This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Introduction In 2007, the Australian government took a dramatic new approach to the governance and management of remote Indigenous communities. The ‘Northern Territory Intervention’, as it became commonly known, was introduced as a means to combat
Filtered results
This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Acknowledgement: Thanks to the Melbourne Networked Society Institute at the University of Melbourne for funding our research project ‘The Internet of Things (IoT) and Consumer Privacy’, 2015-2016, and to our participants for generously sharing their
Internet accessibility for people with disabilities is long overdue. We draw on pioneering Australian efforts, compared with recent US and European initiatives, to argue for better disability internet policy now.
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
This paper is part of ' Australian internet policy ’, a Special issue of Internet Policy Review. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs) and telecommunications providers to store
Papers in this special issue Editorial Angela Daly, Queensland University of Technology, Australia Julian Thomas, RMIT University, Australia The passage of Australia’s data retention regime: national security, human rights, and media scrutiny Nicolas Suzor, Queensland University of Technology, Australia Kylie Pappalardo, Queensland University of
Cloud computing is an inherently international matter, because it usually involves storage and processing of data in different locations. However, regulatory frameworks in non-EU contries do not always live up to European demands, i.e. concerning data protection. Looking at the EU cloud computing strategy, three political mechanisms can be



