Privacy And Phishing In Australia

Improved Essays
Technology is rapidly advancing and it is an area of great concern when it comes to Australian legislation. The government is struggling to keep up to date with all areas of technology however internet privacy significantly stands out and needs to be addressed. Internet privacy is a prevalent issue in the ever growing internet smart generation and in particular the area of phishing. Technological advancements particularly in areas of social media and smart phones have severely changed the way personal information is used and collected. The rapid changes of how personal information is transferred globally influences privacy and the protection of personal information (Techopedia, 2014). The legal issue that will be explored in this report is …show more content…
This Act makes provision to protect the privacy of individuals (Commonwealth of Australia, 2014) and controls the use, storage, collection and disclosure of personal information (OAIC, 2014). Recently, new privacy laws have come into operation and the amendments to the Privacy Act 1988 will introduce a new set of privacy principles that particularly address the collection of personal information and data online. In 2005 there was an attempt to bring in an anti-phishing act however it was not passed. Therefore there is no clear legislation that directly targets the issue of phishing. This proves Australia needs stricter and clearer legislation for offending phishing companies, persons and websites. Relevant cases that are of similar issue of that in Australia include in January 2007, Jeffrey Brett Goodin of California was convicted under the provisions of the CAN-SPAM Act of 2003. Goodin was found guilty of sending thousands of emails to America online users whilst posing as AOL’s billing department, which prompted customers to send personal and credit card information. The offender was sentenced for 6 years, just a fraction of the 101 years he could have been given for the CAN-SPAM violation and other counts including wire fraud, unauthorized use of credit cards and misusing AOL’s trademark. …show more content…
Credit card details and security pins are the most commonly stolen personal details via phishing. This poses issues for both banks and the victims as stakeholders. Banks are faced with ongoing problems with complaining customers of unidentifiable transactions coming out of their bank. Recovering the funds can be out of the banks hands which can lead to unhappy customers creating a bad reputation in society. The lack of concise legislation in place prevents phishers from being caught making this legal issue and reoccurring problem for all stakeholders. Additionally, the most common way of phishing is through fraudulent emails sent with scamming websites posing as major banks or websites such as Westpac, Nab, eBay and iTunes. It is a large threat to organisations as such as it defames their reputation and reliability, driving away potential customers. Email service providers are also major stakeholders in the legal issue of phishing. The fraudulent emails are sent through their servers therefore they could be liable if the emails aren’t filtered correctly into junk and spam folders making users aware of the risk of the emails from phishing websites posing as large organisations. The authentic looking messages are purposefully designed to trick everyday people into submitting personal data and it works as it looks like they’ve been sent from

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Amended Bbbee Strategy

    • 638 Words
    • 3 Pages

    Is there a viable solution? A breakdown of the imminent Protection of Personal Information (PoPI) Act. What is PoPI? • What will be the impact on the daily running of your organisation?…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The new privacy laws create new Australian Privacy Principles (APPs) that revise prior obligations on how and when any personal information can be collected and how…

    • 279 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The article explains how many e-crimes are being treated unfairly and the people found guilty for these crimes are charged with an unreasonable sentence. The Computer Fraud and Abuse Act was created in 1986, but needs various improvements to be up to date with to today’s internet. With the CFAA, almost anybody can be prosecuted and convicted of a violation for minor actions that seem harmless, such as using a roommate’s Netflix account. The ethical issues identified in the article are e-crimes are treated unfairly and prosecutors are sentenced for lengthy periods of time for minor offenses.…

    • 342 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Victims Of Identity Theft

    • 863 Words
    • 4 Pages

    Identity theft is a problem that is effecting more and more people every year, a report released by Michael Keenan shows that an average Australian household is 16 times more likely to be effected by identity fraud then it is to be effected by a robbery, this same report also indicates that people are becoming less concerned about identity crime, however with fraud incidents increasing by 30,000 from 2014 to 2015 and misuse of identity increasing by almost 20,000 from 2014 to 2015 it is best to bring about concern to the ever increasing threat of identity theft. Identity theft is where someone steals someone else’s personal information usually in order to profit themselves in some way or another, identity theft can lead to the forgery of personal…

    • 863 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cyber-Safety Regarding Identity Theft What is Identity Theft? • Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver 's license numbers without that person’s knowledge or permission, to get a benefit or to cause harm. • An identity thief takes on another person’s identity by using their personal information, which includes the person’s name, address, date of birth and email and social media log-in details. It is illegal to: • Have possession of someone else’s personal information with the intention of committing a crime.…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Phishing has also become a common tactic adopted by malicious users of the internet. Phishing is where a reputable organisation, be it a bank or retailer’s website is copied identically and used to trick customers to log in and therefore handing over their credentials accidentally. Viruses, which are malicious pieces of software that replicates itself on a computer, have also been transferred through downloads from…

    • 1898 Words
    • 8 Pages
    Superior Essays