View the report as separate downloadable parts:
    
            
                    
                    
                        Membership of the Committee
                        
                    
                    
                    
                    
                
                    
                        Terms of reference
                        
                    
                    
                    
                    
                
                    
                        List of abbreviations
                        
                    
                    
                    
                    
                
                    
                        List of recommendations
                        
                    
                    
                    
                    
                
                    
                        1. Introduction
                        
                    
                    
                    
                            
                              The Bill and its referral
                        
                              Context of the inquiry
                        
                              Conduct of the inquiry
                        
                              Summary of the Bill
                        
                              Report structure
                        
                            
                        
                    
                
                    
                        2. The case for telecommunications sector security reforms
                        
                    
                    
                    
                            
                              Rationale for the Bill 
                        
                              Industry views on the objectives and design of the Bill
                        
                              The regulatory approach
                        
                              International approaches
                        
                              Committee comment
                        
                            
                        
                    
                
                    
                        3. Security obligation to protect networks and facilities
                        
                    
                    
                    
                            
                              Application to over-the-top providers
                        
                              Application to networks and facilities ‘used by’ C/CSPs
                        
                              Application in foreign jurisdictions
                        
                              Application to ‘cloud computing’
                        
                              Application to broadcasting and content service providers
                        
                            
                        
                    
                
                    
                        4. Notification requirements
                        
                    
                    
                    
                            
                              Access of industry to threat information 
                        
                              Kinds of changes that require notification
                        
                              Adverse security assessments for responses to notifications
                        
                              Exemptions processes
                        
                              Framework and criteria for declaring a CSP an NCSP 
                        
                            
                        
                    
                
                    
                        5. Directions, information-gathering powers, information sharing and confidentiality
                        
                    
                    
                    
                            
                              Directions by the Attorney-General
                        
                              Information-gathering powers of the Attorney
                        
                              Enforcement mechanisms
                        
                              Information sharing and confidentiality
                        
                            
                        
                    
                
                    
                        6. Other key issues raised in evidence
                        
                    
                    
                    
                            
                              Transparency, accountability and performance
                        
                              Retrofitting of systems
                        
                              Location of stored data
                        
                              Concluding comments
                        
                            
                        
                    
                
                    
                        A. List of submissions
                        
                    
                    
                    
                    
                
                    
                        B. Witnesses appearing at public hearings
                        
                    
                    
                    
                    
                
                    
                        C. Glossary