Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles Law, Governance and Technology Series

Total Page:16

File Type:pdf, Size:1020Kb

Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles Law, Governance and Technology Series Law, Governance and Technology Series Sub-series: Issues in Privacy and Data Protection 37 Olga Mironenko Enerstvedt Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles Law, Governance and Technology Series Issues in Privacy and Data Protection Volume 37 Series editors Pompeu Casanovas, Barcelona, Spain Giovanni Sartor, Florence, Italy Serge Gutwirth, Brussels, Belgium Issues in Privacy and Data Protection aims at publishing peer reviewed scientific manuscripts that focus upon issues that engage into an analysis or reflexion related to the consequences of scientific and technological developments upon the private sphere, the personal autonomy and the self-construction of humans with data pro- tection and privacy as anchor points. The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions that relate to experiences and phenomena that can or could be covered by legal concepts stemming from the law regarding the protection of privacy and/or the processing of personal data. Since both the development of science and technology, and in particular information tech- nology (ambient intelligence, robotics, artificial intelligence, knowledge discovery, data mining, surveillance, etc.), and the law on privacy and data protection are in constant frenetic mood of change (as is clear from the many legal conflicts and reforms at hand), we have the ambition to reassemble a series of highly contempo- rary and forward-looking books, wherein cutting edge issues are analytically, con- ceptually and prospectively presented More information about this series at http://www.springer.com/series/8808 Olga Mironenko Enerstvedt Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles Olga Mironenko Enerstvedt Aviation and ICT Law Consulting Langhus, Norway ISSN 2352-1902 ISSN 2352-1910 (electronic) Law, Governance and Technology Series ISSN 2352-1929 ISSN 2352-1937 (electronic) Issues in Privacy and Data Protection ISBN 978-3-319-58138-5 ISBN 978-3-319-58139-2 (eBook) DOI 10.1007/978-3-319-58139-2 Library of Congress Control Number: 2017941081 © Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface When I was finalizing this work, the worst incident in Russian/Soviet history of civil aviation occurred. On 31 October 2015, terrorists blew up Airbus A321 during its flight from Sharm el-Sheikh to St. Petersburg, killing 224 persons on board, mostly Russians. Tragically, I found I needed to update my research with new sad facts and figures. When people are killed, it hurts. When fellow citizens are killed, the pain is doubled. As a participant of a student exchange programme, I was in the USA at the moment of the 9/11 attack. I flew from New York to Moscow in October 2001 and experienced the more stringent security measures. A pair of small scissors was con- fiscated from my hand baggage. I was living in Moscow when the worst terrorist events occurred there, such as the Dubrovka Theatre siege in 2002 and bombing of two flights by suicide terrorists in 2004. On 22 July 2011, I was living in Norway and personally heard the explosion of bombs in government buildings in Oslo. One of the guests invited to my wedding party a week later was unable to attend; her close relative had been killed in the bombings of the government quarter in Oslo. There have been other terrorist-related events in my life. Turning from the personal to a more general perspective, I must say that although not all these catastrophic events were aviation-related, almost all of them had some influence on security regimes, including aviation. Flying from Oslo to Moscow and back quite frequently, as well as other routes, I could not help but notice direct or indirect consequences such as restrictions on liquids, having to remove shoes, metal detectors at the entrance of the airport or body scanners. As a researcher in the field of aviation security and data privacy, however, I know that these measures are only the tip of the iceberg. The emerging mass of security-related data and the corre- sponding impact on individual privacy are only in the beginning stage of development. My interest in aviation grew as a result of my work as a lawyer in a business avia- tion company, Moscow Sky, operating internationally. I worked there during 2005– 2008. I have fond memories of my colleagues and the time I spent there. When I then took the LLM degree in ICT law at the University of Oslo, I was very fortunate v vi Preface to be able to combine aviation and data protection issues in my master’s thesis. The topic concerned passenger name record agreements between the EU and the USA. My master’s thesis was published by the Norwegian Research Center for Computers and Law (NRCCL). I was privileged to have Professor Jon Bing as my supervisor. Very sadly, he passed away in 2014. Inspired by conversations with Jon Bing and the director of NRCCL, Professor Dag Wiese Schartum, I decided to further develop the topic. The aim was to research broader issues in civil aviation security versus privacy, data protection and other human rights and – on a global level – to write a book. I completed the work in 2016. First of all, I would like to thank Professor Dag Wiese Schartum. He has always been very supportive, available for help and advice at any time and willing to pro- vide valuable comments and ideas. I am also very thankful to Professor Lee Andrew Bygrave, for his invaluable advice and comments, in particular on data privacy issues. I would like to thank Peter Burgess from PRIO for his encouragement of my work at the initial stage, inviting me to relevant seminars and sharing contacts in the civil aviation field. I would like to thank the Norwegian Civil Aviation Authority for hosting a meeting at which they presented their organization and work. Many thanks go to the personnel of the Norwegian airport operator Avinor, in particular to senior security advisor Ole Folkestad, who was especially helpful in providing me with an of understanding the use of technologies in modern airports. My gratitude also goes to other relevant entities and persons, in particular from Norway and Russia, who took the time to answer my questions. I would also like to thank all colleagues at the NRCCL who have always been very kind and friendly towards me. Special thanks go to the head of administration of the Institute of Private Law, Eva Modvar, and then to her successor, Eli Knotten, for their kindness and help with every practical issue I faced and for always being available to provide support and advice. I would like to specially thank Tim Challman for proofreading the final text and for offering valuable comments and advice regarding the English language. I am indebted to my family, especially to my mother, my husband Håken and our children, Maria, Anna and Aleksander. Håken has been very kind and extremely patient. He has been a willing babysitter and took good care of our small children, while I was busy with the book and was unable to spend as much time with them as I wished. This work is dedicated to my family. I love you. Langhus, Norway Olga Mironenko Enerstvedt Contents 1 Introduction................................................................................................ 1 1.1 Background and Subject Matter........................................................ 1 1.2 Aims of the Research........................................................................ 8 1.3 Approach of the Research................................................................. 9 1.4 Overview of the Structure................................................................. 13 Part I General Part 2 Protection of Privacy and Data Protection in Aviation Security........... 19 2.1 Introduction....................................................................................... 19 2.2 What Is Privacy and Data Protection................................................ 22 2.2.1 The Concept of Privacy......................................................... 22 2.2.2 The Concept of Data Protection...........................................
Recommended publications
  • V9.5 on Ipad Introduction
    Pilot’s Guide to FOREFLIGHT MOBILE 55th Edition Covers ForeFlight Mobile v9.5 on iPad Introduction ...............................................................................................19 iPad Tips ....................................................................................................................................19 Setting-up ForeFlight Mobile ..............................................................21 Planning a Flight ......................................................................................22 Planning a fight using the Flights form ........................................................................22 Destination Services ................................................................................................................................23 Navlog, Briefng, Messages ...................................................................................................................24 Planning a fight on Maps using the Flight Plan Editor ..........................................25 Planning a fight on Maps using Touch .........................................................................26 Planning a fight on Maps using Search ........................................................................27 Scheduled Flight Search on Maps ......................................................................................................29 Airports ........................................................................................................31 About the Design ..................................................................................................................32
    [Show full text]
  • Security Forum Strategic Panel Phorm Position Paper
    Security Forum Strategic Panel Phorm Position Paper PHORM – PRIVACY IMPACT OF NEW INTERNET ADVERTISING MECHANISMS 1. INTRODUCTION 1.1. Online advertising company Phorm has caused a stir in the Internet community because of its profile-driven service. Phorm has trialled this service with BT, and signed further contracts with Virgin Media and TalkTalk. However, critics claim that the service breaches the Regulation of Investigatory Powers Act (2000), and that Phorm’s approach is contrary to users’ privacy wishes. 1.2. The BCS believes that the solution to this debate rests in self-regulation of online advertising: companies must establish and enforce a code of conduct; be completely transparent about their practices; resist sharing data with third parties; and submit to ongoing oversight from an independent third party organisation. 2. THE BATTLE FOR THE INTERNET 2.1. The massive market for online advertising is one that affects every Internet user: many search engines and websites depend upon advertising revenues for funding, and some ISPs use advertising to subsidise subscription costs. In the absence of those funding sources they would either have to pass on additional operating costs to users, or cease trading altogether. 2.2. The battle for control of Internet advertising had, until recently, been confined to a small number of (rapidly consolidating) players including the likes of Microsoft, Google, Yahoo! and DoubleClick. These well-established companies have built their offerings over many years and believed themselves to control the market, with little threat from new companies. 2.3. However, a new breed of online advertising company has recently appeared.
    [Show full text]
  • Alternative North Americas: What Canada and The
    ALTERNATIVE NORTH AMERICAS What Canada and the United States Can Learn from Each Other David T. Jones ALTERNATIVE NORTH AMERICAS Woodrow Wilson International Center for Scholars One Woodrow Wilson Plaza 1300 Pennsylvania Avenue NW Washington, D.C. 20004 Copyright © 2014 by David T. Jones All rights reserved. No part of this book may be reproduced, scanned, or distributed in any printed or electronic form without permission. Please do not participate in or encourage piracy of copyrighted materials in violation of author’s rights. Published online. ISBN: 978-1-938027-36-9 DEDICATION Once more for Teresa The be and end of it all A Journey of Ten Thousand Years Begins with a Single Day (Forever Tandem) TABLE OF CONTENTS Introduction .................................................................................................................1 Chapter 1 Borders—Open Borders and Closing Threats .......................................... 12 Chapter 2 Unsettled Boundaries—That Not Yet Settled Border ................................ 24 Chapter 3 Arctic Sovereignty—Arctic Antics ............................................................. 45 Chapter 4 Immigrants and Refugees .........................................................................54 Chapter 5 Crime and (Lack of) Punishment .............................................................. 78 Chapter 6 Human Rights and Wrongs .................................................................... 102 Chapter 7 Language and Discord ..........................................................................
    [Show full text]
  • Protection of Biometric Information of Children in Schools and Colleges
    Protection of biometric information of children in schools and colleges Advice for proprietors, governing bodies, head teachers, principals and school and college staff March 2018 Contents 1. About this advice 3 Expiry/review date 3 What legislation does this advice relate to? 3 Who is this advice for? 3 2. Key Points 4 What is biometric data? 4 What is an automated biometric recognition system? 5 What does processing data mean? 5 3. The Protection of Freedoms Act 2012 6 Notification and Parental Consent 6 The pupil’s right to refuse 7 Providing alternatives 8 The Data Protection Act 1998 8 Associated Resources 9 4. Template Notification and Consent Form 10 2 1. About this advice This is non-statutory advice from the Department for Education. It explains the legal duties schools and colleges have if they wish to use biometric information about pupils for the purposes of using automated biometric recognition systems. The duties on schools and colleges in the Protection of Freedoms Act 2012 set out in this advice came into effect from 1 September 2013. Schools and colleges using automated biometric recognition systems, or planning to install them, should make arrangements to notify parents and obtain the consent required under the duties set out in the body of this advice. There are no circumstances in which a school or college can lawfully process a pupil’s biometric data without having notified each parent of a child and received the necessary consent. This advice replaces “Protection of biometric information of children in schools”, which was issued in December 2012.
    [Show full text]
  • The Data Protection Act 1998 and Personal Privacy
    Introduction On 2 February 1998 Lord Williams of Mostyn commenced his second reading speech for the Data Protection Bill: “I recognise that data protection does not sound like a subject to attract obsessive interest; witness the general exodus from your Lordships’ House as I start to Monday, 19 March 2012 introduce this Second Reading. Data protection is redolent in many ways of computers and electronic processing: necessary but essentially technical providers The Data Protection Act 1998 & Personal Privacy of services. In fact it affects our well-being in a much more general way. It shares common ground to that extent with the Human Rights Bill. That Bill will improve Philip Coppel QC the position of citizens of this country by enabling them to rely on the wide range of civil and political rights contained in the European Convention on Human Rights. Those rights include the right to respect for private and family life. The Data Protection Bill also concerns privacy, albeit a specific form of privacy; Synopsis: Described in Campbell v MGN [2003] QB 633 at [72] as “a thicket” personal information privacy. The subject matter of the Bill is, therefore, and as “certainly a cumbersome and inelegant piece of legislation”, inherently important to our general social welfare.”1 the Data Protection Act 1998 is the ugly relation in the law of As I penned this talk, with more than a decade having passed since Lord privacy. As the Human Rights Act 1998 has extruded the law of Williams’s speech echoed in the House, I did wonder whether his words confidentiality to protect personal privacy, the Data Protection Act would similarly resonate tonight.
    [Show full text]
  • Data Protection, Caldicott
    This printed version may be out of date. You should refer to the Hampshire Partnership Trust website (www.hantspt.nhs.uk) for the most up to date copy of this policy NCP 25 DATA PROTECTION, CALDICOTT & CONFIDENTIALITY POLICY & PROCEDURES [VERSION 2] Author: Information Governance Manager 1 Version 2 March 2007 This printed version may be out of date. You should refer to the Hampshire Partnership Trust website (www.hantspt.nhs.uk) for the most up to date copy of this policy NCP 25 Hampshire Partnership NHS Trust POLICIES AND PROCEDURES PROFORMA Subject and Version of Document: Data Protection, Caldicott & Confidentiality Policy and Procedure; Version 2 Author: Gordon Cheeseman, Information Governance Manager Persons/Committees etc consulted Information Governance Group, P&PC, TMT, whilst document in draft: TB Date agreed: Version 1: June 2004 Version 2: March 2007 By whom agreed: P&PC (March 04), TMT (June 04), TB Date of next review/update March 2010 and by whom: Information Governance Group Copy obtainable from: Website Date document issued: Version 1: July 2004 – Update 9 Version 2: March 2007 – Update 22 Responsibility for dissemination All Department Heads to new staff: Principal Target Audience: All staff who come into contact with personal identifiable information Training Implications: Staff Awareness Legal responsibilities covered in Organisational Induction. Amendments Summary: Amend. No. Issued Page Subject 1, Version 2 Nov 2006 All Minor changes to update document 2. Version 2 Dec 2006 24 & 30 Procedure for franked mail 3. Version 2 March 2007 8 Confidentiality: NHS Code of Practice 4. Version 2 March 2007 24 NHSmail Guidance Author: Information Governance Manager 2 Version 2 March 2007 This printed version may be out of date.
    [Show full text]
  • Data Protection and Human Rights
    House of Lords House of Commons Joint Committee on Human Rights Data Protection and Human Rights Fourteenth Report of Session 2007–08 HL Paper 72 HC 132 House of Lords House of Commons Joint Committee on Human Rights Data Protection and Human Rights Fourteenth Report of Session 2007–08 Report, together with formal minutes, and oral and written evidence Ordered by The House of Commons to be printed 4 March 2008 Ordered by The House of Lords to be printed 4 March 2008 HL Paper 72 HC 132 Published on 14 March 2008 by authority of the House of Commons London: The Stationery Office Limited £0.00 Joint Committee on Human Rights The Joint Committee on Human Rights is appointed by the House of Lords and the House of Commons to consider matters relating to human rights in the United Kingdom (but excluding consideration of individual cases); proposals for remedial orders, draft remedial orders and remedial orders. The Joint Committee has a maximum of six Members appointed by each House, of whom the quorum for any formal proceedings is two from each House. Current membership HOUSE OF LORDS HOUSE OF COMMONS Lord Bowness John Austin MP (Labour, Erith & Thamesmead) Lord Dubs Mr Douglas Carswell MP (Conservative, Harwich) Lord Lester of Herne Hill Mr Andrew Dismore MP (Labour, Hendon) (Chairman) Lord Morris of Handsworth OJ Dr Evan Harris MP (Liberal Democrat, Oxford West & The Earl of Onslow Abingdon) Baroness Stern Virendra Sharma MP (Labour, Ealing, Southall) Mr Richard Shepherd MP (Conservative, Aldridge-Brownhills) Powers The Committee has the power to require the submission of written evidence and documents, to examine witnesses, to meet at any time (except when Parliament is prorogued or dissolved), to adjourn from place to place, to appoint specialist advisers, and to make Reports to both Houses.
    [Show full text]
  • Data Protection & Privacy 2020
    Data Protection & Privacy 2020 Contributing editors Aaron P Simpson and Lisa J Sotto Hunton Andrews Kurth LLP © Law Business Research 2019 Leaders in Privacy and Cybersecurity Keep the trust you’ve earned. Complying with global privacy, data protection and cybersecurity rules is challenging, especially for businesses that operate across borders. Our top-ranked privacy team, in combination with the firm’s Centre for Information Policy Leadership, advises on all aspects of US and European data protection law and cybersecurity events. We help businesses develop global compliance frameworks addressing regulatory obligations in the US, the EU and across the world. The firm is widely recognized globally as a leading privacy and data security firm. For more information, visit www.huntonprivacyblog.com. ©2019 Hunton Andrews Kurth LLP | HuntonAK.com © Law Business Research 2019 19268_GettingTheDealThrough_SponsorAd_R2.indd 2 7/9/19 9:22 AM Publisher Tom Barnes [email protected] Subscriptions Claire Bagnall Data Protection & [email protected] Senior business development managers Adam Sargent Privacy [email protected] Dan White [email protected] 2020 Published by Law Business Research Ltd 87 Lancaster Road London, W11 1QQ, UK Contributing editors Tel: +44 20 3780 4147 Aaron P Simpson and Lisa J Sotto Fax: +44 20 7229 6910 Hunton Andrews Kurth LLP The information provided in this publication is general and may not apply in a specific situation. Legal advice should always be sought before taking any legal action based on the information provided. This Lexology Getting The Deal Through is delighted to publish the eighth edition of Data Protection information is not intended to create, nor and Privacy, which is available in print and online at www.lexology.com/gtdt.
    [Show full text]
  • Massdot Aeronautics Division Offices the Logan Office Center One Harborside Drive, Suite 205N East Boston, MA 02128-2909
    MASSACHUSETTS STATEWIDE AIRPORT SYSTEM PLAN MASSDOT AERONAUTICS DIVISION MASSACHUSETTS STATEWIDE AIRPORT SYSTEM PLAN (MSASP) PROJECT MANAGEMENT TEAM (PMT) MEETING #2 MEETING NOTES Thursday, December 10, 2009 (1 PM– 3 PM) MassDOT Aeronautics Division Offices The Logan Office Center One Harborside Drive, Suite 205N East Boston, MA 02128-2909 1. MEETING ATTENDANCE PMT Member Attendees: Member Name Affiliation Chris Willenborg MassDOT Aeronautics, Administrator Denise Garcia MassDOT Aeronautics, Manager of Aviation Planning William Benjamin Former MAC Commissioner Craig Dotlo (via phone) Aircraft Owners and Pilots Association (AOPA) Flavio Leo Massport Russ Maguire Massachusetts Airport Management Association (MAMA) Paul Nelson Massachusetts Executive Office of Transportation (EOT) Michelle Ricci (via phone) Federal Aviation Administration (FAA) Arthur Robert Massachusetts Office of Business Development (MOBD) Dean Saucier (via phone) National Business Aviation Association (NBAA) Absent PMT Member Attendees: Harold Bevis Delta Airlines / Air Transport Association (ATA) Dan Wolf Cape Air Other Meeting Attendees: Steven Rawding MassDOT Aeronautics, Aviation Planner Katie Servis MassDOT Aeronautics, Environmental Analyst Bob Mallard Airport Solutions Group (ASG) - Study Project Manager Pam Keidel-Adams Wilbur Smith Associates – Project Team Member James Miklas Wilbur Smith Associates – Project Team Member Marc Champigny Louis Berger Group – Project Team Member Nick Stefaniak Louis Berger Group – Project Team Member Jeremy Martelle Louis Berger
    [Show full text]
  • UK & EU Data Protection Bulletin
    UK & EU Data Protection Bulletin: April - May 2019 United Kingdom Information Commissioner's Office (ICO) Date Description 15 April The ICO has released its new code on age-appropriate design. It imposes strict rules on information society service providers whose services are likely to be accessed by children. As drafted, compliance with the code may require substantial design and operational changes and organisations which are likely to be affected by its provisions should review carefully. This code is open for public consultation until 31 May 2019. For more please see our Bird & Bird update here. 29 April ICO call for views on a data protection and journalism code of practice. The ICO issued a consultation on the upcoming data protection and journalism code of practice. This consultation, which ends on 27 May, is meant to be the first stage of the consultation process. Contributions will be used to draft and develop the code which will also be based on the detailed guidance already issued by the ICO on this topic. To help with the consultation process, the ICO made available a survey (available here) that can be completed by organisations wishing to express their view on this topic. 1 UK Cases Date Description 10 April Robin Rudd V (1) John Bridle (2) J&S Bridle Ltd [2019] Ewhc 893 This case relates to the Court exercising its discretion in connection with a subject access request. Facts In this decision, Mr Rudd, who is a doctor who specialises in the science of exposure to asbestos and who often acted as an expert witness for claimants in asbestos actions, brought a claim under S7 of the old Data Protection Act 1998 and sought an order requiring the defendants to comply with a subject access request.
    [Show full text]
  • Scalability of the Air Transportation System and Development of Multi-Airport Systems: a Worldwide Perspective
    Scalability of the Air Transportation System and Development of Multi-Airport Systems: A Worldwide Perspective by Philippe A. Bonnefoy B. Ing., Mechanical Engineering, École Polytechnique de Montréal, Canada, 2002 S.M., Aeronautics & Astronautics, Massachusetts Institute of Technology, 2005 Submitted to the engineering systems division in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2008 2008 Philippe A. Bonnefoy, All rights reserved. The author hereby grants to MIT the permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: ______________________________________________________ Philippe A. Bonnefoy Engineering Systems Division May 30th 2008 Certified by: _____________________________________________________________ R. John Hansman, Professor Department of Aeronautics and Astronautics and Engineering Systems Thesis Supervisor Certified by: _____________________________________________________________ Cynthia Barnhart, Professor Department of Civil and Environmental Engineering and Engineering Systems Certified by: _____________________________________________________________ Richard de Neufville, Professor Department of Civil and Environmental Engineering and Engineering Systems Certified by: _____________________________________________________________ Amedeo Odoni, Professor Department of Aeronautics and Astronautics and Civil and Environmental Engineering Accepted
    [Show full text]
  • Official Hansard No
    COMMONWEALTH OF AUSTRALIA PARLIAMENTARY DEBATES SENATE Official Hansard No. 2, 2002 TUESDAY, 12 MARCH 2002 FORTIETH PARLIAMENT FIRST SESSION—FIRST PERIOD BY AUTHORITY OF THE SENATE INTERNET The Journals for the Senate are available at: http://www.aph.gov.au/senate/work/journals/index.htm Proof and Official Hansards for the House of Representatives, the Senate and committee hearings are available at: http://www.aph.gov.au/hansard SITTING DAYS—2002 Month Date February 12, 13, 14 March 11, 12, 13, 14, 19, 20, 21 May 14, 15, 16 June 17, 18, 19, 20, 24, 25, 26, 27 August 19, 20, 21, 22, 26, 27, 28, 29 September 16, 17, 18, 19, 23, 24, 25, 26 October 14, 15, 16, 17, 21, 22, 23, 24 November 11, 12, 13, 14, 18, 19, 20, 21 December 2, 3, 4, 5, 9, 10, 11, 12 RADIO BROADCASTS Broadcasts of proceedings of the Parliament can be heard on the following Parliamentary and News Network radio stations, in the areas identified. CANBERRA 1440 AM SYDNEY 630 AM NEWCASTLE 1458 AM BRISBANE 936 AM MELBOURNE 1026 AM ADELAIDE 972 AM PERTH 585 AM HOBART 729 AM DARWIN 102.5 FM SENATE CONTENTS TUESDAY, 12 MARCH Distinguished Visitors........................................................................................... 509 Questions Without Notice— Health: Program Funding ................................................................................ 509 New Tax System.............................................................................................. 509 Health: Program Funding ...............................................................................
    [Show full text]