Our initial journey, outlined in The Digital Mirror: How Requesting Your Data from Your ISP is a Modern Act of Self-Remembering, was a philosophical and legal mission: reclaiming our scattered digital self under the banner of Australian Privacy Principle (APP) 12, the legal right that grants citizens access to their own personal information held by organisations like ISPs. We invoked that right, sending the formal request into the digital void. We understood the principle of data access; now, we face the practice.
The ISP has replied, and their response immediately erects bureaucratic and financial barriers. In real terms, this sequel explores the legal and practical countermeasures used to deter citizens from exercising their right. The ISP's challenge is two-fold: a demand for unnecessary specificity (the date range) and the introduction of an Archive Fee, turning the fundamental legal right to access one's own data into a costly commodity. This is the moment the Act of Self-Remembering runs into the Ministry of Dataโs bottom line.
Framed through the lens of P.D. Ouspensky's "In Search of the Miraculous"
By: Dr Spacequire, An Advocate for Digital Consciousness
The messenger ship, a fragile craft launched into the digital void, returned. It was sent to the very core of the Telecommunications Empire, to the Ministry of Data, to retrieve the long-lost Scrolls of Self. The vessel was not intercepted by TIE Fighters, nor was it vaporised by a Death Star laser. It was returned by the same quiet channel through which it was sentโa simple email from the Galactic Archive itself.
The reply was not the Data Scroll we sought, but a bureaucratic skirmish, a challenge from the Inner Party. They acknowledged the Seditionary Act of Self-Remembering, but then erected a formidable and insidious obstacle: The Paywall.
To request your data is an Act of Rebellion against the central tenet of the Great Filter: who controls the past controls the future; who controls the present controls the past. To ask for your personal history is to challenge their present narrative. They will not give it up easily.
This article proposes a simple, yet profound act of awakening: formally requesting the data your ISP holds about you. This is not merely a legal right; it is a modern ritual of self-study. It is an attempt to see the reflection of our digital soul in the corporate mirror, a crucial step toward transparency, trust, and ultimately, a more conscious existence in the connected world.

Characters:
Uncle Vova ( ะดัะดั ะะพะฒะฐ): The Earth-based foreman, still trying to grasp Plukan logic.
Bi (ะะธ): A Plukan tramp (patzak) who acts as a guide/opportunist.
Uef (ะฃัั): Biโs partner, equally opportunistic.
(Uncle Vova, Bi, and Uef are sitting near their gravitsapa (the broken teleportation device) in the Plukan desert.)
Uncle Vova: (Frustrated, gesturing at the silent device) Well, thatโs that. Three days, and still nothing. Not a spark, not a flicker. Whatโs the word for "fix" again?
Bi: Koo!
Uncle Vova: No, not koo. I know koo is everything. I mean the specific koo for repairing the broken thing that takes us home.
Uef: (Shrugging) The specific koo is Koo. You must find the right Koo-person. A Koo-man.
Uncle Vova: And how do I find this "Koo-man"? Does he wear a sign? What color are his pants?
Bi: Ah! The pants! You see, if he wears Yellow pants, heโs a Chatlanin. He has power. If his pants are Orange, heโs an Etsilop. He has more power. If his pants areโฆ Blueโฆ he's a Patsak, like us. No power.
Uncle Vova: And if his pants are mine? Just plain gray?
Part I: The Scrivener's Query โ The Protocol for Retrieval
The first article established the philosophical necessity of this mission. This sequel offers the tactical roadmap. Our previous communiquรฉ, a formal request under Australian Privacy Principle (APP) 12, was the launch code for the messenger ship.
Below is the full text of the letter we sent. It is a precise, legally grounded command designed to force the custodians of the Great Filter to acknowledge the individual's right to their own memory.
Instructions for the Citizen-Scrivener
Before lodging this request, understand that you are engaging with a bureaucracy designed for delay.
- Address & Method: Address the letter to the Privacy Officer or the Legal Department of your Internet Service Provider (ISP). Lodge the request via the most recorded or traceable channel you have with themโideally, the official email address they use for customer service or, better yet, a dedicated legal or privacy contact (which can often be found in their official Privacy Policy).
- Personalisation: Crucially, replace all bracketed items (like this) with your exact, verified account information. In the Orwellian world of data, precision is compliance.
- Scope: The letter is intentionally broad, demanding a wide range of data (IP addresses, location logs, browsing data). This forces the ISP to work, rather than allowing them to cherry-pick an incomplete 'memory.'
The Data Scroll Protocol (The Request Letter)
Dear Privacy Officer,
I am writing to make a formal request for access to my personal information under Australian Privacy Principle (APP) 12, as set out in the Privacy Act 1988 (Cth).
My account details are as follows:
(name surname)
(full address)
Customer Number: (account number with your ISP)
Contact Number: (phone number)
To assist you in locating all relevant information, this request pertains to all personal information associated with my account, including any data related to IP addresses, phone numbers, and IMEI/device identifiers associated with my service.
Scope of Request
I request a copy of all personal information you hold about me. To be specific, this includes, but is not limited to, the following categories of data:
- Subscriber and Account Information: All provided personal details, billing information, and account history.
- Telecommunications Data (Metadata): All data retained or recorded under the Data Retention Scheme or for your own business purposes, including:
- Source and destination of all communications (phone numbers, email addresses, IP addresses).
- Date, time, and duration of communications (calls, SMS, internet connections).
- Location data (e.g., cell tower connection logs for mobile services).
- The type of service used (e.g., voice, SMS, email).
- Internet and Browsing Data: Any records of my internet activity, including:
- Web browsing history (full URLs).
- Domain Name System (DNS) queries.
- Application usage data.
- Device Information: Any technical information recorded about my devices, including:
- Device specifications (make, model).
- Operating System and version.
- MAC addresses, IMEI numbers, and other unique identifiers.
- Other Personal Information: Any other data you process, such as inferred profiles, contact lists uploaded to your services, or records of my interactions with customer support.
Additional Information Requested
In accordance with my rights under APP 12, I also request that you provide the following:
- The purposes for which you collect and hold each category of my personal information.
- How I can lodge a complaint with you about a breach of the APPs.
- Whether you are likely to disclose my personal information to overseas recipients, and if so, the countries where such recipients are likely to be located.
Delivery Format
Please provide this information in a structured, commonly used, and machine-readable format (e.g., a PDF or CSV file).
Response Timeframe
Under the Privacy Act, an organisation must generally respond to an access request within a reasonable period. The Office of the Australian Information Commissioner (OAIC) guidelines suggest this should be within 30 days.
If you require more time to process this request, please contact me immediately with a justification for the delay.
If you intend to charge a fee for providing this information, please advise me of the cost in advance.
If you deny access to any part of my information, you are required to provide a written notice explaining the legal reasons for the refusal.
Thank you for your prompt attention to this matter. I look forward to your response within the stipulated timeframe.
Yours faithfully,
(signature)
Part II: The Imperial Response โ The Archival Fee
The Ministry of Data received the Scrivenerโs Query. The reply was signed by an individual whose titleโGeneral Manager Risk, Compliance & Auditโwas a testament to the layers of protection built around the truth.
The response was polite, professional, and entirely focused on deterrence.
Good afternoon,
Thank you for your request regarding access to your personal information. We acknowledge receipt and are currently reviewing the details.
To help us accurately assess and extract the relevant data, could you please specify the date range for which you are seeking information? This will allow us to determine the scope of your request and the volume of data involved.
Please note that depending on the size of the information requested, a processing fee may apply. Once we understand the extent of your request based on the date range provided, we will inform you of any applicable charges. You will have the opportunity to review and approve the cost before we proceed with the extraction and delivery of the information.
If you have any questions, feel free to reach out.
Kind regards,
Company representative
General Manager Risk, Compliance & Audit
ISP Company
Part III: Doublethink and the Cost of Memory
This response is the textbook move of the Inner Party. It performs two key actions, both designed to frustrate the Act of Self-Remembering:
The Burden of Specificity
The request for a "date range" is the first strategic retreat from the Ministry of Data. It shifts the burden of discovery back onto the individual. They hold the data; they know the retention period for every category we listed (Metadata is often 2 years; billing is longer).
By demanding a specific range, they are effectively asking, โWhich parts of your own past are you allowed to look at?โ Our original request was intentionally open-ended to capture all data retained under the Data Retention Scheme and for their own business purposes. An acceptable counter-reply is often to state: "The date range covers all personal information retained about my account from the date of account activation to the present day."
The Archive Fee โ Memory as Commodity
The most insidious part of the reply is the introduction of the processing fee.
If the "memory" (the data) is small, the fee may be waived. But for a citizen who has held an account for a decade, the volume of metadata, billing logs, and interaction records is immense. The price of extracting this data becomes the gatekeeper.
In an Orwellian world, the most fundamental human rightโthe right to one's own historyโis not just restricted; it is commodified. Access to the truth about yourself is not a right; it is a transaction.
- The fee acts as a form of Doublethink: We claim to comply with your right to access your data, but we simultaneously make the cost of that compliance prohibitive.
The message is clear: The Empire Strikes Back with a Paywall. To seek your truth is to find yourself faced with a tollbooth, where the price of your own memory is determined by the very entity that recorded it without your full knowledge.
The fight for self-remembrance is not a single battle, but a campaign against bureaucracy, financial deterrence, and institutionalized forgetting. The next step is clear: counter with the date range, demand an itemised quote for the fee, and prepare to escalate the matter to the OAIC if the price is an act of deliberate obstruction.
The journey to reclaim the Scrolls of Self has only just begun?

DR SPACEQUIRE with JOHNNY MAGRITT:
Determine Your Course
If you require additional assistance feel free to reach out to our intelligence departments via booking a consultation herein. For a comprehensive analysis or to introduce yourself in a unique way. However, time is of the essence, and the effectiveness of this action remains uncertain. Act swiftly to address your IT needs! ๐ #ITSolutions #TechSupport #InnovationInProgress #johhnyappleseedpro



