{"id":26422,"date":"2019-03-27T14:49:43","date_gmt":"2019-03-27T14:49:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29978\/Microsoft-Is-Not-Comfortable-Storing-Data-In-Australia.html"},"modified":"2019-03-27T14:49:43","modified_gmt":"2019-03-27T14:49:43","slug":"microsoft-is-not-comfortable-storing-data-in-australia","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/","title":{"rendered":"Microsoft Is Not Comfortable Storing Data In Australia"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\" class=\"ff-og-image-inserted\"><\/div>\n<p>Companies and governments are \u201cno longer comfortable\u201d about storing their data in Australia as a result of the encryption legislation, <a href=\"https:\/\/www.theguardian.com\/technology\/microsoft\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">Microsoft<\/a> has warned.<\/p>\n<p>On Wednesday the company\u2019s president and chief legal officer, Brad Smith, said customers were asking it to build data centres elsewhere as a result of the changes, and the industry needed greater protection against the creation of \u201csystemic weaknesses\u201d in their products.<\/p>\n<p>This week the Australian tech industry <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/mar\/27\/tech-industry-says-coalitions-encryption-bill-has-put-it-in-a-chokehold\" data-link-name=\"in body link\" class=\"u-underline\">renewed calls for further amendments<\/a> to controversial encryption-cracking legislation at an industry forum in Sydney.<\/p>\n<aside class=\"element element-rich-link element--thumbnail element-rich-link--not-upgraded\" data-component=\"rich-link\" data-link-name=\"rich-link-2 | 1\">\n<div class=\"rich-link\">\n<div class=\"rich-link__container\">\n<div class=\"rich-link__header\">\n<h2 class=\"rich-link__title\">Tech industry says Coalition&#8217;s encryption bill has put it &#8216;in a chokehold&#8217;<\/h2>\n<\/div><\/div>\n<\/div>\n<\/aside>\n<p>Also on Wednesday, Labor\u2019s spokesman on the digital economy, Ed Husic, told the StartupAus forum in Sydney he wished he could \u201cturn back time\u201d, expressing regret for <a href=\"https:\/\/www.theguardian.com\/australia-news\/2018\/dec\/06\/labor-passes-encryption-bill-as-morrison-dodges-lower-house-vote-on-nauru\" data-link-name=\"in body link\" class=\"u-underline\">Labor\u2019s role in passing the bill<\/a> and explaining the opposition feared it would be blamed for a terrorist attack over Christmas if it refused.<\/p>\n<p>In Canberra, Smith told the Committee for the Economic Development of Australia the law had not yet changed Microsoft\u2019s operations in Australia, but the company was worried about the law\u2019s \u201cpotential consequences\u201d.<\/p>\n<p>Smith said the law was not written with the intent to create backdoors in technology, but the safeguard that companies would not have to create \u201csystemic weaknesses\u201d was \u201cnot defined\u201d. After a deal between the Coalition and Labor <a href=\"https:\/\/www.theguardian.com\/technology\/2018\/dec\/08\/australias-war-on-encryption-the-sweeping-new-powers-rushed-into-law\" data-link-name=\"in body link\" class=\"u-underline\">a definition was added, but the industry has said it is still unclear<\/a>.<\/p>\n<p>Smith said Australia had \u201cemerged as a country where companies and governments were comfortable\u201d with storing data, a boon to the tech sector and the economy.<\/p>\n<p>\u201cBut when I travel to other countries I hear companies and governments say \u2018we are no longer comfortable putting our data in Australia\u2019.<\/p>\n<p>\u201cSo they are asking us to build more data centres in other countries, and we\u2019ll have to sort through those issues.\u201d<\/p>\n<p>The Australian Signals Directorate director general, Mike Burgess, has <a href=\"https:\/\/asd.gov.au\/speeches\/20181212-tola-act-statement.htm\" data-link-name=\"in body link\" class=\"u-underline\">labelled it a \u201cmyth\u201d<\/a> that the reputation of Australian tech companies would suffer as a result of the encryption bill, which the Coalition passed with Labor support on the final parliamentary sitting day of 2018.<\/p>\n<p>At the <a href=\"https:\/\/www.theguardian.com\/australia-news\/sydney\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">Sydney<\/a> forum, that claim was rubbished by industry participants. Eddie Sheehy, a tech investor and former chief executive of the cybersecurity vendor Nuix, said on that point Burgess \u201cdoesn\u2019t know what he\u2019s saying\u201d.<\/p>\n<p>He said in response to a later question the law had the \u201ccapacity to turn many Australian companies into Huawei\u201d in that they <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jan\/27\/huaweis-problems-deepen-as-western-suspicions-mount\" data-link-name=\"in body link\" class=\"u-underline\">might become \u201cuntouchable in many places\u201d<\/a>.<\/p>\n<aside class=\"element element-rich-link element--thumbnail element-rich-link--not-upgraded\" data-component=\"rich-link\" data-link-name=\"rich-link-2 | 2\">\n<div class=\"rich-link\">\n<div class=\"rich-link__container\">\n<div class=\"rich-link__header\">\n<h2 class=\"rich-link__title\">Australia&#8217;s war on encryption: the sweeping new powers rushed into law<\/h2>\n<\/div><\/div>\n<\/div>\n<\/aside>\n<p>Nicola Nye, the chief of staff at FastMail, said some customers were no longer using her service as a result of the law, and others had expressed concerns through submissions to the parliamentary joint committee on intelligence and security. The committee is examining proposed amendments and will report next week.<\/p>\n<p>Husic acknowledged that the tech industry was upset, explaining that Labor had passed the bill because <a href=\"https:\/\/www.theguardian.com\/australia-news\/2018\/nov\/26\/asio-says-it-urgently-needs-powers-forcing-telcos-to-help-break-phone-encryption\" data-link-name=\"in body link\" class=\"u-underline\">national security agencies had said it was urgent<\/a>.<\/p>\n<p>He said the opposition could not rule out an \u201cattempt by the other side of politics to blame us if, God forbid, something should happen over that period of time\u201d.<\/p>\n<p>Labor has accused the Coalition of <a href=\"https:\/\/www.theguardian.com\/australia-news\/2019\/feb\/12\/labor-accuses-coalition-of-welching-on-a-deal-over-encryption-bill\" data-link-name=\"in body link\" class=\"u-underline\">reneging on a deal to support amendments<\/a> consistent with a bipartisan security committee report. Labor\u2019s amendments better define \u201csystemic weakness\u201d and require a fresh warrant before ordering tech companies to assist or build a new capability to access electronic communications.<\/p>\n<p>Husic told the forum that Labor would push for those changes \u201cin this current parliament or the next\u201d, regardless of whether it won or lost the May election.<\/p>\n<p>Faced with an angry questioner from the Science party, Husic said he could not change the fact the bill had passed. \u201cI wish I could go back in time and alter things: I can\u2019t.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29978\/Microsoft-Is-Not-Comfortable-Storing-Data-In-Australia.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6279],"class_list":["post-26422","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentprivacymicrosoftaustraliacryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-27T14:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Is Not Comfortable Storing Data In Australia\",\"datePublished\":\"2019-03-27T14:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/\"},\"wordCount\":655,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/2dd7a948adaf865c9237fdb429855074157a2683\\\/198_222_1999_1200\\\/master\\\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\",\"keywords\":[\"headline,government,privacy,microsoft,australia,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/\",\"name\":\"Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/2dd7a948adaf865c9237fdb429855074157a2683\\\/198_222_1999_1200\\\/master\\\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\",\"datePublished\":\"2019-03-27T14:49:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/2dd7a948adaf865c9237fdb429855074157a2683\\\/198_222_1999_1200\\\/master\\\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/2dd7a948adaf865c9237fdb429855074157a2683\\\/198_222_1999_1200\\\/master\\\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-is-not-comfortable-storing-data-in-australia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,microsoft,australia,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacymicrosoftaustraliacryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Is Not Comfortable Storing Data In Australia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-27T14:49:43+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Is Not Comfortable Storing Data In Australia","datePublished":"2019-03-27T14:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/"},"wordCount":655,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917","keywords":["headline,government,privacy,microsoft,australia,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/","name":"Microsoft Is Not Comfortable Storing Data In Australia 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917","datePublished":"2019-03-27T14:49:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/2dd7a948adaf865c9237fdb429855074157a2683\/198_222_1999_1200\/master\/1999.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;s=381e1da3bd8db9e95814fdec922e8917"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-is-not-comfortable-storing-data-in-australia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,microsoft,australia,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacymicrosoftaustraliacryptography\/"},{"@type":"ListItem","position":3,"name":"Microsoft Is Not Comfortable Storing Data In Australia"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26422"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26422\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}