Part 3Network security
Disclosure
47Areas of specified security interest
In this section and section 48, an area of specified security interest, in relation to a network operator, means—
- network operations centres:
- lawful interception equipment or operations:
- any part of a public telecommunications network that manages or stores—
- aggregated information about a significant number of customers:
- aggregated authentication credentials of a significant number of customers:
- administrative (privileged user) authentication credentials:
- aggregated information about a significant number of customers:
- any place in a public telecommunications network where data belonging to a customer or end user aggregates in large volumes, being either data in transit or stored data:
- any area prescribed under subsection (2).
The Governor-General may, by Order in Council, on the recommendation of the Minister responsible for the Government Communications Security Bureau, make regulations—
- amending or removing an area of specified security interest listed in subsection (1):
- prescribing additional areas of specified security interest.
The Minister must not recommend the making of regulations under subsection (2) unless—
- the Minister has consulted network operators registered under Part 4; and
- the Minister is satisfied that the regulations are necessary or desirable to—
- keep up to date with changes in technology; or
- address changes in the way that networks are being used that may give rise to a security risk; or
- address any significant changes in architectural approach to the design of a public telecommunications network.
- keep up to date with changes in technology; or
In this section,—
administrative (privileged user) authentication credentials means the authentication credentials of a privileged user
authentication credentials means any information (for example, passwords or usernames) used to ascertain the identity of a user, process, or device
privileged user means a person who has authorisations that enable the person to, among other things, alter, bypass, or circumvent network security protections.
Regulations under this section are secondary legislation (see Part 3 of the Legislation Act 2019 for publication requirements).
Notes
- Section 47(5): inserted, on , by section 3 of the Secondary Legislation Act 2021 (2021 No 7).


