Policies/Digital Liberties

Provide universal access to a fast, neutral Internet.

 * Institute a common carriage agreement and legal protection for Net Neutrality, and ban the practice of screening, or prioritizing traffic based on packet sources or destinations, unless
 * 1) The default package offered to the user of an ISP contains no such screening or prioritising; and
 * 2) The user can opt-in to a package that will prioritise certain types of traffic by protocol or destination.
 * Allow exceptions in the case of a court order.
 * Allow generic prioritisation of traffic based on protocol types defined by the IETF.
 * Support fibre-to-the-premises infrastructure projects to help build a vibrant digital society.

Install explicit protections for privacy and digital rights.

 * Oppose mandatory censorship and web-blocking architecture.
 * Repeal the Broadcasting Services Amendment (Online Services) Act 1999.
 * Repeal the Communications Legislation Amendment (Content Services) Act 2007.
 * Delete section 313 of the Telecommunications Act.
 * Ensure no criminal offence applies for linking on the Internet.
 * Prevent warrantless monitoring of internet use among the general public.
 * Oppose and repeal any legal mechanisms enacted to create records of Internet use among the general public.
 * Records obtained through such schemes to be securely deleted.
 * No authorisation for unnecessary data collection.
 * Replace the Cybercrime Act with more appropriate legislation for the digital age.
 * Conduct an independent review of the Telecommunications Interception and Access Act to ensure digital liberties are properly protected.
 * No future access to phone or internet metadata without a warrant.
 * Ban practice of agencies obtaining private information on Australian citizens through the NSA or other offshore surveillance not subject to Australian protections and laws.
 * Anti-terrorism practice to emphasise greater use of informants and targeted infiltration.
 * Ensure individuals have a legally protected right to control data collection on devices they own.
 * Control should cover duration data is retained for, encryption and sending of data, and when data is deleted.
 * Ensure no penalties apply to individuals who refuse to provide passwords or assist in decrypting information (in line with existing legal practices regarding self-incrimination).