The LSC has long been the preferred way for Australia to communicate with overseas entities.
But it has had to be overhauled in recent years, with the National Broadband Network and the Telecommunications (Interception) and Security Legislation Amendment (Data Retention) Bill, 2016 making significant changes to the system.
LSC’s major components: The Australian Government, the LSC, and other Australian agencies have a shared responsibility for administering the LSS, with responsibility for managing the information and communication technology (ICT) in the system, ensuring that it is secure, and ensuring that its operations comply with laws and regulations.
The Government has a responsibility for maintaining a robust and accurate record of LSC communications.
The LSP also manages the data stored in the LSA.
It’s important to remember that the Australian Telecommunications and Information Commission (ATIC) is the agency responsible for ensuring the security and integrity of the LSP and the LSE.
Under the Telecommunications Act 1998, the ACCC is responsible for overseeing the LSI and the National Telecommunication System Standards, and for ensuring that they are adhered to.
This process can take years.
But with new legislation, such as the National Telecommunications and Internet Services Act 2017, and the TIA Act 2016, the Government’s role has been expanded.
There are three key roles that the LSLC plays in managing communications between the Government and the various agencies that operate in Australia.
The first is to maintain the system’s integrity and security, including ensuring that the system is secure.
The second is to ensure that the communications that are routed through the system are secure, both for the purposes of the data and the communications it carries.
The third is to manage and provide support for the data storage and processing systems that run the system (called the LMS).
LSCs’ responsibilities are broadly defined in the Telecommunications Acts and the Communications Act.
The Telecommunications Act 1997 provides the LTS and the other LSC functions, and under that Act, each of the three roles plays a role in the operation of the system: managing the communications from the Government to its agencies, including the ACCCs, the ASIOs, and all other agencies and bodies that deal with the communications of the Government; and maintaining the integrity of all data in the data system, including, for example, the integrity and confidentiality of the metadata that the data is stored in.
The ACCC and the ASIC both play a role, with ACCC being responsible for maintaining the data integrity and ensuring the privacy of data in relation to their responsibilities.
For more information, read our article about the LSM.
There’s more: The ACCCs responsibilities under the Telecommunications ACT 1998 are to maintain and operate the system and its associated infrastructure and systems; and to maintain a record of all communications that have been routed through it and to ensure the confidentiality of all the information that has been transmitted through it.
The ASIO is responsible to ensure compliance with the law and to oversee the data retention regime.
It also has responsibilities to ensure there are safeguards in place to protect against misuse of the information stored in its systems.
The TIA is responsible, for the most part, to maintain an accurate record and provide assistance to the Government in this regard.
The ATIC plays a major role in monitoring the operation and performance of the systems.
It monitors the integrity, availability and performance in relation the LSN and the records maintained by the LCS.
It reports to the Minister and the ACC and its report is made available to the LSB and the Australian Federal Police.
The Australian Communications and Media Authority plays a key role in overseeing the data management system.
It provides oversight of the integrity systems, and ensures that they have adequate security to ensure their operation.
The Communications Security Intelligence Centre (CSCI) plays a critical role in managing the operation, management and performance, and in supporting the data security management system in accordance with its responsibilities under Part V of the Telecommunications and Communications Act (TAC).
It plays a central role in ensuring that information in the systems is secured against unauthorized access and misuse.