Search and Surveillance Powers

Search and Surveillance Powers

June 2007, Wellington, New Zealand | R e p o R t 9 7 SeaRch aNd SuRveillaNce poWeRS E3197 June 2007, Wellington, New Zealand | R E P O R T 9 7 SEaRch aNd SuRvEillaNcE POWERS The law commission is an independent, publicly funded, central advisory body established by statute to undertake the systematic review, reform and development of the law of New Zealand. its purpose is to help achieve law that is just, principled, and accessible, and that reflects the heritage and aspirations of the peoples of New Zealand. The Commissioners are: Right honourable Sir Geoffrey Palmer – President dr Warren Young – Deputy President helen aikman Qc Professor John Burrows Qc The General Manager of the law commission is Brigid corcoran The office of the law commission is at level 19, hP Tower, Featherston St, Wellington. Postal address: PO Box 2590, Wellington 6001, New Zealand document Exchange Number: sp 23534 Telephone: (04) 473-3453, Facsimile: (04) 914-4760 Email: [email protected] internet: www.lawcom.govt.nz National library of New Zealand cataloguing-in-Publication data New Zealand. law commission. Search and surveillance powers. (New Zealand law commission report, 0113-2334 ; 97) iSBN 978-1-877316-34-0 1. Searches and seizures—New Zealand. 2. Remote sensing —New Zealand. 3. Electronics in criminal investigation—New Zealand. i. Title. ii. Series: New Zealand. law commission. Report ; 97. 345.930522—dc 22 Report/law commission, Wellington, 2007 iSSN 0113-2334 iSBN 978-1-877316-34-0 This report may be cited as: NZlc R97 This report is also available on the internet at the law commission’s website: www.lawcom.govt.nz Search and surveillance powers ConTenTs letter of transmittal .......................................................................................................................................13 Foreword ....................................................................................................................................... 14 ACknowledgemenTs .................................................................................................................. 17 Terms oF reFerenCe ................................................................................................................... 19 summAry ......................................................................................................................................... 20 chapter 1 – introduction ...............................................................................................................................20 chapter 2 – values underpinning search and surveillance powers ............................................................20 chapter 3 – common issues ..........................................................................................................................21 chapter 4 – applying for and issuing search warrants ...............................................................................22 chapter 5 – Warrantless powers of entry, search and seizure ....................................................................22 chapter 6 – Executing search powers ...........................................................................................................23 chapter 7 – computer searches ....................................................................................................................23 chapter 8 – Search of persons .......................................................................................................................24 chapter 9 – Search of vehicles .....................................................................................................................25 chapter 10 – Production and monitoring powers ......................................................................................25 chapter 11 – interception and surveillance ................................................................................................25 chapter 12 – Privileged and confidential material .......................................................................................26 chapter 13 – Post-execution procedures ......................................................................................................27 chapter 14 – Remedies and immunities .......................................................................................................27 chapter 15 – Reporting on the exercise of search and surveillance powers ..............................................28 chapter 16 – implementation .......................................................................................................................28 ChApTer 1 ........................................................................................................................................ 30 introduction .........................................................................................................................................................30 The growth of search powers ........................................................................................................................30 The nature of the problem .............................................................................................................................31 Scope of report ...............................................................................................................................................32 discussion paper ......................................................................................................................................................... 32 approach taken in report ........................................................................................................................................... 33 Our report .......................................................................................................................................................34 ChApTer 2 ........................................................................................................................................ 36 values underpinning search and surveillance powers ......................................................................................36 introduction ...................................................................................................................................................36 human rights values and law enforcement values ......................................................................................37 Overview .................................................................................................................................................................... 37 human rights values ......................................................................................................................................37 introduction ................................................................................................................................................................ 37 Privacy ......................................................................................................................................................................... 38 Personal integrity ........................................................................................................................................................ 40 Property rights ............................................................................................................................................................ 40 Rule of law .................................................................................................................................................................. 41 law enforcement values ................................................................................................................................41 Search and Surveillance Powers Effectiveness ............................................................................................................................................................... 42 Simplicity .................................................................................................................................................................... 42 certainty ...................................................................................................................................................................... 42 Responsive to different operational circumstances .................................................................................................. 43 human rights consistency .......................................................................................................................................... 43 Reasonable expectations of privacy ..............................................................................................................43 Purpose of reasonable expectations of privacy enquiry ........................................................................................... 44 Reasonable expectations of privacy: what it covers and how it is assessed ............................................................ 44 challenges created by the reasonable expectations of privacy concept ................................................................... 46 Challenges .........................................................................................................................................................................................46 The solution

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    504 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us