Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Similar presentations


Presentation on theme: "Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian."— Presentation transcript:

1 Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation

2 Copyright Surveillance by the Media – and Its Regulation AGENDA Media Surveillance Practices Empirical Analytical Regulation of Media Surveillance Contemporary Prospective

3 Copyright Kidman – January 2005

4 Copyright Kidman – January 2005 Stake-out, listening device, still-image photography, car pursuit, AVOs granted

5 Copyright Falzon & Williams – April 2007 Visual recording, non-public place, covert, unconsented, unofficial media

6 Copyright Elliott – May 2008 Visual recording, public place, vulnerable person, overt, persistent, consent denied

7 Copyright Elliott – At the Inquest

8 Copyright yo Girl – July 2009 Coercion, vulnerable person, live-to-air

9 Copyright Campbell – May 2010 Stake-out, covert, visual recording, unconsented, no public interest

10 Copyright Campbell – May 2010

11 Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, persistent, overt, consent denied

12 Copyright Madaleine Pulver – Aug-Nov 2011 Persistent, pursuit

13 Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, presistent, overt, consent denied, pursuit

14 Copyright yo Boy in Bali – October 2011 Stake-out, visual recording, consent denied, persistent, culturally risky

15 Copyright yo Boy in Bali – October 2011

16 Copyright Forms of Surveillance 1.Physical Surveillance 2.Communications Surveillance 3.Dataveillance 4.Location and Tracking Surveillance 5.Body Surveillance ['Überveillance' Type 1] 6.Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]

17 Copyright Dimensions of Surveillance 1.Of What? 2.For Whom? 3.By Whom? 4.Why? 5.How? 6.Where? 7.When?

18 Copyright Forms of Media Surveillance 1.Physical Surveillance Unaided watching and listening with eyes and ears Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices 2.Comms Surveillance Unauthorised access to voic s /'mailbox hacking'), telephone, or chat/IM traffic 3.Dataveillance Acquired login/passwd pairs Hacking Social Eng'g – pretexting / blagging, masquerade 4.Loc, Track Surveillance Stake-out, pursuit,... More sophisticated tools 5.Body Surveillance 6.Omnipresent and/or Omniscient Surveillance

19 Copyright Contemporary Regulation of Media Surveillance Tort Interference with Real Estate (Trespass, Nuisance) Interference with the Person (Trespass, Obstruction, False Imprisonment, Assault, AVOs / PSIOs) Interference with Emotional State (Stalking, Negligence) Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off) Surveillance Statutes Telecomms (postal, TIAA, computer offences) Aural/Visual Surv Devices (Clth, State, Territory) Pornography, Anti-Voyeurism Other Statutes (Copyright, Trademarks, Media Law, Human Rights, Privacy) Media Codes (APC, ACMA) Direct Action (protecting the public, and the media)

20 Copyright The Regulation of Surveillance – General Principles 1.Justification 2.Proportionality 3.Openness 4.Access Security 5.Controlled Use 6.Controlled Disclosure 7.Controlled Publication 8.Non-Retention and Rapid Destruction 9.Review 10.Withdrawal

21 Copyright Media Use of Surveillance – Specific Principle DO NOT, unless a clear justification exists: seek or gather personal data observe or record personal behaviour Base justification only on: consent by the person to whom the data relates express legal authority; or an over-riding public interest The nature of the activities, and their degree of intrusiveness: must reflect the nature and extent of any consent provided must reflect the nature and extent of any express legal authority; and must be proportionate to the nature and significance of the public interest arising in the particular circumstances

22 Copyright The Public Interest Relevance to: the performance of: a public office a significant corporate or civil society function the credibility of public statements ('hypocrisy') arguably illegal, immoral or seriously anti-social behaviour public health or safety a significant event

23 Copyright Media Use of Surveillance – Controlled Activities 1.activities that intrude into the person's private space 2.activities that intrude into the person's reasonable expectations, even though they are in a public space 3.deceit, such as: masquerade misrepresentation or subterfuge pretexting / blagging, masquerade unexpected observation or recording 4.exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc. 5.intrusions into private space of people in sensitive situations 6.coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence 7.perceived trespass, nuisance, obstruction, pursuit, harassment or stalking

24 Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation


Download ppt "Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian."

Similar presentations


Ads by Google