EFA opposes the construction of 'appropriately used' in s 6AAA of the exposure draft. We submit that the definition in s 6AAA ought to be amended to reflect that operators are only entitled to intercept and monitor communications where those communications pose a threat to the security of the network itself.
Personally, I'd want the ammendment to be clear that it applies to network troubleshooting as well as network security so that network administrators can definitely use tools like Wireshark to fix their network.
Why the **** does the Air Force have critical systems 1) Running a stock commercial OS, and 2) Connected in a way where this sort of infection is even POSSIBLE?
You must be new here.
They also claimed that, because files are broken up into tiny "packets" before being sent over BitTorrent, this may not be enough to suggest a "substantial portion" of a copyrighted file was distributed.
iiNet are suggesting that observing a couple of bittorrent packets is not enough to infer a breach of copyright because each packet does not contain a substantial amount of the original work. Much more data would be required before you could assume a copyright breach.
Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson