Download presentation
Presentation is loading. Please wait.
Published byDomenic Carr Modified over 9 years ago
1
UNSW CLE 19 July 20011 Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council Pacific Privacy Consulting UNSW CLE Seminar – eSecurity & eCrime 19 July, 2001
2
UNSW CLE 19 July 20012 Introduction Narrow battles vs big picture Incremental loss of privacy Regulability of cyberspace depends on architecture – (Lessig 1999) –Choice to be made –Fully informed debate or vested interests –Globalistation
3
UNSW CLE 19 July 20013 Security & Privacy Can co-incide –Audit trails Security independent of type of information With Personal information, tension arises –Security vs other privacy principles –Employees and customers/public
4
UNSW CLE 19 July 20014 Powers to invade privacy Legal entities – arguments for transparency, but powers now being used against individuals Business/personal distinction blurring –ABN holders Privacy laws have no effective limiting function in the face of other laws
5
UNSW CLE 19 July 20015 Search and Communications Interception powers Inconsistent approach to electronic data vs physical intrusion – why? –Eg: ATO, Centrelink ‘notices’ –Even looser controls in IPP11, NPP2 Telecommunications –Warrants for content (but not all?) –Certificates –On request
6
UNSW CLE 19 July 20016 Interception Warrants Progressive weakening of controls –Judges to AAT members –Named person warrants –Period of warrant –Range of offences –No of agencies –More agencies with direct access
7
UNSW CLE 19 July 20017 Computer access warrants Introduced for ASIO Proposed extension to all investigatory agencies under Crimes & Customs Acts ? (Cybercrime Bill 2001) Major concerns about data integrity – question evidentiary value? Same issue in NZ
8
UNSW CLE 19 July 20018 Application of powers Specific investigations vs intelligence gathering - routine surveillance, matching Requirement to retain records Best protection is destruction Once available – pressure for access –Census –Proposed requirement on ISPs?
9
UNSW CLE 19 July 20019 Identification? Pressure to identify in more contexts Justification ? –ID fraud ? Often, real need is authentication PKI – muddled motives and application Privacy issues Privacy Commissioner Guidelines
10
UNSW CLE 19 July 200110 Data-matching Reversal of onus of proof AUSTRAC example –Subjective? –Disproportionate? Tendency for subjective norms to replace objective criteria
11
UNSW CLE 19 July 200111 Conclusion Common theme: Control vs freedom How much risk to tolerate? Difficult at individual program level –will always favour greater control Reject technological determinism Fall back on basic principles No Constitutional/BoR protection Can only question each proposal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.