SURVEILLANCE: opportunities and pitfall David Matthias QC and Ryan Kohli.

Slides:



Advertisements
Similar presentations
Due Diligence for Directors Martin Elliott Kovnats Jeffrey Kyle Merk.
Advertisements

Hamid Dom Reg WS March 04 1 INTRODUCTION THE GATS and DOMESTIC REGULATION.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
NATIONAL INFORMATION GOVERNANCE BOARD
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
Health & Safety at Work Etc. Act 1974
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
ISRCL- Young Lawyers Anthony Gett Barrister & Senior Legal Officer Commonwealth Director of Public Prosecutions (Australia)
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
The Data Protection (Jersey) Law 2005.
1 ICN Cartel Workshop 2013 South Africa Plenary I: Alternative Means of Cartel Detection (AGENCY ONLY) Stephen Blake Senior Director - Cartels and Criminal.
Search and Seizure on the Premises of the Danish Parliament (the Folketing) Conditions, background and practice.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
RIPA & The Protection of Freedoms Act 2012 Tim Glews
 To provide for the health and safety of persons at work and for the health and safety of persons in connection with the use of plant and machinery;
The Special Investigations Unit Act Presentation to Ad-hoc Committee on the President’s response to the Public Protector.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
RIPA John Riddell Weightmans LLP 12 th February 2015.
© 2003 Rule 1.9. Duties to Former Clients (a) A lawyer who has formerly represented a client in a matter shall not thereafter represent another person.
Health and Safety.
INTERNET and CODE OF CONDUCT
Theme 7: Occupational Health and Safety Act 85 of 1993
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Data Protection Overview
Pretext Phone Calls Legal in Canada!!. Police-guided pretext phone calls do not violate Charter s. 8 if prior: -One party consent -Judicial Authorization.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
SimCybercrime Investigations: evidential considerations on McKay, Solicitor Advocate.
CAN THE ESIC INSPECTOR INSIST ON PRODUCTION OF ACCOUNT BOOKS MAINTAINED BY THE EMPLOYER UNDER INCOME TAX ACT, 1961?
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
UK equality law developments Professor Aileen McColgan, Matrix Chambers and Kings College London.
Competition law and Article 8 ECHR VMR, 13 March 2008 Jolien Schukking.
Use of telecommunications data in fighting crime legally and effectively.
A Review of Board of Health Liability James A. LeNoury LeNoury Law Counsel to alPHa February 5th, 2015.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
NEBOSH LEVEL 6 NATIONAL DIPLOMA MODULE A: MANAGEMENT OF HS LESSON 9 : CRIMINAL LAW Part One: HASAWA 1974.
Section 54’s 54.Inspector’s power to deal with dangerous conditions – (1) if an inspector has reason to believe that any occurrence, practice or condition.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Reporting Suspected Child Abuse. Mandated Reporters 6311 of Title 23 Domestics Code  All School Employees are mandated reporters  “if the person has.
Surveillance techniques Essential surveillance techniques available to landlords, providing evidential footage for civil and criminal cases when tackling.
Confidentiality of Government Records and Reasons for Refusal Presentation to Boards and Committees 18 th November 2008 Carole Excell FOI Unit.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Tax Court of Canada THIRD PARTY INFORMATION IN MAKING ASSESSMENT INTERNATIONAL ASSOCIATION OF TAX JUDGES Lucerne, Switzerland September 4, 2015 The Hon.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
Every employer must ensure, as far as is reasonable practicable, the health, safety and welfare of all his employees More specifically, employers must.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Surveillance around the world
Substance Addiction(Compulsory Assessment and Treatment) Act 2017 Processes
Data protection issues in regulatory investigations
Restrictions, including those restrictions permitted by the European Convention on Human Rights Interception of communications Surveillance.
PERSONAL DATA PROTECTION ACT 2010
G.D.P.R General Data Protection Regulations
General Data Protection Regulations 2018
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Electronic Surveillance, Post 9/11
A Review of Board of Health Liability
Newport Flood Emergency Legal Issues
Presentation transcript:

SURVEILLANCE: opportunities and pitfall David Matthias QC and Ryan Kohli

Covert Surveillance: Powers and Constraints RIPA (Regulation of Investigatory Powers Act) 2000 The Act regulates six investigatory powers the interception of communications (ss ); the acquisition of communications data (ss. 21 – 25); intrusive surveillance (ss. 26 – 48); directed surveillance (ss.26 – 48) ; the use of covert human intelligence sources (ss ); disclosure of encrypted data (ss. 49 – 56)

Purpose Ensures that powers to investigate by surveillance of individuals or interception of telecommunications are used with proper regard for human rights. Establishes a new surveillance tribunal to provide a domestic system of redress where it is alleged that public authorities have infringed human rights Defines the powers of public authorities to carry out different types of surveillance and lists the authorities having different powers covered by the Act

Aimed at Protecting Article 8: the right to respect for private and family life; Article 13: the right to an appropriate remedy

(i) Intercepting Communications Will be of little interest to local authorities since only the intelligence services, military personnel and police chiefs may apply to the Secretary of State for an interception warrant Where local authorities are acting in conjunction with the police, unlikely to be proportionate to authorise telephone tapping to obtain evidence, for example, of anti social behaviour. Section 1(3) creates civil liability for any interception of a communication by, or with the express or implied consent of, a person having the right to control a private telecommunications system. This applies, for example, to an employer listening in to telephone or communications of employees. Such conduct is only lawful if it is consented to by the sender or recipient or is otherwise authorised under the Act (s.3(1)).

(ii) Communications Data Chapter II of Part I deals with the lawful acquisition and disclosure of communications data other than in the course of transmission. Communications data includes (i)any traffic data comprised in or attached to a communication; (ii)any information which includes none of the contents of the communication; and (iii)is about the use made by any person of any postal or telecommunications service or other information held or obtained in relation to a customer by a person providing a postal or telecommunications service.

Contd… This covers everything from addresses on envelopes to lists of telephone calls or s and their recipients. Covers everything apart from the actual contents of the communication Acquisition and disclosure of such data is deemed lawful pursuant to s. 21(2) if (i) the person acquiring or disclosing it is authorities or required to do so by an authorisation notice or a notice given under the Act and (ii) their conduct is in accordance with the authorisation notice. Local authorities are not included in the list of relevant public authorities for these purposes pursuant to s. 25(1). If local authorities need to obtain such evidence they will have to involve police officers who can obtain appropriate authorisations.

(iii) Surveillance Operations Part 2 of the Act (ss. 26 – 48) provides the statutory basis for the authorisation and use by public authorities of covert surveillance, agents, informants and undercover officers (described under the Act as covert human intelligence sources). The Act does not make unauthorised activities unlawful, but the consequence of failing to obtain an authorisation may be that the actions are rendered unlawful by s. 6 of the Human Rights Act 1998

Three types of covert surveillance (i)Directed surveillance: covert surveillance which is not intrusive and is undertaken for the purposes of a specific investigation or a specific operation in such a manner as is likely to result in obtaining private information about a person (s. 26(2)). – Any surveillance undertaken which is an immediate response to events or circumstances the nature of which is such that obtaining an authorisation would not be reasonably practicable is excluded from the normal requirements. – Surveillance is covers where it is carried out in a manner calculation to ensure that the person or persons subject to the surveillance are unaware that the surveillance is taking place (s. 26(9)). – This would include, for example, setting up of a covert observation post to gather evidence of anti-social behaviour, trailing benefit fraudsters, CCTV surveillances of particular locations or individuals.

Contd… (ii)Intrusive surveillance: is covert surveillance that is carried out in relation to anything taking place on any residential premises or in any private vehicle and that involves the presence of an individual on the premises or in the vehicle or is carried out by a surveillance device (s. 26(3)). – There is an exception for surveillance devices which are designed or adapted solely for the purpose of providing information as to the location of a vehicle. – Section 32 provides for the authorisation of intrusive surveillance and limits the grounds on which such authorisations may be granted. – There is no provision whereby local authorities may be authorised to carry out any form of intrusive surveillance.

Contd… (iii)Covert Human Intelligence Sources: a person falls under this category if he establishes a personal relationship with someone for the covert purpose of either using the relationship to obtain or provide access to any information, or if he covertly discloses information obtained by the use of such a relationship – A trading standards officer posing as a customer in an attempt to purchase counterfeit goods or to discover the source of such goods would be a covert intelligence source – Similarly an individual, employed by the local authority, under the age of 18 entering a shop with the intention of purchasing alcohol for the purpose of policing licensing conditions would be a covert intelligence source.

Contd… Sections 28 and 29 govern the use of directed surveillance and of covert human intelligence sources. – Local authorities are listed in Schedule 1 as relevant public authorities for the purposes of both sections. – This means that investigators can be authorised to carry out directed surveillance (s. 28) and to use covert human intelligence sources (s. 29).

Practical Issues Authorisation Procedure In either case (s. 28 or s. 29) authorisation has to be granted by the persons designated for that purpose. These are individuals holding such offices, ranks or positions as are prescribed for the purpose (s. 30). – The prescribed persons for local authorities are Assistance Chief Officers and Officers responsible for the management of investigations (RIPA (Prescription of Offices, Ranks, and Positions) Order 2000 S.I – These would include, for example, Chief Trading Standards Officer or Director of Housing Any investigator wishing to carry out surveillance operations to obtain evidence is required to obtain prior authorisation from a designated person. – It is essential that a written record should be kept of authorisation although no formal requirement under the Act – The record should include the reasons for granting the authorisation and its terms

Proportionality and Necessity Both sections require tests of necessity and proportionality to be applied Proportionality is tested against the object to be achieved by carrying out the surveillance in question. Surveillance is necessary and an authorisation justified, if it is necessary on any of the grounds set out in s. 28(3) or s. 29(3) which are (a) in the interests of national security; (b) for the purpose of preventing or detecting crime or of preventing disorder; (c) in the interests of the economic well-being of the United Kingdom; (d) in the interests of public safety; (e) for the purpose of protecting public health; (f) for the purpose of assessing or collecting any tax, duty, levy or other imposition, contribution or charge payable to a government department; or (g) for any purpose (not falling within paragraphs (a) to (f)) which is specified for the purposes of this subsection by an order made by the Secretary of State. The ground relied on should be recorded as part of the authorisation

Covert Human Intelligence Sources: additional requirements Section 29(5) requires that the designated person must be satisfied of each of the following (a) that there will at all times be a person holding an office, rank or position with the relevant investigating authority who will have day-to-day responsibility for dealing with the source on behalf of that authority, and for the source's security and welfare; (b) that there will at all times be another person holding an office, rank or position with the relevant investigating authority who will have general oversight of the use made of the source; (c) that there will at all times be a person holding an office, rank or position with the relevant investigating authority who will have responsibility for maintaining a record of the use made of the source; (d) that the records relating to the source that are maintained by the relevant investigating authority will always contain particulars of all such matters (if any) as may be specified for the purposes of this paragraph in regulations made by the Secretary of State; and (e) that records maintained by the relevant investigating authority that disclose the identity of the source will not be available to persons except to the extent that there is a need for access to them to be made available to those persons.

Contd… Therefore, there must be two officers with responsibility for dealing with a human intelligence source and the designated person must be satisfied that their duties are properly described and allocated. An officer will have responsibility to maintain a record of the use made of the source. Any records which identify the source should not be available to persons except to the extent that the need for access is necessary.