Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

Size: px
Start display at page:

Download "Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979"

Transcription

1 Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Northern Territory Police Submission to the Senate Legal and Constitutional Affairs Committee March

2 Contents Executive Summary... 3 Background... 4 Response to Part A the Recommendations of the Australian Law Reform Commission... 5 Response to Part B the Recommendations Relating to the Act from the Parliamentary Joint Committee on Intelligence and Security... 7 Conclusion Northern Territory Police Submission Page 2 of 10

3 Executive Summary The Northern Territory Police (NT Police) support the comprehensive review of the Telecommunications (Interception and Access) Act 1979 (Cth) (the Act) for greater transparency, efficiency and ease of understanding and use, including: the inclusion of further serious offending against the person to be included in the definition of serious offence under the Act; the domestic violence proceedings in the definition of permitted purpose ; for disciplinary proceedings against public officers in the definition of permitted purpose ; amend the stored communication warrant provisions to provide a greater period of time in which to receive the information lawfully; and the inclusion of decryption requirements on service providers. Northern Territory Police Submission Page 3 of 10

4 Background The Northern Territory, with a population of 239,000 people and covering over 1.34 million square kilometres, is a gateway to Asia with daily direct flights to Singapore, Vietnam, East Timor and Indonesia. The Northern Territory has the highest proportion of people of Aboriginal descent, and is a multicultural community. The non-indigenous population is transient with high proportions of people working in mining and defence. The NT Police is an interception agency as declared under s 34 of the Act. The vision of the NT Police is a safe and secure Northern Territory. The NT Police 2013/14 Business Plan includes a goal to reduce crime by targeting and addressing the causal factors for crime and minimising the opportunity for crime. Strategic outputs by the NT Police for Government include: Ensuring the effective and efficient allocation and use of resources and progressing innovative solutions. Keeping the community safe through focusing on operational excellence and: - implementing crime reduction initiatives focusing on preventing and reducing the level of victim-based crime; and - preventing and reducing the level of re-offending. Northern Territory Police Submission Page 4 of 10

5 Response to Part A the Recommendations of the Australian Law Reform Commission The terms of reference of the Inquiry includes the recommendations of the Australian Law Reform Commission For Your Information: Australian Privacy Law and Practice, dated May 2008, particularly recommendation This Report was tabled in August 2008 and included 34 recommendations relating to telecommunications, under Part J of that Report. Each recommendation under Part J of that Report is addressed individually as follows. Recommendation 71-1 relates to a redraft of the Telecommunications Act 1997 (Cth) and is supported by the NT Police. Recommendation 71-2 relates to considerations in redrafting the Telecommunications Act 1997 (Cth) and the Telecommunications (Interception and Access) Act 1979 (Cth) and is specifically highlighted in the terms of reference to which this submission relates. In a broad sense the NT Police support a review of the Telecommunications Act 1997 and the Telecommunications (Interception and Access) Act Specifically a review provides the opportunity to ensure the two Acts encompass emerging technologies both in terms of regulation and also interception and the prevention of the interception regime being circumvented by criminal enterprise. In regards to recommendation 71-2(e), the NT Police are not in favour of a public interest monitor. The authority and independence of the judicial officer appointed to authorise warrants under the Act is sufficient. Any extra consideration required can be addressed through legislative change instructing the judicial officer on considerations and weight to be placed on those things such as the public interest and privacy concerns. To some extent these conditions already exist. It is appropriate that consideration in relation to the issue of warrants is made by an independent officer of the Court, rather than a statutory position or political appointment. Recommendations 72-1 and 72-2 relate to disclosure under the Telecommunications Act 1997 (Cth). The NT Police support these recommendations. Recommendation 72-6 refers to a cross reference for both Acts. The NT Police are supportive of this recommendation as an aid to understanding and for those unfamiliar with the construct of the Act. Recommendation 72-7 refers to small changes to disclosure provisions. This is supported. There are public safety benefits in accessing contact information for people in an emergency for public health and safety. Recommendation refers to clarifying disclosure of information held on the integrated public number database. This is supported. Northern Territory Police Submission Page 5 of 10

6 Recommendation 73-1 relates to requirements for destruction of records. The NT Police agree there should be some broad guidance on timeframes, within which agencies should review and destroy information. Guidance, rather than legislation can accommodate these differences and provide flexibility regarding when information should be destroyed by an agency. This guidance should address the destruction of intercepted material, stored communications and telecommunications data. Recommendation 73-2 relates to requirements for destruction of non-material records. The NT Police are of the view that there is an inherent risk in selectively deleting intercepted material and are not supportive of this recommendation. Often intercepted material will contain code words and veiled speech as a means to avoid detection by law enforcement agencies. The code words and language vary between individuals and groups. During the course of an intercept, in conjunction with other investigative means, the conversations are deciphered and it is made clear what is being referenced in the communication. This becomes problematic when conversations are selectively destroyed. A coded conversation may not be considered material until further into the intercept and investigation. If the intercepted communication becomes subject of Court proceedings there may be occasions where a defendant claims intercepted material has exculpatory value. If this were deleted this would not be available to the defendant and therefore be a disservice to justice. Recommendation 73-4 refers to bringing the reporting requirements of stored communications warrants and interception warrants into line. The NT Police are not supportive of this. Stored communications warrants provide a different level of intrusion to interception. Reporting requirements at present are considered satisfactory and address needs for ensuring compliance. Recommendation 73-5 refers to the Attorney-General s Department formulating guidelines to clarify existing provisions with regard to telecommunications data. The NT Police support this recommendation. Recommendation 73-6 refers to Ombudsman inspections of stored communications warrants. The NT Police submits that stored communications warrant record inspections should be the responsibility of the Northern Territory Ombudsman and that powers relevant to inspections should mirror those for interception warrants. Northern Territory Police Submission Page 6 of 10

7 Response to Part B the Recommendations Relating to the Act from the Parliamentary Joint Committee on Intelligence and Security The terms of reference of the Inquiry includes the recommendations of the Parliamentary Joint Committee on Intelligence and Security Inquiry into the Potential Reforms of Australia s National Security Legislation report, dated May This Report was tabled in June 2013, and included 43 recommendations, not all of them relevant to a law enforcement agency. The relevant recommendations are addressed individually as follows. Recommendation 1 refers to the insertion of an objectives clause. The NT Police supports the insertion of an objectives clause in the Act, with the following observations: The focus on the investigation of a serious crime and threats to national security excludes the interception and access of telecommunications for the purpose of emergency or disaster management, and for the protection of life and property where no crime exists. For example, the imminent suicide of a person. There is no crime; however, there is a need to prevent the death of a person. Any objectives clause should be constructed so as not to create a conflict between the Act and the Privacy Act 1988 (Cth). Recommendation 2 refers to the examination of the proportionality tests within the Act. The NT Police support the current tiered approach in that the level of authorisation required and considerations varies with the level of intrusiveness involved. Recommendation 3 refers to reviewing the reporting requirements of the Act to evaluate the privacy intrusion and public interest. The NT Police support this recommendation. Recommendation 4 refers to a review of the oversight arrangements. The NT Police are supportive and in favour of one reviewer for simplicity and efficiency. The Ombudsman for the Northern Territory is the preferred reviewer. The Northern Territory Ombudsman currently has responsibility for inspections of the NT Police records as they relate to surveillance devices and conduct these inspections simultaneously with the inspections under the Act. This is more efficient for both parties, and there is a reduced cost to Government by conducting these with a local authority. Recommendation 5 refers to reviewing the threshold for access to telecommunications data. The NT Police supports this recommendation. Recommendation 6 refers to standardisation of thresholds for access to content. The NT Police supports this recommendation. Northern Territory Police Submission Page 7 of 10

8 Recommendation 7 refers to a model of attribute based interception. The NT Police supports this recommendation. Recommendation 8 refers to a review of the information sharing provisions of the Act. The NT Police supports this recommendation. Recommendation 9 refers to the removal of duplication in the legislation. The NT Police supports this recommendation. Recommendation 10 refers to the development of a single warrant regime. The NT Police support further consideration of a single warrant regime noting the following: Currently there is reasonable difference in the threshold required to obtain a telecommunications intercept warrant or stored communications warrant. The NT Police consider the intrusiveness of the two warrants differs sufficiently to justify the different threshold. Examination of a single warrant regime will need to address this. At present access to stored communications usually follows a preservation order. Such an order is crucial in accessing stored communications given the rapid deletion of stored communications by some carriers. Removal of the concept of stored communication would need to keep the concept of a preservation order in some form. Recommendation 16 refers to the creation of an offence for a failure to assist in decrypting communications. The NT Police supports this. Telecommunications has and continues to transfer from traditional telephony to internet protocol (IP) based services. The ability to interpret intercepted communications is more important than ever with the move to encrypted IP based communications. The move from traditional telephony to IP based services could not have been envisaged on the creation of the Act. The NT Police support the requirement of service and product providers to assist in decryption. Recommendation 18 refers to a comprehensive revision of the Act. The NT Police supports this recommendation. Recommendation 42 refers to data retention. The NT Police are supportive of a data retention regime of two years. Such a regime would assist law enforcement agencies in investigating serious crimes. The NT Police are not in favour of excluding browser history. This is inconsistent with the spirit of a revised Act being technology neutral. With the shift from traditional telephony services to IP based services communications taken place on Facebook, Twitter, Google Plus and other IP platforms. This data may be included in browser history and is as important to capture as telephone records for law enforcement purposes. Recommendation 43 relates to oversight and reporting of any data retention scheme that may be adopted. The NT Police supports this recommendation. Northern Territory Police Submission Page 8 of 10

9 More broadly the NT Police seek that any review of the Act considers an update to the serious offence provisions contained in s 5D including the following: The NT Police support a simplification of the current serious offence definition to provide that all offences that carry a period of imprisonment of five years or more be considered a serious offence for the purposes of the Act. If necessary the definition could provide for specific exclusions, should it be determined that a particular category of offence should not be included. Should this not occur, the NT Police seeks to have the following offence categories included in the definition of serious offence: o The inclusion in s 5D(2) of the offence of sexual intercourse without consent, commonly referred to as rape. This offence is punishable by 14 years imprisonment in the Northern Territory. o The inclusion in s 5D(2) of the offence of sexual intercourse or gross indecency with a child under 16 years. This offence is punishable by 16 years imprisonment in the Northern Territory. o The inclusion in s 5D(2) of the offence of attempt to pervert justice. This offence is punishable by 15 years imprisonment in the Northern Territory. The NT Police would further seek for a review of the Act to consider amending the provisions relating to permitted purpose to include the following: Proceedings relating to the application for a domestic violence order and bail applications for matters involving domestic violence. The NT Police consider domestic violence as being a significant form of harm within the community and have over recent years implemented strategies to combat domestic violence. Most homicides and assaults in the Northern Territory are domestic violence related. The Act includes a permitted purpose being used for police discipline proceedings. The NT Police consider this should be expanded to include all public officials. The NT Police have encountered internal investigations where police officers and other public officials have been involved in serious breaches of discipline. The police officer has had their employment terminated and the public officer has not been dealt with for the same course of conduct, due to the difference in the provisions of permitted purpose. The stored communications process should be amended to remove the five day period the warrant is active. Intercepting agencies are beholden to carriers to comply with this five day period to comply with the Act and ensure the material received has been done so lawfully. The NT Police propose the warrant be active for a period of seven business days and place the burden on carriers to comply. Northern Territory Police Submission Page 9 of 10

10 Access to telecommunications material should not be reduced to serious criminal offending or threats to the national security. Many matters exist outside of these parameters that law enforcement considers relevant and in the public interest. They are: o disaster and emergency management including disaster recovery; o missing persons; o threats of serious harm or danger to a person s life, such as suicide; and o search and rescue. Conclusion The NT Police support a review of the Telecommunications (Interception and Access) Act 1979 (Cth) and the Telecommunications Act 1997 (Cth) to provide greater simplicity, clarity and efficiency of operation under those Acts. The reviewed Telecommunications (Interception and Access) Act 1979 (Cth) should include an update to the serious offence provisions at s 5D to include a number of serious offences currently omitted from the Act. Northern Territory Police Submission Page 10 of 10

Q. What do the Law Commission and the Ministry of Justice recommend?

Q. What do the Law Commission and the Ministry of Justice recommend? Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government

More information

Table: Government response to PJCIS recommendations on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

Table: Government response to PJCIS recommendations on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 Australian Parliamentary Joint Committee on Intelligence and Security (PJCIS) report into the Telecommunications (Interception and 2014 Joint media release Senator the Honourable George Brandis QC Attorney-General

More information

Cybercrime Legislation Amendment Bill 2011

Cybercrime Legislation Amendment Bill 2011 Cybercrime Legislation Amendment Bill 2011 Joint Select Committee on Cyber-Safety 14 July 2011 GPO Box 1989, Canberra ACT 2601, DX 5719 Canberra 19 Torrens St Braddon ACT 2612 Telephone +61 2 6246 3788

More information

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD Objective/Risk Create the governance and safeguards necessary to ensure we appropriately balance respect for our customers right to privacy and

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

House Standing Committee on Social Policy and Legal Affairs

House Standing Committee on Social Policy and Legal Affairs Australian Broadcasting Corporation submission to the House Standing Committee on Social Policy and Legal Affairs and to the Senate Legal and Constitutional Affairs Committee on their respective inquiries

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

TekSavvy Solutions Inc.

TekSavvy Solutions Inc. TekSavvy Solutions Inc. Law Enforcement Guide TekSavvy Solutions Inc. ( TekSavvy ) is a provider of Internet access, voice telephony, and related telecommunication services. We retain subscriber information

More information

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence

More information

Legal Guide to Relevant Criminal Offences in Victoria

Legal Guide to Relevant Criminal Offences in Victoria Legal Guide to Relevant Criminal Offences in Victoria A review of Victorian criminal offences relating to technology-facilitated family violence and abuse SOME NOTES Language of victim vs survivor Some

More information

Manual on the Communications (Retention of Data) Act 2011

Manual on the Communications (Retention of Data) Act 2011 Manual on the Communications (Retention of Data) Act 2011 Document last updated July 2017 Table of Contents 1. Introduction...3 2. Disclosure Requests: General...4 4. Request Form...5 5. Oversight...8

More information

the general policy intent of the Privacy Bill and other background policy material;

the general policy intent of the Privacy Bill and other background policy material; Departmental Disclosure Statement Privacy Bill This departmental disclosure statement for the Privacy Bill seeks to bring together in one place a range of information to support and enhance the Parliamentary

More information

Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill

Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill Privacy Commissioner Te Mana Matapono Matatapu Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill Executive

More information

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes INTRODUCTION 11.1 Earlier this year, the report of the first Independent Review of Intelligence and Security was tabled

More information

Senate Legal and Constitutional Affairs Committee. Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979

Senate Legal and Constitutional Affairs Committee. Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979 Submission 11 Senate Legal and Constitutional Affairs Committee Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979 Submission by the Australian Commission

More information

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

INVESTIGATORY POWERS BILL EXPLANATORY NOTES INVESTIGATORY POWERS BILL EXPLANATORY NOTES What these notes do These Explanatory Notes relate to the Investigatory Powers Bill as brought from the House of Commons on 8. These Explanatory Notes have been

More information

Workplace Surveillance Act 2005

Workplace Surveillance Act 2005 Workplace Surveillance Act 2005 As at 20 May 2014 Long Title An Act to regulate surveillance of employees at work; and for other purposes. Part 1 ñ Preliminary 1 Name of Act This Act is the Workplace Surveillance

More information

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA LEGAL GUIDE TO APPREHENDED DOMESTIC VIOLENCE ORDERS LEGAL GUIDES WESTERN AUSTRALIA : Women s technology safety, legal resources, research & training LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the European Data Protection Supervisor on the Proposal for a Council Decision on the conclusion of an Agreement between the European Union and Australia on the processing and transfer of Passenger

More information

I. REGULATION OF INVESTIGATORY POWERS BILL

I. REGULATION OF INVESTIGATORY POWERS BILL These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION

More information

Telecommunications (Interception Capability and Security) Bill

Telecommunications (Interception Capability and Security) Bill Government Bill Explanatory note General policy statement This Bill repeals and replaces the Capability) Act 2004. The main objectives of the Bill are to ensure that the interception obligations imposed

More information

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)

More information

Submission to the Joint Committee on the draft Investigatory Powers Bill

Submission to the Joint Committee on the draft Investigatory Powers Bill 21 December 2015 Submission to the Joint Committee on the draft Investigatory Powers Bill 1. The UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression;

More information

Law Commission Review of the Search and Surveillance Act 2012

Law Commission Review of the Search and Surveillance Act 2012 Law Commission Review of the Search and Surveillance Act 2012 Contact Person: John Hancock Senior Legal Adviser New Zealand Human Rights Commission johnh@hrc.co.nz 1 Law Commission Review of the Search

More information

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND Mandates of the Special Rapporteur on the promotion and protection

More information

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information. Privacy Policy Law Society of South Australia Privacy Policy The Law Society of South Australia (Law Society or we, us or our) deals with information privacy in accordance with the Privacy Act 1988 (Cth)

More information

Protection of Freedoms Act 2012

Protection of Freedoms Act 2012 Protection of Freedoms Act 2012 Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data March 2013 Issued Pursuant to Section 22

More information

22 January Joint submission by:

22 January Joint submission by: Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 22 January 2019 Joint

More information

Key elements of the Work Health and Safety Bill

Key elements of the Work Health and Safety Bill Australian Mines and Metals Association Key elements of the Work Health and Safety Bill The final version of the model national OHS legislation is called the Work Health and Safety Bill, representing a

More information

CRIMINAL LEGISLATION (AMENDMENT) ACT 1992 No. 2

CRIMINAL LEGISLATION (AMENDMENT) ACT 1992 No. 2 CRIMINAL LEGISLATION (AMENDMENT) ACT 1992 No. 2 NEW SOUTH WALES 1. Short title 2. Commencement 3. Amendments 4. Explanatory notes TABLE OF PROVISIONS SCHEDULE 1 AMENDMENT OF CRIMES ACT 1900 NO. 40 SCHEDULE

More information

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL Background 1. This memorandum has been lodged by Michael Matheson, Cabinet Secretary for Justice, under Rule 9B.3.1(a) of the Parliament s Standing

More information

The forensic use of bioinformation: ethical issues

The forensic use of bioinformation: ethical issues The forensic use of bioinformation: ethical issues A guide to the Report 01 The Nuffield Council on Bioethics has published a Report, The forensic use of bioinformation: ethical issues. It considers the

More information

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business. Privacy Policy Cabcharge Australia Limited ( Cabcharge ) is subject to the Australian Privacy Principles pursuant to the Privacy Act 1988 as amended by the Privacy Amendment (Enhancing Privacy Protection)

More information

Counter-Terrorism Bill

Counter-Terrorism Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 6 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following

More information

Technology and the Law. Jackie Charles

Technology and the Law. Jackie Charles Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy

More information

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation DIVISION V CLOUD ACT SEC. 101. SHORT TITLE. This division may be cited as the Clarifying Lawful Overseas Use of Data Act or the CLOUD Act. SEC. 102. CONGRESSIONAL FINDINGS. Congress finds the following:

More information

FILMS AND PUBLICATIONS AMENDMENT BILL

FILMS AND PUBLICATIONS AMENDMENT BILL REPUBLIC OF SOUTH AFRICA PORTFOLIO COMMITTEE AMENDMENTS TO FILMS AND PUBLICATIONS AMENDMENT BILL [B 37 2015] (As agreed to by the Portfolio Committee on Communications (National Assembly)) [B 37A 2015]

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill [AS AMENDED ON REPORT] CONTENTS PART 1 GENERAL PRIVACY PROTECTIONS Overview and general privacy duties 1 Overview of Act 2 General duties in relation to privacy Prohibitions against

More information

Rail Safety (Adoption of National Law) Act 2012 No 82

Rail Safety (Adoption of National Law) Act 2012 No 82 New South Wales Rail Safety (Adoption of National Law) Act 2012 No 82 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Interpretation 2 Application of 4 Application of 3 5 Interpretation

More information

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE References to clauses are to the Bill as introduced to the House of Lords. References are square bracketed and include

More information

Law Enforcement Disclosure Report. Legal Annexe June Vodafone Power to you

Law Enforcement Disclosure Report. Legal Annexe June Vodafone Power to you Law Enforcement Disclosure Report Legal Annexe June 2014 Vodafone Power to you Contents Law Enforcement Disclosure Report Legal Annexe Contents 3 Introduction A-E 5 Albania Albania 16 Czech Republic 8

More information

Protecting Your Privacy

Protecting Your Privacy Protecting Your Privacy 2017 Transparency Report Contents 2 Requests for customer information 3 Number of information requests received, disclosed, rejected and contested 4 Types of disclosure requests

More information

Regulation of Investigatory Powers Bill

Regulation of Investigatory Powers Bill Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary

More information

Investigatory Powers Bill Briefing

Investigatory Powers Bill Briefing Investigatory Powers Bill Briefing What is the Investigatory Powers Bill? Running to 245 pages, the Investigatory Powers Bill is an attempt to establish a clear framework for the authorisation and use

More information

Analysis of the Workplace Surveillance Bill 2005

Analysis of the Workplace Surveillance Bill 2005 Analysis of the Workplace Surveillance Bill 2005 16 May 2005 Introduction This paper sets out the Australian Privacy Foundation s analysis of the Workplace Surveillance Bill 2005 (NSW). The Workplace Surveillance

More information

Official Journal of the European Union. (Legislative acts) DIRECTIVES

Official Journal of the European Union. (Legislative acts) DIRECTIVES 1.5.2014 L 130/1 I (Legislative acts) DIRECTIVES DIRECTIVE 2014/41/EU OF THE EUROPEAN PARLIAMT AND OF THE COUNCIL of 3 April 2014 regarding the European Investigation Order in criminal matters THE EUROPEAN

More information

AIA Australia Limited

AIA Australia Limited AIA Australia Limited Privacy policies & procedures May 2010 The Power of We AIA.COM.AU AIA Australia Limited Privacy policies & procedures Contents Purpose 3 Policy 3 National Privacy Principles Policy

More information

Telecommunications Information Privacy Code 2003

Telecommunications Information Privacy Code 2003 Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8

More information

GeneWatch UK comments on the Northern Ireland Criminal Justice Bill

GeneWatch UK comments on the Northern Ireland Criminal Justice Bill GeneWatch UK comments on the Northern Ireland Criminal Justice Bill 1 August 2012 GeneWatch UK welcomes the opportunity to comment on the aspects of the Criminal Justice Bill which relate to the retention

More information

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981 EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COP 200 TELECOM 151 CODEC 1206 OC 981 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE

More information

Victims Rights and Support Act 2013 No 37

Victims Rights and Support Act 2013 No 37 New South Wales Victims Rights and Support Act 2013 No 37 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 Victims rights Division 1 Preliminary 4 Object of Part

More information

New Zealand Intelligence and Security Bill

New Zealand Intelligence and Security Bill New Zealand Intelligence and Security Bill Government Bill As reported from the Foreign Affairs, Defence and Trade Committee Recommendation Commentary The Foreign Affairs, Defence and Trade Committee has

More information

The Protection of Freedoms Bill

The Protection of Freedoms Bill The Protection of Freedoms Bill The Protection of Freedoms Bill deals with a wide variety of areas. It includes provisions on retention of DNA and fingerprints by the police, use of biometrics by schools,

More information

Submission to the Legal Affairs and Community Safety Committee. Victims of Crime Assistance and Other Legislation Amendment Bill 2016

Submission to the Legal Affairs and Community Safety Committee. Victims of Crime Assistance and Other Legislation Amendment Bill 2016 Submission to the Legal Affairs and Community Safety Committee Victims of Crime Assistance and Other Legislation Amendment Bill 2016 16 January 2016 1 Introduction knowmore is an independent, national

More information

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Executive Summary: The draft bill is far-reaching with the potential to intrude into the private lives of individuals.

More information

Releasing personal information to Police and law enforcement agencies: Guidance on health and safety and Maintenance of the law exceptions

Releasing personal information to Police and law enforcement agencies: Guidance on health and safety and Maintenance of the law exceptions Releasing personal information to Police and law enforcement agencies: Guidance on health and safety and Maintenance of the law exceptions October 2017 CONTENTS Purpose of this Guide... 3 Voluntary requests

More information

House of Commons NOTICES OF AMENDMENTS. given up to and including. Wednesday 8 June 2016

House of Commons NOTICES OF AMENDMENTS. given up to and including. Wednesday 8 June 2016 1 House of Commons NOTICES OF AMENDMENTS given up to and including Wednesday 8 June 2016 New Amendments handed in are marked thus Amendments which will comply with the required notice period at their next

More information

Port Glasgow St Andrew s Data Protection Policy

Port Glasgow St Andrew s Data Protection Policy Port Glasgow St Andrew s Data Protection Policy CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data should be processed 7. Privacy

More information

Our Ref: Criminal Law Committee /5 8 February 2013

Our Ref: Criminal Law Committee /5 8 February 2013 Our Ref: Criminal Law Committee 2100339/5 8 February 2013 Research Director Legal Affairs and Community Safety Committee Parliament House George Street BRISBANE QLD 4000 By Post and Email to: lacsc@parliament.qld.gov.au

More information

Chapter 9 Production orders

Chapter 9 Production orders Chapter 9 Production orders BACKGROUND 9.1 9.2 9.3 Prior to the Search and Surveillance Act 2012 (the Act), enforcement officers who wanted to obtain data from a third party, such as a telecommunications

More information

ANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed

ANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed ANTI-BRIBERY POLICY Rev Date Purpose of Issue/Description of Change Equality Impact Assessment Completed 1. 29 th March, 2012 Initial Issue 2. 5 th October 2015 Review and approval by Compliance Task Group

More information

TELUS Transparency Report

TELUS Transparency Report TELUS is a national telecommunications company, and as such, law enforcement agencies and government organizations regularly contact us to request specific information about our customers. This transparency

More information

National Security Legislation Amendment Bill (No. 1) 2014 No., 2014

National Security Legislation Amendment Bill (No. 1) 2014 No., 2014 0-0 The Parliament of the Commonwealth of Australia THE SENATE As passed by both Houses National Security Legislation Amendment Bill (No. ) 0 No., 0 A Bill for an Act to amend the law relating to national

More information

COMMUNICATION FROM THE COMMISSION. On the global approach to transfers of Passenger Name Record (PNR) data to third countries

COMMUNICATION FROM THE COMMISSION. On the global approach to transfers of Passenger Name Record (PNR) data to third countries EUROPEAN COMMISSION Brussels, 21.9.2010 COM(2010) 492 final COMMUNICATION FROM THE COMMISSION On the global approach to transfers of Passenger Name Record (PNR) data to third countries EN EN COMMUNICATION

More information

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31 New South Wales Child Protection Legislation Amendment (Children s Guardian) Act 2013 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Amendment of Child Protection (Working with Children) Act

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan CANADIAN ASSOCIATION OF CHIEFS OF POLICE Leading progressive change in policing 130 Albert Street Suite 1710 Ottawa,

More information

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org AFRICAN DECLARATION on Internet Rights and Freedoms africaninternetrights.org PREAMBLE Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including

More information

Education Legislation Amendment (Staff) Act 2006 No 24

Education Legislation Amendment (Staff) Act 2006 No 24 New South Wales Education Legislation Amendment (Staff) Act 2006 No 24 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of Teaching Service Act 1980 No 23 2 4 Amendment of Technical and Further

More information

Complaints to the Ombudsman

Complaints to the Ombudsman Complaints to the Ombudsman CHAPTER CONTENTS Introduction 2 Complaints to the Commonwealth Ombudsman 2 Complaints to the Queensland Ombudsman 4 Legal Notices 9 2016 Caxton Legal Centre Inc. queenslandlawhandbook.org.au

More information

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010 First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition

More information

Version No. Date Amendments made Authorised by N/A ACC Hamilton (PSNI)

Version No. Date Amendments made Authorised by N/A ACC Hamilton (PSNI) PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies

More information

Private Sector Housing Civil Penalties Policy

Private Sector Housing Civil Penalties Policy Private Sector Housing Civil Penalties Policy February 2018 Page 1 of 24 Allerdale a great place to live, work and visit Contents Page Section 1 Introduction & Overview 1.1 Introduction 4 1.2 When will

More information

11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also

11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also 11 July 2007 Committee Secretary Senate Legal and Constitutional Committee Department of the Senate PO Box 6100 Parliament House Canberra ACT 2600 Australia Dear Sir/Madam: Inquiry into Telecommunications

More information

PRIVACY BILL 2018 APPROVAL FOR INTRODUCTION AND ADDITIONAL POLICY DECISIONS

PRIVACY BILL 2018 APPROVAL FOR INTRODUCTION AND ADDITIONAL POLICY DECISIONS In Confidence Office of the Minister of Justice Chair Cabinet Business Committee PRIVACY BILL 2018 APPROVAL FOR INTRODUCTION AND ADDITIONAL POLICY DECISIONS Proposal 1. This paper seeks approval for the

More information

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2 Document Information Summary Partners ISA Ref: As Part 1 An agreement to formalise the information sharing arrangements for the purpose of specific Information sharing pursuant to Crime and Disorder reduction

More information

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction Protection of Freedoms Bill Delegated Powers - Memorandum by the Home Office Introduction 1. This Memorandum identifies the provisions of the Protection of Freedoms Bill which confer powers to make delegated

More information

Discussion paper: Register of places and objects

Discussion paper: Register of places and objects Aboriginal Heritage Act 1972 Discussion paper: Register of places and objects Foreword The Western Australian Government is committed to the protection and preservation of Aboriginal cultural heritage

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 ch2300a00a 01-08-00 22:01:07 ACTA Unit: paga RA Proof 20.7.2000 Regulation of Investigatory Powers Act 2000 CHAPTER 23 ARRANGEMENT OF SECTIONS Part I Communications Chapter I Interception Unlawful and

More information

BERMUDA GOOD GOVERNANCE ACT : 35

BERMUDA GOOD GOVERNANCE ACT : 35 QUO FA T A F U E R N T BERMUDA GOOD GOVERNANCE ACT 2011 2011 : 35 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 Citation Inserts sections 32B to 32E of the Public Treasury (Administration and Payments) Act 1969 Inserts

More information

NSW Council for Civil Liberties Inc.

NSW Council for Civil Liberties Inc. NSW Council for Civil Liberties Inc. Postal address: PO BOX A1386 SYDNEY SOUTH NSW 1235 Office address: suite 203, 105 Pitt Street SYDNEY NSW 2000 Phone: 02 8090 2952 Fax: 02 8580 4633 Email: office@nswccl.org.au

More information

Child Protection Legislation Amendment Act 2003 No 90

Child Protection Legislation Amendment Act 2003 No 90 New South Wales Child Protection Legislation Amendment Act 2003 No 90 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of child protection legislation 2 Schedule 1 Amendment of Ombudsman Act

More information

MEMORANDUM. Internet Corporation for Assigned Names and Numbers. Thomas Nygren and Pontus Stenbeck, Hamilton Advokatbyrå

MEMORANDUM. Internet Corporation for Assigned Names and Numbers. Thomas Nygren and Pontus Stenbeck, Hamilton Advokatbyrå MEMORANDUM To From Internet Corporation for Assigned Names and Numbers Thomas Nygren and Pontus Stenbeck, Hamilton Advokatbyrå Date 15 December 2017 Subject gtld Registration Directory Services and the

More information

Sanctions and Anti-Money Laundering Bill [HL]

Sanctions and Anti-Money Laundering Bill [HL] Sanctions and Anti-Money Laundering Bill [HL] COMMONS AMENDMENTS [The page and line references are to Bill 157, the Bill as first printed for the Commons] Clause 1 1 Page 2, line 10, at end insert (ea)

More information

Legal Annexe: Overview of legal powers. Digital Rights and Freedoms Vodafone Group Plc

Legal Annexe: Overview of legal powers. Digital Rights and Freedoms Vodafone Group Plc Legal Annexe: Overview of legal powers Digital Rights and Freedoms Vodafone Group Plc Contents The content covered in this Legal Annexe was updated following analysis completed in spring 2016. Transparency

More information

Vulnerable Children Bill

Vulnerable Children Bill Vulnerable Children Bill Government Bill Explanatory note General policy statement This Bill is an omnibus Bill that is introduced under Standing Order 260(a) (dealing with an interrelated topic regarded

More information

The Right to Privacy in the Digital Age: Meeting Report

The Right to Privacy in the Digital Age: Meeting Report The Right to Privacy in the Digital Age: Meeting Report In light of the recent revelations regarding mass surveillance, interception and data collection the Permanent Missions of Austria, Brazil, Germany,

More information

AUSTRALIA: STUDY ON HUMAN RIGHTS COMPLIANCE WHILE COUNTERING TERRORISM REPORT SUMMARY

AUSTRALIA: STUDY ON HUMAN RIGHTS COMPLIANCE WHILE COUNTERING TERRORISM REPORT SUMMARY AUSTRALIA: STUDY ON HUMAN RIGHTS COMPLIANCE WHILE COUNTERING TERRORISM REPORT SUMMARY Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism

More information

Children and Young Persons (Care and Protection) Act 1998 No 157

Children and Young Persons (Care and Protection) Act 1998 No 157 New South Wales Children and Young Persons (Care and Protection) Act 1998 No 157 Status information Currency of version Current version for 10 May 2011 to date (generated 29 June 2011 at 15:21). Legislation

More information

INFORMATION SHARING AGREEMENT This document is NOT PROTECTIVELY MARKED

INFORMATION SHARING AGREEMENT This document is NOT PROTECTIVELY MARKED PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies

More information

Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression

Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9359 / +41 22 917 9407 FAX: +41 22

More information

Queensland FREEDOM OF INFORMATION ACT 1992

Queensland FREEDOM OF INFORMATION ACT 1992 Queensland FREEDOM OF INFORMATION ACT 1992 Act No. 42 of 1992 Queensland FREEDOM OF INFORMATION ACT 1992 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Division 1 Introductory Page 1 Short title.....................................................

More information

Health Information Privacy Code 1994

Health Information Privacy Code 1994 Health Information Privacy Code 1994 Incorporating amendments Privacy Commissioner Te Mana Matapono Matatapu New Zealand The Code of Practice comprises clauses 1-7 and rules 1-12. To assist with the use

More information

Report of the Working Group on the Universal Periodic Review*

Report of the Working Group on the Universal Periodic Review* United Nations General Assembly Distr.: General 31 May 2011 A/HRC/17/10/Add.1 Original: English Human Rights Council Seventeenth session Agenda item 6 Universal Periodic Review Report of the Working Group

More information

FIRE SAFETY ENFORCEMENT POLICY

FIRE SAFETY ENFORCEMENT POLICY FIRE SAFETY ENFORCEMENT POLICY Document Version Number: 3 Version Date: 22 December 2016 Approved by: Document Reference Number: ACFO Walmsley PPG006 (This page is intentionally blank to facilitate double

More information

Court Suppression and Non-publication Orders Act 2010 No 106

Court Suppression and Non-publication Orders Act 2010 No 106 New South Wales Court Suppression and Non-publication Orders Act 2010 No 106 Contents Part 1 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 4 Inherent jurisdiction and powers of courts

More information

Douwe Korff Professor of International Law London Metropolitan University, London (UK)

Douwe Korff Professor of International Law London Metropolitan University, London (UK) NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European

More information

Commercial Agents and Private Inquiry Agents Act 2004 No 70

Commercial Agents and Private Inquiry Agents Act 2004 No 70 New South Wales Commercial Agents and Private Inquiry Agents Act 2004 No 70 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Objects 2 4 Definitions 2 Licensing of persons for

More information

Review of police stop, search and seizure powers, the control order regime and the preventative detention order regime

Review of police stop, search and seizure powers, the control order regime and the preventative detention order regime Review of police stop, search and seizure powers, the control order regime and the preventative detention order regime Parliamentary Joint Committee on Intelligence and Security 3 November 2017 Telephone

More information