Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979
|
|
- Brett Gibbs
- 5 years ago
- Views:
Transcription
1 Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Northern Territory Police Submission to the Senate Legal and Constitutional Affairs Committee March
2 Contents Executive Summary... 3 Background... 4 Response to Part A the Recommendations of the Australian Law Reform Commission... 5 Response to Part B the Recommendations Relating to the Act from the Parliamentary Joint Committee on Intelligence and Security... 7 Conclusion Northern Territory Police Submission Page 2 of 10
3 Executive Summary The Northern Territory Police (NT Police) support the comprehensive review of the Telecommunications (Interception and Access) Act 1979 (Cth) (the Act) for greater transparency, efficiency and ease of understanding and use, including: the inclusion of further serious offending against the person to be included in the definition of serious offence under the Act; the domestic violence proceedings in the definition of permitted purpose ; for disciplinary proceedings against public officers in the definition of permitted purpose ; amend the stored communication warrant provisions to provide a greater period of time in which to receive the information lawfully; and the inclusion of decryption requirements on service providers. Northern Territory Police Submission Page 3 of 10
4 Background The Northern Territory, with a population of 239,000 people and covering over 1.34 million square kilometres, is a gateway to Asia with daily direct flights to Singapore, Vietnam, East Timor and Indonesia. The Northern Territory has the highest proportion of people of Aboriginal descent, and is a multicultural community. The non-indigenous population is transient with high proportions of people working in mining and defence. The NT Police is an interception agency as declared under s 34 of the Act. The vision of the NT Police is a safe and secure Northern Territory. The NT Police 2013/14 Business Plan includes a goal to reduce crime by targeting and addressing the causal factors for crime and minimising the opportunity for crime. Strategic outputs by the NT Police for Government include: Ensuring the effective and efficient allocation and use of resources and progressing innovative solutions. Keeping the community safe through focusing on operational excellence and: - implementing crime reduction initiatives focusing on preventing and reducing the level of victim-based crime; and - preventing and reducing the level of re-offending. Northern Territory Police Submission Page 4 of 10
5 Response to Part A the Recommendations of the Australian Law Reform Commission The terms of reference of the Inquiry includes the recommendations of the Australian Law Reform Commission For Your Information: Australian Privacy Law and Practice, dated May 2008, particularly recommendation This Report was tabled in August 2008 and included 34 recommendations relating to telecommunications, under Part J of that Report. Each recommendation under Part J of that Report is addressed individually as follows. Recommendation 71-1 relates to a redraft of the Telecommunications Act 1997 (Cth) and is supported by the NT Police. Recommendation 71-2 relates to considerations in redrafting the Telecommunications Act 1997 (Cth) and the Telecommunications (Interception and Access) Act 1979 (Cth) and is specifically highlighted in the terms of reference to which this submission relates. In a broad sense the NT Police support a review of the Telecommunications Act 1997 and the Telecommunications (Interception and Access) Act Specifically a review provides the opportunity to ensure the two Acts encompass emerging technologies both in terms of regulation and also interception and the prevention of the interception regime being circumvented by criminal enterprise. In regards to recommendation 71-2(e), the NT Police are not in favour of a public interest monitor. The authority and independence of the judicial officer appointed to authorise warrants under the Act is sufficient. Any extra consideration required can be addressed through legislative change instructing the judicial officer on considerations and weight to be placed on those things such as the public interest and privacy concerns. To some extent these conditions already exist. It is appropriate that consideration in relation to the issue of warrants is made by an independent officer of the Court, rather than a statutory position or political appointment. Recommendations 72-1 and 72-2 relate to disclosure under the Telecommunications Act 1997 (Cth). The NT Police support these recommendations. Recommendation 72-6 refers to a cross reference for both Acts. The NT Police are supportive of this recommendation as an aid to understanding and for those unfamiliar with the construct of the Act. Recommendation 72-7 refers to small changes to disclosure provisions. This is supported. There are public safety benefits in accessing contact information for people in an emergency for public health and safety. Recommendation refers to clarifying disclosure of information held on the integrated public number database. This is supported. Northern Territory Police Submission Page 5 of 10
6 Recommendation 73-1 relates to requirements for destruction of records. The NT Police agree there should be some broad guidance on timeframes, within which agencies should review and destroy information. Guidance, rather than legislation can accommodate these differences and provide flexibility regarding when information should be destroyed by an agency. This guidance should address the destruction of intercepted material, stored communications and telecommunications data. Recommendation 73-2 relates to requirements for destruction of non-material records. The NT Police are of the view that there is an inherent risk in selectively deleting intercepted material and are not supportive of this recommendation. Often intercepted material will contain code words and veiled speech as a means to avoid detection by law enforcement agencies. The code words and language vary between individuals and groups. During the course of an intercept, in conjunction with other investigative means, the conversations are deciphered and it is made clear what is being referenced in the communication. This becomes problematic when conversations are selectively destroyed. A coded conversation may not be considered material until further into the intercept and investigation. If the intercepted communication becomes subject of Court proceedings there may be occasions where a defendant claims intercepted material has exculpatory value. If this were deleted this would not be available to the defendant and therefore be a disservice to justice. Recommendation 73-4 refers to bringing the reporting requirements of stored communications warrants and interception warrants into line. The NT Police are not supportive of this. Stored communications warrants provide a different level of intrusion to interception. Reporting requirements at present are considered satisfactory and address needs for ensuring compliance. Recommendation 73-5 refers to the Attorney-General s Department formulating guidelines to clarify existing provisions with regard to telecommunications data. The NT Police support this recommendation. Recommendation 73-6 refers to Ombudsman inspections of stored communications warrants. The NT Police submits that stored communications warrant record inspections should be the responsibility of the Northern Territory Ombudsman and that powers relevant to inspections should mirror those for interception warrants. Northern Territory Police Submission Page 6 of 10
7 Response to Part B the Recommendations Relating to the Act from the Parliamentary Joint Committee on Intelligence and Security The terms of reference of the Inquiry includes the recommendations of the Parliamentary Joint Committee on Intelligence and Security Inquiry into the Potential Reforms of Australia s National Security Legislation report, dated May This Report was tabled in June 2013, and included 43 recommendations, not all of them relevant to a law enforcement agency. The relevant recommendations are addressed individually as follows. Recommendation 1 refers to the insertion of an objectives clause. The NT Police supports the insertion of an objectives clause in the Act, with the following observations: The focus on the investigation of a serious crime and threats to national security excludes the interception and access of telecommunications for the purpose of emergency or disaster management, and for the protection of life and property where no crime exists. For example, the imminent suicide of a person. There is no crime; however, there is a need to prevent the death of a person. Any objectives clause should be constructed so as not to create a conflict between the Act and the Privacy Act 1988 (Cth). Recommendation 2 refers to the examination of the proportionality tests within the Act. The NT Police support the current tiered approach in that the level of authorisation required and considerations varies with the level of intrusiveness involved. Recommendation 3 refers to reviewing the reporting requirements of the Act to evaluate the privacy intrusion and public interest. The NT Police support this recommendation. Recommendation 4 refers to a review of the oversight arrangements. The NT Police are supportive and in favour of one reviewer for simplicity and efficiency. The Ombudsman for the Northern Territory is the preferred reviewer. The Northern Territory Ombudsman currently has responsibility for inspections of the NT Police records as they relate to surveillance devices and conduct these inspections simultaneously with the inspections under the Act. This is more efficient for both parties, and there is a reduced cost to Government by conducting these with a local authority. Recommendation 5 refers to reviewing the threshold for access to telecommunications data. The NT Police supports this recommendation. Recommendation 6 refers to standardisation of thresholds for access to content. The NT Police supports this recommendation. Northern Territory Police Submission Page 7 of 10
8 Recommendation 7 refers to a model of attribute based interception. The NT Police supports this recommendation. Recommendation 8 refers to a review of the information sharing provisions of the Act. The NT Police supports this recommendation. Recommendation 9 refers to the removal of duplication in the legislation. The NT Police supports this recommendation. Recommendation 10 refers to the development of a single warrant regime. The NT Police support further consideration of a single warrant regime noting the following: Currently there is reasonable difference in the threshold required to obtain a telecommunications intercept warrant or stored communications warrant. The NT Police consider the intrusiveness of the two warrants differs sufficiently to justify the different threshold. Examination of a single warrant regime will need to address this. At present access to stored communications usually follows a preservation order. Such an order is crucial in accessing stored communications given the rapid deletion of stored communications by some carriers. Removal of the concept of stored communication would need to keep the concept of a preservation order in some form. Recommendation 16 refers to the creation of an offence for a failure to assist in decrypting communications. The NT Police supports this. Telecommunications has and continues to transfer from traditional telephony to internet protocol (IP) based services. The ability to interpret intercepted communications is more important than ever with the move to encrypted IP based communications. The move from traditional telephony to IP based services could not have been envisaged on the creation of the Act. The NT Police support the requirement of service and product providers to assist in decryption. Recommendation 18 refers to a comprehensive revision of the Act. The NT Police supports this recommendation. Recommendation 42 refers to data retention. The NT Police are supportive of a data retention regime of two years. Such a regime would assist law enforcement agencies in investigating serious crimes. The NT Police are not in favour of excluding browser history. This is inconsistent with the spirit of a revised Act being technology neutral. With the shift from traditional telephony services to IP based services communications taken place on Facebook, Twitter, Google Plus and other IP platforms. This data may be included in browser history and is as important to capture as telephone records for law enforcement purposes. Recommendation 43 relates to oversight and reporting of any data retention scheme that may be adopted. The NT Police supports this recommendation. Northern Territory Police Submission Page 8 of 10
9 More broadly the NT Police seek that any review of the Act considers an update to the serious offence provisions contained in s 5D including the following: The NT Police support a simplification of the current serious offence definition to provide that all offences that carry a period of imprisonment of five years or more be considered a serious offence for the purposes of the Act. If necessary the definition could provide for specific exclusions, should it be determined that a particular category of offence should not be included. Should this not occur, the NT Police seeks to have the following offence categories included in the definition of serious offence: o The inclusion in s 5D(2) of the offence of sexual intercourse without consent, commonly referred to as rape. This offence is punishable by 14 years imprisonment in the Northern Territory. o The inclusion in s 5D(2) of the offence of sexual intercourse or gross indecency with a child under 16 years. This offence is punishable by 16 years imprisonment in the Northern Territory. o The inclusion in s 5D(2) of the offence of attempt to pervert justice. This offence is punishable by 15 years imprisonment in the Northern Territory. The NT Police would further seek for a review of the Act to consider amending the provisions relating to permitted purpose to include the following: Proceedings relating to the application for a domestic violence order and bail applications for matters involving domestic violence. The NT Police consider domestic violence as being a significant form of harm within the community and have over recent years implemented strategies to combat domestic violence. Most homicides and assaults in the Northern Territory are domestic violence related. The Act includes a permitted purpose being used for police discipline proceedings. The NT Police consider this should be expanded to include all public officials. The NT Police have encountered internal investigations where police officers and other public officials have been involved in serious breaches of discipline. The police officer has had their employment terminated and the public officer has not been dealt with for the same course of conduct, due to the difference in the provisions of permitted purpose. The stored communications process should be amended to remove the five day period the warrant is active. Intercepting agencies are beholden to carriers to comply with this five day period to comply with the Act and ensure the material received has been done so lawfully. The NT Police propose the warrant be active for a period of seven business days and place the burden on carriers to comply. Northern Territory Police Submission Page 9 of 10
10 Access to telecommunications material should not be reduced to serious criminal offending or threats to the national security. Many matters exist outside of these parameters that law enforcement considers relevant and in the public interest. They are: o disaster and emergency management including disaster recovery; o missing persons; o threats of serious harm or danger to a person s life, such as suicide; and o search and rescue. Conclusion The NT Police support a review of the Telecommunications (Interception and Access) Act 1979 (Cth) and the Telecommunications Act 1997 (Cth) to provide greater simplicity, clarity and efficiency of operation under those Acts. The reviewed Telecommunications (Interception and Access) Act 1979 (Cth) should include an update to the serious offence provisions at s 5D to include a number of serious offences currently omitted from the Act. Northern Territory Police Submission Page 10 of 10
Q. What do the Law Commission and the Ministry of Justice recommend?
Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government
More informationTable: Government response to PJCIS recommendations on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014
Australian Parliamentary Joint Committee on Intelligence and Security (PJCIS) report into the Telecommunications (Interception and 2014 Joint media release Senator the Honourable George Brandis QC Attorney-General
More informationCybercrime Legislation Amendment Bill 2011
Cybercrime Legislation Amendment Bill 2011 Joint Select Committee on Cyber-Safety 14 July 2011 GPO Box 1989, Canberra ACT 2601, DX 5719 Canberra 19 Torrens St Braddon ACT 2612 Telephone +61 2 6246 3788
More informationLAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD
LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD Objective/Risk Create the governance and safeguards necessary to ensure we appropriately balance respect for our customers right to privacy and
More informationREGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING
REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework
More informationHouse Standing Committee on Social Policy and Legal Affairs
Australian Broadcasting Corporation submission to the House Standing Committee on Social Policy and Legal Affairs and to the Senate Legal and Constitutional Affairs Committee on their respective inquiries
More informationINVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE
INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication
More informationTekSavvy Solutions Inc.
TekSavvy Solutions Inc. Law Enforcement Guide TekSavvy Solutions Inc. ( TekSavvy ) is a provider of Internet access, voice telephony, and related telecommunication services. We retain subscriber information
More informationAPPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:
APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence
More informationLegal Guide to Relevant Criminal Offences in Victoria
Legal Guide to Relevant Criminal Offences in Victoria A review of Victorian criminal offences relating to technology-facilitated family violence and abuse SOME NOTES Language of victim vs survivor Some
More informationManual on the Communications (Retention of Data) Act 2011
Manual on the Communications (Retention of Data) Act 2011 Document last updated July 2017 Table of Contents 1. Introduction...3 2. Disclosure Requests: General...4 4. Request Form...5 5. Oversight...8
More informationthe general policy intent of the Privacy Bill and other background policy material;
Departmental Disclosure Statement Privacy Bill This departmental disclosure statement for the Privacy Bill seeks to bring together in one place a range of information to support and enhance the Parliamentary
More informationPrivacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill
Privacy Commissioner Te Mana Matapono Matatapu Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill Executive
More informationChapter 11 The use of intelligence agencies capabilities for law enforcement purposes
Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes INTRODUCTION 11.1 Earlier this year, the report of the first Independent Review of Intelligence and Security was tabled
More informationSenate Legal and Constitutional Affairs Committee. Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979
Submission 11 Senate Legal and Constitutional Affairs Committee Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979 Submission by the Australian Commission
More informationINVESTIGATORY POWERS BILL EXPLANATORY NOTES
INVESTIGATORY POWERS BILL EXPLANATORY NOTES What these notes do These Explanatory Notes relate to the Investigatory Powers Bill as brought from the House of Commons on 8. These Explanatory Notes have been
More informationWorkplace Surveillance Act 2005
Workplace Surveillance Act 2005 As at 20 May 2014 Long Title An Act to regulate surveillance of employees at work; and for other purposes. Part 1 ñ Preliminary 1 Name of Act This Act is the Workplace Surveillance
More informationLEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA
LEGAL GUIDE TO APPREHENDED DOMESTIC VIOLENCE ORDERS LEGAL GUIDES WESTERN AUSTRALIA : Women s technology safety, legal resources, research & training LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Proposal for a Council Decision on the conclusion of an Agreement between the European Union and Australia on the processing and transfer of Passenger
More informationI. REGULATION OF INVESTIGATORY POWERS BILL
These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION
More informationTelecommunications (Interception Capability and Security) Bill
Government Bill Explanatory note General policy statement This Bill repeals and replaces the Capability) Act 2004. The main objectives of the Bill are to ensure that the interception obligations imposed
More informationTranslation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland
Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)
More informationSubmission to the Joint Committee on the draft Investigatory Powers Bill
21 December 2015 Submission to the Joint Committee on the draft Investigatory Powers Bill 1. The UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression;
More informationLaw Commission Review of the Search and Surveillance Act 2012
Law Commission Review of the Search and Surveillance Act 2012 Contact Person: John Hancock Senior Legal Adviser New Zealand Human Rights Commission johnh@hrc.co.nz 1 Law Commission Review of the Search
More informationHAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND
HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND Mandates of the Special Rapporteur on the promotion and protection
More informationPrivacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.
Privacy Policy Law Society of South Australia Privacy Policy The Law Society of South Australia (Law Society or we, us or our) deals with information privacy in accordance with the Privacy Act 1988 (Cth)
More informationProtection of Freedoms Act 2012
Protection of Freedoms Act 2012 Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data March 2013 Issued Pursuant to Section 22
More information22 January Joint submission by:
Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 22 January 2019 Joint
More informationKey elements of the Work Health and Safety Bill
Australian Mines and Metals Association Key elements of the Work Health and Safety Bill The final version of the model national OHS legislation is called the Work Health and Safety Bill, representing a
More informationCRIMINAL LEGISLATION (AMENDMENT) ACT 1992 No. 2
CRIMINAL LEGISLATION (AMENDMENT) ACT 1992 No. 2 NEW SOUTH WALES 1. Short title 2. Commencement 3. Amendments 4. Explanatory notes TABLE OF PROVISIONS SCHEDULE 1 AMENDMENT OF CRIMES ACT 1900 NO. 40 SCHEDULE
More informationLEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL
LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL Background 1. This memorandum has been lodged by Michael Matheson, Cabinet Secretary for Justice, under Rule 9B.3.1(a) of the Parliament s Standing
More informationThe forensic use of bioinformation: ethical issues
The forensic use of bioinformation: ethical issues A guide to the Report 01 The Nuffield Council on Bioethics has published a Report, The forensic use of bioinformation: ethical issues. It considers the
More informationPrivacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.
Privacy Policy Cabcharge Australia Limited ( Cabcharge ) is subject to the Australian Privacy Principles pursuant to the Privacy Act 1988 as amended by the Privacy Amendment (Enhancing Privacy Protection)
More informationCounter-Terrorism Bill
EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 6 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following
More informationTechnology and the Law. Jackie Charles
Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy
More informationH. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation
DIVISION V CLOUD ACT SEC. 101. SHORT TITLE. This division may be cited as the Clarifying Lawful Overseas Use of Data Act or the CLOUD Act. SEC. 102. CONGRESSIONAL FINDINGS. Congress finds the following:
More informationFILMS AND PUBLICATIONS AMENDMENT BILL
REPUBLIC OF SOUTH AFRICA PORTFOLIO COMMITTEE AMENDMENTS TO FILMS AND PUBLICATIONS AMENDMENT BILL [B 37 2015] (As agreed to by the Portfolio Committee on Communications (National Assembly)) [B 37A 2015]
More informationCRS Report for Congress
Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act
More informationInvestigatory Powers Bill
Investigatory Powers Bill [AS AMENDED ON REPORT] CONTENTS PART 1 GENERAL PRIVACY PROTECTIONS Overview and general privacy duties 1 Overview of Act 2 General duties in relation to privacy Prohibitions against
More informationRail Safety (Adoption of National Law) Act 2012 No 82
New South Wales Rail Safety (Adoption of National Law) Act 2012 No 82 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Interpretation 2 Application of 4 Application of 3 5 Interpretation
More informationCOUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE
COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE References to clauses are to the Bill as introduced to the House of Lords. References are square bracketed and include
More informationLaw Enforcement Disclosure Report. Legal Annexe June Vodafone Power to you
Law Enforcement Disclosure Report Legal Annexe June 2014 Vodafone Power to you Contents Law Enforcement Disclosure Report Legal Annexe Contents 3 Introduction A-E 5 Albania Albania 16 Czech Republic 8
More informationProtecting Your Privacy
Protecting Your Privacy 2017 Transparency Report Contents 2 Requests for customer information 3 Number of information requests received, disclosed, rejected and contested 4 Types of disclosure requests
More informationRegulation of Investigatory Powers Bill
Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary
More informationInvestigatory Powers Bill Briefing
Investigatory Powers Bill Briefing What is the Investigatory Powers Bill? Running to 245 pages, the Investigatory Powers Bill is an attempt to establish a clear framework for the authorisation and use
More informationAnalysis of the Workplace Surveillance Bill 2005
Analysis of the Workplace Surveillance Bill 2005 16 May 2005 Introduction This paper sets out the Australian Privacy Foundation s analysis of the Workplace Surveillance Bill 2005 (NSW). The Workplace Surveillance
More informationOfficial Journal of the European Union. (Legislative acts) DIRECTIVES
1.5.2014 L 130/1 I (Legislative acts) DIRECTIVES DIRECTIVE 2014/41/EU OF THE EUROPEAN PARLIAMT AND OF THE COUNCIL of 3 April 2014 regarding the European Investigation Order in criminal matters THE EUROPEAN
More informationAIA Australia Limited
AIA Australia Limited Privacy policies & procedures May 2010 The Power of We AIA.COM.AU AIA Australia Limited Privacy policies & procedures Contents Purpose 3 Policy 3 National Privacy Principles Policy
More informationTelecommunications Information Privacy Code 2003
Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8
More informationGeneWatch UK comments on the Northern Ireland Criminal Justice Bill
GeneWatch UK comments on the Northern Ireland Criminal Justice Bill 1 August 2012 GeneWatch UK welcomes the opportunity to comment on the aspects of the Criminal Justice Bill which relate to the retention
More informationEUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981
EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COP 200 TELECOM 151 CODEC 1206 OC 981 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE
More informationVictims Rights and Support Act 2013 No 37
New South Wales Victims Rights and Support Act 2013 No 37 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 Victims rights Division 1 Preliminary 4 Object of Part
More informationNew Zealand Intelligence and Security Bill
New Zealand Intelligence and Security Bill Government Bill As reported from the Foreign Affairs, Defence and Trade Committee Recommendation Commentary The Foreign Affairs, Defence and Trade Committee has
More informationThe Protection of Freedoms Bill
The Protection of Freedoms Bill The Protection of Freedoms Bill deals with a wide variety of areas. It includes provisions on retention of DNA and fingerprints by the police, use of biometrics by schools,
More informationSubmission to the Legal Affairs and Community Safety Committee. Victims of Crime Assistance and Other Legislation Amendment Bill 2016
Submission to the Legal Affairs and Community Safety Committee Victims of Crime Assistance and Other Legislation Amendment Bill 2016 16 January 2016 1 Introduction knowmore is an independent, national
More informationJoint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission
Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Executive Summary: The draft bill is far-reaching with the potential to intrude into the private lives of individuals.
More informationReleasing personal information to Police and law enforcement agencies: Guidance on health and safety and Maintenance of the law exceptions
Releasing personal information to Police and law enforcement agencies: Guidance on health and safety and Maintenance of the law exceptions October 2017 CONTENTS Purpose of this Guide... 3 Voluntary requests
More informationHouse of Commons NOTICES OF AMENDMENTS. given up to and including. Wednesday 8 June 2016
1 House of Commons NOTICES OF AMENDMENTS given up to and including Wednesday 8 June 2016 New Amendments handed in are marked thus Amendments which will comply with the required notice period at their next
More informationPort Glasgow St Andrew s Data Protection Policy
Port Glasgow St Andrew s Data Protection Policy CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data should be processed 7. Privacy
More informationOur Ref: Criminal Law Committee /5 8 February 2013
Our Ref: Criminal Law Committee 2100339/5 8 February 2013 Research Director Legal Affairs and Community Safety Committee Parliament House George Street BRISBANE QLD 4000 By Post and Email to: lacsc@parliament.qld.gov.au
More informationChapter 9 Production orders
Chapter 9 Production orders BACKGROUND 9.1 9.2 9.3 Prior to the Search and Surveillance Act 2012 (the Act), enforcement officers who wanted to obtain data from a third party, such as a telecommunications
More informationANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed
ANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed 1. 29 th March, 2012 Initial Issue 2. 5 th October 2015 Review and approval by Compliance Task Group
More informationTELUS Transparency Report
TELUS is a national telecommunications company, and as such, law enforcement agencies and government organizations regularly contact us to request specific information about our customers. This transparency
More informationNational Security Legislation Amendment Bill (No. 1) 2014 No., 2014
0-0 The Parliament of the Commonwealth of Australia THE SENATE As passed by both Houses National Security Legislation Amendment Bill (No. ) 0 No., 0 A Bill for an Act to amend the law relating to national
More informationCOMMUNICATION FROM THE COMMISSION. On the global approach to transfers of Passenger Name Record (PNR) data to third countries
EUROPEAN COMMISSION Brussels, 21.9.2010 COM(2010) 492 final COMMUNICATION FROM THE COMMISSION On the global approach to transfers of Passenger Name Record (PNR) data to third countries EN EN COMMUNICATION
More informationChild Protection Legislation Amendment (Children s Guardian) Act 2013 No 31
New South Wales Child Protection Legislation Amendment (Children s Guardian) Act 2013 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Amendment of Child Protection (Working with Children) Act
More informationCoordinated text from 10 August 2011 Version applicable from 1 September 2011
Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending
More informationResolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan
Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan CANADIAN ASSOCIATION OF CHIEFS OF POLICE Leading progressive change in policing 130 Albert Street Suite 1710 Ottawa,
More informationAFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org
AFRICAN DECLARATION on Internet Rights and Freedoms africaninternetrights.org PREAMBLE Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including
More informationEducation Legislation Amendment (Staff) Act 2006 No 24
New South Wales Education Legislation Amendment (Staff) Act 2006 No 24 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of Teaching Service Act 1980 No 23 2 4 Amendment of Technical and Further
More informationComplaints to the Ombudsman
Complaints to the Ombudsman CHAPTER CONTENTS Introduction 2 Complaints to the Commonwealth Ombudsman 2 Complaints to the Queensland Ombudsman 4 Legal Notices 9 2016 Caxton Legal Centre Inc. queenslandlawhandbook.org.au
More informationFirst Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010
First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition
More informationVersion No. Date Amendments made Authorised by N/A ACC Hamilton (PSNI)
PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies
More informationPrivate Sector Housing Civil Penalties Policy
Private Sector Housing Civil Penalties Policy February 2018 Page 1 of 24 Allerdale a great place to live, work and visit Contents Page Section 1 Introduction & Overview 1.1 Introduction 4 1.2 When will
More information11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also
11 July 2007 Committee Secretary Senate Legal and Constitutional Committee Department of the Senate PO Box 6100 Parliament House Canberra ACT 2600 Australia Dear Sir/Madam: Inquiry into Telecommunications
More informationPRIVACY BILL 2018 APPROVAL FOR INTRODUCTION AND ADDITIONAL POLICY DECISIONS
In Confidence Office of the Minister of Justice Chair Cabinet Business Committee PRIVACY BILL 2018 APPROVAL FOR INTRODUCTION AND ADDITIONAL POLICY DECISIONS Proposal 1. This paper seeks approval for the
More informationPurpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2
Document Information Summary Partners ISA Ref: As Part 1 An agreement to formalise the information sharing arrangements for the purpose of specific Information sharing pursuant to Crime and Disorder reduction
More informationProtection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction
Protection of Freedoms Bill Delegated Powers - Memorandum by the Home Office Introduction 1. This Memorandum identifies the provisions of the Protection of Freedoms Bill which confer powers to make delegated
More informationDiscussion paper: Register of places and objects
Aboriginal Heritage Act 1972 Discussion paper: Register of places and objects Foreword The Western Australian Government is committed to the protection and preservation of Aboriginal cultural heritage
More informationRegulation of Investigatory Powers Act 2000
ch2300a00a 01-08-00 22:01:07 ACTA Unit: paga RA Proof 20.7.2000 Regulation of Investigatory Powers Act 2000 CHAPTER 23 ARRANGEMENT OF SECTIONS Part I Communications Chapter I Interception Unlawful and
More informationBERMUDA GOOD GOVERNANCE ACT : 35
QUO FA T A F U E R N T BERMUDA GOOD GOVERNANCE ACT 2011 2011 : 35 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 Citation Inserts sections 32B to 32E of the Public Treasury (Administration and Payments) Act 1969 Inserts
More informationNSW Council for Civil Liberties Inc.
NSW Council for Civil Liberties Inc. Postal address: PO BOX A1386 SYDNEY SOUTH NSW 1235 Office address: suite 203, 105 Pitt Street SYDNEY NSW 2000 Phone: 02 8090 2952 Fax: 02 8580 4633 Email: office@nswccl.org.au
More informationChild Protection Legislation Amendment Act 2003 No 90
New South Wales Child Protection Legislation Amendment Act 2003 No 90 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of child protection legislation 2 Schedule 1 Amendment of Ombudsman Act
More informationMEMORANDUM. Internet Corporation for Assigned Names and Numbers. Thomas Nygren and Pontus Stenbeck, Hamilton Advokatbyrå
MEMORANDUM To From Internet Corporation for Assigned Names and Numbers Thomas Nygren and Pontus Stenbeck, Hamilton Advokatbyrå Date 15 December 2017 Subject gtld Registration Directory Services and the
More informationSanctions and Anti-Money Laundering Bill [HL]
Sanctions and Anti-Money Laundering Bill [HL] COMMONS AMENDMENTS [The page and line references are to Bill 157, the Bill as first printed for the Commons] Clause 1 1 Page 2, line 10, at end insert (ea)
More informationLegal Annexe: Overview of legal powers. Digital Rights and Freedoms Vodafone Group Plc
Legal Annexe: Overview of legal powers Digital Rights and Freedoms Vodafone Group Plc Contents The content covered in this Legal Annexe was updated following analysis completed in spring 2016. Transparency
More informationVulnerable Children Bill
Vulnerable Children Bill Government Bill Explanatory note General policy statement This Bill is an omnibus Bill that is introduced under Standing Order 260(a) (dealing with an interrelated topic regarded
More informationThe Right to Privacy in the Digital Age: Meeting Report
The Right to Privacy in the Digital Age: Meeting Report In light of the recent revelations regarding mass surveillance, interception and data collection the Permanent Missions of Austria, Brazil, Germany,
More informationAUSTRALIA: STUDY ON HUMAN RIGHTS COMPLIANCE WHILE COUNTERING TERRORISM REPORT SUMMARY
AUSTRALIA: STUDY ON HUMAN RIGHTS COMPLIANCE WHILE COUNTERING TERRORISM REPORT SUMMARY Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism
More informationChildren and Young Persons (Care and Protection) Act 1998 No 157
New South Wales Children and Young Persons (Care and Protection) Act 1998 No 157 Status information Currency of version Current version for 10 May 2011 to date (generated 29 June 2011 at 15:21). Legislation
More informationINFORMATION SHARING AGREEMENT This document is NOT PROTECTIVELY MARKED
PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies
More informationMandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression
HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9359 / +41 22 917 9407 FAX: +41 22
More informationQueensland FREEDOM OF INFORMATION ACT 1992
Queensland FREEDOM OF INFORMATION ACT 1992 Act No. 42 of 1992 Queensland FREEDOM OF INFORMATION ACT 1992 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Division 1 Introductory Page 1 Short title.....................................................
More informationHealth Information Privacy Code 1994
Health Information Privacy Code 1994 Incorporating amendments Privacy Commissioner Te Mana Matapono Matatapu New Zealand The Code of Practice comprises clauses 1-7 and rules 1-12. To assist with the use
More informationReport of the Working Group on the Universal Periodic Review*
United Nations General Assembly Distr.: General 31 May 2011 A/HRC/17/10/Add.1 Original: English Human Rights Council Seventeenth session Agenda item 6 Universal Periodic Review Report of the Working Group
More informationFIRE SAFETY ENFORCEMENT POLICY
FIRE SAFETY ENFORCEMENT POLICY Document Version Number: 3 Version Date: 22 December 2016 Approved by: Document Reference Number: ACFO Walmsley PPG006 (This page is intentionally blank to facilitate double
More informationCourt Suppression and Non-publication Orders Act 2010 No 106
New South Wales Court Suppression and Non-publication Orders Act 2010 No 106 Contents Part 1 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 4 Inherent jurisdiction and powers of courts
More informationDouwe Korff Professor of International Law London Metropolitan University, London (UK)
NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European
More informationCommercial Agents and Private Inquiry Agents Act 2004 No 70
New South Wales Commercial Agents and Private Inquiry Agents Act 2004 No 70 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Objects 2 4 Definitions 2 Licensing of persons for
More informationReview of police stop, search and seizure powers, the control order regime and the preventative detention order regime
Review of police stop, search and seizure powers, the control order regime and the preventative detention order regime Parliamentary Joint Committee on Intelligence and Security 3 November 2017 Telephone
More information