>>964708
(((Principles)))
(((The Attorneys General and Interior Ministers of the United States, the United Kingdom, Canada, Australia and New Zealand affirm the following principles in relation to encryption.)))
(((1. Mutual Responsibility)))
(((Diminished access to the content of lawfully obtained data is not just an issue for Governments alone, but a mutual responsibility for all stakeholders.)))
(((Providers of information and communications technology and services - carriers, device manufacturers or over-the-top service providers --- are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications. Safe and secure communities benefit citizens and the companies that operate within them. )))
(((Hey. wait, I thought cooperation was going to be voluntary!?)))
(((We are always willing to work with technology providers in order to meet our public safety responsibilities and ensure the ability of citizens to protect their sensitive data. Law enforcement agencies in our countries need technology providers to assist with the execution of lawful orders. Currently there are some challenges arising from the increasing use and sophistication of encryption technology in relation to which further assistance is needed.)))
(((Well, if it stops the terrorists I suppose I understand)))
(((Governments should recognize that the nature of encryption is such that that there will be situations where access to information is not possible, although such situations should be rare.)))
(((Yes. Locks should be for security, but no one needs Fort Knox level security in their home.)))
(((2. Rule of law and due process are paramount)))
(((All governments should ensure that assistance requested from providers is underpinned by the rule of law and due process protections.)))
(((The principle that access by authorities to the information of private citizens occurs only pursuant to the rule of law and due process is fundamental to maintaining the values of our democratic society in all circumstances -- whether in their homes, personal effects, devices, or communications. Access to information, subject to this principle, is critical to the ability of governments to protect our citizens by investigating threats and prosecuting crimes. This lawful access should always be subject to oversight by independent authorities and/or subject to judicial review.)))
(((I gladly submit to my judicial overlords. They know what's best for me concerning how secure and private my data should be.)))
(((3. Freedom of choice for lawful access solutions)))
(((The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries. Governments should not favor a particular technology; instead, providers may create customized solutions, tailored to their individual system architectures that are capable of meeting lawful access requirements. Such solutions can be a constructive approach to current challenges.)))
(((Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.)))
(((So I can still keep my iPhone? All my life is on that, as long as I don't have to change phones, I think this is ok.)))