Should Government Be Able To Access The Metadata Of Australians

Improved Essays
Should the government be able to access the metadata of Australians?
The Australian legal system is meant to provide the community with safety, a way of improving our protection is by using data retention. Data retention is usually used for any crime related offences. The information from the metadata which the government retrieves is basically who, when and where. The information obtained is: who was it sent to, when was it sent and where it was sent from. Leaving just the core concern, the content. The content will not be either accessible or obtained by the government (Thomas, 2015). Metadata is also known as telecommunication data or record data- this could also be interpreted as data of data (Kocher, 2015). The data is only retained for
…show more content…
The current legislation on data retention is the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015. The legislation allows the government and a limited amount of agencies to access the data, which would be provided by the internet service. It is also known that around 35 Western countries worldwide have a legislation for their data retention schemes, which will make the community feel more assured with the law (Australian Government). There are many ways metadata is retrieved such as phone calls, emails and other technological appliances that utilize telecommunications companies. For example, an email will only give the email addresses and when it was sent; the government does not receive the details of the subject line or the content of the email. By allowing the government to access our metadata it will reduce any upcoming problems. Hence, the current legislation is fine, all we can are minor adjustments by implementing a …show more content…
Majority of the opposing group tends to lean on the thought of protecting their own privacy, they prefer not to grant the government information of their internet activities (Kidman, 2014). People tend to become superstitious with thoughts such as the possibility of the government being able to listen in to calls and read emails, the government will be able to access everything you’re doing online and the government is gathering and analysing information of Australian citizens (Australian Government). Although privacy is a problem, cost is also major. It is estimated that $188.8mill-$319.1mill will be used to implement the proposed data retention regime in consultation with industry, this will most likely be in the expense of tax payers. Money will be wasted on building new data centres with each storing petabytes of information which will cost tens or hundreds of millions of dollars (iinet, 2014; Australian Government). The use of the money is usually seen as wasteful. Australian’s opinions in the comment section, of Kidman’s article, mentioned how the money could have been used for more useful resources such as buildings or funding more hospitals and schools. Although stakeholders can bring up that even the government themselves do not thoroughly know the aspect of metadata (Hopewell, 2014). This is shown how Attorney General George Brandis did not

Related Documents

  • Improved Essays

    The Government introduces you to a precedent that has to do with DLK’s case because in this case they intended for their info to be private, but the government used something that goes above the five senses so you would need a warrant to use it. This is important because in DLK’s case he intended for his info to be private, but since the government used a thermal imager without a warrant just like the bug in the Katz case, they found out he was growing marijuana in his home. No one else would want someone else to find out something that they are doing if it is private. While some may argue that the government can do that without a warrant if they are suspicious, no one would want their private info to be found or heard by the government. In conclusion, the Government should not invade your privacy unless given a warrant to do…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unit 8 P1

    • 787 Words
    • 4 Pages

    Newsletter Legal Issues: Data Protection Act 1998 This law is designed so that your personal information is protected. It protects your data in which is stored on the pc and hard copies. This act gives the people the right to know what information about them is being stored. It protects information such as your name, address, employment history, credit records etc.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Ethical Dilemmas

    • 1132 Words
    • 5 Pages

    The government claims that that is classified information however many disasters have happened since then such as the Boston bombings and there was nothing done to prevent them from happening. “Little information is available beyond the NSA’s purpose and mission,” (National Security Agency) and its beginning to make the people question the effectiveness of the government's techniques. “Exposure of the surveillance capabilities have ‘had a profound impact on the economy, the security of the internet and the credibility of the U.S. government’s leadership when it comes to online governance.’” (Zetter) For instance, during the Boston bombings the NSA released information that they found leading to the discovery of the criminal after the fact, however they weren’t aware of his intent to bomb the marathon before it actually happened therefore were unable to prevent this act of terrorism.…

    • 1132 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    One reason why we should not have it is because big brother, used to refer to any rule or government that invades the privacy of its citizens.(Dictionary) Is wrong and we all don 't want the government to know what we 're doing twenty-four seven. The…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    While this proposed law may only absolve a piece of the issue, it is the stepping stone that will help protect citizens and companies from constant governmental interference. In this paper I will begin to discuss what this piece of legislation proposes, then I will give an explanation and evidence as to why I support this bill. I will then provide the counter-argument for those who oppose it. Following this I will conclude with a brief summary and reiterate the importance of this necessary…

    • 1800 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    After September 11, 2001, many things changed in the United States. Because of the potential for additional attacks on Americans here and abroad, the government started monitoring conversations on the Internet and on cell /telephones of citizen of the United States. This monitoring of electronic devises was without the knowledge or consent of the owners. The National Security Agency or NSA was very good at keeping their surveillance a secret from the public but all things done in the dark come to the light sooner or later. The NSA has completed all three branches of the U.S. Government and the American people to reexamine their positions on surveillance as the threat of terrorism increases.…

    • 765 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Even though, we understand that the government take the information from us is try to protect us, but we also want the limit of it too…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Supporters of the act argue that this freedom of information allows the government to be more efficient in rooting out terrorism and protecting national security, without the hindrances of protocol. However, this is also a blatant infringement upon the privacy of Americans, and has also failed to produce any significant results in preventing terrorism in the United States (“Surveillance Under the Patriot Act”). Fortunately, the inclusion of a “sunset clause” within the act allows certain provisions to expire by 2015, such as NSA’s authority to wiretap, seize of voicemails, and receive warrants for electronic evidence (Kayyali). Therefore, although it was originally intended as a defense for our nation, the USA PATRIOT Act should be allowed to expire without a renewal of these clauses because it oversteps federal boundaries outlined in the constitution, infringes upon the rights and sovereignty of US citizens, and has produced no significant results in the fight against terrorism since its…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    According to the film, “And metadata, in aggregate, is content. It tells a story about you which is made up facts, but is not necessarily true. So for example, just because you were on the corner and all those data points point to it, it doesn’t mean you committed the crime” (Citizenfour). Metadata obtains information from phone calls, online chats, and can identify someone. This metadata is misleading and can convict someone for a crime they didn’t commit.…

    • 816 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The Obama years have accelerated the use of these systems and brought forth the dilemma where people working for the government started to question the authority and rights of the government for the people. This increase in data collection and these programs has led to some agents from these programs to go out in public and release information. The most recent figure is known as Edward Snowden. Due to Snowden’s leaks and many others starting to pop up, it has brought forth political obligation into question. More people are becoming aware of the practices that are occurring and thanks to his attempts governments around the world have started to show more of the information that they are collecting and what they are doing with it.…

    • 2374 Words
    • 10 Pages
    Superior Essays