Review of the Privacy Act 1993

Total Page:16

File Type:pdf, Size:1020Kb

Review of the Privacy Act 1993 NZLC REPORT 123 E31(123) NovemberJune 2011, 2010, Wellington, Wellington, New New Zealand Zealand | | REPORT REPORT 123 119 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 LAW COMMISSION E31 (123) June 2011, Wellington, New Zealand | REPORT 123 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 The Law Commission is an independent, publicly funded, central advisory body established by statute to undertake the systematic review, reform and development of the law of New Zealand. Its purpose is to help achieve law that is just, principled, and accessible, and that reflects the heritage and aspirations of the peoples of New Zealand. The Commissioners are: Honourable Sir Grant Hammond KNZM – President Dr Warren Young – Deputy President Emeritus Professor John Burrows QC George Tanner QC Professor Geoff McLay The General Manager of the Law Commission is Brigid Corcoran The office of the Law Commission is at Level 19, HP Tower, 171 Featherston Street, Wellington Postal address: PO Box 2590, Wellington 6140, New Zealand Document Exchange Number: sp 23534 Telephone: (04) 473-3453, Facsimile: (04) 471-0959 Email: [email protected] Internet: www.lawcom.govt.nz National Library of New Zealand Cataloguing-in-Publication Data New Zealand. Law Commission. Review of the Privacy Act 1993 : review of the law of privacy, stage 4. (Law Commission report ; 123) ISBN 978-1-877569-14-2 (pbk.)—ISBN 978-1-877569-23-4 (internet) 1. New Zealand. Privacy Act 1993. 2. Privacy, Right of—New Zealand. I. Title. II. Series: New Zealand. Law Commission. Report ; no. 123 342.930858—dc 22 ISSN 0113-2334 (Print) ISSN 1177-6196 (Online) This paper may be cited as NZLC R123 This report is also available on the Internet at the Law Commission’s website: www.lawcom.govt.nz ii Law Commission Report The Hon Simon Power Minister Responsible for the Law Commission Parliament Buildings WELLINGTON 30 June 2011 Dear Minister, NZLC R123 – REVIEW OF THE PRIVACY ACT 1993: REVIEW OF THE LAW OF PRIVACY STAGE 4 I am pleased to submit to you Law Commission Report 123, Review of the Privacy Act 1993: Review of the Law of Privacy Stage 4, which we submit under section 16 of the Law Commission Act 1985. Yours sincerely Hon Sir Grant Hammond KNZM President Review of the Privacy Act 1993 – Review of the law of privacy stage 4 iii FOREWORD The Law Commission has been reviewing the law of privacy. The project was a very large one, and the Commission approached it in four stages. The first stage resulted in a study paper, Privacy: Concepts and Issues; the second in a report, Public Registers; and the third in a report, Privacy: Penalties and Remedies. The present report concludes stage 4. It is a review of the Privacy Act 1993, the Act which deals with the collection, security and use of people’s personal information, and sets up the office of Privacy Commissioner. The government has postponed action on stages 2 and 3 until the completion of this fourth stage, so that the proposed reforms can be seen as a package. The review of the Privacy Act, the subject of this report, is timely. The Act is now 18 years old. In this modern age, technology, and its ability to gather, store and disseminate information about people, has advanced beyond anything imaginable in 1993. Much personal information is held by large agencies in both the public and private sectors. It can be sent to agencies overseas. It is very important to people that their personal information is properly protected, and that the law is flexible enough to be able to move with the times and provide that protection. On the other hand, we must also accept that privacy is not an absolute value. It must be balanced against other important values: health and safety, law enforcement and national security, for example. The challenge is to get the balance right between protecting privacy and allowing disclosure of information to appropriate people when that is necessary. This report investigates how far the Act’s principles need to be amended. It also tackles some important policy questions, such as whether the Privacy Commissioner needs more powers; whether the complaints process, particularly in progressing claims to the Human Rights Review Tribunal, could be streamlined; whether agencies which lose people’s information should have to tell them; and what the obligations should be of agencies which send personal information overseas. These questions are important, not only for the citizens whose personal information is in question, but also for the agencies which deal with it. In reaching its conclusions the Commission consulted with, and received submissions from, many persons and organisations. It records its thanks to all those who participated, and acknowledges in particular the assistance it has received from the Office of the Privacy Commissioner and the Ministry of Justice. The Commissioners who worked on the privacy project were Sir Geoffrey Palmer and John Burrows. The legal and policy advisers who were involved in stage 4 were Ewan Lincoln, Joanna Hayward, Sara Jackson, Steven Melrose and Geoff Lawn. Legal and policy advisers who worked on other stages of the privacy review were Mark Hickford, Susan Hall, Rachel Hayward and Janet November. Hon Sir Grant Hammond KNZM President iv Law Commission Report Review of the Privacy Act 1993 Review of the law of privacy stage 4 CONTENTS Foreword .........................................................................................................................................iv Glossary ............................................................................................................................................8 Summary ........................................................................................................................................11 Introduction .......................................................................................................................11 The Act’s main provisions ................................................................................................11 Enforcement .......................................................................................................................14 Miscellaneous .....................................................................................................................17 Information sharing and matching ...................................................................................20 Summary of recommendations .....................................................................................................22 Chapter 2 ............................................................................................................................22 Chapter 3 ............................................................................................................................23 Chapter 4 ............................................................................................................................25 Chapter 5 ............................................................................................................................26 Chapter 6 ............................................................................................................................26 Chapter 7 ............................................................................................................................28 Chapter 8 ............................................................................................................................29 Chapter 9 ............................................................................................................................30 Chapter 10 ..........................................................................................................................31 Chapter 11 ..........................................................................................................................31 Chapter 12 ..........................................................................................................................32 Appendix 2 .........................................................................................................................33 Information sharing proposals in appendix 1 ..................................................................34 Recommendations from other reports ..............................................................................35 Stage 2: Public Registers................................................................................................................35 Stage 3: Invasion of Privacy .........................................................................................................35 Review of the Privacy Act 1993 – Review of the law of privacy stage 4 1 Contents CHAPTER 1 Introduction ...................................................................................................................................36 The Law Commission’s Review of Privacy ......................................................................36 Other relevant work ..........................................................................................................37 Privacy Commissioner statutory reviews of the Privacy Act ...............................................37 Work within government on privacy law reform ...................................................................37 Australian reviews .........................................................................................................................38
Recommended publications
  • Australian Political Writings 2009-10
    Parliament of Australia Department of Parliamentary Services Parliamentary Library Information, analysis and advice for the Parliament BIBLIOGRAPHY www.aph.gov.au/library Selected Australian political writings 2009‐10 Contents Biographies ............................................................................................................................. 2 Elections, electorate boundaries and electoral systems ......................................................... 3 Federalism .............................................................................................................................. 6 Human rights ........................................................................................................................... 6 Liberalism and neoliberalism .................................................................................................. 6 Members of Parliament and their staff .................................................................................... 7 Parliamentary issues ............................................................................................................... 7 Party politics .......................................................................................................................... 13 Party politics- Australian Greens ........................................................................................... 14 Party politics- Australian Labor Party .................................................................................... 14 Party politics-
    [Show full text]
  • Australia 2019
    Australia Free 77 100 A Obstacles to Access 23 25 B Limits on Content 29 35 C Violations of User Rights 25 40 Last Year's Score & Status 79 100 Free Overview Internet freedom in Australia declined during the coverage period. The country’s information and communication technology (ICT) infrastructure is well developed, and prices for connections are low, ensuring that much of the population enjoys access to the internet. However, a number of website restrictions, such as those related to online piracy or “abhorrent” content, limit the content available to users. The March 2019 terrorist attack on mosques in Christchurch, New Zealand, prompted internet service providers (ISPs) to block certain websites and the government subsequently introduced a new law that criminalized the failure to delete “abhorrent” content. Other legal changes—including court decisions expanding the country’s punitive defamation standards, an injunction silencing digital media coverage of a high-profile trial, and a problematic law that undermines encryption—shrunk the space for free online expression in Australia. Finally, an escalating series of cyberattacks sponsored by China profoundly challenged the security of Australia’s digital sphere. Australia is a democracy with a strong record of advancing and protecting political rights and civil liberties. Recent challenges to these freedoms have included the threat of foreign political influence, harsh policies toward asylum seekers, and ongoing disparities faced by indigenous Australians. Key Developments June 1, 2018 – May 31, 2019 After the March 2019 Christchurch attack, in which an Australian man who had espoused white supremacist views allegedly killed 51 people at two New Zealand mosques, ISPs acted independently to block access to more than 40 websites that hosted the attacker’s live-streamed video of his crimes.
    [Show full text]
  • Privacy and Data Protection in Australia: a Critical Overview (Extended Abstract)
    Privacy and Data Protection in Australia: a Critical overview (extended abstract) David Watts1, Pompeu Casanovas2,3 1 La Trobe Law School, La Trobe University, Melbourne, Australia 2 UAB Institute of Law and Technology, Universitat Autònoma de Barcelona, Spain Abstract. This extended abstract describes the regulation of privacy under Aus- tralian laws and policies. In the CRC D2D programme, we will develop a strategy to model legal requirements in a situation that is far from clear. Law enforcement agencies are facing big floods of data to be acquired, stored, assessed and used. We will propose in the final paper a linked data regulatory model to organise and set the legal and policy requirements to model privacy in this unstructured con- text. Keywords: Australian privacy law, legal requirements, privacy modelling 1 Introduction Australia has a federal system of government that embodies a number of the structural elements of the US Constitutional system but retains a Constitutional monarchy. It con- sists of a national government (the Commonwealth), six state governments (New South Wales, Victoria, Tasmania, Queensland, South Australia and Western Australia) as well as two Territories (the Australian Capital Territory and the Northern Territory). Under this system, specific Constitutional powers are conferred on the Common- wealth. Any other powers not specifically conferred on the Commonwealth are retained by the States (and, to a lesser extent, the Territories). There is no general law right to privacy in Australia. Although Australia is a signa- tory to the International Convention on Civil and Political Rights, the international law right to privacy conferred under Article 17 of the ICCPR has not been enacted into Australia’s domestic law.
    [Show full text]
  • Legitimacy in the New Regulatory State
    LEGITIMACY IN THE NEW REGULATORY STATE KAREN LEE A THESIS IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF LAW MARCH 2016 TABLE OF CONTENTS ACKNOWLEDGEMENTS ...................................................................................................... I PUBLICATIONS AND PRESENTATIONS ARISING FROM THE WRITING OF THE THESIS .. III GLOSSARY AND TABLE OF ABBREVIATIONS .................................................................. IV CHAPTER 1 INTRODUCTION ............................................................................................. 1 I JUSTIFICATION FOR RESEARCH AND ITS APPROACH .......................................... 4 A THE NEED FOR EMPIRICAL STUDY OF INDUSTRY RULE-MAKING ....................... 4 B PART 6 RULE-MAKING ....................................................................................... 7 1 THE COMMUNICATIONS ALLIANCE ................................................................ 8 2 CONSUMER CODES ....................................................................................... 10 C PROCEDURAL AND INSTITUTIONAL LEGITIMACY, RESPONSIVENESS AND THEIR CRITERIA ......................................................................................................... 11 II TERMINOLOGY ................................................................................................ 15 A CONSUMER AND PUBLIC INTERESTS................................................................. 15 1 CONSUMER INTEREST .................................................................................
    [Show full text]
  • Mark Burdon Thesis
    THE CONCEPTUAL AND OPERATIONAL COMPATIBILITY OF DATA BREACH NOTIFICATION AND INFORMATION PRIVACY LAWS Mark Burdon M.Sc. (Econ) Public Policy (Lon), LLB (Hons) (London South Bank University, UK) Submitted in fulfilment of the requirements for the degree of PhD by publications Faculty of Law Queensland University of Technology 2011 Keywords Data Breach Notification Law – Information Privacy Law – Data Protection – Contextualisation - Information Security Law ii Abstract Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue.
    [Show full text]
  • Review of Secrecy Laws
    Review of Secrecy Laws ISSUES PAPER You are invited to provide a submission or comment on this Issues Paper ISSUES PAPER 34 December 2008 This Issues Paper reflects the law as at 1 November 2008. © Commonwealth of Australia 2008 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN-978-0-9804153-4-6 Commission Reference: IP 34 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Ligare Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the particular inquiry.
    [Show full text]
  • Telecommunications Act 1997
    Telecommunications Act 1997 Act No. 47 of 1997 as amended This compilation was prepared on 26 November 2008 taking into account amendments up to Act No. 117 of 2008 [Note: Subsections 531F(1) and (2) and paragraphs 531G(2)(e) and (3A)(e) cease to have effect on 27 May 2009, see subsections 531F(3), 531G(3) and (3B)] The text of any of those amendments not in force on that date is appended in the Notes section The operation of amendments that have been incorporated may be affected by application provisions that are set out in the Notes section Prepared by the Office of Legislative Drafting and Publishing, Attorney-General’s Department, Canberra Contents Part 1—Introduction 1 1 Short title [see Note 1].......................................................................1 2 Commencement [see Note 1].............................................................1 3 Objects...............................................................................................1 4 Regulatory policy ..............................................................................3 5 Simplified outline ..............................................................................3 6 Main index.........................................................................................7 7 Definitions.........................................................................................8 8 Crown to be bound ..........................................................................18 9 Extra-territorial application .............................................................18
    [Show full text]
  • Download PDF Read More
    This Issues Paper reflects the law as at 30 November 2006 © Commonwealth of Australia 2006 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN 0-9758213-7-7 Commission Reference: IP 32 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Canprint Communications Pty Ltd Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the inquiry.
    [Show full text]
  • Secrecy Laws and Open Government in Australia
    Secrecy Laws and Open Government in Australia REPORT REPORT 112 December 2009 This Report reflects the law as at 11 November 2009 © Commonwealth of Australia 2009 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN- 978-0-9807194-0-6 Commission Reference: ALRC Report 112 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] Homepage: www.alrc.gov.au Printed by Ligare The Hon Robert McClelland MP Attorney-General of Australia Parliament House Canberra ACT 2600 11 December 2009 Dear Attorney-General Review of Secrecy Laws On 5 August 2008, you issued terms of reference for the ALRC to undertake a comprehensive review of secrecy laws and related issues.
    [Show full text]
  • The Legal Protection of Personal Images Shared on Social Networks in Australia
    The Legal Protection of Personal Images Shared on Social Networks in Australia Author Georgiades, Eugenia Published 2017 Thesis Type Thesis (PhD Doctorate) School Griffith Law School DOI https://doi.org/10.25904/1912/3656 Copyright Statement The author owns the copyright in this thesis, unless stated otherwise. Downloaded from http://hdl.handle.net/10072/367723 Griffith Research Online https://research-repository.griffith.edu.au The Legal Protection of Personal Images Shared on Social Networks in Australia Eugenia Georgiades Bachelor of Arts (Hons), Bachelor of Laws, Graduate Diploma Legal Practice, Master of Laws School of Law, Griffith University This thesis is submitted in fulfilment of the requirements of the degree of Doctor of Philosophy December 2016 ii Abstract Social networks have changed the nature of communication in the modern world: they have changed how people communicate, the frequency and mode of communication, and how people relate to those communications. Social networks have also changed the type of information that is communicated. One of the notable developments has been a proliferation of the sharing of images that people have taken themselves. From the ubiquitous selfie through to group shots, personal images are now a key part of modern social communication. A number of problems have arisen as a consequence of the rapid increase in the sharing of personal images online. This is because personal images uploaded online are, more now than ever, prone to misuse. Third parties are easily able to reuse, distort and alter images that are uploaded on social networks. As a result, people are at risk of losing control over the images that they upload online.
    [Show full text]
  • Upholding the Australian Constitution Volume Fourteen
    Upholding the Australian Constitution Volume Fourteen Proceedings of the Fourteenth Conference of The Samuel Griffith Society Menzies Hotel, Carrington Street, Sydney, 14 – 16 June, 2002 © Copyright 2002 by The Samuel Griffith Society. All rights reserved. Table of Contents Foreword John Stone Dinner Address Hon Chief Justice Murray Gleeson, AC The Birth, Life and Death of Section 74 Introductory Remarks John Stone Chapter One Professor Geoffrey de Q Walker The Seven Pillars of Centralism: Federalism and the Engineers’ Case Chapter Two Dr Nicholas Aroney The Ghost in the Machine: Exorcising Engineers Chapter Three Hon Justice Kenneth Handley, AO When “Maybe” means “No” Chapter Four Professor David Flint, AM The Republic: Report from Corowa Chapter Five Professor John McMillan Immigration Law and the Courts Chapter Six Hon Philip Ruddock, MHR Immigration Policy and the Separation of Powers Chapter Seven Piers Akerman Immigration Policy, Sovereignty and the Media Chapter Eight Hon Justice Lloyd Waddy Memories of a Monarchist – now a Trappist Judge Chapter Nine Dr Stephen Hall September 11 and International Law Chapter Ten Dr Janet Albrechtsen National Interest versus International Law: The International Criminal Court Chapter Eleven Steven Franks, MP (NZ) Treaty of Waitangi: Only Good Intentions? Concluding Remarks Rt Hon Sir Harry Gibbs, GCMG, AC, KBE Appendix Contributors Foreword John Stone The fourteenth Conference of The Samuel Griffith Society, which was held in Sydney in June, 2002, was more than usually notable, for several reasons. This Volume of the Society’s Proceedings, Upholding the Australian Constitution, contains the papers, and Dinner Addresses, delivered to that Conference, together with the usual brief concluding remarks of our President, the Rt Hon Sir Harry Gibbs.
    [Show full text]
  • Michael Wilson Thesis
    THE POLITICS OF PRIVACY PROTECTION: AN ANALYSIS OF RESISTANCE TO METADATA RETENTION AND ENCRYPTION ACCESS LAWS Michael Peter Wilson Bachelor of Justice (Honours) Bachelor of Behavioural Science A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Justice, Faculty of Law Queensland University of Technology 2020 Abstract The politics of privacy protection are contested. In recent years, the Australian Government has justified the expansion of surveillance powers, under the Data Retention Act (2015) and Encryption Access Act (2018), by invoking the ‘problem of going dark’ – a claim that the investigative capabilities of law enforcement agencies are being undermined by the use of privacy-enhancing technologies. As such, the ‘problem of going dark’ draws a moral equivalence between privacy protection and methods of evading criminal investigations. This thesis examines the politics of privacy protection within the context of Australia’s national debates about digital surveillance powers, focusing on how privacy advocates contest this moral equivalence embedded within the ‘problem of going dark’. Specifically, this research involves a political discourse analysis (Laclau & Mouffe, 1985) of twenty-one (n=21) semi-structured interviews with Australian privacy advocates involved in campaigns opposing data retention and encryption access laws. Using the analytical constructs of signification, subjectivation, and identification, the research examines how privacy advocates challenge the ‘problem of going dark’, discursively position the subjects of surveillance laws, and mobilise through the construction of shared identities. This thesis argues that Australian privacy advocates contest the moral equivalence embedded within the ‘problem of going dark’ via the articulation of a civic duty to disrupt the relations of domination that enable ‘morally arbitrary’ surveillance under the Data Retention Act (2015) and Encryption Access Act (2018).
    [Show full text]