">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Thursday, January 28, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

How to protect yourself from the new data retention law.

Dennis Mathu by Dennis Mathu
3 years ago
in Tech
7 min read
0

A few months ago, the Australian government passed a law that does not seem to care for the Civil Rights of its citizens. The injustice we are referring to is the data retention law that came into effect on April.

This law requires that telecommunication companies to keep a record of customer metadata for a period of at least 2 years. This metadata will be from phone calls, texts, email and even internet browsing activity. The data will be accessible by the government, its intelligence and law enforcing agencies. But some people are turning to VPNs to protect themselves. To learn more about how to protect yourself, check out this site that talks about VPNs and how to use them effectively.

The fact that the Privacy Awareness Week was just a few weeks ahead didn’t deter the Australian government to pass a law that ironically invades people’s privacy. Disturbingly, other Western democracies seem to follow suit, for instance, the UK passed the Investigatory Powers Act and the US made a decision to repeal the Internet Privacy Law.

Why it matters

First and foremost, the law undermines the Australian Privacy Principles which state the limited conditions under which your personal information can be collected. The Privacy Principles state that personal information must be collected only by “fair” means.

Additionally, metadata, which is essentially data about data, has been proven to tell more about a person than the actual contents of his/her communications. Metadata is very broad in scope and those that think that data about data doesn’t affect their right to privacy are very wrong indeed.

READ  DOBA Faculty Introduces Online Master’s Degree Programme In Kenya
Attorney-General George Brandis.

The government justified this law with the need to protect Australians from terrorist attacks. However, the risk of Australia having such an attack has been low for many years. Other countries such as France, Germany and Israel have higher risks of attacks based on threats subjected to them, yet, they have not resulted to mass data collection of their citizens, instead, they have better, more targeted means to counter terrorism without violating their people’s civil rights. There are a range of widely accessible technologies  that can used instead of data retention, in fact, the now prime minister, Malcolm Turnbull had previously outlined some of them.

As if that is not enough, on top of violating civil rights, the law is set to increase the budgetary debt by approximately A$740 million over the next ten years. How’s that for a legacy.

Related posts

Showmax customers to pay for a one-month & receive two months subscription for free

January 27, 2021
0

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0

How can we protect ourselves from the intrusive law?

Fortunately, all is not lost, there are several technologies we can use to challenge the law and increase our online privacy in the process. They include;

  1. Virtual private networks (VPN)- VPNs are used to hide your browsing activity from trackers and internet service providers. To learn more about how to protect yourself, check out this site that talks about VPNs and how to use them effectively.
  2. Tor – this is a software that helps keep you anonymous online by hiding your identity from surveillance. An example of such software is the Onion Router.
  3. Encrypted message applications – most messaging application can be easily tracked, however, if you use a platform that offers encryption to your messages, you will be safe from snooping. Telegram and Signal are good places to start.
READ  6 Commonly Used Conveyor Belts and Their Applications

Citizens of Australia need to be vigilant for laws that invade their civil rights. The continued regulation of the internet is further evidence that the government is headed in the direction of deteriorating those very crucial rights. It is the responsibility of the citizens to have open and honest debates to criticize such laws and call out misguided representatives. Finally, the public should strive to elect representatives who value democratic principles that support a modern Australian society.

Readers 2,142

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Dennis Mathu

Dennis Mathu

I cover gadgets, software releases, web and mobile apps and enterprise systems powering corporations. Contact me at [email protected]

Related Posts

Tech

Showmax customers to pay for a one-month & receive two months subscription for free

January 27, 2021
0
Tech

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0
Tech

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8
Tech

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0
Tech

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0
Toshiba
Tech

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0
Tech

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0
Tech

What Software Developers Need to Know About Burnout

January 22, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Showmax customers to pay for a one-month & receive two months subscription for free

January 27, 2021

Huawei Mobile to launch Huawei Y7a in Kenya early next month

January 27, 2021

Air Conditioner Maintenance Tips to Save Energy

January 27, 2021

Enjoy The Convenience of Washing & Drying With Ramtons Washer Dryer Combo 

January 27, 2021

Samsung, Safaricom partner to push Samsung Galaxy S21 pre-orders

January 26, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: