks over the last five years, a series of United States Executive Orders and statutes have come to include cyberterrorists amongst the list of banned individuals with whom U.S. persons cannot conduct financial transactions. This impacts payments to cybercriminals for ransomware attacks.
There is a detailed article from a U.S. law firm here, that sets out when payment of a ransom could lead to breach of U.S. law. See https://www.friedfrank.com/siteFiles/Publications/NYLJ_03.05.21_Kleinman.pdf
Justice Keane of the High Court of Australia gave a speech at the end of 2020 that discussed privacy.
It was titled; "Too Much Information: civilisation and the problems of privacy" and argued that relying upon judicial development of the law to solve the problem of privacy "has been, at best, a hit and miss affair".
Justice Keane said it "would not be surprising were the High Court now to accept a tort of invasion of privacy" along U.S. lines.
"But such a cause of action would probably be confined to cases of intentional intrusion, physically or otherwise, upon the solitude or seclusion of an individual or his or her private affairs.
"In the case of the publicising of a matter concerning the private life of an individual, the conduct would be actionable if the matter publicised is of a kind that would be highly offensive to a reasonable person and is not of legitimate concern to the public."
He noted that in the recent High Court case involving the Australian Federal Police raid on the home of journalist Annika Smethurst the media "carefully eschewed any attempt to press forward . . . towards a broader protection of privacy". (I suspect that the media did not want to expand the right of privacy in Australia even though it may have been helpful in this case - because the media since at least 1890 has been the subject of negative criticism regarding the media's lack of respect of privacy rights.)
Text of Keene J's Speech: https://cdn.hcourt.gov.au/assets/publications/speeches/current-justices/keanej/keanej27Aug2020.pdf
The Australian Government is implementing "Critical Infrastructure reforms". The consultation process for the new laws is being managed by the Critical Infrastructure Centre which is part of the Department of Home Affairs.
The CIC is currently assessing implementation of the governance rules to accompany the to-be-amended Security of Critical Infrastructure Act 2018 (Cth) at a broad, industry-neutral level. The CIC is intending these rules to provide an overview of the role industry will play in self-assessment and self-reporting, with the specific rules and obligations around assessment standards to come from later consultations.
At a high-level, materials made available by CIC set out CIC’s intention for the governance rules including a breakdown of the intention behind specific provisions in the draft Bill.
- The Bill is not anticipated to pass until mid-2021 – while not all industry-specific rules may be finalised at that stage, consultation should be almost complete by then.
- Consultation with industry is happening on sequential basis – Electricity and Gas sectors are to start consultation in late March/early April 2021, and then other industries will each have a consultation period one after another.
- The consultation timeline will be quite aggressive – the governance rules are in consultation this week for publication in late March.
- The obligations will not activate immediately on enactment of the Bill, and are instead taking a ‘switch on’ approach. The CIC is vague on what the triggers for ‘switching on’ will be and it is not clear if it was an industry-wide event, whether it was incident-based or whether it would occur from a certain point.
Virginia in the USA recently passed a new privacy law.
A US law firm note is here: https://communications.willkie.com/103/1291/uploads-(icalendars-pdf-documents)/virginia-is-the-new-privacy-leader-what-s-next-after-virginia-passes-comprehensive-privacy-law.pdf and another is here: https://www.jdsupra.com/legalnews/virginia-legislature-sends-novel-2533245/
The most recent issue of the Journal of the Australian Society for Computers and the Law is available here: http://classic.austlii.edu.au/au/journals/ANZCompuLawJl/recent.html
This journal includes articles on privacy law and cybersecurity law.
In January, the NY Times published a long article on Tech predictions for 2021. There was a section on privacy laws, that was U.S. focused but interesting reading. An extract:
Lawmakers will take on comprehensive federal privacy legislation. (Hopefully.)
Greg Bensinger, member of the New York Times editorial board:
Lawmakers on both sides of the aisle have indicated that they suddenly care about Americans’ privacy rights online. I am looking forward to them putting their money where their mouth is in 2021 by rolling out comprehensive federal privacy legislation.
Is this a pipe dream? Yes. But if anything good comes from backlash against technology companies, I hope it’s that consumers have more control over the rights to their own data.
About two years ago, Landmark White (a property valuation firm in Australia) was subject to a number of cyber security incidents. Justice moves slowly.
Landmark White’s cyber security standards will come under the spotlight this week, as the trial kicks off of an IT contractor accused of stealing customer data from the firm and putting it on the dark web.
The Federal Court of Australia has sided with the Patents Office and upheld a rejection of a patent application for an invention that improves the timeliness and accuracy of risk information. It was decided by the judge that the claimed invention was merely a business method or scheme for sharing and completing work place health and safety documents, and was thus unpatentable.
See Repipe Pty Ltd v Commissioner of Patents (No 3)  FCA 31 https://jade.io/article/783336
Amazon was refused a patent in Australia on the grounds that the invention was not patentable subject matter.
See Amazon Technologies, Inc.  APO 7 https://jade.io/article/785911
The patent application was directed to the field of computer resource virtualization. Providers, such as Amazon, manage large-scale computing resources that can be accessed on demand by their many customers via virtual machines. This allows various computing resources to be efficiently and securely shared by multiple customers.
The European Data Protection Board (EDPB) has recently published guidelines with examples for data breach notification under the GDPR.
The Guidelines set out common types of data breaches, such as ransomware, lost or stolen devices, social engineering attacks and the like, and set out case studies to clarify notification and remediation obligations.
The Australian Patents Office has decided that an AI machine cannot be an inventor for the purposes of granting a patent.
"Section 15(1) is inconsistent with an artificial intelligence machine being treated as an inventor, since it is not possible to identify a person who can be granted a patent."
Further, the person who operated the AI machine was also not an inventor:
"I have considered the alternative option that Dr Thaler is the inventor. It seems clear that Dr Thaler asserts that he did not devise the invention but merely acquired knowledge of the invention from the artificial intelligence machine. In the light of JMVB Dr Thaler would not be the inventor."
U.S. law firm Wilson Sonsini has a good summary of likely FTC priorities.
Potential key priorities:
- Requirements in privacy and data security consent orders that represent a departure from the FTC's typical approach to consumer notice and disgorgement, including requirements that companies "disgorge" the data and benefits that they amassed through their allegedly wrongful behavior, and provide notice to consumers of the FTC settlement and the conduct at issue in the settlement; and
- Increased FTC scrutiny of health apps, facial recognition technology, algorithms and AI, and other issues related to the pandemic and racial equity, particularly where those issues fall under the purview of the FCRA or ECOA.
Tech companies think the statute allows them to censor with impunity. The law is seldom so simple.
Read in The Wall Street Journal: https://apple.news/AykpuzRwHQJeQWQoc3GPxyg
Flight Centre organised a hack-a-phon in 2017, and gave those participating access to real customer data. This resulted in a breach of the Privacy Act.
Swiss Hacktivist was raided at the request of U.S. authorities for data theft and then publishing what was hacked. https://amp.9news.com.au/...
The United Nations intellectual property agency (WIPO) is the latest front in the US-China trade war. http://www.theage.com.au/world/sad-am...
Carly Long, an expert in domain name litigation, will teach the first half of the class this Tuesday evening. You may wish to have a look a...
This website has some useful links and references: http://www.epiphanysolutions.co.uk/article-index/rights-and-laws-of-the-internet/