Excerpt from speech by the Hon Bob Debus, Attorney-General for NSW

Similar documents
Analysis of the Workplace Surveillance Bill 2005

Surveillance Devices Act 2007 No 64

AIA Australia Limited

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

Surveillance Devices Act 2007

NSW Council for Civil Liberties Inc.

APPLICATION FOR COMMUNICATIONS DATA (UNDER THE DATA PROTECTION ACT 1998) RESTRICTED

Workplace Surveillance Act 2005

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.

Cutting Red Tape. Submission to the Queensland Parliament Finance and Administration Committee

Private Investigators Bill 2005

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

Complaint about the Police use of a vehicle checkpoint

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

Covert Human Intelligence Sources Code of Practice

REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL

DATA PROTECTION POLICY STATUTORY

Law Enforcement processing (Part 3 of the DPA 2018)

Q. What do the Law Commission and the Ministry of Justice recommend?

Data Protection Act 1998 Policy

PRIVACY MANAGEMENT PLAN

House Standing Committee on Social Policy and Legal Affairs

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

DATA PROTECTION LAWS OF THE WORLD. Egypt

Privacy in relation to VET Student Loans

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

Conducting surveillance in a public place

Re: The Council's Draft CCTV Code of Practice

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Child Protection Legislation Amendment (Children s Guardian) Act 2013 No 31

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

DATA SHARING AND PROCESSING

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached.

11 July , Barry Steinhardt, Liberty in the Age of Technology (2004) Global Agenda, at 154. See also

Access to Information

Child Protection (Offenders Prohibition Orders) Act 2004 No 46

PRIVACY Policy. 1. Policy Statement. 2. Purpose. 3. Policy

Welsh Language Commissioner: Strategic Equality Plan

European College of Business and Management Data Protection Policy

Domestic Violence Victims Protection Bill

Court Security Act 2005 No 1

A guide to the new privacy landscape for the Commonwealth Government

DURHAM CONSTABULARY POLICY

NSW COUNCIL FOR CIVIL LIBERTIES SUBMISSION ISSUES PAPER: A COMMONWEALTH STATUTORY CAUSE OF ACTION FOR SERIOUS INVASION OF PRIVACY

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

THE FREEDOM OF INFORMATION ACT, Arrangement of Sections PART I PRELIMINARY

Support for Person Reporting Wrongdoing Policy and Procedure

Hernandez V. Hillsides: Evolving Calif. Privacy Law

Analysis of legal issues and information tips on how to respond critically

The Correctional Services Administration, Discipline and Security Regulations, 2003

Industrial Relations (Child Employment) Act 2006 No 96

Policies and Procedures

Information Services Computer Misuse/Abuse Procedures for Students, Staff, Alumni and External Users

Code of Practice - Covert Human Intelligence Sources. Covert Human Intelligence Sources. Code of Practice

Clause 10.4 of the Legal Aid ACT General Panel Services Agreement requires the practitioner to comply with certain practice standards.

SURVEILLANCE DEVICES ACT 1999

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD

The Saskatchewan Gazette

The Act on Processing of Personal Data

NON-DISCLOSURE AGREEMENT

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER P September 10, 2018 PRIMARIS MANAGEMENT INC. Case File Number

CORPORATE GOVERNANCE & PUBLIC INTEREST DISCLOSURE


OCTOPUS CONFERENCE 2012 STRASBOURG JUNE 6.-8.

GAMING SECURITY PROFESSIONALS OF CANADA PROFESSIONNELS EN SÉCURITÉ DU JEU DU CANADA

Bar Council response to The Cab Rank Rule: Standard contractual terms and the list of defaulting solicitors consultation paper

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Security Video Surveillance Policy

EUROPEAN PARLIAMENT Committee on the Internal Market and Consumer Protection

Electronic Privacy Information Center September 24, 2001

If you do not accept any items within our Privacy Policy, Disclaimer or these Terms and Conditions documents, then you must not use the Site

Port Glasgow St Andrew s Data Protection Policy

The NSW Civil & Administrative Tribunal (NCAT) Structure & Operation

LISTENING DEVICES ACT, 1984, No. 69

Complaint Handling and Resolution Policy. Section 1 - Purpose and Context

Mandatory data breach reporting comes to Australia new notification requirements under the Privacy Act (2018) 15(4) PRIVLB 54

Colloquium organized by Supreme Administrative Court of the Czech Republic and ACA-Europe

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

EDPS Newsletter NO 25 JULY 2010

PRIVACY ACT 1993 SECTION ONE INTRODUCTION...3

Investigatory Powers Bill

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction

MUTUAL ASSISTANCE IN CRIMINAL MATTERS ACT

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy

Our ref: FOI June Phillip Sweeney via Dear Mr Sweeney

ACCESS, OPENNESS, ACCOUNTABILITY: A Guide to the Newfoundland and Labrador Registry of Lobbyists

The City of London Law Society Competition Law Committee

I. REGULATION OF INVESTIGATORY POWERS BILL

Data Protection Policy

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002

FREEDOM OF INFORMATION

SUMMARY OFFENCES ACT 1988 REGULATION

Criminal Code Amendment (Animal Protection) Bill 2015 Submission 72

Report on the Law Derived from the European Union (Wales) Bill

Is information about legal entities personal data? No. The DPA only applies to information about individuals as opposed to legal entities.

The Hon Justice Peter McClelland AM Royal Commission into Institutional Responses to Child Sexual Abuse GPO Box 5283 Sydney NSW 2001 Australia

Transcription:

Excerpt from speech by the Hon Bob Debus, Attorney-General for NSW Communications Law Centre/Freehills Professional Seminar on E-Mail Surveillance in the workplace 28 June 2001 Outside the cloistered world of the New South Wales parliament, e-mail which ten years ago was almost unknown to the majority of people in Australia, has of course taken its place alongside the telephone as one of the most important and popular forms of communication. E-mail has irrevocably changed the nature of human interaction. A message sent from Australia to a person s Hotmail address will find that person whether they log on in Timbuktu or Outer Mongolia. But e-mail s most important application has been in relation to business. By that I mean business in its broadest sense, to include all forms of activity that people may undertake to earn a living. It has permitted documents or information to be moved cheaply and quickly across an office or across the world. This mobility is coupled with a second advantage over other forms of media such as the phone. E-mail provides a permanent record of the fact that a communication took place and the content of that communication. Clearly a permanent record of all communication is attractive in relation to business as it provides a clear record of any undertakings or agreements and can prevent misunderstandings or disputes. Problems caused by e-mail However, both the mobility and permanence of e-mail carry with them problems. The same mobility which allows a document to be sent to a client also permits a rogue employee to send it to a competitor, the press, or to their home. The permanence of the record that helps to prevent

disputes can be a disadvantage when sensitive personal information is communicated or when damaging material such as defamatory statements are sent. Employers have responded in a number of ways to these problems ranging from the draconian to the laissez faire. One employer response which has emerged involves a range of security practices involving surveillance often covert surveillance - of all employee e-mail. Secret or covert e-mail surveillance has been the basis of numerous complaints. While some employers argue that this is necessary to protect their legitimate interests, employees expect that their private correspondence, like their private telephone calls or private conversations, should not be unnecessarily subject to surveillance. It would be both unreasonable and impractical to prevent employees using e-mail for non-employment purposes as the distinction between employment and non employment purposes can be blurred at best. For example, what is the status of a comment in a business e-mail asking a work colleague about his or her recent holiday? Most accept that it is reasonable for people to speak about non-employment related matters at work so it is hard to see why employees should not be permitted to communicate similar information via e-mail. Given these competing considerations, a sophisticated approach is needed to strike the right balance between an employee s right to privacy and an employer s right to protect their business interests. So what is the Government proposing to do about this matter? The Law Reform Commission s Report In 1996, my predecessor, Jeff Shaw, commissioned a NSW Law Reform Commission review into Surveillance, in response to growing concerns surrounding the increasing use of surveillance in NSW.

The Commissions Interim Report will be released in the near future and the intricacies of the Cabinet process will of course dictate the nature and extent of the legislative response of the Government. Within the constraints imposed by these various processes, I am, however, in a position to indicate the broad directions for reform which will be set out in the Commission s Interim Report. The Law Reform Commission will be advocating a comprehensive regulatory approach to surveillance through a new Surveillance Act. The Commission s recommendations will represent a departure from the device-specific approach taken in the past in relation to legislation such as the Listening Devices Act. The proposed scheme offers the benefit of clarification and simplification of a somewhat grey area of the law. The Law Reform Commission proposes a framework which protects the right of the individual not to be subjected to arbitrary surveillance, while permitting legitimate uses of surveillance technology. The overall scheme is similar to that which was pioneered in the Workplace Video Surveillance Act 1998. In regulating surveillance there is a clear distinction between overt and covert surveillance. The Commission defines overt surveillance as surveillance which occurs in circumstances where there is adequate notice of the surveillance. Examples of notice would be such things as signs and clearly visible equipment such as cameras. In the case of covert surveillance, where the subject of the surveillance is unaware that it is taking place, the Law Reform Commission considers that, apart from a very limited number of cases, covert surveillance should require prior approval from a court or similar body. Clearly there will be cases where permission will be sought to conduct covert surveillance of e-mail in, for example, employment and for law enforcement purposes. Given the focus of today s forum, I will focus upon the regime for covert surveillance in the workplace. And I need to restate here, again, that this is the Commissions proposed scheme as I understand it to be. While it has much to recommend it intellectually, it is

of course the case that further analysis in my own Department and at a Cabinet level will have to ensue before adoption of the scheme legislatively can be brought to finality. Under the scheme envisaged by the LRC, an employer who wishes to conduct covert surveillance of an employee s e-mail will require prior authorisation from an Industrial Magistrate or a Judicial Member of the Industrial Relations Commission. An employer would only be entitled to obtain a covert surveillance authorisation where he or she could demonstrate that unlawful activity or serious misconduct is reasonably suspected. The court would then weigh up a number of factors including the privacy of the employee or any third parties before permitting the covert surveillance to take place. It is envisaged that authorisations would only last for a limited period and that employers would be obliged to report back the results of the covert surveillance. It will also be recommended that an employer conducting covert surveillance would also be obliged to keep records and to make those records available to the Privacy Commissioner or Ombudsman. In accordance with accepted privacy principles, any information gathered through a covert surveillance authorisation should only be permitted to be used for the purposes explicitly stated in the authorisation. It would need to be kept secure and the information should be destroyed when it is found to be no longer relevant. Clearly, these requirements if enacted would preclude covert e-mail surveillance except in a limited number of circumstances where serious abuse was thought to be taking place. It would mean that people would generally need to be notified that surveillance of e-mail was occurring in order that the surveillance was overt rather than covert.

For overt surveillance, apart from the notice requirements, the Law Reform Commission has developed a number of privacy principles. These are: 1. overt surveillance should not be used in such a way that it breaches an individual s reasonable expectation of privacy; 2. overt surveillance must only be undertaken for an acceptable purpose (these are listed as protection of the person; protection of property; protection of the public interest; and protection of a legitimate interest). 3. surveillance must be conducted in a manner which is appropriate for purpose; 4. notice provisions shall identify the surveillance user; 5. surveillance users are accountable for their surveillance devices and the consequences of their use; 6. surveillance users must ensure that all aspects of their surveillance system are secure (eg security procedures for video and audio tapes, proper training and probity checks on staff, etc); 7. material obtained through surveillance to be used in a fair manner and only for the purpose obtained; 8. material obtained through surveillance to be destroyed within specified period. These principles would clearly not preclude e-mail surveillance by employers but would require that it be carried out ethically and sensibly. It would require that employers wishing to take steps to protect their lawful interests should take account of employee privacy. I would expect that most responsible users of overt surveillance would already subscribe to these standards set down by the Law Reform Commission.

Where breaches of the proposed legislation occur, the LRC is of the view that breaches of the overt surveillance principles should give rise to civil liability while a breach of the requirements in relation to covert surveillance would constitute a criminal offence. Government Response to LRC The Government, [in its 1999 paper, Law Reform in NSW: A Fairer, Faster Justice System ] has made a commitment to introduce a comprehensive scheme for the regulation of unwarranted and intrusive surveillance, following a review of the recommendations of the NSW Law Reform Commission. This process is now underway. The Government as I have said, is currently reviewing the Report and as you will appreciate, it is a substantial document proposing a significant law reform proposal. The Government will therefore undertake any necessary consultation before finalising its response to the Report s recommendations. However, I can say that I find the arguments of the Law Reform Commission in relation to the regulation of e-mail surveillance persuasive. Subject to the outcome of the present consultations, I hope to be in a position to announce a comprehensive package of legislative reforms in the relatively near future. Employees and employers, in my opinion, can only benefit from the clarity and certainty that such a regime, if well drafted and designed, can deliver. Unions, employer groups and indeed specialist groups such as this will differ in their interpretation of the appropriate line to be drawn between employee privacy and the right of employers to be aware of activity conducted in the workplace. In the coming months I look forward to debating the details with all interested parties. Probably in my case the key debates will take place in press conferences, in forums such as this and on the radio rather than in cyber space but that is regrettably the fate of an Attorney General grounded firmly in twentieth century technology.

Let me once again thank you for your hospitality this afternoon, wish you well in your twenty first century deliberations and wish me luck as I return to the seventeenth century world of the NSW parliament.