Re: The Council's Draft CCTV Code of Practice

Similar documents
The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached.

Analysis of the Workplace Surveillance Bill 2005

CCTV CODE OF PRACTICE

In the picture: A data protection code of practice for surveillance cameras and personal information. Jonathan Bamford Head of Strategic Liaison

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

Workplace Surveillance Act 2005

Conducting surveillance in a public place

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

The installation of CCTV can provide information on activities at the Water,

DECISION no. 52 of 31 st May 2012 on the processing of personal data using video surveillance means

REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL

A closed circuit television system is used at the Memorial Hall by the Parish Council.

11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also

Rail Safety (Adoption of National Law) Act 2012 No 82

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

B I L L. No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act

Security Video Surveillance Policy

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

House Standing Committee on Social Policy and Legal Affairs

Q. What do the Law Commission and the Ministry of Justice recommend?

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

Law Commission Review of the Search and Surveillance Act 2012

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

DURHAM CONSTABULARY POLICY

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31

Law Enforcement processing (Part 3 of the DPA 2018)

Excerpt from speech by the Hon Bob Debus, Attorney-General for NSW

Submission to the Joint Committee on the draft Investigatory Powers Bill

DATA PROTECTION POLICY STATUTORY

MANITOBA FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY RESOURCE MANUAL

The defence submit that the RSPB and the police are so inextricably linked in the investigation and prosecution of offences of this type, that the

I. REGULATION OF INVESTIGATORY POWERS BILL

A BILL. (a) the owner of the device and/or geolocation information; or. (c) a person to whose geolocation the information pertains.

The Rental Exchange. Contribution Agreement for Rental Exchange Database. A world of insight

AIA Australia Limited

Not Protectively Marked POLICY AND STANDARD OPERATING PROCEDURES

Access to view taser camera footage of 47 incidents where the taser was

PHARMAC s implementation of Trans-Pacific Partnership (TPP) provisions and other amendments to application processes September 2016 Appendix two

Information Commissioner s Office. ICO response to consultation on revisions to PACE codes

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection

United Nations Convention against Torture: New Zealand s sixth periodic review, 2015 shadow report

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

ARTICLE 29 Data Protection Working Party

26 July 2011

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

Privacy Commissioner's submission to the Law and Order Committee on the Anti-Money Laundering and Countering Financing of Terrorism Amendment Bill

The Protection of Freedoms Bill

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

SUPERVISED LEGAL PRACTICE GUIDELINES

Tertiary Education Quality and Standards Agency Act 2011

Financial Dispute Resolution Service (FDRS)

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Decision 019/2011 Mr Allan Clark and Glasgow City Council. Names and addresses of Glasgow s Community Councillors

An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology

Access to Information

Consistency with the New Zealand Bill of Rights Act 1990: Conservation (Infringement System) Bill

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Covert Human Intelligence Sources Code of Practice

CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS

Data Protection Act 1998 Policy

PDF Agreement: Product Development Forum Terms

Frequently Asked Questions for Municipalities LOCAL GOVERNMENT BODIES RECORDS

PRIVACY MANAGEMENT PLAN

Procedures for investigating breaches of competition-related conditions in Broadcasting Act licences. Guidelines

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources

County Tipperary Joint Policing Committee. A Policy Paper on CCTV Provision in Public Places

Architects Regulation 2012

Surveillance Devices Act 2007 No 64

B. The transfer of personal information to states with equivalent protection of fundamental rights

Enforcement guidelines for regulatory investigations. Guidelines

In-Court Media Coverage Guidelines 2016

Information Privacy Act 2000

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

Data Protection Policy

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

The Enforcement Guide

Student/Queensland Health Terms of Agreement Information for Students

Our ref: FOI June Phillip Sweeney via Dear Mr Sweeney

DRAFT GUIDELINES ON IMMUNITY FROM PROSECUTION FOR CARTEL OFFENCES

NSW Council for Civil Liberties Inc.

The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State

Justice Sub-Committee on Policing. Police Body Worn Video. Written submission from Police Scotland

COUNTERING TERRORIST FIGHTERS LEGISLATION BILL Human Rights Commission Submission to the Foreign Affairs, Defence and Trade Committee 27 November 2014

Court Security Act 2005 No 1

The University is the owner of a competition format and associated materials entitled Visualise Your Thesis.

ARTICLE 29 Data Protection Working Party

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015

Annex 1: Standard Contractual Clauses (processors)

Access to Personal Information Procedure

CCTV Code of Practice

Liquor Amendment (3 Strikes) Act 2011 No 58

Consistency with the New Zealand Bill of Rights Act 1990: Outer Space and High Altitude Activities Bill

COMMISSION IMPLEMENTING DECISION. of XXX

PERSONAL INFORMATION PROTECTION ACT

Transcription:

http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 7 September 2010 Mr Kevin Crameri OAM The Mayor Penrith Council Dear Mr Crameri Re: The Council's Draft CCTV Code of Practice I refer to the article in the Penrith Press of 2 September 2010, entitled 'CCTV privacy issues a worry as Penrith Council reviews Code of Practice', at http://penrith-press.whereilive.com.au/news/story/cctv-privacy-issues-a-worry-as-penrith-councilreviews-code-of-practice/ The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached. The APF's policy statement in relation to Visual Surveillance including CCTV is attached and at. The document provides a set of Principles that can be used to guide the evaluation of proposals for new CCTV schemes, and the conduct of reviews of existing CCTV operations. The APF believes that the document is more comprehensive than others that have been published. It represents a much better basis for ensuring that only appropriate schemes are introduced, and that those that are installed are effective. We suggest that it would be valuable for the Council to evaluate its draft Public Spaces CCTV Program Code of Practice in light of the APF's set of Principles. In addition, we would appreciate a copy of the Council's draft, and the opportunity to provide a submission to Council prior to its adoption. Thank you for your consideration. Yours sincerely Roger Clarke Chair, Australian Privacy Foundation (02) 6288 1472 Chair@privacy.org.au The APF Australia s leading public interest voice in the privacy arena since 1987

Australian Privacy Foundation Background Information The Australian Privacy Foundation (APF) is the primary national association dedicated to protecting the privacy rights of Australians. The Foundation aims to focus public attention on emerging issues that pose a threat to the freedom and privacy of Australians. The Foundation has led the fight to defend the right of individuals to control their personal information and to be free of excessive intrusions. The APF s primary activity is analysis of the privacy impact of systems and proposals for new systems. It makes frequent submissions to parliamentary committees and government agencies. It publishes information on privacy laws and privacy issues. It provides continual background briefings to the media on privacy-related matters. Where possible, the APF cooperates with and supports privacy oversight agencies, but it is entirely independent of the agencies that administer privacy legislation, and regrettably often finds it necessary to be critical of their performance. When necessary, the APF conducts campaigns for or against specific proposals. It works with civil liberties councils, consumer organisations, professional associations and other community groups as appropriate to the circumstances. The Privacy Foundation is also an active participant in Privacy International, the world-wide privacy protection network. The APF s Board comprises professionals who bring to their work deep experience in privacy, information technology and the law. The Board is supported by a Patron (Sir Zelman Cowen), and an Advisory Panel of eminent citizens, including former judges, former Ministers of the Crown, and a former Prime Minister. The following pages provide access to information about the APF: Policies http://www.privacy.org.au/papers/ Resources http://www.privacy.org.au/resources/ Media http://www.privacy.org.au/media/ Current Board Members http://www.privacy.org.au/about/contacts.html Patron and Advisory Panel http://www.privacy.org.au/about/advisorypanel.html The following pages provide outlines of several campaigns the APF has conducted: The Australia Card (1985-87) http://www.privacy.org.au/about/formation.html Credit Reporting (1988-90) http://www.privacy.org.au/campaigns/creditrpting/ The Access Card (2006-07) http://www.privacy.org.au/campaigns/id_cards/hsac.html The Media (2007-) http://www.privacy.org.au/campaigns/media/

APF Policy Statement re Visual Surveillance, incl. CCTV POLICY Media Resources Campaigns About Us What Can I Do? Big Brother Contact Us The Scope of This Policy Statement Revision of 6 January 2010 This document supersedes the version of 14 October 2009 The scope of this Policy Statement is Visual Surveillance, such as that conducted using Closed-Circuit Television (CCTV). The term is used here to encompass the capture and/or projection of images and video, whether or not with audio, whether or not the images and/or audio are recorded, whether or not they are subsequently disclosed and/or published, and whether the image-resolution is high- or low-quality. The focus is on visual surveillance conducted in a systematic manner, as is generally the case with its use by organisations. The scope is not intended to encompass casual use of cameras by individuals, which gives rise to privacy concerns that are of a different nature and gravity from institutionalised uses. The focus is on data that represents images and any associated sound. Structured and textual data deriving from such images, including meta-data describing them, are also a source of considerable privacy concern, and must be subject to data protection provisions. The Principles enunciated below also have broader application, to surveillance conducted using any part of the electromagnetic spectrum including that outside the human-visible range, such as infra-red, ultra-violet and X-rays. The Principles Visual surveillance may have potential in particular circumstances to protect important human values. On the other hand, visual surveillance is highly privacy-intrusive. It has a chilling effect on human behaviour generally. Moreover, unless it is well-designed and well-managed, visual surveillance may have little or no chilling effect on criminal or anti-social behaviour. Studies have created serious doubts about the effectiveness of visual surveillance as a technique for crime prevention, for crime detection, for criminal investigation and for criminal prosecution. Wherever visual surveillance is applied, all of the following conditions must be fulfilled. 1. Justification Because visual surveillance is highly privacy-invasive, a Privacy Impact Assessment (PIA) must be conducted before a scheme is commenced or significantly changed. A PIA involves publication of a clear explanation, demonstrating that it is expected on reasonable grounds to have positive benefits sufficient to justify its intrusiveness, followed by public consultation. The explanation must be based on evidence and systemic reasoning, and not merely rely on assertions. The justification must make clear what less privacy-invasive alternatives have been considered, and why they are inadequate. 2. Proportionality 1 of 4 7/9/10 17:09

The benefits identified in the justification for using visual surveillance must outweigh the negative impacts on privacy. Visual surveillance must be no more intensive (e.g. the number of cameras), and no more extensive (e.g. across a large area) than the analysis justifies. 3. Openness The conduct of visual surveillance in any open space (whether it is public or is commonly used by members of the public) must be disclosed to the public, and clearly notified to individuals who enter that space. This applies to both the fact that visual surveillance is undertaken and the nature and extent of the surveillance. Any exceptions to this must be treated as covert surveillance (see below). Before visual surveillance is conducted in any space in which a reasonable expectation of privacy exists (including private premises, and toilets and change-rooms in open facilities), it must be the subject of formal, specific and bounded legal authority, exercised by a judicial institution that makes its judgements in a manner demonstrably independently of the organisation that seeks to conduct the surveillance. It must also be disclosed to the public, and clearly notified to individuals who enter that space. This applies to both the fact that visual surveillance is undertaken and the nature and extent of visual surveillance. Any exceptions to this must be treated as covert surveillance (see below). Before covert visual surveillance is undertaken, it must be the subject of formal, specific and bounded legal authority, exercised by a judicial institution that makes its judgements in a manner demonstrably independently of the organisation that seeks to conduct the surveillance. Where a recording is made, and the images and/or video are such as to identify any individual, the data must be treated as personal data, and must be subject to data protection laws, including access by the data subject, complaint handling, and redress. 4. Access Security Access to images and video, both live and recorded, must be tightly controlled., and a Any security breaches must be acted upon promptly and effectively. 5. Controlled Use The purposes must be clearly defined for which the images and video, both live and recorded, may be used by the organisation that collects it. Use for any other purpose must be precluded, and must be subject to sanctions and enforcement. The material may of course be used under legal authority. 6. Controlled Disclosure The purposes must be clearly defined for which the images and video, both live and recorded, may be disclosed to other parties. Disclosure for any other purpose must be precluded, and must be subject to sanctions and enforcement. This provision applies to all parties, including law enforcement and national security agencies. The material may of course be disclosed under legal authority, such as a search warrant. 7. Controlled Publication Any publication of material must be justified, and must be the minimum necessary to achieve the aim. This applies with particular force to the publication of images of 'innocent bystanders' and of witnesses to an event. 2 of 4 7/9/10 17:09

Wherever possible, images of 'innocent bystanders' and of witnesses must be anonymised. The same principle applies to all other forms of information that may identify an individual, such as images showing number plates. 8. Cyclical Destruction Any recordings that are made as a result of visual surveillance must be retained only for a brief period. A defined program must be in place to ensure destruction of recordings. Failure to destroy recordings in compliance with the program must be subject to sanctions and enforcement. The material may of course be retained where a legal requirement exists to do so. However, the terms of the legal authority must be subject to Principles 1 and 2 (Justification and Proportionality). 9. Review All aspects of a visual surveillance program must be reviewed, both periodically and as circumstances warrant, in order to establish whether these Principles are being complied with, and a review report prepared. Where the review identifies problems, corrective action must be taken. To ensure that this Principle is honoured, authority for visual surveillance must be subject to a sunset clause. The sunset clause must include the requirement that a comprehensive review report be input to the re-authorisation process. Review reports must be made publicly available, or at least sufficient information from them must be made publicly available, in order to enable informed public debate. 10. Withdrawal A visual surveillance scheme and associated infrastructure must be de-commissioned and removed where it has demonstrably not fulfilled its objectives, where resources necessary to enable its objectives to be fulfilled are not available, or where an alternative with superior effectiveness and/or a superior privacy trade-off is available. Some Resources Guidelines EDPS (2009) 'Video-Surveillance Guidelines, **Consultation Draft**', European Data Protection Supervisor, 7 July 2009 ICO (2008) 'CCTV Code of Practice' Information Commissioner's Office, UK, 2008 NSW (2000) 'CCTV in Public Places' NSW Government Policy Statement and Guidelines, 2000, and the Review, 2001 NZPC (2009) 'Privacy and CCTV: A guide to the Privacy Act for businesses, agencies and organisations' New Zealand Privacy Commissioner, October 2009 OPCC (2006) 'Guidelines for the Use of Video Surveillance of Public Places by Police and Law Enforcement Authorities', Office of the Privacy Commissioner of Canada, March 2006 'Standards' BSI guidelines, BS 7958:1999 Evaluations 3 of 4 7/9/10 17:09

BBC (2008) 'CCTV boom 'failing to cut crime'', BBC News, 6 May 2008 CITRIS (2008) 'CITRIS Report: The San Francisco Community Safety Camera Program', University of California, Berkeley, 17 December 2008 Webster C.W.R. (2009) 'CCTV policy in the UK: reconsidering the evidence base' Surveillance & Society 6, 1 (March 2009) 10-22 Wells H., Allard T. & Wilson P. (2006) 'Crime and CCTV in Australia: Understanding the Relationship' Centre for Applied Psychology and Criminology, Bond University, 2006 short media report in Kerin L. (2008) 'Doubts raised over using CCTV cameras', ABC News, 7 May 2008 Welsh B.C. & Farrington D.P. (2004) 'Evidence-based Crime Prevention: The Effectiveness of CCTV' Crime Prevention and Community Safety: An International Journal (2004) 6, 21 33; doi:10.1057/palgrave.cpcs.8140184 Whitehead T. (2009) 'CCTV only effective at cutting car crime' The [London] Daily Telegraph, 18 May 2009 Resources CofE (2007a) 'Opinion on Video Surveillance in Public Places by Public Authorities and the Protection of Human Rights' European Commission for Democracy through Law (Venice Commission), Study no. 404/2007, 16-17 March 2007 CofE (2007b) 'Opinion on Video Surveillance by Private Operators in the Public and Private Spheres and by Public Authorities in the Private Sphere and Human Rights Protection' European Commission for Democracy through Law (Venice Commission), Study no. 430/2007, 1-2 June 2007 EU Article 29 Committee (2004) 'Opinion 4/2004 on the Processing of Personal Data by means of Video Surveillance' Article 29 Data Protection Working Party, Document 11750/02/EN WP 89, 11 February 2004 Urbaneye (2004) The Urbaneye Working Papers Series, Centre of Technology and Society, Technical University of Berlin, August 2004 APF thanks its site-sponsor: Created: 2 September 2009 - Last Amended: 6 January 2009 by Roger Clarke - Site Last Verified: 11 January 2009 Australian Privacy Foundation Inc., 1998-2010 - Mail to Webmaster Site Map - This document is at http://www.privacy.org.au/papers/media-0903.html - Privacy Policy 4 of 4 7/9/10 17:09