<div dir="ltr">What if we don't log?</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Aug 7, 2014 at 12:08 AM, Paul Brooks <span dir="ltr"><<a href="mailto:pbrooks-ausnog@layer10.com.au" target="_blank">pbrooks-ausnog@layer10.com.au</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
  
    
  
  <div bgcolor="#FFFFFF" text="#000000"><div class="">
    <div>On 6/08/2014 11:51 PM, Skeeve Stevens
      wrote:<br>
    </div>
    <blockquote type="cite">
      <div dir="ltr">For email, it is amusing... who uses ISP email
        anymore?  The ISP's I am building at the moment have no email
        facilities for end-users at all.
        <div><br>
        </div>
        <div>They can talk to google/microsoft/yahoo.</div>
      </div>
    </blockquote></div>
    They do. That bit isn't a problem for them at all, they already have
    very good links with those parties.<br>
    <br>
    Traditionally, the metadata that has been required to be provided to
    answer a warrant has been data the provider has had to keep anyway
    for their own billing purposes - length of call, date/time,
    destination - all the stuff you needed to report to put on a
    telephone bill, and being financial data, that the provider needed
    to keep for 7(?)  years to provide evidence for the tax return etc.<br>
    The provider didn't need to do anything extra.<br>
    <br>
    Now, they are wanting data you may not currently record or keep or
    need to use for billing.<br>
    <br>
    A couple of questions - <br>
    for those who's equipment produces RADIUS logs or DHCP logs - how
    long do you currently keep those logs before purging/overwriting?<br>
    <br>
    for those running SMTP/POP3/IMAP services - how long do you
    currently keep the logs coming out of those servers?<br>
    <br>
    Put another way - if the Government didn't mandate a time period,
    how long are you currently voluntarily keeping your logfile
    information for anyway? How far back could they go if they asked you
    for the data today?<span class="HOEnZb"><font color="#888888"><br>
    <br>
     Paul.</font></span><div><div class="h5"><br>
    <br>
    <br>
    <br>
    <br>
    <br>
    <blockquote type="cite">
      <div dir="ltr">
      </div>
      <div class="gmail_extra"><br clear="all">
        <div>
          <div dir="ltr">
            <div><br>
              ...Skeeve</div>
            <div><br>
            </div>
            <div>
              <div><b style="font-size:13px;font-family:Calibri">Skeeve
                  Stevens - </b><span style="font-size:13px;font-family:Calibri">eintellego
                  Networks Pty Ltd</span></div>
              <div>
                <div><span style="font-family:Calibri;font-size:13px"><a href="mailto:skeeve@eintellegonetworks.com" target="_blank">skeeve@eintellegonetworks.com</a> ; <a href="http://www.eintellegonetworks.com/" target="_blank">www.eintellegonetworks.com</a></span><font>
                    <p style="font-family:Calibri;font-size:13px;margin:0px">
                      Phone: <a href="tel:1300%20239%20038" value="+611300239038" target="_blank">1300 239 038</a>; Cell <a href="tel:%2B61%20%280%29414%20753%20383" value="+61414753383" target="_blank">+61 (0)414 753 383</a> ; <a>skype://skeeve</a></p>

                    <p style="font-family:Calibri;font-size:13px;margin:0px"><a href="http://facebook.com/eintellegonetworks" target="_blank">facebook.com/eintellegonetworks</a> ; <a href="http://linkedin.com/in/skeeve" target="_blank">linkedin.com/in/skeeve</a> </p>

                    <p style="font-family:Calibri;font-size:13px;margin:0px"><a href="http://twitter.com/theispguy" target="_blank">twitter.com/theispguy</a><span style="color:rgb(0,0,0)"> ; blog: </span><a href="http://www.theispguy.com/" target="_blank">www.theispguy.com</a><br>

                    </p>
                    <p style="font-family:Calibri;font-size:13px;margin:0px"><img src="http://eintellegonetworks.com/logos/ein09.png"><br>
                    </p>
                    <p style="margin:0px"><span style="color:rgb(127,0,127);font-family:Calibri,sans-serif;font-size:13px">The
                        Experts Who The Experts Call</span></p>
                  </font></div>
                <div style="font-family:Calibri,sans-serif;font-size:14px;color:rgb(127,0,127)"><span style="color:rgb(0,32,96);font-size:13px">Juniper -
                    Cisco </span><span style="color:rgb(0,32,96);font-size:13px">- Cloud</span><span style="color:rgb(0,32,96);font-size:13px"> </span><span style="color:rgb(0,32,96);font-size:13px">-
                    Consulting</span><span style="color:rgb(0,32,96);font-size:13px"> </span><span style="color:rgb(0,32,96);font-size:13px">- IPv4
                    Brokering</span></div>
              </div>
            </div>
          </div>
        </div>
        <br>
        <br>
        <div class="gmail_quote">On Wed, Aug 6, 2014 at 7:13 PM, Mark
          Dignam <span dir="ltr"><<a href="mailto:mark@innaloo.net" target="_blank">mark@innaloo.net</a>></span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div link="blue" vlink="purple" lang="EN-AU">
              <div>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Narelle.</span></p>
                <p class="MsoNormal">
                  <span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Great
                    post – the shame of it is, the questions are only
                    going to be answered with sound bytes … two of which
                    I heard on Sky News this morning..</span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">“its
                    just the data the ISP already collects for billing”
                    and …</span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">“Its
                    just like the front of an envelope, there’s no harm
                    in that.”</span></p>
                <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p>
                <p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"" lang="EN-US">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"" lang="EN-US"> AusNOG [mailto:<a href="mailto:ausnog-bounces@lists.ausnog.net" target="_blank">ausnog-bounces@lists.ausnog.net</a>]
                    <b>On Behalf Of </b>Narelle<br>
                    <b>Sent:</b> Wednesday, 6 August 2014 4:28 PM<br>
                    <b>To:</b> <a href="mailto:ausnog@ausnog.net" target="_blank">ausnog@ausnog.net</a><br>
                    <b>Subject:</b> [AusNOG] Fwd: Ten questions about
                    metadata retention</span></p>
                <p class="MsoNormal"> </p>
                <div>
                  <div>
                    <p class="MsoNormal"> </p>
                  </div>
                  <p class="MsoNormal">FYI</p>
                  <div>
                    <p class="MsoNormal"> </p>
                    <div>
                      <p class="MsoNormal" style="margin-bottom:12.0pt">
                        ---------- Forwarded message ----------<br>
                        From: <b>Narelle Clark, President ISOC-AU</b>
                        <<a href="mailto:president@isoc-au.org.au" target="_blank">president@isoc-au.org.au</a>><br>
                        Date: Wed, Aug 6, 2014 at 6:22 PM<br>
                        Subject: Ten questions about metadata retention<br>
                        <br>
                        <br>
                      </p>
                      <div>
                        <p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">6
                              August 2014</span></b></p>
                        <p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></b></p>
                        <p class="MsoNormal" style="text-align:center" align="center"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Ten
                              questions about metadata retention</span></b></p>
                        <p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></b></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">The
                            Australian Government has announced that it
                            will mandate the retention of communications
                            metadata for two years in order to assist
                            law enforcement and national security
                            agencies to improve the detection of
                            terrorism offences and reduce the risk of a
                            terrorist attack within Australia or which
                            affects Australians or their interests.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">There
                            has been criticism of this proposal on the
                            grounds of interference with the privacy of
                            the vast majority of Australians who are not
                            terrorists as well as the cost and risks of
                            implementation.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Reassuringly,
                            the Attorney General and Minister for
                            Communications have made it clear that, as a
                            general principle, the Government will seek
                            to minimise the cost impact and risk of
                            interference with the privacy of ordinary
                            Australians to the extent possible.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">However,
                            unfortunately at this point there appears to
                            be insufficient information in the public
                            domain about the detail of the proposal to
                            understand how it is to be implemented in
                            practice and to reach informed conclusions
                            as to whether the benefits of the proposal
                            outweigh its cost and risk.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">The
                            Government has criticised previous
                            governments for the implementation of major
                            communications projects without adequate
                            consideration, planning and design including
                            a formal business case identifying and
                            weighing the benefits of the project against
                            its costs and risks. It is arguable that
                            this is indeed fair criticism.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Accordingly,
                            the Internet Society of Australia expects
                            the Government to ensure that the design and
                            implementation of the metadata retention
                            proposal is not rushed, chaotic or
                            inadequate, by requiring a rigorous business
                            case and/or regulatory impact assessment
                            process which takes into account the costs
                            and risks of the proposal across industry
                            and the economy as a whole, as well as the
                            direct costs to the Commonwealth budget and
                            risks to the Commonwealth.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">We
                            also recommend that the Government conduct a
                            full privacy impact assessment of the
                            proposal in accordance with the Office of
                            the Australian Information Commissioner's
                            guidelines, in addition to any usual
                            parliamentary processes to scrutinise and
                            improve legislation before it is adopted.</span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></p>
                        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Based
                            on the technical and policy experience of
                            its members, the Internet Society of
                            Australia has posed the following questions
                            in relation to the proposal which will
                            require further consideration as part of the
                            various policy, legislation and technical
                            development and assessment processes for the
                            proposal:</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">1.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">What
                              is the definition of metadata to be
                              retained?</span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> 
                            If carriers or other organisations are to be
                            obliged to retain metadata, they need to
                            know what metadata is to be retained. The
                            scope of the data required to be retained
                            will have significant impact on the cost and
                            risk in implementing the proposal.  Is it
                            only Internet connection duration and
                            location information, such as that from
                            authentication systems? Is it IP packet
                            headers, or a subset of the information
                            contained in the packet header, or the full
                            content of some of the packets, for example
                            the contents of the packets which include
                            email subject headings?  Will information
                            about the content of the packets themselves
                            be required to be retained?  Must the
                            metadata of every packet be retained or only
                            session information?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">2.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Which
                              entities are required to retain metadata
                              (Retention Entities)? </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> Will
                            it be restricted to only licensed carriers
                            transmitting information across the public
                            Internet?  Will organisations which operate
                            private internal IP networks or virtual
                            private networks be required to retain the
                            metadata of information passing across their
                            private networks, or only if and once the
                            communication leaves the private network to
                            the public Internet?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">3.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Whose
                              metadata is required to be retained?</span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">
                            Is it the metadata of all individuals,
                            companies, media organisations, members of
                            parliament, political parties, governments
                            and agencies (including the law enforcement
                            and national security agencies themselves)? 
                            Will it apply to the metadata of
                            communications by autonomous devices, like
                            smart meters?  If there are to be
                            exceptions, what is the basis for those
                            exceptions and how will the exceptions be
                            implemented in practice?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">4.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">What
                              method of metadata retention must a
                              Retention Entity employ?  </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Will
                            it be sufficient for Retention Entities to
                            maintain records in a large range of devices
                            across their networks or will the metadata
                            need to be centralised into a single server
                            or data centre? If so, will the
                            centralisation need to occur in real time
                            (which might considerably increase the
                            network overhead and thus require capacity
                            upgrades across the entire network) or can
                            it be batched and transmitted in periods of
                            lower network traffic?  If so, how
                            frequently must it be batched and
                            transmitted?  What will be the consequences
                            of failing to do?  What format is the
                            metadata required to be collected and stored
                            in?  Will the format be standardised or
                            different for different types of
                            communications and storage medium or vendor
                            equipment?  What minimum level of security
                            must the Retention Entity establish and
                            maintain in relation to retained metadata?
                            Will a Retention Entity be restrained from
                            outsourcing and/or offshoring the
                            performance of its retention obligations? 
                            If not, does the Retention Entity remain
                            primarily liable for those obligations?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">5.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">When
                              must metadata retention commence?</span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> 
                            The Government has indicated that there is
                            an immediate serious risk to the Australian
                            community from terrorism which metadata
                            retention and access will assist to
                            mitigate.  Accordingly the Government will
                            seek to implement some form of voluntary
                            informal metadata retention arrangements by
                            direct discussions with the communications
                            industry prior to the introduction of
                            legislation.  However, implementation of a
                            metadata retention system is likely to
                            require adequate time to properly plan,
                            design, implement and test before it 'goes
                            live'.  Too rapid implementation is likely
                            to:</span></p>
                        <p style="margin-left:85.1pt"><span style="font-family:"Verdana","sans-serif";color:#095261">5.1</span><span style="font-size:7.0pt;color:#095261">           
                          </span><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">unexpectedly
                            incur or bring forward capital costs which
                            have not been previously budgeted for or
                            funded which may create short term
                            competitiveness or even liquidity issues,
                            particularly for smaller Retention Entities;
                          </span></p>
                        <p style="margin-left:85.1pt"><span style="font-family:"Verdana","sans-serif";color:#095261">5.2</span><span style="font-size:7.0pt;color:#095261">           
                          </span><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">increase
                            total costs of implementation due to
                            uncertainties in the specification of the
                            form of metadata retention required to be
                            implemented and changing requirements
                            through the various review and parliamentary
                            processes; and</span></p>
                        <p style="margin-left:85.1pt"><span style="font-family:"Verdana","sans-serif";color:#095261">5.3</span><span style="font-size:7.0pt;color:#095261">           
                          </span><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">increase
                            the risk of unidentified defects in design
                            and implementation, thereby increasing the
                            total risk of project failure, loss or
                            disclosure of retained metadata and future
                            requirements to incur additional costs of
                            rectification.</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">6.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Who
                              will pay the cost of metadata retention? </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Will
                            there be some public subsidy to private
                            organisations to meet the capital and
                            operational expenses of implementing and
                            operating metadata retention?  Or, will the
                            cost need to be absorbed by customers and/or
                            shareholders?  If there is to be some form
                            of public subsidy, on what basis will it be
                            calculated and allocated between Retention
                            Entities?  What will the costs of operation
                            of the subsidy system be and how will that
                            be allocated between the public and private
                            sectors?  A practical mechanism may be to
                            require relevant law enforcement or national
                            security agencies to subsidise the Retention
                            Entities' capital implementation costs and
                            then pay the true operational cost of each
                            access request they make from their existing
                            budget allocations.  This would create a
                            practical budgetary incentive upon agencies
                            to restrict the requirements of (and thus
                            cost of) metadata retention systems and the
                            number of access requests to only the most
                            important and to limit 'fishing
                            expeditions'.</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">7.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">What
                              authorisation will be required to access
                              metadata?  </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Will
                            metadata be available only to law
                            enforcement (ie Police) and national
                            security agencies? What are the range of
                            agencies permitted to seek access to
                            retained metadata and the purposes for which
                            they may seek access? Will it be limited to
                            intelligence and policing agencies for
                            counter-terrorism purposes or extend to
                            'ordinary' criminal or civil law enforcement
                            activity.  For example, will ASIC, local
                            governments, the Victorian Taxi Directorate
                            and the RSPCA continue to have the ability
                            to access retained metadata for the
                            enforcement of the statutes for which they
                            are responsible, as currently?   In what
                            circumstances will a warrant or formal
                            authorisation be required?  Will that be an
                            independent process?  What oversight will be
                            in place?  What sanctions will be applied to
                            individual officers who inappropriately
                            authorise access?  What sanctions will apply
                            to agencies and officers who inappropriately
                            use or disclose metadata which has been
                            accessed?  Will the Retention Entity be
                            permitted to access its retained metadata
                            for its own business (including billing and
                            marketing) or other purposes?  Will private
                            parties to litigation (for example, unfair
                            dismissal, breach of confidence or divorce
                            cases) be able to demand the provision of
                            metadata upon subpoena?  Will metadata of,
                            or held by, agencies be available under
                            Freedom of Information requests?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">8.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">How
                              long must metadata be retained and how
                              will it be disposed of?  </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Is
                            the two year period foreshadowed by the
                            government the specific, minimum or maximum
                            period for which the data is to be
                            retained?  Will agencies be authorised to
                            access metadata which is more than two years
                            old?  What obligations will Retention
                            Entities have to ensure that retained
                            metadata is disposed of and fully expunged
                            after the expiry of the two year period?</span></p>
                        <p><span style="font-family:"Verdana","sans-serif";color:#095261">9.</span><span style="font-size:7.0pt;color:#095261">              
                          </span><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">Who
                              will bear the risks of metadata retention?
                            </span></b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">It
                            is likely that any 'deep pool' of metadata
                            will pose an attractive target to hackers,
                            ranging from the purely curious through the
                            disorganised anti-social to organised crime
                            and terrorist organisations themselves.   As
                            the Manning and Snowden cases make clear, no
                            information system is ever completely
                            secure, so there is a real probability that
                            retained metadata will be accessed
                            inappropriately or without authorisation, in
                            a way that causes real personal and economic
                            harm.  Who bears the costs of that harm: is
                            it the individual whose privacy is
                            interfered with; the business who suffers
                            loss or damage from the disclosure of its
                            confidential information; the Retention
                            Entity which is retaining the data; or the
                            taxpayer through the government?  What
                            mechanisms, for example statutory
                            indemnities or immunities, will be put in
                            place to give effect to that risk
                            allocation?  What disclosure regimes will be
                            in place in order to report such breaches?</span></p>
                        <p><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">10.     
                            <b>What ongoing review and reporting of
                              metadata retention will occur? </b>Is the
                            metadata retention intended only to be in
                            place for the next five years, which the
                            Director General of ASIO has identified as
                            the peak risk period for returning
                            jihadists, or will it be in place
                            indefinitely?  This will affect the way
                            Retention Entities amortise any of their
                            unsubsidised capital costs of implementing
                            retention systems.  Will there be a review
                            of metadata retention?  Who will conduct the
                            review, by what process and when? What
                            statistics and key performance indicators of
                            the effectiveness of the proposal in
                            achieving its stated aims will be collected,
                            analysed and published to enable a review to
                            occur?</span></p>
                        <p class="MsoNormal" style="text-autospace:none"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a"> </span></b></p>
                        <p class="MsoNormal" style="text-autospace:none">
                          <b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">About
                              the Internet Society</span></b></p>
                        <p class="MsoNormal" style="margin-bottom:12.0pt;text-align:justify">
                          <span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095257">The
                            Internet Society is the world's trusted
                            independent source of leadership for
                            Internet policy, technology standards and
                            future development. Based on its principled
                            vision and substantial technological
                            foundation, the Internet Society works with
                            its members and Chapters around the world to
                            promote the continued evolution and growth
                            of the open Internet through dialogue among
                            companies, governments, and other
                            organisations around the world. See</span><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">
                            <a href="http://www.internetsociety.org" target="_blank">www.internetsociety.org</a>
                          </span></p>
                        <p class="MsoNormal" style="text-align:justify"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">The
                            <b>Australian Chapter of the Internet
                              Society</b> is ISOC-AU, a non-profit
                            society founded in 1996, to promote Internet
                            development in Australia for the whole
                            community and is a peak body organisation,
                            representing the interests of Internet users
                            in Australia. See: <a href="http://www.isoc-au.org.au" target="_blank">www.isoc-au.org.au</a></span></p>
                        <p><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261"> </span></b></p>
                        <p class="MsoNormal" style="text-align:justify"><b><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">Narelle
                              Clark</span></b></p>
                        <p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify;line-height:115%"><b><span style="font-size:11.0pt;line-height:115%;font-family:"Verdana","sans-serif";color:#18606a">President</span></b></p>

                        <p class="MsoNormal" style="text-align:justify;line-height:115%"><b><span style="font-size:11.0pt;line-height:115%;font-family:"Verdana","sans-serif";color:#18606a">Contact:</span></b></p>

                        <p class="MsoNormal" style="text-align:justify"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">Narelle
                            Clark</span></p>
                        <p class="MsoNormal" style="text-align:justify">
                          <span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">President</span></p>
                        <p class="MsoNormal" style="text-align:justify"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a">Ph:
                            <a href="tel:0412%20297%20043" value="+61412297043" target="_blank">0412 297 043</a></span></p>
                        <p class="MsoNormal" style="text-autospace:ideograph-numeric"><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#18606a"><a href="mailto:President@isoc-au.org.au" target="_blank">President@isoc-au.org.au</a></span></p>

                        <p style="text-align:center" align="center"><b><i><span style="font-size:11.0pt;font-family:"Verdana","sans-serif";color:#095261">The
                                Internet is for everyone!</span></i></b><span></span></p>
                        <span><font color="#888888">
                            <p class="MsoNormal"><span style="color:#888888"><br clear="all">
                                <br>
                                <span>-- </span><br>
                                <br>
                                <br>
                                <span>Narelle Clark</span><br>
                                <span>President</span><br>
                                <span>Internet Society of Australia</span><br>
                                <span>ph: <a href="tel:0412%20297%20043" value="+61412297043" target="_blank">0412 297 043</a></span><br>
                                <span>int ph: <a href="tel:%2B61%20412%20297%20043" target="_blank">+61 412 297 043</a></span><br>
                                <span><a href="mailto:president@isoc-au.org.au" target="_blank">president@isoc-au.org.au</a></span><br>
                                <span><a href="http://www.isoc-au.org.au" target="_blank">www.isoc-au.org.au</a></span><br>
                                <span>The Internet is for Everyone!</span><br clear="all">
                                <br>
                                <span>-- </span><br>
                                <br>
                                <br>
                                <span>Narelle</span><br>
                                <span><a href="mailto:narellec@gmail.com" target="_blank">narellec@gmail.com</a>
                                </span></span></p>
                          </font></span></div>
                    </div>
                  </div>
                </div>
              </div>
            </div>
            <br>
            _______________________________________________<br>
            AusNOG mailing list<br>
            <a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
            <a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
            <br>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset></fieldset>
      <br>
      <pre>_______________________________________________
AusNOG mailing list
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a>
</pre>
    </blockquote>
    <br>
  </div></div></div>

<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div dir="ltr"><div>--</div><div>Ben Cooper</div><div>CEO</div><div>Zeno Holdings PTY LTD<br></div><div>P: <span style="color:rgb(51,51,51);font-family:'lucida grande',tahoma,verdana,arial,sans-serif;font-size:11px;line-height:14.079999923706055px">+61 7 3503 8553</span></div>
<div>M: 0410411301</div><div>E: <a href="mailto:ben@zeno.io" target="_blank">ben@zeno.io</a></div><div>W: <u><a href="http://zeno.io" target="_blank">http://zeno.io</a></u></div></div>
</div>