Simon Bronitt and James Stellios ANU College of Law, The Australian National University Regulating Telecommunications Interception and Access: A Seachange.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Privacy Platform The Impact of Rising Economies on Privacy and Data Protection 19 September 2012 With thanks to the House of the Dutch Provinces.
Sources of Law Chapter 1.2.
FERPA Family Educational Rights and Privacy Act A presentation for the Biola University Admissions Staff Angela Bessolo December 2004.
National Smartcard Project Work Package 8 – Report on financial services legislation.
Preventing public sector corruption: The relationship between parliamentary committees and corruption commissions Dr Lyndel Bates CARRS-Q Peter Rogers.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
1 Regulatory Framework for C&I Regimes Presented by Andrew Kwan ITU Consultant Conformity and Interoperability Training for ARB Region on Type Approval.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
When antitrust theory meets practice Stephen P. King Monash University.
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
(Edited) WORKPLACE PRIVACY.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Chapter 18 - The Fourth Amendment and National Security.
Presentation Public Sector Integrity Commissioner 60 Queen Street, 7 th floor Ottawa ON K1P 5Y7 (613)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
 The bicameral System  The structure of the Commonwealth and Victorian Parliament  Role of the Upper and Lower house in both Federal and State Parliaments.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 Business and the Constitution.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
WORKSHOP, Nicosia 2-3rd July 2008 “Extension of SAFETY & QUALITY Common Requirements to the EMAC States” Item 3 : Regulatory Context Peter Stastny EUROCONTROL.
Public law governs:  relationships between individuals and the state/government; and  the structure, administration and operation of the state/government.
Michael Coonan Content Assessment International Training Program Melbourne, September 2006 Strategies for regulating online content.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
Firearms Controls in Australia Session III: Challenges, constraints and opportunities in national PoA implementation by States of the Pacific Brooke King,
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
Four-year Review of the Victorian Charter. Outline 1. Key Messages 2. Background to the Charter Review 3. Terms of Reference 4. Making a Submission 5.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
Chapter 18 - The Fourth Amendment and National Security.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Democracy and Constitutions Texas Constitutions p
Chapter 4: Laws, Regulations, and Compliance
European Data Protection Supervisor CRIM, EP, 17 September 12 Cybercrime and Data protection Hielke HIJMANS Head of Unit Policy & Consultations.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Combating Discrimination in the Workplace Complies with Legal Profession Regulation 176 Special MCLE Requirement Presented by Dr Monica Hayes Solicitor.
The Pensions Board Andrew Nugent Assistant Head of Information Services The Pensions Board.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Tackling communications surveillance in SA Murray Hunter Right2Know
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
NSW DOMESTIC AND FAMILY VIOLENCE FRAMEWORK FOR REFORM:
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
American History Do Now:
Protection of CONSUMER information
Principles of Administrative Law <Instructor Name>
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Essentials of the legal environment today, 5e
Criminal Procedure: Theory and Practice, 2d.
AERODROME CERTIFICATION COURSE
Chapter 6 Powers and Functions of Administrative Agencies.
Haylie Pepper – Perth Using Twitter in P&L Haylie Pepper – Perth
2002 International Conference on Personal Data Protection
School Searches and You
Presentation transcript:

Simon Bronitt and James Stellios ANU College of Law, The Australian National University Regulating Telecommunications Interception and Access: A Seachange in Surveillance Laws

Key Issues and Questions  The 2006 Act represents a landmark reform to the telecommunications interception regime in Australia.  New power to access stored communications provide state with further tools for security and law enforcement purposes.  Legal & Policy Issues  What is the impact of the new legislative scheme?  Are existing safeguards effective?  Has privacy have been ‘balanced’ away in favour of providing state with enhanced surveillance tools?  Is a balancing approach wrong?

Interception Regime  Trends since 1979: Normalization of Extraordinary Powers The Emergence of Regulatory Surveillance: Beyond Serious Crime From Prohibition to Permission From Intelligence-Gathering to Evidence-Gathering From Federal to National Surveillance From Judicial to Administrative Control

History - Trends AGENCYRelevant StatisticsApplications for Part 2.5 (Part VI) Warrants 93/9495/9601/0202/0305/06 AFPMade Refused/Withdrawn Issued NSW Crime Commission Made Refused/Withdrawn Issued NSW PoliceMade Refused/Withdrawn Issued TotalMade Refused/Withdrawn Issued

The Surveillance Seachange? Seachange … a ‘noticeable and unexpected transformation’ (Oxford English Dictionary) TI versus TIA Surveillance  ‘Live’ Interception versus access to stored data Surveillance Warrant: The New Form of Search Warrant  More or Less Privacy intrusive?  SMS & Deserving Less Protection (or Y-Gen Prejudice)? Debased Process of Law Reform

Human Rights and Remedies ‘Front End’ versus ‘Back End’ Accountability Demise of Class 1 and Class 2 Warrants Citizen Suits? Effective or Illusory remedies? Privacy: Paramount or Subordinate?

Telecommunications Interception Amendments (TIA)  New security/law enforcement tools: Device specific warrants B-Party warrants  Regulation of stored communications

The Warrant System  Two ways in which privacy is protected: Privacy as a factor in issuing process Use of judges in issuing process  Reality does not match theory: Privacy likely to be outweighed by law enforcement/security purposes Judges have a limited role in process

Warrants Issued  Number of Warrants Issued in by Fed. Court Judges, Family Court Judges, Nominated AAT Members and Fed. Magistrates (from Telecommunications (Interception) Act 1979: Report for Year ending 30 June 2005, Table 29) IssuerNumber issuing warrants Total Warrants issued Family Court Judges19179 Federal Court Judges213 Federal Magistrates260 Nominated AAT Members282691

‘Balancing’ Rhetoric  ‘Balancing’ model in law enforcement context problematic  In telecommunications interception/access context, law enforcement/security has balanced away privacy interests

Conclusions  Observations are tentative  Changes in the regulatory context have substantially affected privacy  Mechanisms for further protection: Public interest monitor Destruction requirements Notification  Rejection of ‘balancing’ models  Placing privacy at the centre of law reform