House of Representatives Committees

Chapter 8 Consumer Protection

Introduction

8.1                   This chapter canvasses aspects of the consumer protection regime that relate to cyber crime. The Federal, State and Territory consumer protection bodies are increasingly dealing with the violation of consumer protection laws perpetrated over the Internet. The first section focuses on the Australian Competition and Consumer Commission’s role in the enforcement of the Trade Practices Act 1974 (Cth). In particular, the challenge of international enforcement of domestic consumer protection laws.

8.2                   The discussion in the remaining sections move beyond the status quo and discuss strategic consumer protection interventions that have the potential to better protect ordinary end users from cyber crime:

n  a requirement for informed consent and penalties for unauthorised installation of software;

n  IT vendor information standards to promote e-security;

n  the problem of insecure IT products; and

n  industry standards to promote higher level security settings to better protect consumers.

Australian Competition and Consumer Commission

8.3                   The Australian Competition and Consumer Commission (ACCC) administers the Trade Practices Act 1974 (Cth) and has a responsibility to protect consumers from economic harm: ‘This includes conduct that is fraudulent and has the purpose of misleading consumers for financial gain’.[1]

8.4                   The ACCC received 77,000 complaints in the 2008-2009 financial year. Of these, 18,000 related to scams of all types. Scams perpetrated over the Internet accounted for 12,000 of these complaints.[2]

8.5                   The Committee noted thatmany complainants reported fraudulent conduct that also involved the proliferation of malware, such as via phishing emails.[3] As has been noted throughout this report, the combination of cyber crime techniques involving crimes and civil wrongs is often difficult to disentangle and requires strategic policy and enforcement intervention.

8.6                   Finally, in line with the Government’s overall strategy, the ACCC emphasise the importance of consumer education (see Chapter 10). The ACCC also hosts the SCAMwatch website, which provides public information, alerts and access to complaints mechanisms on a wide range of consumer scams, including scams perpetrated online (see Chapter 5).

International and Domestic Cooperation

8.7                   The ACCC identified cross agency information sharing and cooperation and, where appropriate, enforcement action, as key elements of their approach.[4] Where online scams impact on consumers in multiple jurisdictions, domestic and international cooperation was described as crucial.[5]

8.8                   To this end, the ACCC chairs the Australasian Consumer Fraud Taskforce (ACFT), which includes 20 Commonwealth and State agencies, departments and research institutes as well as the New Zealand Ministry of Consumer Affairs and the NZ Commerce Commission.[6]  The Committee was told that the ACFT provides a mechanism for sharing information on enforcement activities as well as educative and information campaigns, and is also involved in research on consumer fraud.[7]

8.9                   In 2009 the ACCC worked with a number of other agencies:

Domestically, the ACCC has worked with the Australian Federal Police, Australian Communications and Media Authority, Australian Securities and Investments Commission, Queensland Police, Australian Taxation Office and the state and territory offices of fair trading. Internationally, the ACCC has worked with the United States Federal Trade Commission and the Washington State AttorneyGeneral’s office.[8]

8.10               The Committee was told that the ACCC will often refer alleged scam matters to other agencies or organisations. This may occur at the first point of contact or be more formal or take place in one of the less formal forums for discussion and information sharing.[9] However, while the ACCC ‘records the handling of each complaint’ there were no statistics that differentiate the different types of referrals. Consequently, the Committee was unable to ascertain the number of matters referred for criminal prosecution by Australian authorities.[10] It was noted in Chapter 5, that the NSW Police believed that while a lot of resources are devoted to online scams, there are few criminal prosecutions (as opposed to civil enforcement action).[11] A more centralised approach to complaint handling across a wider range of cyber crime types is discussed in Chapter 5.

8.11               Broader international liaison is facilitated through the International Consumer Protection and Enforcement Network (ICPEN), a network of over 30 national fair trade agencies mainly from OECD countries. The ACCC took over the Presidency of ICPEN in August 2009 for 12 months.[12]  The objectives of ICPEN include sharing best practices in legislative and other measures for effective consumer protection enforcement; taking action to combat cross border breaches of consumer protection laws; and facilitating effective cross border remedies.[13]

8.12               The ACCC also has a bilateral agreement with the US Federal Trade Commission on Mutual Enforcement Assistance in Consumer Protection Matters. This MOU provides a detailed elaboration of the obligations of both parties to cooperate to ensure effective enforcement of consumer protection laws in both countries.[14] On the question of Australia – US cooperation, the ACCC advised that the US passed the Undertaking Spam, Spyware and Fraud Enforcement with Enforcers Beyond Borders Act 2006, which broadened the US powers to reciprocate information sharing and collection of information and evidence for foreign agencies.[15] It was submitted that the bilateral agreement did not require any strengthening at this stage.

8.13               In addition to the US, the ACCC also has MOUs to facilitate international cooperation with other counterparts, including with agencies in the UK, Korea and New Zealand.[16]

Litigation Issues – Online Scams

8.14               The Committee was told that whether enforcement action under the Trade Practices Act 1974 (Cth) is taken in Australia will often depend on jurisdictional and evidential issues. Jurisdictional issues arise when the offender is located outside Australia, and, in some cases, the difficulty of ascertaining the identity and location of scam promoters can make enforcement more difficult.

8.15               Some of the issues identified were:

n  if the ACCC requires further evidence it would ordinarily use its statutory powers but cannot serve those notices in other jurisdictions;

n  court documents need to be served on parties outside the jurisdiction. This requires leave of the court and then service of documents in the relevant country once the relevant respondent is located; and

n  the utility of orders the ACCC may seek from a court may be undermined by the difficulty in enforcing those against the respondent.[17]

8.16               While these challenges are present in a number of consumer protection genres, the ACCC said such problems are particularly prevalent in the online scam environment.[18]

8.17               Out of approximately 12,000 complaints of online scams in the 2008-2009 financial year there were only two matters in 2009 concluded by the ACCC. The two cases categorised by the ACCC as ‘cyber crime or cyberscam activity’, were referred to the ACCC from the US. The ACCC said that ‘assistance in providing information about conduct based in Australia affecting consumers more generally’ was influential in the decision to pursue the matters.[19]

8.18               One earlier example where the ACCC had a measure of success was the 2003 Sydney Opera House Case, which involved a fraudulent website hosted and administered from overseas that purported to be the official booking site for the Sydney Opera House. Consumers in the UK and Europe had been caught by the fraudulent site. In August 2003, the Federal Court declared that the site was illegal and, although the injunction could not be formally registered in the US, the court accepted that Australian orders would support Australia’s request for assistance from the US Federal Trade Commission.[20]

8.19               Even where an alleged perpetrator is outside the country there are sometimes opportunities to use Australian enforcement orders against them within this jurisdiction. The ACCC said:

The ability to quickly transfer funds and the propensity to morph and phoenix without the same reputational issues mainstream traders have make effective enforcement orders very important. Court orders may be sought to secure assets in Australia, such as funds in bank accounts, to ensure money is available for consumer redress.[21]

8.20               In 2009, the Designer Brand Outlet Case, a matter referred by the US Federal Trade Commission (FTC) in June 2008, was concluded and serves as a useful case study (see below).[22]


 

ACCC v Bindert (Ben) Kloosterman & Ors

The FTC provided the ACCC with a number of consumer complaints. In addition, the ACCC also received complaints from consumers in the United Kingdom and a number of Australian states. The complaints variously related to Designer Brand Outlet accepting payment and not delivering the goods, goods received not matching the goods ordered (including issues relating to authenticity), refunds not provided and consumers unable to contact the company.

The investigation included liaison with international counterparts, a major Australian bank responsible for the credit merchant facilities for the website and Australian Domain Registrar, Netregistry Pty Ltd, in relation to the registration of the website.

In September 2008, the ACCC sought interim injunctions against the operators of the website, Mr Bindert (Ben) Kloosterman and Ms Xin Fang (Lucy) Shi, and asset preservation orders to ensure the assets of the company and individuals were not sent off shore.

In December 2008 final orders were made, with the Court declaring that the alleged conduct was in breach of ss. 52, 53(a), 53(d), 53(g), 55 and 58 of the Trade Practices Act 1974. Injunctions restraining the operators of the website from engaging in similar conduct in the future on any website were also made, and a timeframe for negotiating a compensation scheme for affected consumers was also set out.

In April 2009, the ACCC reached agreement with the respondents as to terms of compensation for affected consumers. In June 2009 the monies received by the respondents was returned to consumers that had provided a valid claim for compensation.

 

Reciprocal registration and enforcement of judgements

8.21               The reciprocal registration and enforcement of overseas judgments is dealt with under the Foreign Judgements Act 1991 (Cth) but the scheme only applies to ‘enforceable money judgments’ unless the regulations also provide for ‘non-money’ judgements. At the commencement of this inquiry pecuniary penalties were not available in relation to consumer protection matters under the Trade Practices Act 1974 (Cth). And, to date declarations of breaches of the Trade Practice Act 1974 (Cth) and injunctions to prevent future violations are not covered by the scheme.

8.22               The Australian Consumer Law is intended to replace provisions of the various State and Territory Acts and Trade Practices Act 1974 (Cth) and to be fully implemented nationally by 31 December 2010.[23] Part of these reforms includes stronger remedies, including empowering regulators to seek civil and pecuniary penalties, injunctions, damages, and compensation orders for contravention of the Australian Consumer Law.

Committee View

8.23               The availability of money judgments under the new Australian Consumer Law means that the Foreign Judgments Act 1991 (Cth) will have greater potential for utility in the field of consumer protection.[24] However, whether non-money orders should be provided for by regulation under the Foreign Judgments Act 1991 (Cth) remains an outstanding question.

8.24               In the Internet age national governments need to utilise all the mechanisms available to enforce their consumer protection regimes.  In the Sydney Opera House Case, Justice Sackville took the opportunity to comment that:

While domestic courts can, to a limited extent, adapt their procedures and remedies to meet the challenges posed by cross border transaction in the Internet age, and effective response requires international co-operation of a high order. As the evidence in this case shows, some steps have been taken to secure that cooperation ... [but] much more needs to be done if Australian consumers are to be adequately protected against fraud or misleading conduct perpetrated over the Internet.[25]

8.25               This Committee is of the view that combating the globalisation of online scams and other forms of cyber crime requires a comprehensive and integrated approach to enforcement. As Australia moves into an era of stronger and nationally consistent consumer protection law it makes sense to pay attention to the international cooperation and enforcement aspects of the new regime.

8.26               The bilateral MOUs with the US and other countries and the ICPEN Memorandum are intended, among other things, to improve the effective enforcement of consumer protection laws and have benefits for consumers everywhere. Further institutionalising enforcement through formal court procedures will also enable the Australian regulator to assertively and efficiently enforce Australian law to protect Australian consumers. This is not a substitute for administrative cooperation, which remains of vital importance and in many cases will be the most appropriate way forward.  However, closing the gap between the Australian Consumer Law and the Foreign Judgments Act 1991 (Cth) is one area of legislative reform that can strengthen the protection of consumers in the Internet age.

 

Recommendation 22

  That the Australian Government ensure that:

n  remedies available under the new Australian Consumer Law can be effectively asserted against perpetrators outside Australia; and

n  the Foreign Judgments Act 1991 (Cth) be amended to allow for the reciprocal registration and enforcement of non-money judgments made under the Australian Consumer Law.

 

Consumer Privacy and the Problem of Spyware

8.27               The evidence has demonstrated the complex interplay between different crime methodologies that combine activities crossing criminal and civil law boundaries.  The Cyberspace Law and Policy Centre (CLPC) argued that regulatory and policy analysis tends to focus on one or two elements (DDOS and malware or spam and phishing) creating artificial distinctions that result in wrongly targeted approaches.[26] 

8.28               For example, the installation of unwanted software without the user’s informed consent was said not to be ‘expressly illegal in Australia’.[27] The CLPC said the existing approach misses the connection between legitimate and illegitimate conduct, which if properly targeted could cut through the fragmentation in the Australian system.[28]

8.29               The Trade Practices Act 1974 (Cth) does not explicitly address the problem of unauthorised installation of software per se. Whether an unauthorised installation of software contravenes the Trade Practices Act 1974 (Cth) will depend on whether the conduct takes place within the context of misleading and deceptive conduct or false representation.

8.30               The problem of spyware illustrates the inherently complex relationship between legitimate commercial and criminal online conduct:

… the distinction between spyware and adware can turn on the issue of informed consent: Spyware is software that is installed on a computing device and takes information from it without the consent or knowledge of the user and gives that information to a third party.[29]

8.31               Spyware can be deployed through various means, for example, through free software that includes browser toolbars and personal organisers, downloaded accidentally via an email attachment or simply clicking onto a website.[30] Adware is software that supports the automatic download and display of advertisements and is generally bundled as part of a software package. With permission it also often tracks the end users web browsing activity, this personal information is then used to tailor the display advertisements.

8.32               Where adware is deployed through a third party that bundles the software with its own product, liability is transferred to the third party affiliate through an online contract.[31] In this complex arrangement the adware is less visible, the ability to avoid liability greatly enhanced and the prospect of genuine or informed consent probably redundant.

8.33               In 2005 a Spyware Bill was introduced to the Parliament which sought to ensure that no program, cookie or tracking device could be installed without the user being given full and clear information about the purpose of the program or tracking device.[32]  However, in a review of the legislative framework the then Government concluded that spyware is like other forms of malware and existing criminal offences adequately deal with the problem.[33]  In addition, the Privacy Act 1998 (Cth) prohibits the unlawful collection of personal information; the Trade Practices Act 1974 (Cth) applies where spyware is downloaded in the context of misleading or deceptive conduct and the Australian Securities and Investments Commissions Act 2001 (Cth), Corporations Act 2001 (Cth), and the Telecommunications Act 1997 (Cth) also apply.[34]

8.34               It was contended that Australia’s legal framework is convoluted and works against investigation and prosecution.[35] The ACCC said that:

Careful consideration is needed to determine whether ... [it] would be appropriate to apply industry specific regulations rather than general prohibitions......[36]

8.35               The CLPC argued that:

From the legal perspective, charges and fines have not been made against a single corporation or organisation for spyware or malware distribution in Australia. Contrast this finding to jurisdictions that have mandated an authority such as OPTA or the United States Federal Trade Commission, where over 100 fines and charges have been made against spyware and malware distribution companies such as DollarRevenue in the United States, Canada and Europe.[37]

The DollarRevenue Case

8.36               The CLPC cited the example of Dutch company DollarRevenue, an advertising company, held responsible for the illegal installation of spyware on 22 million computers. The company used an affiliate business model where third parties agreed to deploy DR Software through ActiveX and software bundling (Active payouts in Northern America average $.25c per installation).[38]  According to CLPC, the affiliates use a variety of means to trigger DR software downloads including spam, botnets, and chatroom sessions. Although the company is structured legally, in practice the model is intended to transfer liability to third party affiliates through an online contract.[39]

8.37               The CLPC submitted that DollarRevenue is or has also been involved with ‘malicious spam, iframe injections and Trojan downloads, which initialise information capturing software (such as passwords or browser histories)’. The CLPC also stated that IT security company Sunbelt Malware Research Labs identified over 2,000 additional adware/spyware programs downloaded in a single DR software application.[40]

8.38               Installing software without a user’s informed consent is a violation of the Dutch Telecommunications Act 2004, and the Dutch Telecom Regulator has powers to investigate, fine and issue penalties and compliance notices. The regulator also works with the Dutch police ‘to bring criminal charges where it is warranted’.[41] In this case, the company was fined by the regulator for installing unsolicited software without the informed consent of computer owners. The company directors are reported to be subject to separate criminal investigation.[42]

8.39               The AGD reiterated to the Committee that the computer offences would ‘generally apply in cases where software, such as spyware, is installed in a PC without the owner’s informed consent’ (s.477.2 makes it an offence to use the Internet to infect a computer with spyware).[43] However, the CLPC’s main point was that legitimate adware makes consumers more vulnerable to illegitimate spyware, and other malware applications such as Trojans that ‘collect usernames and passwords for Internet banking and e-commerce websites’.[44]

Committee View

8.40               The Committee believes that while there must be appropriate criminal offences, traditional criminal law enforcement will not always be the most effective approach. Tackling the problem through clear consumer protection measures will help to protect consumer privacy, reduce the opportunities for cyber crime and support criminal law enforcement goals.

8.41               This approach will also support consumer education on the importance of reading the terms and conditions of user agreements and licences, which are often given little or no attention. The browser activity and online purchasing habits of an end user are, in our view, a form of personal information and is unlikely to be consented to in the offline world. While there are technical solutions, not all anti-virus and spyware detection software works all the time. Additionally, consumers may be being surreptitiously tricked into ‘consenting’ to the download. There is also a problem of young people, including children, agreeing to downloads that they not understand or do not have legal capacity to consent to.

8.42               In theory, the Criminal Code applies to the unauthorised installation of spyware, but the lack of enforcement action (domestically or in concert with international partners) suggests Australian agencies are not making inroads into this particular problem. In any event, the existence of a criminal offence on the statute book does not negate the role that a more strategically positioned consumer protection measure can play in preventing further criminal activity.  It also empowers ordinary citizens to respond to privacy violation in a commercial context and strengthens regulators – in this case the ACCC and the Privacy Commissioner.

 

Recommendation 23

  That the Treasurer amend the Australian Consumer Law to include specific protections against the unauthorised installation of software programs:

n  the reform should target the unauthorised installation of programs that monitor, collect, and disclose information about end users’ Internet purchasing and Internet browsing activity;

n  the authority to install a software program must be based on informed consent; and

n  to obtain informed consent the licence/agreement must require clear accessible and unambiguous language.

 

Information Standards

8.43               A common theme in the inquiry has been how to best get the e-security message across to ordinary consumers.  The evidence canvassed in Chapter 4 highlighted that, although general levels of awareness are reasonable among the Australian public, this does not always translate into action. The value of a national e-security awareness strategy is discussed in Chapter 10.

8.44               Some witnesses argued that providing e-security information at the point of sale may be the best time to prompt consumers to take protective action.[45] The Australian Computer Society (ACS) said:

The ACS believes that governments should look to developing agreements with vendors to ensure that computer systems and mobile devices are not sold without supplying adequate e-security and cyber safety information that covers not only current threats but also emerging threats.[46]

8.45               The Australian Senior Computer Clubs Association (ASCCA) was clear that senior Australians must get consistent messages from both government and industry. The ASCCA said:

That anti-virus software and a firewall should be pre-installed on all new computers purchased. An easy to understand brochure, written in plain English, outlining how to be safe online should also be provided with each purchase. Translating this brochure into relevant community languages should also be considered.[47]

8.46               Mr Peter Coroneos, CEO, Internet Industry Association (IIA) agreed that the industry needs to look at every point of contact with the consumer to get across the e-security message. He said:

Absolutely. This is where we need to be lateral in our thinking. We need to look at every point in the chain from the initial purchase of the computer through the setting up of the computer to the ongoing usage of the computer. Each of those points represents an opportunity for awareness raising and behavioural change.[48]

8.47               The IIA used the example of routers and modems, which are vulnerable to being hijacked and the home user would have no way of knowing that it had occurred. Mr Peter Coroneos said that more needs to be done to promote router and modem security.[49] The IIA is working directly with manufacturers and distributors to develop standardised information to give to consumers at point of sale of these devices.[50]

Committee View

8.48               There was general agreement that point of sale information is a useful step in getting out the e-security message to consumers. This will take different forms depending on the product. There is no impediment to the IT industry creating an industry wide e-security messaging standard that applies to the point of sale but none has yet emerged. The Committee is conscious of IIA’s efforts in this regard, but considers that a more comprehensive approach is needed if we are to see any real gains in promoting an e-security culture.

8.49               The Australian consumer protection legal framework provides for information standards that industry must comply with in order to protect consumers for known risks. Under the new Australian Consumer Law, there will be a national approach and new information standards will be created by the Commonwealth Minister.

8.50               The Committee is of the view that the problem of cyber crime, which is predicted to continue to grow in volume and sophistication, poses a sufficiently serious risk of economic and social harm to Australian consumers that a national information standard is warranted. The ACCC should, in consultation with manufacturers and distributors of personal computers, mobile phones and related IT devices such as modems and routers, develop information standards to address the e-security vulnerabilities of these products and the provision of e-security information to consumers at the point of sale.

 

Recommendation 24

  That the Australian Competition and Consumer Commission, in consultation with manufacturers and distributors of personal computers, mobile phones and related IT devices such as modems and routers, develop information standards to:

n  address the e-security vulnerabilities of these products and the provision of e-security information to consumers at the point of sale; and

n  require that the information is presented in a manner that is clear and accessible to a non-IT literate person.

 

IT Vendor Responsibilities

Security of IT Products

8.51               The Committee was told that the problem of cyber crime can largely be traced to the lack of adequate testing of hardware and software products before they are released onto the market.[51] There has been a steady climb in the number of vulnerabilities reported, which was illustrated to the Committee by the IBM Internet Security Systems X Force 2008 Trend and Risk Report published in January 2009.[52]

8.52               The IT vendors usually follow up with security updates and patches, which consumers can often receive automatically, but these may not follow for many months and can involve additional cost and inconvenience. Major vendors, such as Microsoft, provide options for automatic updates but as the evidence has indicated many consumers do not make use of the updates.

8.53               As AusCERT pointed out, the lack of security in technology products exposes all end users (including government, business and the home users) to e-security risks:

We have built vast networks and information systems using technology that cannot be properly or easily secured, ... despite the fact that the software security industry is big business in its own right.[53]

8.54               In 1998, the National Security Agency (NSA), in its paper The Inevitability of Failure: The flawed assumption of security in modern computing environments (1998), summarised a key aspect of the problem as follows:

The goal of this paper is to motivate a renewed interest in secure operating systems. [The NSA] argues that the threats posed by the modern computing environment cannot be addressed without support from secure operating systems and, [...] any security effort which ignores this fact can only result in a “fortress built upon sand”.[54]

8.55               The problem extends beyond operating systems to software applications, which AusCERT said need to be securely designed because vulnerabilities in applications such as browser plug-ins, for example Adobe Flash and Shockwave, can compromise entire computer systems. The general point was made that NSA analysis remains valid but in fact the threat environment has ‘substantially worsened and the modern software environment has not kept pace.’[55]

8.56               The ACS concurred with this overall assessment:

Ultimately, many cyber crime risks can be mitigated by industry developing more secure hardware and software and integrating improved security into the software and hardware development cycles. Technology must become more trustworthy in terms of its security vulnerabilities.[56]

8.57               There has been a trade off in the market between security with speed, interoperability and the desire to allow an openness that will foster innovation. However, as ACS said, the downside is that:

The competitive nature of computing and the rush to market to achieve first mover advantages appear to be driving a less thorough testing of code, system and hardware vulnerabilities.[57]

8.58               According to ACCAN’s research the cost and inconvenience to consumers is significant and warrants specific research, perhaps by the Productivity Commission. In ACCA’s report Surfing on Thin Ice: Consumers and Malware, Adware, Spam & Phishing it was found that:

More than 1 out of every 10 consumers surveyed had suffered financial loss or unexpectedly high bills as a result of security problems, with the majority of these losses exceeding $100. These results, combined with written comments we received, highlight the significant burden consumers face as a result of online security issues and hints at their impact on the economy, consumer satisfaction and productivity. Projected to the wider Australian population, consumers as a whole may be experiencing hundreds of millions of dollars of financial loss as a result of security problems, and many may be experiencing emotional distress and spending significant amounts of time dealing with security issues.[58]

8.59               The lack of IT security and the risks and costs of cyber crime are also a factor that inhibits the growth of e-commerce. It has been reported that although over 90 per cent of small and medium sized businesses are connected to the Internet, the risk that company systems can be hacked into is the number one concern in relation to e-commerce.[59]

8.60               The ACS would like to see vendors embrace secure development of applications more fully. In their view, this should be done on a voluntary basis and ‘consistent with the international standards to which all hardware and software developers and suppliers sign up to comply with’.[60]

8.61               A voluntary security assurance scheme based on an International Common Criteria Framework already exists. In Australia, the Defence Signals Directorate (DSD) provides evaluation and testing of products as part of this scheme in its role of providing technical security support to government departments and agencies.[61] Lists of certified products are available online but the audience is generally IT security professionals working within government.

8.62               Microsoft Australia advocated a wider take up of the existing framework for testing and evaluation of the security features of IT products.[62] However, as AusCERT pointed out, although software assurance occurs as part of the Common Criteria program there is no requirement for products to undergo security assurance checking before being released to the market. Nor is there any requirement for those that do undergo the testing process to display the level of security assurance obtained to consumers.[63]

8.63                According to AusCERT most products do not achieve a level of security that is sufficient for the purposes of reducing cyber crime:

Hence, a lot more work needs to be done by software manufacturers to attain a software evaluation that allows consumers to have confidence that they are buying products that are relatively secure to deploy, ie are able to reliably defend themselves from attack. This applies to both operating systems manufacturers and application software, both proprietary and open source.[64]

8.64               The ACCC confirmed that there is no code of practice or standards under the Trade Practices Act 1974 (Cth) that require IT manufacturers to build security into their products. As Mr Nigel Ridgway, Group General Manager, Compliance, Research, Outreach and Product Safety, ACCC, pointed out, the problem of e-security vulnerabilities in hardware and software products have been responded to by the growth of anti-virus products.[65]

8.65               The ACS suggested that to drive greater trustworthiness of the technology manufacturers should advertise their compliance with security standards (for example the Common Criteria). This would enable consumers to make more informed choices about the security of the product.[66] AusCERT took a similar approach and advocated a software labelling scheme.[67] This would require national regulation requiring software manufactures to display consumer labels with independent evaluation of the product’s security.[68]

8.66               As noted above, Microsoft advocated a greater take up of the existing testing and evaluation scheme under the Common Criteria. However, they argued that any legislative reforms should protect innovation in the IT industry and government should fund research into security issues.[69]  Symantec also argued that a healthy competitive market in security solutions was vital to promote innovation and combat the fast pace of the changing threats.[70]

Committee View

8.67               Throughout this inquiry liability has been a key issue that many stakeholders appeared reluctant to address directly. When considering the same problem in the UK, the House of Lords Science and Technology Committee concluded that efforts to promote better security standards have been hampered by a lack of commercial incentives and that IT vendors can too easily shift the risks and costs onto consumers through licensing agreements.[71] The consumer group, ACCAN, has indicated that it believes the cost to consumers is such a significant issue that it should be looked into by the Productivity Commission.

8.68               The question is what is the best way to drive manufacturers toward greater security in hardware and software applications? The Committee agrees with the House of Lords’ general view that industry should be making security a much higher priority. While it has been important to foster innovation and competition the Committee queries whether the market may have gone too far in this direction at the expense of the security of consumers. The widespread claim that innovation and interoperability will suffer if security is given a higher priority is not entirely convincing.

8.69               The Committee accepts that, to a significant extent, there is an ‘arms race’ to discover and exploit vulnerabilities by highly sophisticated criminal networks. Vulnerabilities cannot be entirely eliminated because of the complexity of these products and the importance of interoperability with third parties. However, in our view, manufacturers must start taking their duty of care to their customers more seriously.

8.70               The costs to end users, especially ordinary consumers but also small and medium size businesses, have been largely hidden. A more secure online environment is needed to build and maintain trust, protect vulnerable end users as much as possible from cyber crime and support the expansion of e-commerce and the digital economy.

8.71               It is the Committee’s view that consumers should not have to rely on the general prohibition on false representation or misleading or deceptive conduct. A more direct approach would be to require by law that IT manufacturers that sell product in Australia should disclose known vulnerabilities so that a consumer can make an informed choice at the point of purchase. To improve security standards manufacturers should adopt best practice to testing and evaluation before release to market. There is a case for specific industry regulation through a code of practice on security standards based on the internationally accepted standards regime. This framework could then provide the basis for a security labelling scheme.

8.72               However, the Committee is conscious there are difficulties with developing a single national regulation for the IT products industry that is global in nature. One issue is the need for such a regime to be consistent with Australia’s international trade obligations.

8.73               The Productivity Commission is an appropriate body to conduct in depth investigation into the economic and social costs of the systemic security issues in the IT hardware and software market, and its impact on efficient functioning of the Australian economy. At this stage the Committee recommends that this in depth investigation be carried out to provide more comprehensive analysis to support future policy development.

 

Recommendation 25

  That the Treasurer direct the Productivity Commission to conduct an in depth investigation and analysis of the economic and social costs of the lack of security in the IT hardware and software products market, and its impact on the efficient functioning of the Australian economy.

That, as part of its inquiry, the Productivity Commission address the merits of an industry specific regulation under the Australian Consumer Law, including a scheme for the compulsory independent testing and evaluation of IT products and a product labelling scheme.

 

8.74               That said, inadequate security is a systemic problem in the IT market and the risks and many of the costs of cyber crime are widely accepted and known. The Committee believes that IT manufacturers have an obligation to make products as secure as possible (subject of course to the rules of anti-competitive conduct). As an interim step, end users should have statutory cause of action against manufacturers who release products to market with known vulnerabilities that result in losses that could not otherwise have reasonably been avoided. The courts are well equipped to apply principled reasoning to complex facts and work out the liability between respective multiple parties.

 

Recommendation 26

  That the Treasurer consult with State and Territory counterparts with a view to amending the Australian Consumer Law to provide a cause of action for compensation against a manufacturer who releases an IT product onto the Australian market with known vulnerabilities that causes losses that could not have reasonably been avoided.

 

Security Settings

8.75               One of the issues raised with the Committee was the lack of sufficient prompting to end users to adopt more secure settings when setting up new products. A case in point is the vulnerability of routers to being hacked and compromised, which affects the security of an entire computer system. It is widely known and accepted that consumers often do not change router settings and this is a risk factor that could be addressed without significant expense to manufacturers.[72] But despite industry knowledge that consumers often do not change the default settings, no industry wide practice has yet emerged to address it.

8.76               The question was why manufacturers do not make default settings as secure as possible or ensure that when setting up there are automatic prompts or actually require the consumer to adopt the strongest possible setting? For example, in the case of a router, a prompt that requires the user to change the setting with a strong password before it can be used would be a simple solution. Secondly, is the failure of industry to provide adequate e-security prompts and secure settings a breach of the Trade Practices Act 1974 (Cth)?

8.77               Under the Trade Practices Act 1974 (Cth), consumers are entitled to products that are ‘fit for purpose’ and ‘free of defects’. These entitlements are statutory conditions that are implied into consumer contracts. In essence, this means that goods must match the description given; be fit for the purpose for which they have been sold; and be of ‘merchantable quality’.[73]

8.78               A product, such as a router, which is ‘fit for purpose’ at the point of sale is arguably no longer ‘fit for purpose’ if the way in which it is set up actually makes the computer system more vulnerable to attack. Some might regard the ability to connect a router to a computer system and the Internet without adequate security setting as an inherent defect in the design of the product.

8.79               The current legal regime does not oblige manufacturers to take any responsibility for designing security into the product.[74] It is not a statutory condition implied into a contract of sale, and nor is it addressed by any industry specific regulation or industry code of practice. As Mr Nigel Ridgway, ACCC, explained:

We do look at these issues on a case by case basis but, in the hypothetical, something that functions quite well or quite appropriately, absent that malicious attack by a third party, is not, I would think, going to fall foul of the warranty provisions.[75]

Committee View

8.80               It seems likely that the vast majority of end users, whether they are home users, or small or medium sized businesses, lack the knowledge to make an informed choice about appropriate security setting for their operating system, the additional hardware devices or the software applications used on it. This appears to be a widespread and well known problem that neither governments nor industry can ignore, because of the financial and social impacts of cyber crime.

8.81               The Committee believes that IT vendors can do more to prompt and guide consumers to adopt better security without locking consumers into completely secure systems that will prevent interoperability. The industry should be encouraged to take account of the reality that most consumers are not IT literate and are unlikely to understand all the implications of poor security settings.

 

Recommendation 27

  That the manufacturers of IT products adopt a best practice approach that ensures products are designed to prompt and guide end users to adopt more secure settings.

That the Australian Government monitor industry practice in this regard, and promote international standards that put a higher priority on security through product design.

 

 

 

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.