Technology and the Law. Jackie Charles

Similar documents
Legal Guide to Relevant Criminal Offences in Victoria

Table: Government response to PJCIS recommendations on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

Submission Regarding the Crimes (High Risk Offenders) Act 2006 (NSW)

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA

Aviation Security Identification Card (ASIC) Application Form S002

1. Commonwealth. Relevant Provisions of the Australian Legislation. Summary/Description of Relevant Provision. Cth/ State.

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

Counter-terrorism Laws, Offences and Other Provisions

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

Investigatory Powers Bill

Telecommunications Information Privacy Code 2003

Aviation Security Identification Card (ASIC) Application Form S002

Cybercrime Legislation Amendment Bill 2011

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

Cyber Crime & Information Security A Legislative Regime. Dr. Adrian McCullagh Information Security Institute Queensland University of Technology

AIA Australia Limited

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill 2014 No., 2014

Castan Centre for Human Rights Law Monash University. Submission to the Senate Legal and Constitutional Affairs Committee

3. Competition begins at 09:00hrs on Saturday 12 November 2016 and closes at 23:59hrs on Friday 9 December 2016 (the Competition Period ).

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

House Standing Committee on Social Policy and Legal Affairs

Legislative Brief The Information Technology (Amendment) Bill, 2006

Surveillance Devices Act 2007 No 64

MARITIME SECURITY IDENTIFICATION CARD (MSIC) INFORMATION

Policy: Notifiable Data Breach

Protecting Your Privacy

Commercial Agents and Private Inquiry Agents Act 2004 No 70

Child Protection (Offenders Prohibition Orders) Act 2004 No 46

Application Guidelines

REISSUE OF ASIC APPLICATION VISA RENEWAL FORM-S010

SENTENCING: A New Regime

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Appointment of a migration agent or exempt agent or other authorised recipient

Policies and Procedures

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

DATED DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE

Senate Legal and Constitutional Affairs Committee. Inquiry into comprehensive revision of the Telecommunications (Interception and Access) Act 1979

Law Enforcement Disclosure Report. Legal Annexe June Vodafone Power to you

Mandatory data breach reporting comes to Australia new notification requirements under the Privacy Act (2018) 15(4) PRIVLB 54

Regulation of Interception of Act 18 Communications Act 2010

You and Your Records Management Obligations

I. REGULATION OF INVESTIGATORY POWERS BILL

2018 No. 873 (C. 66) INVESTIGATORY POWERS

2. Definitions Bullying: the persistent and ongoing ill treatment of a person that victimises, humiliates, undermines or threatens that person.

National Security Legislation Amendment Bill (No. 1) 2014 No., 2014

Government of Canada Public Safety Initiatives

Domestic Violence NSW

Analysis of the Workplace Surveillance Bill 2005

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

NEW FALSE ACCOUNTING OFFENCES COMMENCE OPERATION IN AUSTRALIA

Submission on Exposure Draft New Offences Criminal Code (Forced Labour, Servitude, Forced Marriage, Deceptive Recruiting)

The Hon Justice Peter McClelland AM Royal Commission into Institutional Responses to Child Sexual Abuse GPO Box 5283 Sydney NSW 2001 Australia

Data Protection Policy

COMMONWEALTH OF DOMINICA

DATA PROTECTION LAWS OF THE WORLD. Egypt

Surveillance Devices Act 2007

Submission to the Joint Committee on the draft Investigatory Powers Bill

PROTECTION OF CHILDREN AND PREVENTION OF SEXUAL OFFENCES (SCOTLAND) ACT 2005

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

Criminal Code Amendment (Animal Protection) Bill 2015 Submission 72

ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT, ACT NO. 25 OF 2002 [ASSENTED TO 31 JULY 2002] [DATE OF COMMENCEMENT: 30 AUGUST 2002]

Legal Annexe: Overview of legal powers. Digital Rights and Freedoms Vodafone Group Plc

Regulation of Investigatory Powers Bill

1. This is the Country Addendum for Australia to the UOB Business Internet Banking Service Agreement (the Agreement).

KENYA GAZETTE SUPPLEMENT

Victims Rights and Support Act 2013 No 37

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

22 January Joint submission by:

Electronic Transactions Act, Act, Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act

NATIONAL CRIMINAL RECORD CHECK CONSENT FORM

Port Glasgow St Andrew s Data Protection Policy

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013

Disclosure Guidelines

Regulation of Investigatory Powers Act 2000

Crimes (Sentencing Procedure) Amendment Bill 2007

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy

VII. AUSTRALIA 8 SUMMARY OF LEGISLATION OF AUSTRALIA RELATED TO TERRORISM Counter Terrorism Legislation package. (a)

University of Wollongong

APPLICATION AND RECRUITMENT PROCESS EXPLANATORY NOTE

precise background services telstra employment pack 1

Act No. 502 of 23 May 2018

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

A message from Sheriff Scotty Rhoden:

Liquor Amendment (3 Strikes) Act 2011 No 58

DATA PROTECTION LAWS OF THE WORLD. South Korea

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

Proof Committee Hansard

TRAVEL DOCUMENTS ACT, official consolidated version, (ZPLD-1-UPB3)

Australasian University Safety Association 2016 Fiona Austin

Public Interest Disclosures Procedure

CHESTER-LE-STREET GOLF CLUB DISCIPLINARY POLICY AND PROCEDURE

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31

AUSTRALIAN HUMAN RIGHTS COMMISSION RESPONSE TO QUESTIONNAIRE FROM THE WORKING GROUP ON ARBITRARY DETENTION 8 November 2013

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Transcription:

Technology and the Law Jackie Charles jackie@ruleoflaw.org.au

What is the Rule of Law?

Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy drug trafficking money laundering image based sexual abuse harassment, stalking and other threatening behaviours terrorist recruitment and propaganda

Data Breach Notification Laws Data breach Legislation - Privacy Amendment (Notifiable Data Breaches) Bill 2016 Passed by Parliament 22 February 2017 Amends the Privacy Act 1988 (Cth) An eligible data breach happens if: (a) there is unauthorised access to, unauthorised disclosure of, or loss of, personal information held by an entity; and (b) the access, disclosure or loss is likely to result in serious harm to any of the individuals to whom the information relates. An entity must give a notification

Crimes Amendment (Intimate Images) Act 2017 Intimate image is defined to mean an image of a person s private parts, or of a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy provides that: it will be an offence for a person to intentionally record or distribute, or threaten to record or distribute, an intimate image of another person without that person s consent. The maximum penalty will be imprisonment for 3 years or 100 penalty units, or both.

National Security 1960 to 2016 1960 Only ASIO could tap phones in relation to matters of national security: the security of the Commonwealth means the protection of the Commonwealth and the Territories from acts of espionage, sabotage or subversion, whether directed from, or intended to be committed, within the Commonwealth or not; Telephonic Communications (Interception) Act 1960 1979 TIA Act, police receive more powers to intercept phone calls in drugs investigations 80s, 90s, 00s broader powers to access communications, and stored communications, and METADATA. 2015 mandatory retention of METADATA 2017 - Attorney-General s Dept. Review calls for submissions on whether metadata should be available for use in civil cases

What is metadata: WHO WHEN WHERE HOW about a communication. so you can think about WHY: Someone is calling someone else? they spent 20 minutes on the phone with them at 2 in the morning? did they text/sms that person 20 times in one day? was that email attachment 20mb?

Mandatory retention of metadata Telecommunications companies like Optus, Telstra, iinet, etc were no longer keeping metadata. Intelligence and law enforcement agencies pushed for a law that required companies to keep this data for use in investigations. Law passed in 2015 requires all telcos to keep 2 years worth of metadata. Intelligence and law enforcement can access this data in investigations relating to crime or national security

Concerns about mandatory data retention Issue 1 Who decides what metadata is? Issue 2 Self Authorisation to access metadata Issue 3 Who can access metadata? Issue 4 Journalists, Freedom of the Press and Metadata

Balancing Acts Criminal investigations & metadata: metadata used to catch a murderer National security and the safety of the community AND Individual rights and freedoms Too many checks and balances AND Too few checks and balances

Does metadata retention work? #effectivene ss Rick Sarre - Professor of Law and Criminal Justice University of South Australia says it can be defeated - hence the emphasis on encrypted data there is no guarantee that it is not being shared internationally it costs approx $750 million over 10 years there is little evidence of a causal link to reducing attacks and it s a threat to privacy

What about Privacy should we have a Charter of rights? Statutory or Constitutional? (Where?) Privacy is not absolute, what kind of privacy do we want? (What?) How would a charter protect rights in a practical sense? (How?) National security and effective law enforcement is fundamental, as is having a society where we respect individuals (Why?)

Key Legislation Crimes Amendment (Intimate Images) Act 2017 (NSW) Data breach Legislation - Privacy Amendment (Notifiable Data Breaches) Bill 2016 Amends the Privacy Act 1988 (Cth) Metadata Law: Telecommunications (Interception and Access) Act 1979 Recent legislation: Carly s law - Criminal Code Amendment (Protecting Minors Online) Act 2017 amends the TIA act and the Criminal Code Act 1995 (Cth)

What is the Rule of Law?

WWW.RULEOFLAW.ORG.AU