The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached.

Similar documents
Re: The Council's Draft CCTV Code of Practice

Analysis of the Workplace Surveillance Bill 2005

CCTV CODE OF PRACTICE

In the picture: A data protection code of practice for surveillance cameras and personal information. Jonathan Bamford Head of Strategic Liaison

Conducting surveillance in a public place

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

Workplace Surveillance Act 2005

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

B I L L. No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act

The installation of CCTV can provide information on activities at the Water,

Rail Safety (Adoption of National Law) Act 2012 No 82

MANITOBA FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY RESOURCE MANUAL

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL

DECISION no. 52 of 31 st May 2012 on the processing of personal data using video surveillance means

A closed circuit television system is used at the Memorial Hall by the Parish Council.

Security Video Surveillance Policy

Q. What do the Law Commission and the Ministry of Justice recommend?

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

United Nations Convention against Torture: New Zealand s sixth periodic review, 2015 shadow report

AIA Australia Limited

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

SUBMISSION TO THE REVIEW OF THE FLORA AND FAUNA GUARANTEE ACT, 1988 (Vic).

Law Enforcement processing (Part 3 of the DPA 2018)

DURHAM CONSTABULARY POLICY

Submission to the Joint Committee on the draft Investigatory Powers Bill

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

House Standing Committee on Social Policy and Legal Affairs

DATA PROTECTION POLICY STATUTORY

I. REGULATION OF INVESTIGATORY POWERS BILL

26 July 2011

PRIVACY MANAGEMENT PLAN

Information Commissioner s Office. ICO response to consultation on revisions to PACE codes

Law Commission Review of the Search and Surveillance Act 2012

Not Protectively Marked POLICY AND STANDARD OPERATING PROCEDURES

Excerpt from speech by the Hon Bob Debus, Attorney-General for NSW

PHARMAC s implementation of Trans-Pacific Partnership (TPP) provisions and other amendments to application processes September 2016 Appendix two

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection

In-Court Media Coverage Guidelines 2016

Covert Human Intelligence Sources Code of Practice

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources

Financial Dispute Resolution Service (FDRS)

PDF Agreement: Product Development Forum Terms

The defence submit that the RSPB and the police are so inextricably linked in the investigation and prosecution of offences of this type, that the

Access to Information

The Protection of Freedoms Bill

Tertiary Education Quality and Standards Agency Act 2011

A BILL. (a) the owner of the device and/or geolocation information; or. (c) a person to whose geolocation the information pertains.

The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State

Surveillance Devices Act 2007 No 64

Consistency with the New Zealand Bill of Rights Act 1990: Conservation (Infringement System) Bill

The Enforcement Guide

The Rental Exchange. Contribution Agreement for Rental Exchange Database. A world of insight

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

Table: Government response to PJCIS recommendations on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

NSW Council for Civil Liberties Inc.

Access to view taser camera footage of 47 incidents where the taser was

BILL NO. 42. Health Information Act

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

Rules Notice Request for Comment

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Electronic Publication of Court Proceedings Report April 2016 Summary of Recommendations

PPCA STANDARD TERMS AND CONDITIONS FOR LICENCE FOR PUBLIC USE OF PROTECTED SOUND RECORDINGS

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party

Data Protection Act 1998 Policy

Consistency with the New Zealand Bill of Rights Act 1990: Outer Space and High Altitude Activities Bill

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015

SUPERVISED LEGAL PRACTICE GUIDELINES

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill

Inquiry into the Human Rights (Parliamentary Scrutiny) Bill 2010

Data Protection Bill, House of Lords second reading Information Commissioner s briefing

Architects Regulation 2012

Frequently Asked Questions for Municipalities LOCAL GOVERNMENT BODIES RECORDS

Criminal Code Amendment (Animal Protection) Bill 2015 Submission 72

Information Privacy Act 2000

14 October The Australian Law Reform Commission Level 40, MLC Tower 19 Martin Place Sydney NSW to:

Liquor Amendment (3 Strikes) Act 2011 No 58

B. The transfer of personal information to states with equivalent protection of fundamental rights

PERSONAL INFORMATION PROTECTION ACT

County Tipperary Joint Policing Committee. A Policy Paper on CCTV Provision in Public Places

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Student/Queensland Health Terms of Agreement Information for Students

LEGISLATION DESIGN AND ADVISORY COMMITTEE

Lobbying Disclosure Bill

Court Security Act 2005 No 1

An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology

Surveillance Devices Act 2007

Transcription:

http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 5 May 2013 Mr B. O'Farrell Premier of NSW cc. Mr G. Smith NSW Attorney-General and Minister for Justice Dear Mr O'Farrell Re: CCTV (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached. We refer to the media reports following the recent decision of the NSW Administrative Appeals Tribunal (SF v Shoalhaven City Council [2013] NSWADT 94). We welcome the review that you have announced. However, it is vital that the review reflect the substantial body of evidence that shows that most CCTV installations have very limited deterrent and preventative effect on crime, and have very limited value in investigating and in prosecuting crime. I attach a copy of the APF's Policy Statement on Visual Surveillance. It embodies a set of Principles for the evaluation of proposals for such schemes as CCTV in public areas. It also provides a framework whereby existing schemes can be retrospectively evaluated. We urge that the review apply such a set of Principles. It is common ground among all parties that some CCTV schemes, under particular ciircumstances, and supported by relevant resources on an ongoing basis, are valuable to society and justify their intrusiveness. However, a great many schemes do not deliver, and this judgement represents a historical opportunity for a suitable balance to be achieved. We request the opportunity to contribute to the review. Thank you for your consideration. Yours sincerely Roger Clarke Chair, for the Board of the Australian Privacy Foundation (02) 6288 1472 Chair@privacy.org.au The APF Australia s leading public interest voice in the privacy arena since 1987

Australian Privacy Foundation Background Information (APF) is the primary national association dedicated to protecting the privacy rights of Australians. The Foundation aims to focus public attention on emerging issues that pose a threat to the freedom and privacy of Australians. The Foundation has led the fight to defend the right of individuals to control their personal information and to be free of excessive intrusions. The APF s primary activity is analysis of the privacy impact of systems and proposals for new systems. It makes frequent submissions to parliamentary committees and government agencies. It publishes information on privacy laws and privacy issues. It provides continual background briefings to the media on privacy-related matters. Where possible, the APF cooperates with and supports privacy oversight agencies, but it is entirely independent of the agencies that administer privacy legislation, and regrettably often finds it necessary to be critical of their performance. When necessary, the APF conducts campaigns for or against specific proposals. It works with civil liberties councils, consumer organisations, professional associations and other community groups as appropriate to the circumstances. The Privacy Foundation is also an active participant in Privacy International, the world-wide privacy protection network. The APF is open to membership by individuals and organisations who support the APF's Objects. Funding that is provided by members and donors is used to run the Foundation and to support its activities including research, campaigns and awards events. The APF does not claim any right to formally represent the public as a whole, nor to formally represent any particular population segment, and it accordingly makes no public declarations about its membership-base. The APF's contributions to policy are based on the expertise of the members of its Board, SubCommittees and Reference Groups, and its impact reflects the quality of the evidence, analysis and arguments that its contributions contain. The APF s Board, SubCommittees and Reference Groups comprise professionals who bring to their work deep experience in privacy, information technology and the law. The Board is supported by Patrons The Hon Michael Kirby and Elizabeth Evatt, and an Advisory Panel of eminent citizens, including former judges, former Ministers of the Crown, and a former Prime Minister. The following pages provide access to information about the APF: Policies http://www.privacy.org.au/papers/ Resources http://www.privacy.org.au/resources/ Media http://www.privacy.org.au/media/ Current Board Members http://www.privacy.org.au/about/contacts.html Patron and Advisory Panel http://www.privacy.org.au/about/advisorypanel.html The following pages provide outlines of several campaigns the APF has conducted: The Australia Card (1985-87) http://www.privacy.org.au/about/formation.html Credit Reporting (1988-90) http://www.privacy.org.au/campaigns/creditrpting/ The Access Card (2006-07) http://www.privacy.org.au/campaigns/id_cards/hsac.html The Media (2007-) http://www.privacy.org.au/campaigns/media/ The APF Australia s leading public interest voice in the privacy arena since 1987

APF Policy Statement re Visual Surveillance, incl. CCTV POLICY Media Resources Campaigns About Us What Can I Do? Big Brother Contact Us The Scope of This Policy Statement Revision of 6 January 2010 This document supersedes the version of 14 October 2009 The scope of this Policy Statement is Visual Surveillance, such as that conducted using Closed-Circuit Television (CCTV). The term is used here to encompass the capture and/or projection of images and video, whether or not with audio, whether or not the images and/or audio are recorded, whether or not they are subsequently disclosed and/or published, and whether the image-resolution is high- or low-quality. The focus is on visual surveillance conducted in a systematic manner, as is generally the case with its use by organisations. The scope is not intended to encompass casual use of cameras by individuals, which gives rise to privacy concerns that are of a different nature and gravity from institutionalised uses. The focus is on data that represents images and any associated sound. Structured and textual data deriving from such images, including meta-data describing them, are also a source of considerable privacy concern, and must be subject to data protection provisions. The Principles enunciated below also have broader application, to surveillance conducted using any part of the electromagnetic spectrum including that outside the human-visible range, such as infra-red, ultra-violet and X-rays. The Principles Visual surveillance may have potential in particular circumstances to protect important human values. On the other hand, visual surveillance is highly privacy-intrusive. It has a chilling effect on human behaviour generally. Moreover, unless it is well-designed and well-managed, visual surveillance may have little or no chilling effect on criminal or anti-social behaviour. Studies have created serious doubts about the effectiveness of visual surveillance as a technique for crime prevention, for crime detection, for criminal investigation and for criminal prosecution. Wherever visual surveillance is applied, all of the following conditions must be fulfilled. 1. Justification Because visual surveillance is highly privacy-invasive, a Privacy Impact Assessment (PIA) must be conducted before a scheme is commenced or significantly changed. A PIA involves publication of a clear explanation, demonstrating that it is expected on reasonable grounds to have positive benefits sufficient to justify its intrusiveness, followed by public consultation. The explanation must be based on evidence and systemic reasoning, and not merely rely on assertions. The justification must make clear what less privacy-invasive alternatives have been considered, and why they are inadequate. 2. Proportionality 1 of 4 9/12/10 9:52

The benefits identified in the justification for using visual surveillance must outweigh the negative impacts on privacy. Visual surveillance must be no more intensive (e.g. the number of cameras), and no more extensive (e.g. across a large area) than the analysis justifies. 3. Openness The conduct of visual surveillance in any open space (whether it is public or is commonly used by members of the public) must be disclosed to the public, and clearly notified to individuals who enter that space. This applies to both the fact that visual surveillance is undertaken and the nature and extent of the surveillance. Any exceptions to this must be treated as covert surveillance (see below). Before visual surveillance is conducted in any space in which a reasonable expectation of privacy exists (including private premises, and toilets and change-rooms in open facilities), it must be the subject of formal, specific and bounded legal authority, exercised by a judicial institution that makes its judgements in a manner demonstrably independently of the organisation that seeks to conduct the surveillance. It must also be disclosed to the public, and clearly notified to individuals who enter that space. This applies to both the fact that visual surveillance is undertaken and the nature and extent of visual surveillance. Any exceptions to this must be treated as covert surveillance (see below). Before covert visual surveillance is undertaken, it must be the subject of formal, specific and bounded legal authority, exercised by a judicial institution that makes its judgements in a manner demonstrably independently of the organisation that seeks to conduct the surveillance. Where a recording is made, and the images and/or video are such as to identify any individual, the data must be treated as personal data, and must be subject to data protection laws, including access by the data subject, complaint handling, and redress. 4. Access Security Access to images and video, both live and recorded, must be tightly controlled., and a Any security breaches must be acted upon promptly and effectively. 5. Controlled Use The purposes must be clearly defined for which the images and video, both live and recorded, may be used by the organisation that collects it. Use for any other purpose must be precluded, and must be subject to sanctions and enforcement. The material may of course be used under legal authority. 6. Controlled Disclosure The purposes must be clearly defined for which the images and video, both live and recorded, may be disclosed to other parties. Disclosure for any other purpose must be precluded, and must be subject to sanctions and enforcement. This provision applies to all parties, including law enforcement and national security agencies. The material may of course be disclosed under legal authority, such as a search warrant. 7. Controlled Publication Any publication of material must be justified, and must be the minimum necessary to achieve the aim. This applies with particular force to the publication of images of 'innocent bystanders' and of witnesses to an event. 2 of 4 9/12/10 9:52

Wherever possible, images of 'innocent bystanders' and of witnesses must be anonymised. The same principle applies to all other forms of information that may identify an individual, such as images showing number plates. 8. Cyclical Destruction Any recordings that are made as a result of visual surveillance must be retained only for a brief period. A defined program must be in place to ensure destruction of recordings. Failure to destroy recordings in compliance with the program must be subject to sanctions and enforcement. The material may of course be retained where a legal requirement exists to do so. However, the terms of the legal authority must be subject to Principles 1 and 2 (Justification and Proportionality). 9. Review All aspects of a visual surveillance program must be reviewed, both periodically and as circumstances warrant, in order to establish whether these Principles are being complied with, and a review report prepared. Where the review identifies problems, corrective action must be taken. To ensure that this Principle is honoured, authority for visual surveillance must be subject to a sunset clause. The sunset clause must include the requirement that a comprehensive review report be input to the re-authorisation process. Review reports must be made publicly available, or at least sufficient information from them must be made publicly available, in order to enable informed public debate. 10. Withdrawal A visual surveillance scheme and associated infrastructure must be de-commissioned and removed where it has demonstrably not fulfilled its objectives, where resources necessary to enable its objectives to be fulfilled are not available, or where an alternative with superior effectiveness and/or a superior privacy trade-off is available. Some Resources Guidelines EDPS (2009) 'Video-Surveillance Guidelines, **Consultation Draft**', European Data Protection Supervisor, 7 July 2009 ICO (2008) 'CCTV Code of Practice' Information Commissioner's Office, UK, 2008 NSW (2000) 'CCTV in Public Places' NSW Government Policy Statement and Guidelines, 2000, and the Review, 2001 NZPC (2009) 'Privacy and CCTV: A guide to the Privacy Act for businesses, agencies and organisations' New Zealand Privacy Commissioner, October 2009 OPCC (2006) 'Guidelines for the Use of Video Surveillance of Public Places by Police and Law Enforcement Authorities', Office of the Privacy Commissioner of Canada, March 2006 'Standards' BSI guidelines, BS 7958:1999 Evaluations 3 of 4 9/12/10 9:52

BBC (2008) 'CCTV boom 'failing to cut crime'', BBC News, 6 May 2008 CITRIS (2008) 'CITRIS Report: The San Francisco Community Safety Camera Program', University of California, Berkeley, 17 December 2008 Webster C.W.R. (2009) 'CCTV policy in the UK: reconsidering the evidence base' Surveillance & Society 6, 1 (March 2009) 10-22 Wells H., Allard T. & Wilson P. (2006) 'Crime and CCTV in Australia: Understanding the Relationship' Centre for Applied Psychology and Criminology, Bond University, 2006 short media report in Kerin L. (2008) 'Doubts raised over using CCTV cameras', ABC News, 7 May 2008 Welsh B.C. & Farrington D.P. (2004) 'Evidence-based Crime Prevention: The Effectiveness of CCTV' Crime Prevention and Community Safety: An International Journal (2004) 6, 21 33; doi:10.1057/palgrave.cpcs.8140184 Whitehead T. (2009) 'CCTV only effective at cutting car crime' The [London] Daily Telegraph, 18 May 2009 Resources CofE (2007a) 'Opinion on Video Surveillance in Public Places by Public Authorities and the Protection of Human Rights' European Commission for Democracy through Law (Venice Commission), Study no. 404/2007, 16-17 March 2007 CofE (2007b) 'Opinion on Video Surveillance by Private Operators in the Public and Private Spheres and by Public Authorities in the Private Sphere and Human Rights Protection' European Commission for Democracy through Law (Venice Commission), Study no. 430/2007, 1-2 June 2007 EU Article 29 Committee (2004) 'Opinion 4/2004 on the Processing of Personal Data by means of Video Surveillance' Article 29 Data Protection Working Party, Document 11750/02/EN WP 89, 11 February 2004 Urbaneye (2004) The Urbaneye Working Papers Series, Centre of Technology and Society, Technical University of Berlin, August 2004 APF thanks its site-sponsor: Created: 2 September 2009 - Last Amended: 6 January 2009 by Roger Clarke - Site Last Verified: 11 January 2009 Australian Privacy Foundation Inc., 1998-2010 - Mail to Webmaster Site Map - This document is at http://www.privacy.org.au/papers/media-0903.html - Privacy Policy 4 of 4 9/12/10 9:52