Database

Browse Database

AUSTRALIA

Since October 1979

Pillar Domestic data policies  |  Indicator Requirement to allow the government to access personal data collected
Telecommunications (Interception and Access) Act 1979
The Telecommunications (Interception and Access) Act 1979 grants criminal law enforcement agencies the authority to intercept real-time communications without a warrant. The Act addresses various types of interception warrants, including an interception warrant (Section 10), a telecommunications service warrant (Section 11A), a foreign communications warrant (Section 11C), and a stored communications warrant (Section 110). However, in emergency situations (Section 30) or for the purpose of developing and testing interception capabilities (Section 31A), law enforcement officers or agencies may intercept live communications without obtaining a warrant.
Coverage Telecommunications sector

AUSTRALIA

Since May 1997, last amended in October 2025

Pillar Domestic data policies  |  Indicator Requirement to allow the government to access personal data collected
Telecommunications Act 1997
Sections 317L–317RA of the Telecommunications Act 1997 (Cth), as amended by the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, establish a mechanism whereby security and law enforcement agencies may issue Technical Assistance Notices (TANs) to communications providers. These notices require providers to take specified steps to assist agencies in performing their national security or criminal law enforcement functions.
The scope of application is broad, as “designated communications providers” include not only telecommunications carriers and service providers but also any entity that supplies electronic services, such as websites or encrypted messaging platforms. Recipients of a TAN may therefore be required to provide technical assistance, including facilitating access to encrypted communications. Notably, the framework permits such requests to be made without a warrant.
Coverage Telecommunications sector

AUSTRALIA

Since June 1968, last amended in December 2024

Pillar Intermediary liability  |  Indicator Safe harbour for intermediaries for copyright infringement
Copyright Act 1968
Sections 36 and 101 of the Copyright Act contain safe harbour protections for carriage service providers such as Internet infrastructure providers and Internet Service Providers (ISPs). To qualify, these organisations must implement mechanisms to enable copyright owners to report infringing content on their platforms and request that action is taken to prevent the infringement (for example, disabling access to the content or terminating the accounts of infringing users).
Coverage Internet intermediaries

AUSTRALIA

N/A

Pillar Intermediary liability  |  Indicator Safe harbour for intermediaries for any activity other than copyright infringement
Lack of intermediary liability framework in place beyond copyright infringement
A basic legal framework on intermediary liability beyond copyright infringement is absent in Australia's law and jurisprudence. It is reported that the basis for third parties' liability for individuals' online actions is confusing and, viewed as a whole, largely incoherent. The result is significant uncertainty.
Coverage Internet intermediaries

AUSTRALIA

Since December 2014, last amended in April 2017

Pillar Intermediary liability  |  Indicator User identity requirement
Telecommunications (Service Provider — Identity Checks for Prepaid Mobile Carriage Services) Determination 2017
Under the Telecommunications (Service Provider — Identity Checks for Prepaid Mobile Carriage Services) Determination 2017, telecommunications companies must identify their customers when customers activate a prepaid mobile service. According to Part 4 of the law, to activate a new prepaid mobile service, customers must provide their telecommunication company with their name, date of birth, and home address (or business name and address if acting on behalf of a business). Proof of ID is also necessary.
Coverage Telecommunications sector

AUSTRALIA

Since June 2021
Since June 2024
Since June 2024

Pillar Intermediary liability  |  Indicator Monitoring requirement
Online Safety Act 2021 No. 76

Online Safety (Relevant Electronic Services—Class 1A and Class 1B Material) Industry Standard 2024

Online Safety (Designated Internet Services—Class 1A and Class 1B Material) Industry Standard 2024
Australia enacted an Online Safety Act that places additional responsibilities on digital platforms and internet service providers (ISPs) to monitor and remove harmful content posted on their services. Specifically, the Act reduces the time a site owner or ISP has to remove harmful content from 48 hours to 24 hours after receiving a removal notice from the eSafety Commissioner. It also provides the eSafety Commissioner with additional information collection powers and the power to require ISPs to disable access to material depicting violent conduct for a limited period during “crisis situations.”
Pursuant to Sections 19–21 of the Online Safety (Relevant Electronic Services—Class 1A and Class 1B Material) Industry Standard 2024 and Sections 20–22 of the Online Safety (Designated Internet Services—Class 1A and Class 1B Material) Industry Standard 2024, providers of “relevant electronic services” and “designated internet services”, as defined in Sections 13A and 14 of the Online Safety Act, are required to implement “appropriate systems, appropriate processes and appropriate technologies” to detect and identify specified categories of illegal content. This obligation applies in particular to known child sexual abuse material and known pro-terror material where such content is stored on the service, accessible to an end-user in Australia, or has been accessed or distributed in Australia through the service. The Standards further require providers to remove such material as soon as practicable.
Coverage Digital platforms and internet service

AUSTRALIA

Since January 1958, as amended in April 2018
Since August 2024

Pillar Quantitative trade restrictions for ICT goods and online services  |  Indicator Export restrictions on ICT goods or online services
Customs (Prohibited Exports) Regulations 1958

Defence and Strategic Goods List 2024
Pursuant to Section 13 of the Customs (Prohibited Exports) Regulations 1958, the export of goods listed in the Defence and Strategic Goods List (DSGL), as well as goods incorporating DSGL technology, is prohibited unless prior authorisation is granted by the Minister for Defence. The applicable application procedure is set out in Regulation 13EB.
The 2024 DSGL defines the current scope of goods subject to export controls. It encompasses a wide range of items organised into nine categories, including electronics, computers, telecommunications, and information security.
Coverage Several strategic goods, including electronics, computers, telecommunications, and information security

AUSTRALIA

Reported in 2022, last reported in 2025

Pillar Telecom infrastructure & competition  |  Indicator Presence of an independent telecom authority
Presence of an independent telecom authority
The Australian Communications and Media Authority Act 2005 No. 44 establishes the Australian Communications and Media Authority (ACMA) as an independent telecommunications authority. Division 4 of the Act establishes that the Minister may give written directions to the ACMA in relation to the performance of its functions and the exercise of its powers. However, it is reported that the ACMA is independent from the government in the decision-making process.
Coverage Telecommunications sector

AUSTRALIA

Since June 2012

Pillar Cross-border data policies  |  Indicator Ban to transfer and local processing requirement
My Health Records Act 2012
My Health Records Act 2012 requires information relating to health records to be stored and processed within Australia unless the records do not include "personal information in relation to a healthcare recipient or a participant in the My Health Record System" or "identifying information of an individual or entity" (Section 77).
Coverage Medical and health services

AUSTRALIA

Since December 1975, last amended in December 2025
Since November 2015, last amended in

Pillar Foreign Direct Investment (FDI) in sectors relevant to digital trade  |  Indicator Screening of investment and acquisitions
Foreign Acquisitions and Takeovers Act 1975

Foreign Acquisitions and Takeovers Regulation 2015
Under the Foreign Acquisitions and Takeovers Act 1975 (FATA), Australia subjects certain foreign investments to national security screening, combining mandatory ex ante notification with call-in and last-resort ex post powers. Under Section 55B, a notifiable national security action arises where a foreign person proposes to start a national security business, acquire a direct interest in a national security business (or in an entity carrying on such a business), or acquire an interest in national security land. The term national security business is defined in Section 8AA of the Foreign Acquisitions and Takeovers Regulation 2015, including businesses connected to critical infrastructure, telecommunications carriers or nominated carriage service providers, businesses supplying critical military or intelligence goods, technologies, or services, and certain businesses handling classified information or sensitive data relating to defence and intelligence personnel. Government guidance further indicates that, where this national security screening applies, notification is generally required regardless of transaction value.
Australia’s national security screening framework also includes ex post review mechanisms. Under Section 66A of FATA, the Treasurer may review a reviewable national security action (and certain significant actions) on national security grounds. Investments not subject to mandatory notification may be voluntarily notified to reduce the risk of later review, while non-notified investments may be called in for a national security assessment. In addition, Division 3 of Part 3 of FATA establishes last-resort powers, including powers to vary or revoke conditions, impose new conditions, or require divestment where national security risks arise after an initial assessment or approval.
In practice, these powers have been invoked to restrict foreign participation on grounds of national security and national interest. For example, in 2012, the Australian Government blocked Huawei Technologies Co Ltd from tendering for contracts associated with the National Broadband Network (NBN), citing cybersecurity concerns. More recently, in June 2024, the Treasurer ordered several China-linked investors to dispose of their shares in the rare earths miner Northern Minerals, including Yuxiao Fund, Ximei Liu, Xi Wang, and Black Stone Resources.
Coverage Critical infrastructure and national security-related businesses

AUSTRALIA

Since March 1980

Pillar Intellectual Property Rights (IPRs)  |  Indicator Participation in the Patent Cooperation Treaty (PCT)
Patent Cooperation Treaty (PCT)
Australia is a party to the Patent Cooperation Treaty (PCT).
Coverage Horizontal

AUSTRALIA

Since June 1968, last amended in December 2024

Pillar Intellectual Property Rights (IPRs)  |  Indicator Copyright law with clear exceptions
Copyright Act 1968
Australia has a clear regime of copyright exceptions under the Copyright Act that follows the fair dealing model, which enables the lawful use of copyrighted work by others without obtaining permission. The list of exceptions includes research or study, criticism or review, parody or satire, reporting news, enabling a person with a disability to access the material, and professional advice by a lawyer, patent attorney or trademark attorney (Division 3).
Coverage Horizontal

AUSTRALIA

Since July 2007

Pillar Intellectual Property Rights (IPRs)  |  Indicator Adoption of the WIPO Copyright Treaty
WIPO Copyright Treaty
Australia has ratified the World Intellectual Property Organization (WIPO) Copyright Treaty.
Coverage Horizontal

AUSTRALIA

Since July 2007

Pillar Intellectual Property Rights (IPRs)  |  Indicator Adoption of the WIPO Performances and Phonograms Treaty
WIPO Performances and Phonograms Treaty
Australia has ratified the World Intellectual Property Organization (WIPO) Performances and Phonograms Treaty.
Coverage Horizontal

AUSTRALIA

N/A

Pillar Intellectual Property Rights (IPRs)  |  Indicator Effective protection covering trade secrets
Comprehensive regulatory framework covering trade secrets
Under Australian law, trade secrets are treated as a subset of confidential information and are primarily protected under common law principles, complemented by relevant statutory provisions, including those contained in the Corporations Act 2001 and the Competition and Consumer Act 2010.
In addition, the Treasury Laws Amendment (2018 Measures No. 3) Act 2018 introduced specific provisions reinforcing the protection of confidential information. Together, this legal framework provides remedies against the unauthorised use or disclosure of such information. Available causes of action include claims for breach of confidence, with courts empowered to grant relief in the form of injunctions, damages, and an account of profits in cases of misappropriation.
Coverage Horizontal

Report issue     Report new measure