Whistle-blowing and the Law – Part I Gavin Millar QC and Dr Andrew Scott.

Slides:



Advertisements
Similar presentations
Access to Court Records Developments in New Zealand.
Advertisements

Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Openness, Privacy and Access to Electronic Court Records Paul Schabas Blake, Cassels & Graydon LLP May, 2008.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
DEFAMATION Torts protecting the reputation. Traditional role of the courts Protection of individuals from the damage that can be caused to the reputation.
COSTS AGREEMENTS AND DISCLOSURES BAR ASSOCIATION CPD SEMINAR 2 AUGUST 2007 By Roger Traves SC.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Liability and Procedure in European Antitrust Law The EU Damages Directive Does the European Union overstep the mark again?
JOURNALISTS AND THEIR SOURCES ‘….It is now clear that despite the ringing declaration of the ECtHR on the importance of protecting confidential sources,
Code of Ethics – Discussion Question
MEDIA LAW Copenhagen University SESSION 7 Dirk VOORHOOF Ghent University (->contact)
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Public Interest Whistleblowing: Mandatory Reporting? Catherine Hobby University of East London IER Conference: Workplace Issues: Taking up the issues with.
Data Protection Overview
1 OVERVIEW PRESENTATION FREEDOM OF INFORMATION (SCOTLAND) ACT 2002.
Exemptions and the Public Interest Test Louise Townsend - Masons.
Confidentiality, Privilege and the Tax Adviser The Impact of European Law Philip Baker QC Paul Farmer.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Millennium Challenge Corporation (MCC) Component Three US Department of Justice/OPDAT (Office of Overseas Prosecutorial Development, Assistance and Training)
Airport noise Case law and the balanced approach Marc Martens 10 December 2007.
© PCaW PCaW is an independent charity, founded in We provide: free confidential advice to people concerned about wrongdoing.
INTERNATIONAL LAW different types of information: different types of information: laws, cases and regulations, guides or overviews, policy studies, conventions,
Comparative Law Spring 2002 Professor Susanna Fischer CLASS 31 FRENCH CIVIL PROCEDURE April 3, 2002.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
“Freedom of Media and Data Protection” Workshop within Twinning Project “Implementation of Personal Data Protection Strategy” in Montenegro Hotel Podgorica,
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 1 The Nature and Sources of Law Twomey Jennings Anderson’s Business.
Grant, Harrison, Suberu and Shepherd: Where do we go from here? [How about: “Back to Basics”] presented by Peter Rosinski.
Forum on HEI Procedures for Suitability for Social Work Legal Perspectives London House, Goodenough College Monday, 3 November 2008.
Code & Constitution - South Somerset District Council Code & Constitution Ian Clarke Assistant Director – Legal & Corporate Services.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
1 The Just Culture Initiative Roderick van Dam Head of Legal Service, EUROCONTROL ICAO / McGill Conference 2007 European Organisation for the Safety of.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Confidentiality and responsible information handling Legal and ethical considerations Brayne & Carr: Law for Social Workers: 10e Chapter 4.
CONFIDENTIALITY. BREACH OF CONFIDENCE  Breach of confidence is based on the principle that a person who has obtained material “in confidence” should.
Public Communications Law Lecture 13 Slide 1 Controlling Pre-Trial Publicity A court is obligated to try to make sure the defendant gets a fair trial.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
19 th Theater Support Command Inspector General NEED ASSISTANCE? Before You Tell it to Your Inspector General….Give Your Chain of Command a Chance to Solve.
P.R.I.M.E. Finance Panel of Recognized International Market Experts in Finance The role of experts in complex financial cases: DIFC Court case study (Al.
1 The Public Interest Disclosure (Whistleblower Protection) Act.
THE PROSECUTOR V. SIMIC 27 JULY 1999 TRIAL CHAMBER OF THE INTERNATIONAL TRIBUNAL FOR THE PROSECUTION OF PERSONS RESPONSIBLE FOR SERIOUS VIOLATIONS OF INTERNATIONAL.
HUMAN RIGHTS & POLICE ETHICS IN POLICE TRAINING The 4th INTERPA Conference May 2015 Abudhabi Dr. Mustafa YAYLA Turkish National Police Academy ANKARA.
The East African Court of Justice. Discussion What is the East African Court of Justice? Is it a human rights court? Has it considered human rights cases?
Journalists’ Sources 19th November 2015.
Protection of confidential sources Training workshop on media and freedom of expression law.
The media and judicial proceedings Training workshop on media and freedom of expression law.
FREEDOM OF INFORMATION Getting to grips with the Act.
BREACH OF CONFIDENCE 3/12/ What is Breach of Confidence? Spans several areas of law - Intellectual property, Tort and Equity Based on principle.
Copyright All rights reserved. Copyright All rights reserved. Foreign Corrupt Practices Act (FCPA) – value added for business or competitive.
Confidentiality 26th November Vatican Law on leaking documents ‘Whoever illicitly obtains or reveals information or documents whose publication.
Whistleblowing: A Human Right under Threat? Catherine Hobby University of East London IER Conference: Human Rights vs Bill of Rights: What’s in it for.
1 The balance between access to public information and personal data protection: The German Experience Sven Hermerschmidt, Office of the Federal Commissioner.
MA Journalism Law & Institutions Whistleblowers and the Protection of Sources Lincoln School of English and Journalism.
František Nonnemann Skopje, 9th October 2012 JHA DP aspects related to provision of information about public figures in CZ.
Recognizing the Client
The Protection of Confidential Commercial or Industrial Information in Environmental Law: Analysis and Call for a Graded Concept of Protection Prof. Dr.
Surveillance around the world
Jamie McPherson Partner – MVM Legal
Privacy principles Individual written policies
Data protection issues in regulatory investigations
Protection of News Sources
A framework for the analysis and comparison of legal aid structures
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Data Protection in Law Enforcement Area Chapter 9a of the draft law
Mediation Law in Austria
Data protection & FOIA considerations
Chapter 1: The Nature and Sources of Law
Presentation transcript:

Whistle-blowing and the Law – Part I Gavin Millar QC and Dr Andrew Scott

Overview  Rights-based jurisprudence  Potential liability for journalist having published ‘whistle-blown’ content  Protection of sources  Potential liability for journalist regarding newsgathering involving whistle-blower  Potential liability for source

Rights-based jurisprudence  Human Rights Act 1998 ‘domesticates’ European Convention standards  Basic scheme: ss 2, 3, and 6236  Relevant rights: Arts 8 and 10 ECHR810  Special rule on injunctions: s 1212

Publishing risks I  Confidentiality - 3 requirements stated in Coco v Clark (1969), per Megarry J  information must have necessary quality of confidence  information imparted in circumstances giving rise to an obligation of confidence  unauthorized disclosure of the imparted information (to detriment of person to whom duty owed)

Publishing risks II  Copyright - Copyright, Designs and Patents Act 1988 (as amended)  confers exclusive rights on holder – s 16 ‘acts restricted by copyright’s 16 ‘acts restricted by copyright’  pertains to ‘original’ copyright works of various types (s 1)‘original’ copyright works of various types (s 1)  range of defences, but some limitations in the context of content obtained through whistleblowing

Publishing risks III  Misuse of private information - ‘new methodology’ involving a 2 stage assessment  Stage 1: is there a ‘reasonable expectation of privacy’ in the information concerned?  Stage 2: should the information be protected in the ‘ultimate balancing test’

Publishing risks IV  Is there a ‘public interest’ defence available in respect of these potential claims?  confidentiality: yes, but double test – (a) does information concern matters of public interest, (b) is it in public interest that confidence should be breached?  copyright: yes, but...  privacy: not as such – an element in the ultimate balancing test  What do we mean by the ‘public interest’?

Source protection I  General principle  Professional rule: PCC Editors’ Code, cl 14PCC Editors’ Code  Legal principle: s 10, Contempt of Court Act 1981s 10, Contempt of Court Act 1981  Legal principle: Goodwin v UK (1996) 22 EHRR 123: “...freedom of expression constitutes one of the essential foundations of a democratic society and... the safeguards to be afforded to the press are of particular importance. Protection of journalistic sources is one of the basic conditions for press freedom... Without such protection, sources may be deterred from assisting the press in informing the public on matters of public interest. As a result the vital public-watchdog role of the press may be undermined and the ability of the press to provide accurate and reliable information may be adversely affected... an order of source disclosure... cannot be compatible with Article unless it is justified by an overriding requirement in the public interest” (at [39])

Source protection II  Factors relevant to disclosure decision  degree of need for disclosure of source identity (nature of wrongdoing; risk of further wrongdoing – interim remedy / time delay; extent to which other reasonable avenues exist / explored)  motive (or conduct) of the source  general importance of watchdog role / chilling effect of disclosure  degree of public interest in the particular story (?)  impact on Art 2 and 3 rights

Source protection III  Civil cases  generally, one party in a civil action may seek disclosure from the other allowing identification  libel: factor relevant to assessment of ‘responsibility’ in Reynolds public interest defence concerns source (nb recognition of source protection issue)  independent of any pre-existing action, aggrieved party may seek information from journalist regarding source under a Norwich Pharmacal order

Source protection IV  Criminal investigations  General: Police and Criminal Evidence Act 1984 (PACE), ss 9, 11, 13, 14 and Sch 1Police and Criminal Evidence Act 1984  differentiates journalistic material from other information and classifies it as ‘special procedure material’ or ‘excluded material’ depending on whether it is held in confidence  Sch 1 provides access criteria for special procedure material Sch 1  Terrorism-related: Terrorism Act 2000, s 37 and Sch 5Sch 5  paras 5 and 6 provide for access to both categories  Other: Criminal Justice Act 1987 s2; Inquiries Act 2005 s21; Financial Services & Markets Act 2000, s13s2s21s13

Source protection V  Circumvention of protections through the use of other powers?  Interception of communications and surveillance - Regulation of Investigatory Powers Act 2000  interception of communications, Part I Chapter I (nb s 5)Part I Chapter I  disclosure of communications data, Part I Chapter II (nb s 22)Part I Chapter II  directed (nb ss 28 and 29)) and intrusive (s 32) surveillance, Part II Part II  Bugging of premises - Police Act 1997, Part IIIPart III

Newsgathering risks I  Payment of source  source a witness in criminal proceedings: PCC Editors’ Code, cl 15; common law of contempt (?)PCC Editors’ Code  source a ‘criminal’: PCC Editors’ Code, cl 16  source a police officer: Prevention of Corruption Act 1906, s 1 (nb US Foreign Corrupt Practices Act)Prevention of Corruption Act 1906, s 1  general: Bribery Act 2010Bribery Act 2010

Newsgathering risks II  General  source a police officer/ public official: conspiracy, aiding or abetting others to commit misconduct in a public officemisconduct in a public office  source disclosing in breach of Official Secrets Act 1989: ss 5 and 656  Terrorism Act 2000 disclosure obligation: s 1919

Liability of source I  Payment of source  source a ‘criminal’: Coroners and Justice Act 2009, Part 7 (exploitation proceeds orders) Part 7  source a police officer: Prevention of Corruption Act 1906, s 1Prevention of Corruption Act 1906, s 1  general: Bribery Act 2010Bribery Act 2010

Liability of source II  General  source a juror: Contempt of Court Act 1981, s 8  source a police officer or public official: misconduct in a public office  source disclosing in breach of Official Secrets Act 1989: ss 1-4Official Secrets Act 1989  source an employee – breach of contract, but nb Public Interest Disclosure Act 1998 Public Interest Disclosure Act 1998  wider civil or criminal liability – eg breach of confidence; Data Protection Act 1998, s 55s 55

Dr Andrew Scott Gavin Millar QC Whistle-blowing and the Law – Part I cij summer school - 16 July 2011