[Home] [Help] [Databases] [WorldLII] [Feedback] | ||
Murdoch University Electronic Journal of Law |
Author: | Jamie H Lyford School of Law, Murdoch University |
Issue: | Volume 1, Number 3 (September 1994) |
WAR IS PEACE
FREEDOM IS SLAVERY
IGNORANCE IS STRENGTH
1. Introduction
1984 has long since passed, however The Ministry of Truth has finally arrived! The Ministry, however, is not quite the same
as that encountered by Winston in George Orwells fictional account of
1949. It is bigger and arguably
more pervasive. It doesn't 'control'
the individuals of just one country or even a continent, it can control nearly
all individuals, but no individual or organisation can control it. Simultaneous to the thawing of the Cold War
and the disintegration and reintegration of European states the Worlds
network of databases have slowly come on line. These networked databases contain information pertaining to
nearly all individuals on the planet.
The Thought Police in the new Ministry are inconceivably numerous, the users
of the information range from government organisations ranging from: local
government who use details from your car license plates to fine you for
double parking; to international agencies set up to stop money laundering
through national banks; or to restrict you entry to a certain country
because of your political or religious beliefs stored electronically
elsewhere. The Thought Police also
include private corporations using individual personal information to
restrict their credit or even sack their own employees for not typing the
required number of words per week on their word processor. The Thought Police even extend down to
individuals such as doctors refusing medical treatment because a patient's
record shows HIV or some other dangerous or infectious disease. It should be pointed out that this
information, at present is available only to the scrutiny of the powerful
few and to those individuals and organisations that know how to get it,
this however is changing with each passing day. The role of this paper is to consider some of these problems
and in particular to focus on the role International Law has to play in
protecting the rights of *privacy* of the individual from the expanding
Big Brother that is potentially watching all of them.
2. A Definition of Privacy
Why do we need Privacy? The invasion of
privacy lessens the dignity and ultimately the identity of the
individual. The exposure to methods of
data collection, particularly those that intrude upon his solitude, reduce
him as a person and ultimately may be psychologically destructive.[1]
Despite criticisms by some writers that most people would not consider the
collection and storage and later dissemination of personal information as
a breach of privacy,[2] the following discussion will show the need to
further increase concerns raised by the new world in which we live.
Winston although aware of the breach of his rights to privacy through the
omnipresence of the telescreen, was unable to do anything to protect
himself. Protection begins with this
*recognition* of a right to privacy but in order to do this a working
definition of *privacy* is required in order to place the concept in the
terms of the international legal system.[3] Benn[4] writes that the importance attached to the
privacy of the person is one aspect of the Western European
post-Renaissance liberal stress on individuality, on the moral
responsibility of the normally rational individual, and his responsibility
for what he is and does. Basic to this view of man is the idea of the
natural person as a chooser, conscious of himself as able to make a
difference to the way the world goes, by deciding to do this rather than
that, having projects, therefore, of his own, whose life experience may
consequently be understood, not simply as a chronicle of events, but as an enterprise,
on which he puts his own construction.
Moreover she recognises other men and women as persons, and hence
choosers like herself.
The difficulty has been to devise a definition which is sufficiently comprehensive
to cover all those areas of privacy with which the law might be concerned,
but which is not so broad as to be useless in a legal context. Most early definitions consider privacy in a
way that doesn't contemplate the use of the term as applied to modern
networked databases. Hence a
balance must be found between a sufficiently wide definition and a
definition that is not so wide as to make the concept unworkable.
The most famous definition of all is that of Judge Cooley who called it "the
right to be let alone."[5] As
Storey[6] notes, although this is compelling in its stark simplicity it is
not a realistic statement of a legal right. It ignores the fact that no person who is a member of a community
has an absolute right to be let alone.
Indeed any person who chooses to live in a community must accept
the restraints and intrusions upon her life occasioned by the social
organisation necessary to enable the community to function
effectively.[7] In 1970 the
Justice Committee[8] incorporated this idea into its use of the word. It said that privacy is:
"that area of a man's life which in any given circumstances, a reasonable
man with an understanding of the legitimate needs of the community would
think it wrong to invade"
Warren and Brandeis[9] considered the right to privacy as being part of a
more general right to the immunity of the person - the right to one's personality. This would seem to be a more fundamental and
overriding principle than even that of privacy.
Westin[10] has defined a right of privacy as:
"the claim of individuals, groups or institutions to determine for themselves
when, how and to what extent information about them is communicated to
others".
However this definition has been criticised on the basis of its impossible
breadth.[11] A further definition has
been provided by Miller[12] who says that the:
"...basic attribute of an effective right of privacy is the individual's
ability to control the circulation of information relating to him."
The Morison Report[13] of 1973 stated:
Privacy may be regarded as the condition of an individual when he is free
from interference with his intimate personal interests by others. It is
not implied that complete freedom in this respect is anyone's moral right
or that he has a legitimate claim that such complete freedom should be his
legal right.
Tucker[14] correctly accepts that privacy is inherently difficult to define. The problem he feels stems from its
sociological and cultural underpinning's.
He feels that whilst it is clear that the concept embraces
generally freedom from physical or electronic intrusions and publication
of intimate details of one's private life, there are many fringe areas
which may be regarded as being on the periphery of privacy.
The Australian Law Reform Commission in its major report took the term in
its use as an "ordinary language concept"[15]. It is significant to note though, that
no all encompassing definition has yet been created to include all forms
of privacy concern[16]. This however
may be unnecessary as the predominant accumulation of information about individuals
including photographic[17] and other traditionally non-data type material
such as voice recordings and fingerprints is being included on modern
networked databases. I submit that a
definition which is sufficient to encompass all electronic accumulation
and dissemination systems will adequately encompass most typically
non-data type invasions.
However, the kind of privacy that will be considered in this paper is that
of *personal information privacy*[18] and by combining some of the elements
of earlier definitions a suitably updated definition can be created. A revised definition could be worded in
terms such as:
Privacy may be regarded as the condition of an individual when s/he is free
from interference with his/her intimate personal interests by others. A basic attribute of this is the
individual's ability to control the accumulation and circulation of
information relating to him/her.
It is not implied that complete freedom in this respect is anyone's
moral right or that s/he has a legitimate claim that such complete freedom
should be his/her legal right, it would include however that area of a
person's life, which in any given circumstances, a reasonable person with
an understanding of the legitimate needs of the community would think it
wrong to invade.
2.1 What Information is to be Kept Private?
In addition to the problem of a definition of Privacy a consideration of
the information that should be kept private should be included. The OECD have provided guidelines for
this, they suggest that purchasing patterns, data relating to sexual
preferences, religious and political beliefs, medical records, police
records, financial information; which relate to an identifiable individual
or individuals.[19] The OECD recognise
that certain classes of data may be more sensitive than others and hence
should be treated accordingly.
2.2 A Historical Perspective on the Law of Privacy
One of the earliest recognitions of a legal right to privacy was that of
the Michigan Supreme Court in 1881 in the United States. That court in the case of DeMay v
Roberts[20] decided that the plaintiff, who had been observed while giving
birth by the defendant passing themselves off as a physician's assistant
was allowed recovery on the basis of an unwarranted intrusion upon her
*physical privacy*.
The law of privacy began to be recognised as a distinct component of law
in 1890 with the work of Samuel Warren and Louis Brandeis of Harvard. In this locus classicus statement on the law
of privacy of the time they state what we now perceive as the problem of
data protection[21] as being:
"...numerous mechanical devices threaten[ing] to make good the prediction
that 'what is whispered in the closet shall be proclaimed from the
house-tops'."
Their idea of privacy evolved from a number of specific areas which were
individually considered by courts to have some element requiring protection
of the individual (such as the breach of some property right or an action
in defamation). Warren and Brandeis'
work has been said to have in fact led to the foundation of the tort of
*breach of privacy* in the US. It
is important to note however that the incidents prompting, and reported in
the article had nothing at all to do with breaches of *information
privacy*.[22]
The American courts since 1890 have had difficulty coming to terms with the
introduction of the nebulous concept of privacy into their domestic law. The US' courts decisions were reviewed in
1960 by Prosser[23] who concluded on a review of the cases, that the *tort
of privacy* fell into four seperate categories:
1) Intrusion upon the plaintiff's seclusion, or solitude or into his private
affairs. 2) Public disclosure or embarrassing private facts about the
plaintiff. 3) Publicity which places the plaintiff in a false light in the
public eye. 4) Appropriation, for the defendant's advantage of the
plaintiff's name or likeness.[24]
Nevertheless, there has not been a clear recognition of privacy rights in
respect of *personal information* as a distinct category,[25] at the domestic
level in any State. It is important to
note that current literature has made the conceptual shift in terminology
from *privacy* to *data protection*.[26] A consideration of privacy with
respect to things other than *personal information* or *data protection*
is beyond the scope of this paper and as such will not be considered
further.[27]
3. Privacy as a Human Right
Articles 55 and 56 of the *UN Charter* impose on UN members legal obligations
to "promote" respect for and observance of human rights. Enforcement
of breaches of human rights have occurred largely through the UN
Commission on Human Rights which has established procedures to consider
allegations of human rights violations by particular states and by the more
recent addition of a thematic approach.
As to allegations of particular states, in 1967, ECOSOC (the UN
Economic and Social Council), produced its Resolution 1235[28] authorised
the Commission to "examine information relevant to gross violations
of human rights" and to "make a thorough study of situations
which reveal a consistent pattern of violations of human
rights". Arguably a breach or
invasion of privacy could only fall into the latter category. Therefore a
consistent record of a country interfering itself or allowing
interferences into its citizens information privacy may fall under the
UN's obligations. This agreement
however provides the least substantial evidence of a right of privacy at
International Law.
Clearer evidence of such a right can be found
in the *Universal Declaration of Human Rights* adopted by the
United Nations on 10 December 1948.
This provides[29] that:
"No one shall be subjected to arbitrary interference with his privacy, family
home, or correspondence, nor to attacks upon his honour or reputation. Everyone has the right to protection of law
against such interference or attacks".
Arising out of this *Declaration* came two further international instruments. First, the *European Convention on Human
Rights* of 1950 which provides[30] inter alia:
"Everyone has the right to respect for his private and family life, his home
and his correspondence."
Of the international instruments governing human rights, the *European Convention
on Human Rights* alone confers protection of privacy in absolute terms,
listing in paragraph 2 eight specific grounds on which public authorities
may, under domestic law, interfere with the exercise of the protected
right. The other instruments protect
only against interference with privacy or family which is 'arbitrary'[31],
'abusive'[32], or 'unlawful.'[33]
Secondly, the *International Covenant on Civil and Political Rights* of 1966
provides that:
1) No one shall be subjected to arbitrary and unlawful interference with
his privacy, family, home or correspondence, nor to unlawful attacks on
his honour and reputation. 2) Everyone has the right to protection of the
law against such interference or attacks.[34]
The *European Convention* has been followed by another convention, drafted
by the Council of Europe, which specifically deals with data protection. This is considered below.[35]
The *Proclamation of Teheran*, adopted by the International Conference on
Human Rights on 13 May 1968, contains the following paragraph 18:
"While recent scientific discoveries and technological advances have opened
vast prospects for economic, social and cultural progress, such developments
may nevertheless endanger the rights and freedoms of individuals and will
require continuing attention."[37]
On 19 December 1968, The General Assembly invited the Secretary- General
to undertake a study of the problems in connection with human rights
arising from developments in science and technology[38], including one on
the uses of electronics which might affect the rights of the person and
the limits which should be placed on such uses in a democratic society.
(see Appendix A - for a discussion of this)
This study the first part of which is concerned with computerised personal
data systems, was presented to the UN Commission on Human Rights at its
1974 session.[39] The principles
recognised were later adopted by the General Assembly, at its 1975 session
in the *Declaration on the Use of Scientific and Technological Progress in
the Interests of Peace and for the Benefit of Mankind*, in which it proclaimed
that:
"...All states shall take appropriate measures to prevent the use of scientific
and technological developments, particularly by the state organs, to limit
or interfere with the enjoyment of the human rights and fundamental
freedoms of the individual as enshrined in the Universal Declaration of
Human Rights, the International Covenants on Human Rights and other
relevant international instruments..."
A sub-commission of the Commission on Human Rights at its 1980 session[40],
noted[41] that one of the consequences of the use of computers was the
increasingly frequent recourse to computerised personal files; that the
concentration of personal particulars in such files entailed grave risks
of interference with the privacy of individuals and the exercise of their
freedoms; and that apart from States, international, Intergovernmental and
regional organisations were keeping an increasing number of computerised
personal files.
With this increasing concern in mind and the change in terminology from Privacy
to Data Protection the international treaty based Law has proceeded in
this direction also. On 28 January 1981
the *European Convention for the Protection of Individuals with Regard to
Automatic Processing of Personal Data* was adopted by the Council of
Europe's Council of Ministers. And
on 23 September 1981 the OECD Council of Ministers adopted a
recommendation which provided similar guidelines (See Appendix A for a
complete discussion of the guidelines adopted). The OECD guidelines have
been followed substantially in Australia's *Privacy Act 1988*.
Since 1981 a strong push has been made in Europe for unified data protection
laws that work across the EEC. Current
laws in Europe place restrictions on whether one can trade data with
foreign countries, requiring that those countries have
"adequate" data protection laws. Taking this even further
advocates are now pushing that this be changed to a requirement for
"equivalent" laws.[42] The
idea being ,that countries that are not offering the same or very similar
protection of personal information will not be allowed to trade data or
allow so called *transborder data flows* to occur with the EEC
countries.[43]
It has been suggested that with differences in each country's laws, individuals
concerned about their privacy in an international information marketplace
may be unable to get true legislative solutions because they can't affect
the laws of other nations.[44] Although
this may be true at the domestic level, with all of the existing domestic statutory
law and International Treaties that seem to imply a right to privacy the
question arises of whether privacy as a human right has now passed into
Customary International Law?
4. Has a Custom Developed at International Law
Any answer to this can be nothing more than mere speculation as the International
Court of Justice (ICJ) has not had the opportunity to consider such an
issue before. However, arguably a clear
custom could be found by looking at:
1) The actions of the many states that have signed treaties to recognise
data protection as being a valid cause for concern of the loss of the
human right of privacy.
2) Very many states have instigated municipal laws to provide for both non-data
privacy and information protection especially with respect to trans border
data flow. The acceptance and adoption
of the treaties by many states may be enough to satisfy custom[45]:
3) Recognition of *opinio juris* as expressed in the extensive collection
of writings from legal writers worldwide.
Additionally, the wide acceptance of treaty law would indicate a
collective conscience intending to be bound by a custom if it arose.[46]
4) The long history of recognition. The
history of the concern of intrusions to privacy by mechanical means can be
traced to 1890 in the work of Warren and Brandeis.[47]
The ICJ could be forced to indicate its position if a State or States seek
an advisory opinion of the Court.
Although not binding, this may prove persuasive in the event of a
State breaching the expanding obligations of international bodies.
International Treaty Law if taken as providing protection as a human right,
the view to which I subscribe, would suggest that any interference with an
individual or a groups privacy would be in breach of the *International
Covenant on Civil and Political Rights*, the *Universal Declaration of
Human Rights* and various other Human Rights agreements.
The remedy that an individual or state could seek is not clear. Most writers
and legislators have focused on developing the principles that should be
upheld in International Law.
Additionally the shift in emphasis to the problems associated with
transborder data flows has in effect shifted the focus to controls or
sanctions that can be used on states not complying with the conventions to
this specific problem. So the
broader issue of privacy as a human right seems to have no solution even
if it could in fact be raised as a norm of international law.
5. Privacy in Domestic Law 5.1 As Recognised Internationally
Most recently France[48] recognised such a right when it said in *SA Locunivers
v Hospices de Lyon*[49] that everybody is entitled in law to refuse to
reveal his address or place of domicile, particularly where he is doing it
to escape his past indiscretions, and his wish ought in principle to be
respected by others. But the position
is otherwise where his design in keeping his address secret is to wriggle
out of his proper obligations or to escape his creditors and such a person
cannot use the right to respect for his private life provision contained
in Art. 8 of the European Convention on Human Rights in order to conceal salient
facts from his creditors.
Also a recent UK law has required that all databases of information about
people be registered with the Data Protection Agency. Flaherty[50] has
criticised this proclaiming that currrently nothing more than registration
is required, but already, simply handling the registration applications
requires a large staff that is already behind in its work. He points out that opponents of data
protection laws point to this as an example of the sort of "database
police" bureaucracies that may be created by poorly thought-out data
protection legislation.
5.2 As Recognised by the High Court of Australia
In addition to the possibility of a right to privacy arising with respect
to non-data privacy intrusions such as the *breach of privacy tort*, the
recent High Court decisions of *Australian Capital Television Pty Ltd v
The Commonwealth*[51] (the *Political Broadcasting Case*) and *Nationwide
News v Wills*[52] raise the issue of freedom of expression and
communications[53] in the context of media bans on political advertising
and media criticism of the Industrial Relations Commission
respectively. Both decisions consider
the constitutional position regarding any implied right of communications
or free speech. Some of the judgments support an implied right of this
nature, looking upon it as a *sine qua non* of the representative
government regime laid down in the Constitution.[54]
In essence, this idea runs contrary to the development of a right of privacy
as they support the competing notion of freedom of expression and
communication. The decisions themselves
could be said to raise the general issue of whether there is a need for
more certainty in the protection of fundamental human rights in
Australia's domestic law. Tucker[55] believes that the cases, though not
in any way decisive, are helpful in generating debate about whether it is
appropriate that the judiciary, on a case by case basis, imply these into
Australia's Constitution. Tucker
feels that these cases may be the harbinger of the development of a right
of privacy in Australia. He also
considers the role they may play in shaping a Bill of Rights for
Australia.
6. Problems with the International Law
His Honour Mr Justice Michael Kirby[56] who is presently chairing the OECD
Expert Group on Security of Information Systems believes that all of
society is at risk not so much from the systems themselves or their misuse
but from the "international community and the representative democratic
process to keep pace with the social implications of technology"[57]
Justice Kirby provides a list of problems that the Expert Group recognises
stands in the way of a truly effective international response to the
issues of information security. These
problems are:
1) Whilst the technology of informatics is universal, the institutions for
social regulation of problems such as data security, remain resolutely
national or even local; 2) Whilst there have been many moves towards
international institutions to serve the global community of the 20th
century, such global institutions have tended to be weak and vulnerable to
strongly felt national and local concerns. The economically weak may be noisy in the institutions of
the world. But, when the chips are
down, it is the economically and politically powerful who will generally
make the vital decisions. They
will usually do so by reference to their perceived national
interests. Altruism is rare. True internationalism is exceptional. Kirby states that this is understood by all
players; 3) The international institutions engage a parade of
visiting politicians and bureaucrats.
They, in turn, are served by contingents of civil servants striving
to accommodate often conflicting instructions and (not unreasonably) to
assure their own survival. The larger
and more diverse the institution, the more numerous and contradictory will
be the interests to which the participants give voice. Kirby points out that the average duration
in office of a minister in a developing country is less than a year. Thus the drama of international
agencies is played out by a huge team of constantly changing actors, of
greatly varying capacity and interest, usually with large egos and, sadly,
often with little real commitment to the substantive international
business which is temporarily in their charge;
4) Kirby states that political leaders must respond to increasingly pervasive
democratic pressures. We hear much
loose talk today of the triumph of democracy over autocracy in the
world. Yet reality falls sadly
short of these proud boasts. Political
leaders are, all too often, chosen not by the people, or even their
elected representatives, but by powerful vested interests. They are beholden to those interests which,
in turn, are hapless captives of the necessity to raise funds for their
political parties. Election campaigns
are waged in terms of grossly superficial slogans. Image has all too often replaced substance. This is itself, in part, a product of the
information technology of mass communications. It is in this way, that the "democratic
revolution" is increasingly debased.
The kinds of players who are interested in that particular game
are, all too often, uninterested in the tedious business of dealing with
complex technological, economic and sociological phenomena; 5) The
political process both nationally and internationally, is frequently
responsive to passing fads and fancies, to prejudice and local, parochial concerns. There are occasions when the world holds its
breath as important issues of principle are asserted and upheld. Kuwait was an example. But these are truly exceptional
circumstances. For the most part
the political leaders of our nations have little if any international
vision. The very political process
which spawns them domestically usually contracts their minds to provincial
concerns. Not for them the
urgencies of responding to the global necessities of effective
international data protection law and policy.
Much more likely is it that they will respond to the passions of
old, ethnic and cultural tribalism which is the feature of our world today
and in which some votes may be found;
6) If initiatives can be stimulated in an international agency to deal with
a global problem such as information security, the pace is all too often
glacial. In part, this is an
inescapable function of the costs of bringing together representatives of
many nations. In part, it reflects
the wholly proper obligation to consult the numerous departments, agencies
and interests back home before offering a commitment to any global
approach. In part, it may reflect constitutional
obligations. The history of this
century was profoundly affected by that requirement of the United States
Constitution which obliges the President to have the advice and consent of
the Senate to the ratification of treaties;
7) There is also the language and cultural barrier through which we must
deal with each other in resolving problems which are global in character. In addition to the difficulty of language
International institutions bear the mark of their Anglo-American
forefathers and do not necessarily meet the perspectives or needs of the
changing world including the Third World the Muslim World and the
Occidental world.
8) Finally there is the impediment that Kirby identifies as the rich and
poor of any country. He feels that it
now presents itself in a new aspect:
the technologically rich and poor.
It can be seen between states and communities, between the
different language of the technologist and the law maker. Finally Kirby notes that lawyers and law
makers spend time crafting words to come to terms with the law and by the
time this is completed the technology has changed requiring new words.
In addition to these problems a new range of *technosocial* influences are
emerging which will affect the world in which we live and the international
law that maintains our world. Some of
these issues are considered later.
7 Specific Problems - Identity Cards, Numbers and the Problem of Data Matching
The English jurist and philosopher Jeremy Bentham developed the idea of a
*panopticon*, an innovation for the easy and efficient exercise of power
by those in authority to solve the problem of surveillance whereby each
individual, knowing that he is under observation, 'will end by
interiorising to the point that he is his own overseer, each individual
thus exercising this surveillance against himself'. A superb formula: power exercised continuously and for what
turns out to be a minimal cost[58].
Ware[59] believes that the Australia Card if actuated will result
in such an omnipresent method of control.
This panopticon idea can further be extended to the Tax File
Number. 'Big Brother' in Orwell's
account did not actually exist it was just the perception created in the
minds of the individuals as a result of the propaganda of the state in
order to maintain this same form of Benthamist internalised control. The TFN in Australia could serve the same
function.
7.1 The Australia Card
The Australia Card ID system was abandoned in 1987 by the Federal Government
principally because of the opposition it drew from a wide section of the
Australian community. The original
function of the card was to replace existing government ID systems and to
provide the Australian Taxation Office with access to a wider range of
information in respect of income sources.[60]
7.2 The Tax File Number
Following the demise of the Australia Card the Federal Government in 1988
introduced the Tax File Number (TFN) system which although designed for
the purpose of stopping tax evasion[61] has already been extended
widely. Within 2 years despite the
Government's statements at the time the system has been extended to
Austudy, obtaining unemployment or sickness benefits and other social
security.
7.3 Law Enforcement Access Network (LEAN)
This database gives law enforcement agencies, the ATO and the department
of defence, and DEET 'centralised access' to the records of the Australian
Security Commission and the land data systems in the States and
Territories[62]. The government maintains
that the information used is already publicly available however people
concerned with privacy issues say that it is not the availability that is
the problem, it is the combining of individual publicly available files or data
matching that is the concern[63] (The TFN providing the perfect search
key.). This will result in the ability
of agencies with a law enforcement function to 'fish' around without any
suspicion of wrongdoing. It has
been suggested that further linkages will occur into databases containing
electoral roll information and motor vehicle registration. A particular concern about LEAN is that may
not be subject to the *Privacy Act 1988* (Cth) Information Principles
because it does not process or generate records within the meaning of the Information
Principles[64] and is hence outside of the scope of the International Law
on this.
7.4 The Problem of Data Matching
The danger with extensive use of identification numbers is that enormous
amounts of personal data gained via countless harmless transactions and
activities can be permanently stored and correlated with information held
in other data bases.[65] It is not
difficult to see the potential this information would create for more
manipulative efforts by a new breed of government and marketing
researchers.
Nolan[66] suggests that the principle of an ID system by its very nature
is designed not merely to facilitate the positive identification of data
subjects within an administrative structure, but to assist in the linkage
of files relating to individual subjects outside that structure.
Nolan also points out that it is a fundamental principle of privacy that
data gathered for one purpose ought not be used for another without the
consent of the data subject.[67] The
concept of a national identification system offends this principle as it
allows government agencies without the consent to access information given
to other organisations or departments for specific purposes (eg credit information
supplied to banks for loan purposes.
See Appendix C for a consideration of this).
In the US the Social Security Number has been used by Federal agencies and
State authorities since 1961 as the search key in more than 500 computer
matching programs.[68] The main problems with the ability to link
data files in this way are identified as being:
* Because information is taken from different sources information can be
taken out of its original context when combined.
* Historical records can be obtained which may not be representative of the
current situation and may include a lifetime of information such as prior
traffic offences, credit difficulties in the past and health problems,
which may not reflect on the current situation at all. Also the early information may be
incorrect and the individual may not even be aware of this.
* The individual will be forced to always defend any and all legal actions
against them whether they can afford to or not because of the concern that
they will be recorded and the record will persist. For instance a long record of parking fines may indicate
unreliability and may affect employment prospects so by defending all, the
defence will be recorded.
* The Black Economy is likely to expand to avoid transactions being recorded
so that the Tax authorities cannot get to all activities. In Sweden where a Personal
Identification Number has been used since 1947, it is not uncommon for
medical treatment or legal advice being exchanged for house painting or plumbing. Bartering for goods is common also.[69]
* Issuance of ID cards will be dependent upon the production of a birth certificate
or drivers licence. Both of which may
be forged with ease or obtained unlawfully. In some states birth certificates do not indicate whether
the subject has in fact died, making it simple to obtain the birth
certificate of a deceased person.
The width of the problem can be seen by the fact that the Australian Law
Reform Commission has likened data matching to a "modern version of the
general warrant".[70] Whilst the
Privacy Commissioner, Kevin O'Connor,[71] calls it the "privacy
equivalent of drift-net fishing".
The Privacy Commissioner released a survey[72] of the five key Commonwealth
agencies (Tax, Social Security, Veterans Affairs, Education and
Immigration), which identified 24 different matching programs between
those 5 agencies and other agencies (including the electoral office,
Health Insurance commission and State Registrar Generals Offices) and
organisations (employers, insurers, universities etc). Data matching between most agencies is
illegal unless it comes within one of the exceptions to Information
Privacy Principle 11 of the *Privacy Act* 1988 (Cth). The tenuous legal basis of some of the existing
matching schemes is hinted at by the Commissioner when he says:
"...many of the programs have originated in response to administrative demands
or as cost saving measures rather than as a use of personal information
specifically authorised by law."
More recently to overcome this, the Federal Parliament enacted the *Data
Matching Progam (Assistance and Tax) Act* 1990 (Cth), which establishes
and controls one new data matching scheme.
This act when combined with the *Taxation Laws Amendment (Tax File
Numbers) Act* 1988 has been described as being the "Australia Card by
the back door", with the essential purpose of getting around the
Information Privacy Principles contained in the *Privacy Act 1988*[73]
The main problem identified with this matching is that under ss. 10 and 11
of the DMP(A&T)A the organisations matching can reverse the onus of proof
onto the individual that provides incorrect or out of date information to
one agency and when it doesn't match
with the searching agencies records, they are asked to "show
cause" why action should not be taken against them.[74]
8. Recent Social and Economic Developments Affecting Privacy 8.2 Privacy
in the Modern Workplace
The privacy pressures that technology places on individuals and groups within
the modern work environment are significant to say the least. With each
day new technologies are being developed that further decay the fabric of
what individuals once cherished as private.
Recent technologies of this kind include Telepresence, Electronic
Mail (E-mail) and Collaborative Computing (for a discussion of the dangers of
these see Appendix B). But of
particular concern is employee monitoring which I consider below.
8.2 Employee Monitoring
At the Pacific Southwest Airlines office in California, the central computer
records exactly how long each of the 400 reservation clerks spends on
every call and how long they take to pick up their next call. Workers
earn negative points if they spend more than the regulation 109 seconds on
each call, or if they spend more than 12 minutes a day going to the rest
room outside of lunch and coffee breaks.
If employees accrue more than 37 points over the year they can be
dismissed[75]. Big Brothers' Ministry of Truth without the telescreen.
According to a report tabled to the US Congress between 25 and 30 percent
of clerical employees in the US (or around 6 million people) are now under
surveillance. Forester[76] suggests
that apart from service workers computer monitoring is also spreading to
salespeople, nurses, hotel workers and even professionals like stock
brokers and lawyers. Monitoring
can take the form of 'silent monitoring' of phone calls and actual
counting of keystrokes performed by word processor operators or data-entry
clerks.
Arguments put forward in support of monitoring include:
* it can be useful for coaching new employees who deal with the public.
* it can provide clear and accurate performance measures.
* it enables the right people to be promoted.
* it helps to reduce employee theft, industrial espionage and acts of sabotage
which are more costly with the growing sophistication of manufacturing and
office systems.
Critics argue that monitoring represents an intolerable invasion of privacy
and a blatant disregard of human rights.
It undermines trust, reduces autonomy and generally turns workers
into 'battery hens'. They maintain
that the practice itself causes stress and ill-health. A recent University of Wisconsin
study[77] of 762 telephone operators found monitored employees were more
likely to suffer from headaches, back pain, fatigue, anxiety, stiff
shoulders and sore wrists.
Additionally monitoring is actually counter-productive because employee morale
declines, and with it productivity.
Further, work not measured is not considered important and is
neglected by monitored employees hence the quality of work actually falls
in preference to a higher quantity.[78]
Gary Marx, professor of sociology at Melbourne Institute of Technology whilst
not suggesting employee monitoring should be banned has proposed a code of
ethics merely to ensure accuracy of information and relevance of
information to the job.[79]
8.3 The Knowledge Value Revolution Japanese philosopher and
economist Taichi Sakaiya[80] has theorised that the world has reached the
end of the Industrial Revolution[81] and has almost passed through the
Information Revolution to emerge in what he terms the Knowledge Value
Revolution[82]. This last step requires the
transition from the Information Economy to the Knowledge Economy, where
the Information Economy is the shift in the composition of goods traded,
from matter to information. Already so
called 'financial trading' exceeds the trading in actual commodities by 26
to 1. The Knowledge Economy as he
sees it requires a further extension of this where information is seen as
the commodity itself and can be combined into products as a new form of
value added. He likens the high fashion industry's
ability to price its goods way beyond their actual component value by way
of their individualism or distinctiveness.
So too goods and services will be able to attract a higher market
price by incorporating greater knowledge value. This new phase in history revolves around the idea that man
now seeks the most individualistic and purpose built products and
services, hence a restructuring in the way global business is carried out
will be required in order to satisfy the world economy's needs. The problem arising from this new use of information
will be that privacy will be further exposed to attack in preference to
satisfying global economic needs. The
individual may be sold out by world governments in preference to maintaining
the free flow of information in the Knowledge Economy. Already the International Law's attempt
to adequately control transborder data flows has proved unsuccessful, in
order to protect individual privacy in this new age is going to require a
very concentrated effort worldwide with International Law making bodies at
the lead of such an enterprise.
8.4 Electronic Frontier Foundation
An organisation formed in 1990 in the United States[83] devoted to the use
of technology for the good of mankind, they are concerned specifically
with the preservation of individual rights on the Electronic Frontier[84],
they hope to extend "...society's highest traditions of the free and
open flow of information and communication". They hold the idea that
the networks are themselves the frontier of a new global free land and
hence should be free for all users or 'citizens' within this new
realm. Such NGO's may prove essential
as a means of checking on and lobbying international governments and
bodies as has occurred in the environmental protection movement.[85]
8.5 Global Electronic Democracy (GED)
There has been growing suggestion[86] that with the advent of the merging
of computer and communications technologies and the falling prices of such
technology the new West and eventually the Third World nations will opt
for the cost effective method of government by computer network. This idea is already feasible and has been
tested on a small scale in towns in both France and the US where homes
were provided with telephones that combined video, telephone and computer technology
so that the user could vote or take part in a referendum on their personal
telephone in the comfort of their own home on a daily basis. If applied on a countrywide basis or global
basis the Ancient Greek ideal of pure democracy will have been reached
after more than 2000 years since it was suggested.
The problems that the GED may pose to individual privacy are unimaginable
- perhaps this will be the full blown version of the Telescreen and Big
Brother envisioned by Orwell. On the
other hand, the globalisation of the system with the users providing their
own checks and balances will be enough to ensure a degree of electronic privacy.
Additional concerns arising are, that under such a regime the Separation
of Powers Doctrine may die off with a merging of the three functions of
power falling into the hands of all individuals carrying out all of the
functions of legislature, executive and judiciary. The Rule of Law itself may even be affected with such a
major upheaval of known legal and legislative structures.
9. Conclusion
Professor Cowen often concluded his lectures "The Private Man"[88]
with the comment that "we cannot assume that privacy will survive
simply because man has a psychological or social need for it". Now, more than ever, this is the
case. Without realising it, each day we
interact with humanity we are being in some way recorded. This recording is leading to the
expansion of the files on each person and is hence eroding our privacy and
exposing our private lives to others, we have no choice in this. The choice that we do have however, is to
control how much is recorded and to a lesser extent how the information is used. Similarly it cannot be assumed that domestic
law such as Australia's *Privacy Act 1988* (Cth) will be adequate to
maintain any degree of privacy for individuals. Whilst International Law may provide only limited hope of
placing some restrictions on the growth of data matching across
international networks.
In essence this paper amounts to a warning to all that the omnipresent Ministry
of Truth is watching and taking note of individuals with every transaction
and interaction with modern civilisation that they make. The individuals
should be educated to the dangers of this and be held responsible in part
for the information they provide.
Privacy starts with the individual, what the individual does not
want going outside into the public sphere should not be distributed by
them unless absolutely necessary, they should be careful that the
information they provide is correct, up to date, and when providing
information to private organisations to confirm that the information is
not going to be made available to other private or public agencies or be
open to access indirectly by such groups.
Flaherty[89] suggests that the best protection against abuse of data use
comes from both stopping the collection of data and requiring its destruction
after it has been used. Data that has
never been collected, or which is reliably destroyed is unlikely to be
used to invade privacy down the road.
Data that is kept secret only by legislation is far less secure.
In conclusion the international (and domestic) legal communities are, I submit,
limited in what they can do with respect to law making. Justice Kirby[90]
the chair of the OECD Expert Group recognises the inability of law making
bodies to keep pace with developments in technology (This does not of
course mean that they should give up without trying). However, such bodies may better serve
humanity by:
1) actively participating in this education program of alerting individuals
to the dangers to their own privacy and instructing them on how to better
interact with the burgeoning data collection systems of the modern world
and;
2) by focusing their efforts on looking at the social impact of technology,
and trying to forecast the direction technology is taking in shaping the
social environment of tomorrow, rather than making laws or rules to
control the use or misuse of the actual technology as and when it becomes
available.
Finally, whilst in Australia always remember: Your Tax File Number is Watching
You!
Appendix A
OECD Council of Ministers Guidelines - for the Protection of Individuals
with Regard to Automatic Processing of Personal Data:
[Extracted from Lawson, *Encyclopaedia of Human Rights* p 1230]
As a result of the concern of the sub-commission a request was made to the
chairman to designate one of its members to undertake a study of guidelines
to be adopted in this area. Mrs Nicole
Questiaux (France) was designated for the task on the understanding that
it would be carried out by her alternate, Mr Louis Joinet. Mr Joinet who in the meantime replaced
Mrs Questiaux as a member of the sub-commission, submitted an interim
report in 1981 and the final report.[91]
In the report, Mr Joinet noted that, as early as 1966, the Nordic Council,
a regional Organization comprising the Scandinavian countries had become
an effective organ for cooperation among the national bodies responsible
for the supervision of data files.
Further he noted that the council of Europe and the Organization
for Economic Cooperation and Development (OECD) had proposed for adoption
by their member states- in the form of resolutions, recommendations, and
even a convention - minimum rules, commonly known as the "hard
core", which governments should take into account in the rules they were
drafting. In particular, the
Council of Europe's Council of Ministers adopted, on 28 January 1981, the
European Convention for the Protection of Individuals with Regard to
Automatic Processing of Personal Data, and the OECD Council of Ministers adopted,
on 23 September 1980, a recommendation concerning guidelines on the
protection of privacy and transborder flows of personal data, and the OECD
Council of Ministers adopted, on 23 September 1980, a recommendation
concerning guidelines on the protection of privacy and transborder flows
of personal data. On the basis of
these precedents and other materials available to him, Mr Joinet concluded
his study with two main proposals, the first relating to the promotion of
human rights in domestic law (para 136-148) and the second relating to the
files of international organisations and agencies (para 149-152) as
follows:
A The Promotion of Human Rights in
Domestic Law:
In order, firstly to encourage States to promote protective regulations in
their legislation, and secondly, to avoid excessive discrepancies between
one legislation and another, guidelines should be proposed for adoption by
the competent United Nations bodies, possibly in the form of a
recommendation, which might be along the following lines:
States should take steps to give effect to the following basic principles
in their domestic legislation:
1) Principle of Fairness: information about persons should not be collected
or processed in unfair or unlawful ways.
2) Principle of Accuracy: persons
responsible for data files should be obliged to check the accuracy of the
data recorded and to ensure that they are kept up to date.
3) Principle of Purpose Specification:
the main purpose which a file is to serve should be known before it
is established in order to make it possible subsequently to check whether:
(a) the personal data collected and recorded are relevant to the purpose
to be served; (b) the personal data are not used for purposes other than
those for which the file was intended; and (c) the period for which the
personal data are kept does not exceed that which would enable the
objective for which they were recorded to be achieved.
4) Principle of Openness: measures
should be taken to ensure that any person may be in a position to know of
the existence of a personal data file.
5) Principle of Individual Access: any
person irrespective of nationality or place of residence, should have the
right: (1) to know whether
information concerning him is being processed; (2) if the need arises, to
have such information communicated to him in an intelligible form, without
excessive delay or expense; (3) to have appropriate rectification or
erasures made in the case of erroneous, unlawful or inaccurate entries.
6) Principle of Security: appropriate
measures should be taken to ensure the essential security of data files
and of access to restricted information. Departures from the application of one or other of these
principles might be admitted in regulations concerning security files
(police, defence, courts, intelligence) medical records, scientific and statistical
data, and press files, provided that the limits of the exceptions were
specified and they were embodied in laws or special regulations
promulgated in accordance with the juridical system of each State.
Information on racial origin, sexual proclivities, political opinions, religious
or philosophical convictions, or trade-union membership should not be
recorded. Departures from these
prohibitions should not be authorised except by law and should be subject
to more rigorous safeguards.
A Supervisory body should be established with adequate guarantees of impartiality
both for the purpose of advising the persons affected by these new
legislative measures and in order to ensure that the above principles are
complied with.
The above principles and rules should at the very least, be applied to public
or private computerised files containing data relating to natural persons.
Particular provision might be made to extend the application of these provisions
to manual data systems.
B. The Files of International
Organisations and Agencies.
The international organisations and agencies using computerised personnel
files should be recommended to take appropriate protective measures unless
they accept local jurisdiction where such exists.
The internal statutes and rules of international organisations and agencies
should make provision, as concerns their own files, for the application of
the aforementioned principles of fairness, accuracy, purpose
specification, openness, individual access and security.
A supervisory authority, either of a collegiate or "ombudsman" type, set
up under a procedure offering adequate guarantees of impartiality, should
be appointed within each Organization or agency.
Its task would be to advise those responsible for the operation of data files
and to ensure effective enforcement of internal regulations.
Mr Joinet recommended that the sub-commission prepare a resolution embodying
in some appropriate way the twofold proposal above, for the submission to
the Commission on Human Rights. At the
same time, he suggested that, as an immediate step, as far as United
Nations computerised files are concerned, one member, one member of the sub-commission
should be appointed to study draft internal regulations with the
assistance of the Secretariat.
*Guidelines concerning Computerised Personal Data Files*
In the Study of the Relevant Guidelines in the Field of Computerised Personnel
Files[92] prepared for the Sub-Commission on Prevention of Discrimination
and Protection of Minorities by its special rapporteur, Mr Louis Joinet
(France), the author elaborated a series of provisional draft guidelines
on the use of such files with a view to encouraging States to adopt the
regulations necessary to ensure the right to privacy.
At the request of the sub-commission, the Secretary-General transmitted the
provisional draft guidelines to member states and interested international
organisations with a request that they submit their comments. The guidelines were revised in the light of
the comments received and presented to the sub-commission at its 1988
session.[93]
On 1 September 1988, the sub-commission, expressing its satisfaction with
the revised draft guidelines, forwarded them through the commission on
Human Rights and the Economic and Social Council to the General Assembly
with a recommendation for their adoption.[94]
The assembly after examining them, invited the special rapporteur
to submit to the commission, at its 1990 session a revised version[95]
taking into account the comments and suggestions submitted by the eight governments. The special rapporteur accordingly submitted
a revised text of the "Guidelines concerning computerised Personal
Data Files", reproduced below, to the commission at its 1990
session[96]:
The procedures for implementing regulations concerning computerised personal
data files are left to the initiative of each State subject to the
following orientations:
A. Principles concerning the Minimum
Guarantees that Should Be Provided in National Legislations
1) Principle of Lawfulness and Fairness.
Information about persons should not be collected or processed in
unfair or unlawful ways, nor should it be used for ends contrary to the
purposes and principles of the charter of the United Nations.
2) Principle of Accuracy. Persons
responsible for the compilation of files or those responsible for keeping
them have an obligation to conduct regular checks on the accuracy and
relevance of the data recorded and to ensure that they are kept up to date
regularly or when the information contained in a file is used, as long as
they are being processed.
3) Principle of the Purpose Specification.
The purpose which a file is to serve and its utilisation in terms
of that purpose should be specified, legitimate and when it is
established, receive a certain amount of publicity or be brought to the
attention of the person concerned, in order to make it possible
subsequently to ensure that:
(a) all the personal data collected and recorded remain relevant and adequate
to the purposes to be specified; (b) none of the said personal data is
used or disclosed, except with the consent of the person concerned, for
purposes incompatible with those specified; (c) the period for which
the personal data are kept does not exceed that which would enable the
achievement of the purpose so specified.
4) Principle of Interested Person Access.
Everyone who offers proof of identity has the right to know whether
information concerning him is being processed and to obtain it in an
intelligible form, without undue delay or expense, and to have the
appropriate rectifications or erasures made in the case of unlawful,
unnecessary or inaccurate entries, and when it is being communicated, to
be informed of the addresses.
Provision should be made for a remedy, if need be with the supervisory
authority specified in principle 8 below.
The cost of any rectification shall be borne by the person
responsible for the file. It is desirable that the provisions of this
principle should apply to everyone, irrespective of nationality or place
of residence.
5) Principle of Non-Discrimination.
Subject to cases of exceptions restrictively envisaged under
principle 6, data likely to give rise to unlawful or arbitrary
discrimination, including information on racial or ethnic origin, colour,
sex life, political opinions, religious, philosophical or other beliefs as
well as membership of an association or trade union, should not be
compiled.
6) Power to Make Exceptions. Departures
from principles 1 to 4 may be authorised only if they are necessary to
protect national security, public order, public order, public health or
morality, as well as inter alia, the rights and freedoms of others,
especially persons being persecuted (humanitarian clause) provided that
such departures are expressly states their limits and sets forth
appropriate safeguards.
7) Exceptions to principle 5 relating to the prohibition of discrimination,
in addition to being subject to the same safeguards as those prescribed
for exceptions to principles 1 and 4, may be authorised only within the
limits prescribed by the International bill of Human Rights and the other
relevant instruments in the field of protection of human rights and the
prevention of discrimination.
8) Principle of Security. Appropriate
measures should be taken to protect the files against both natural
dangers, such as accidental loss or destruction and human dangers, such as
an unauthorised access, fraudulent misuse of data or contamination by
computer viruses.
9) Supervision and Sanctions. The laws
of every country shall designate the authority which, in accordance with
its domestic legal system, is to be responsible for supervising observance
of the principles set forth above.
This authority shall offer guarantees of impartiality, independence
vis-a-vis persons or agencies responsible for processing and establishing
data, and technical competence. In the event
of violation of the provisions of the national law implementing the
aforementioned principles, criminal or other penalties should be envisaged
together with the appropriate individual remedies.
10) Transborder Data Flows. When the
legislation of two or more countries concerned by a transborder data flow
offers comparable safeguards for the protection of privacy demands.
11) Field of Application. The present
principles should be made applicable; in the first instance, to all public
and private computerised files as well as, by means of optional extension
and subject to appropriate adjustments, to manual files. Special provision, also optional, might
be made to extend all or part of the principles to files on legal persons
particularly when they contain some information on individuals.
Application of the Guidelines to Personal Data Files Kept by Governmental
International Organisations
The present guidelines should apply to personal data files kept by governmental
international organisations, subject to any adjustments required to take
account of any differences that might exist between files for internal
purposes such as those that concern personnel management and files for
external purposes concerning third parties having relations with the
Organization. Each Organization should designate the authority statutorily
competent to supervise the observance of these guidelines.
Humanitarian clause: a derogation from
these principles may be specifically provided for when the purpose of the
file is the protection of human rights and fundamental freedoms of the
individual concerned or humanitarian assistance.
A similar derogation should be provided in national legalisation for governmental
international organisations whose headquarters agreement does not preclude
the implementation of the said national legislation as well as for non-governmental
international organisations to which this law as applicable.
Appendix B
Privacy in the Modern Workplace
Electronic Mail
Electronic Mail or E-mail has been around for about 15 years. However, the idea of sending personal
messages and not so personal messages through a computer with the vain
hope that they will show up on the intended parties screen or E-mailbox
has met with mixed success until now.
The use of E-mail has now exploded, business organisations and governments
now happily use such systems internally to send memos quickly and cheaply
and this year AT&T is releasing its own E-mail system for all
telephone users in the US called MagicMail .
The threats to privacy arising from such technology have already
been legislated for in the US in the *Electronic Communications Privacy
Act 1986* however the experience so far in the US has been that the act
has proved totally inadequate and certain Bulletin Board Services (BBS's) have
been shut down, the equipment used to run such services including all
personal electronic files and messages contained on the storage devices
confiscated by the US Secret Service all without any indictments for any
illegal activity.[97] Arguably,
protection may exist in another form, that of Intellectual Property Law
where the idea that the information placed into or onto a network in the
form of a message is the intellectual property of the author of that work.
Collaborative Computing
Collaborative computing and groupware is the concept that individual employees
in organisations can participate in group projects across networks, the
technology for this is already widely available and poses privacy threats
to individuals the group and the organisation that the group is a part
of. Such privacy threats arise because
of the problems of the human users.
Some users may be careful in maintaining system integrity, and
hence the confidential information contained on the network, whilst others
will show blatant disregard for such security, exposing themselves, and
their fellow workers to breaches of individual privacy and their employers
to breaches of commercial privacy and even industrial espionage.
Telepresence
Telepresence[98] a combination of the much talked about Virtual Reality and
the ordinary telephone based computer network.
People around the world will be able to 'virtually' participate in
activities such as architects simultaneously walking Japanese and
Australian joint venture clients through building designs that they can
'see and feel' when all of the parties involved are on different
continents.[99] This technology as
it becomes readily available is predicted as being a new, faster and more
purpose oriented method of accessing databases as the user will be able to
'see' more effectively the information that they seek and 'reach out and
grab it'. The privacy issues raised by
this technology are unknown.
However, it would be safe to suggest that such technology can only
act to further reduce control of individual privacy, and hence will
require careful consideration by international legislators.
Appendix C
Credit Reporting in Australia
The *Privacy Act 1988* (Cth) Pt IIIA - Credit Reporting (ss 18c-18v) deal
specifically with the reporting of credit information pertaining to
individuals and to commercial credit transactions. This part of the legislation is perhaps the most privacy
oriented legislation to be introduced into Australia as it places a
restriction on credit providers not to provide credit standing information
to anyone without the consent of the individual concerned and a breach can
result in a fine of up to $15000.[100]
Additionally, information described as "positive
reporting", that is, the reporting of all credit transactions other
than just defaults, is banned. Hence
the provisions have come under criticism by the Credit Reference
Association of Australia as being the most restrictive credit reference
laws in the Western World.[101]
However as Greenleaf[102] points out this is not necessarily true
as the act itself fails to cover "publicly available information"
so that any private organisation can disseminate information about matters
such as default judgements or bankruptcy without providing even the most
basic of privacy rights such as access and correction.
Bibliography:
Articles
BARRY J. V. , An End to Privacy, 1959-60 2 Melbourne University Law Review 443-453
BAYNE, Peter. Freedom of information
and access for privacy purposes. AUSTRALIAN LAW JOURNAL 64 (3) March 1990
: 142-146
BENN, S., The Protection and Limitation of Privacy, 1978 52 ALJ 601
BIG brother information fears. LAW
INSTITUTE JOURNAL 66 (4) April 1992 : 250
BURKERT, Herbert., Public Sector Information:
Towards a More Comprehensive Approach in Information Law?, 1992 v3
n1 Journal of Law and Information Science 47-62.
COLE K., Opinion - 'Just Tell Me Your Name, Bank and Tax File Number', 1992
17 Alternative L. J. 52 at 70.
DANCER Helen, Interview with Taichi Sakaiya, Jan 1993 Australian Personal Computer
129-134 at 130.
European Current Law
- generally.
FLAHERTY D., CFP-2: International privacy law a mixed bag, extract from speech
at the second conference on Computers, Freedom and Privacy, Newsbytes
March 27 1992, Ref # A12002694.
FORESTER, Spying on Employees, Australian and New Zealand PC User, Sept 1993,
p106.
GAVISON Ruth, Privacy and the Limits of the Law, Jan 1980 v89 n3 Yale Law Journal
421-471.
GRAINGER, Chris. The long arm of
privacy law : new procedures for credit providers. LAW SOCIETY JOURNAL 30 (3) April 1992 :
54-56
GREENLEAF, Graham. 'The most
restrictive credit reference laws in the Western World'? AUSTRALIAN LAW JOURNAL 66 (10) October 1992
: 672-674
GREENLEAF, Graham. Can the data
matching epidemic be controlled? AUSTRALIAN LAW JOURNAL 65 (4) April 1991
: 220-223
GREENLEAF, Graham. No confidence in the
Commonwealth privacy bill. AUSTRALIAN LAW JOURNAL 62 (1) January 1988 :
78-81
GREENLEAF, Graham. The Privacy Act 1988
: half a loaf and other matters. AUSTRALIAN LAW JOURNAL 63 (3) March 1989
: 116-118
HUGHES, Gordon. The regulation of
database privacy. AUSTRALIAN ACCOUNTANT
57 (6) July 1987 : 32-36
HUGHES, Gordon. Data protection at
common law. LAW INSTITUTE JOURNAL 62 (10)
October 1988 : 971-973
HUGHES, Gordon. An overview of data
protection in Australia. MELBOURNE UNIVERSITY
LAW REVIEW 18 (1) June 1991 : 83-120
HUGHES, Gordon, (ed.) The Development
of Personal Data Protection Laws in Australia, essay in Essays on Computer
Law, Longman Professional, Melbourne 1990.
International legal
protection of privacy
and controls over transnational data flow.
AUSTRALIAN LAW JOURNAL 55 (3) March 1981: 163-165
KAPOR M and BARLOW J P, Free Speech and Privacy Online, Real Time Conference
- General Electric Network for Information Interchange (GEnie) 1991,
compiled in v3 n3.18 Computer Underground Digest May 28 1991
KIRBY, Michael., The Computer, the Individual and the Law, 1981 55 ALJ 443-457
KIRBY, Michael. Informatics,
transborder data flows and law - the new challenges. NEW ZEALAND LAW JOURNAL November 1988 :
381-388
KIRBY, M. D. Information security: OECD
initiatives. Journal of Law and Information
Science, v.3, no.1 1992
KIRBY, M. D. Legal aspects of
informatics and transborder data flows. In: Essays on Computer Law
(1990): (197)-214
KIRBY, Michael. Legal aspects of transborder
data flows. INTERNATIONAL COMPUTER
LAW ADVISER 5 (5) February 1991 : 4-10
MITCHELL D., Being here and there, April 1993 Australian Personal Computer 186.
NOLAN , ID Cards Who Needs Them?, 1985
Legal Service Bulletin 165. O'CONNOR, Kevin. Information privacy : an overview. AUSTRALIAN DIRECTOR May-June 1989 :
33-36
O'CONNOR, Kevin. Information privacy :
explicit civil remedies provided. LAW SOCIETY JOURNAL 28 (2) March 1990 :
38-41
PEARSE, Ray. The Privacy Act - its
impact on credit reporting practice. AUSTRALIAN BANKER 106 (3) June 1992
: 153-156
Section Action Administrative Law, Parliament told of network privacy concerns,
Mar 1993 v67 n3 Law Institute Journal 170.
Section Action Administrative Law, Big Brother Information Fears, 1992 v66 n4
Law Institute Journal 250.
STOLJAR S., A Re-Examination of Privacy,
Legal Studies 67.
STOREY, Infringement of Privacy and its Remedies, 1973 47 ALJ 498
TAPPER, Colin, New European Directions in Data Protection, 1992 v3 n1 Journal
of Law and Information Science, 7-24.
TUCKER, G., Frontiers of Information Privacy in Australia, (1992) Journal of Law and Information
Science 63
TUCKER, Greg and Michael GRONOW. Is big
brother watching? - the proposed Law Enforcement Access Network. LAW INSTITUTE JOURNAL 66 (11) November 1992
: 993-994
TUCKER, Greg Restrictions on the transborder flows of personal data. Australian
Law Journal, v.65, no.9, Sept 1991 : 560-562
TUCKER, Greg., Frontiers of Information Privacy in Australia, 1992 v3 n1 Journal
of Law and Information Science 63-81.
TUCKER, Greg Privacy protection and
transborder data flows: international legal notes. Australian Law Journal, v.65, no.6, June
1991 : 354-356
TUCKER, Greg. Privacy protection and
transborder data flows. AUSTRALIAN LAW
JOURNAL 65 (6) June 1991 : 354-356
TUCKER, Greg. Restrictions on the
transborder flows of personal data. AUSTRALIAN LAW JOURNAL 65 (9)
September 1991 : 560-562
WACKS, R.., The Poverty of Privacy, Jan 1980, 96 Law Quarterly Review 73-89
at 87-8.
WARE D, Bentham's Panopticon Downunder, The Australia Card Program, October
1986 Legal Service Bulletin 198.
WARREN and BRANDEIS, The Right to Privacy, 1890 5 Harvard. L. Rev 193.
YANG T.L., Privacy: A Comparative Study
of English and American Law, Jan 1966 15 International and Comparative Law
Quarterly, 175-198
Texts/Reference
Books:
HUGHES, Gordon, Data Protection in Australia, Law Book Company, NSW 1991.
LAWSON E., Encyclopaedia of Human Rights, Taylor & Francis, 1989, UK and USA,
at p 1230.
POULLET Y., Privacy Protection and Transborder Data Flow; Recent Legal Issues, article in Advanced Topics of Law and
Information Technology, Kluwer Law and Taxation Publishers, Deventer
Netherlands, 1989.
REED, Chris (ed.), (WALDEN, Ian and Chris EDWARDS, Chapter 10: Data Protection),
Computer Law, Blackstone Press, London 1990.
ROSTOKER, Michael and Robert RINES, Computer Jurisprudence: Legal Responses
to the Information Revolution, Oceana Publications Inc, New York, 1986.
SAKAIYA T, The Knowledge Value Revolution, Kodansha 1991.
TAPPER Colin, Computer Law, 4th ed. Longman, London 1989.
TUCKER Greg, Information Privacy Law in Australia
Notes:
[1] Gordon Hughes, Preface to *Data Protection in Australia*, Law Book Company, NSW 1991.
[2] Storey at 501.
[3] esp Wacks R., *The Poverty of Privacy*, Jan 1980, 96 Law Quarterly Review 73-89 at 87-8.
[4] Accepting the monist approach of International Law.
[5] Benn S., *The Protection and Limitation of Privacy*, (1978) 52 ALJ 601.
[6] Cooley, *Torts*, 2nd Ed, p1888 cited in Storey at 499.
[7] The Hon H Storey, M.L.C., *Infringement of Privacy and it's Remedies*, 47 ALJ 498.
[8] This recognition of an individuals interaction with the community is shown in the Australian Law Reform Commissions report which has emphasized the extent to which information about citizens is required by the Commonwealth: For most Australians, the process of recording their life histories begins with the opening prior to birth of a health record and is and is continued throughout their lives ... The typical Australian will most probably become the subject of an extensive education record, employment record, taxation record, banking record, insurance record and credit record. (ALRC Privacy Report 22 (1983)) In addition, most people will be the subject of information stored in public records and registries (for example, marriage, property ownership and litigation records) and indirectly statistical data. (ALRC 12 (1979) "Privacy and the Census" para 10 and in 14: "the fact that a collection of information is for statistical purposes rather than administrative ones is not itself a gaurantee that privacy interests will be adequately protected")
[9] *Privacy and the Law, A Report by Justice (The British Section of the International Commission of Jurists)* 1970, p5 cited in Storey at 499.
[10] (1890) 5 Harvard L. Rev. 193.
[11] Westin, *Privacy and Freedom*, (1967) cited in Storey at 499.
[12] Lusky, "Invasion of Privacy: a clarification of concepts", 87 Pol. Sc. Q. 192 at 195 cited in Storey at 499.
[13] Miller, The Assault on Privacy (1971), p25 cited in Storey at 499.
[14] Report on the Law of Privacy to the Standing Committee of Cth and State Attorneys - General No. 170/1973, p3. cited in Tucker G, *Frontiers of Information Privacy in Australia*, (1992) Journal of Law and Information Science 63.
[15] Tucker G, *Frontiers* p63.
[16] ALRC, Report on Privacy No. 22/1983, para 20.
[17] See Tucker at 64.
[18] Warren and Brandeis' prime concern in 1890.
[19] Now widely referred to as Data Protection, these terms will be used interchangeably.
[20] OECD *Guidelines on the Protection of Privacy and Transborder Data Flows of Personal Data*, Paris, 1980 para 1. Also: *Council of Europe Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data*, 108/1981, article 2.
[21] 46 Mich. 160, 9 N.W. 146 (1881) cited in Rostoker at 233.
[22] Note: they were referring to the collection of scenes and sounds, however these properties are open to recording along with all other forms of information on computer files.
[23] Tucker at 12. Information Privacy Law in Australia.
[24] Prosser W.L., "Privacy", 48 Cal.L.Rev. 383.
[25] Identified by Tucker at page 13.
[26] although arguably categories 1 and 2 overlap into this area.
[27] Tapper C., *Computer Law*, 4th ed., Longman, London 1989 at p 331.
[28] A good discussion of Privacy as a tort, or the equitable area of confidentiality of information can be found in: Warren and Brandeis, *The Right to Privacy*, 1890 5 Harvard. L. Rev 193.; Storey, *Infringement of Privacy and its Remedies*, 1973 47 ALJ 498,; T.L. Yang, *Privacy: AComparative Study of English and American Law*, Jan 1966 15 International and Comparitive Law Quarterly, 175-198; Stoljar S., *A Re-Examination of Privacy*, Legal Studies 67.; Benn S., *The Protection and Limitation of Privacy*, 1978 52 ALJ 601.; A good discussion of the social aspects of privacy as a right at law can be found in Gavison Ruth, *Privacy and the Limits of the Law*, Jan 1980 v89 n3 Yale Law Journal 421-471.; A consideration of the law of privacu with respect to telephone tapping and bugging can be found in Justice J. V. Barry, *An End to Privacy*, 1959-60 2 Melbourne University Law Review 443-453.
[29] E.S.C.O.R. 42nd Sess., Supp. 1 (1967) cited in Harris at 603.
[30] Article 12.
[31] per Article 8.
[32] *Universal Declaration of Human Rights*, *International Covenant on Civil and Political Rights* and the *American Convention on Human Rights*.
[33] *American Declaration of the Rights and Duties of Man* and *American Convention on Human Rights*.
[34] *International Covenant on Civil and Political Rights*.
[35] Article 17, which follows closely Article 12 of the Declaration.
[36] *European Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data*.
[37] Lawson E., *Encyclopaedia of Human Rights*, Taylor & Francis, 1989, UK and USA, at p 1230.
[38] UN Resolution 2450 [XXIII], cited in Lawson.
[39] UN Doc. E/CN.4/1142 and Corr. 1, and Add. 1 and 2., cited in Lawson.
[40] In 1977, after the Commission on Human Rights was able to consider the sub-commission's study, it called upon the sub- commission to examine this and other studies in the light of the provisions of the declaration and to submit its recommendations for further action (UN Resolution 10 B [XXXIII]), cited in Lawson.
[41] resolution 12 [XXXIII].
[42] Flaherty D., *CFP-2: International privacy law a mixed bag*, extract from speech at the second conference on Computers, Freedom and Privacy, Newsbytes March 27 1992, Ref # A12002694.
[43] see below with respect to the consideration of the emerging Knowledge Value Revolution.
[44] Flaherty at 2.
[45] *Nicaragua v USA* where the ICJ noted that states had entered into treaties containing the obligations of customary international law which in itself was evidence of that custom.
[46] *Nicaragua v USA*.
[47] (1890) 5 Harvard L. Rev. 193.
[48] France seems to be leading Europe in the recognition of Privacy as a Human Right: In *Ordre des Experts-Comptables et Comptables Agrees v X*. (C.A., Paris, May 31, 1991) [1992] Dalloz Jur. 253. cited in European Current Law, July 1992 at 66 - where France found that a person leaves himself open to criminal proceedings for breach of Act 78-17 on the keeping of information dossiers and the freedom of the individual when, without making the necessary declaration to the Civil Liberties Council, he compiles at his home computer records of personal information about individuals and companies with which he has contacts by way of business which concern in particular the employees of such contacts.
[49] (Cass., March 19, 1991) [1991] Dalloz 568, cited in European Current Law, Feb 1992 at 78.
[50] Flaherty David, lecturer in privacy University of Western Ontario Canada and author of *Protecting Privacy in Surveillance Societies*, U. of N. Carolina Press.
[51] (1992) 108 ALR 577.
[52] (1992) 108 ALR 681.
[53] these issues are often raised in parallel with privacy, however they are issues beyond the scope of this paper a good discussion can be found in:
[54] Tucker G., *Privacy Protection and the High Court*, Jan/Feb 1993, v67 n1&2 Law Institute Journal 69.
[55] Tucker G at 69.
[56] President of the New South Wales Court of Appeal.
[57] Kirby at 26.
[58] Gordon C.(ed.), *Power/Knowledge-Selected Interviews and Other Writings*, 1972-77 - Michel Foucault, cited in Ware at 198.
[59] Ware D, *Bentham's Panopticon Downunder, The Australia Card Program*, October 1986 Legal Service Bulletin 198.
[60] For a comprehensive look at the problems with the Australia Card see: Ware supra note 41; Nolan supra note 44.
[61] as in the Australia card.
[62] Section Action Administrative Law, Parliament told of network privacy concerns, Mar 1993 v67 n3 Law Institute Journal 170.
[63] Section Action Adminstrative Law, *Big Brother Information Fears*, 1992 v66 n4 Law Institute Journal 250.
[64] Cole K., *Opinion - 'Just Tell Me Your Name, Bank and Tax File Number'*, 1992 17 Alternative L. J. 52 at 70.
[65] Nolan at 166.
[66] Nolan ,* ID Cards Who Needs Them?*, 1985 Legal Service Bulletin 165.
[67] Nolan at 165.
[68] Nolan at 165.
[69] Nolan at 166.
[70] ALRC 22, 1983.
[71] of the time.
[72] *Data Matching in Commonwealth Administration* (1990) cited in Greenleaf at 220.
[73] per ss 5 and 6.
[74] Greenleaf G., *Information Technology and the Law - Can the Data Matching Epidemic be Controlled?*, 1991 65 ALJ 220 at 221.
[75] Forester, *Spying on Employees*, Australian and New Zealand PC User, Sept 1993, p106.
[76] Forester at p 106.
[77] Forester at p 106.
[78] Forester at 106.
[79] Forester at 106.
[80] recently translated to English, Sakaiya T, *The Knowledge Value Revolution*, Kodansha 1991.
[81] Sakaiya notes that socialism as originally theorised is based on the assumption that if a man has enough information and is in a situation where he can make clear-headed judgements, we can expect him to make objective rational choices as to what economic step will be the most advantageous. Karl Marx called this man 'Homo economicus'. Sakaiya points out that Marx also made the assumption that there is one single rational correct solution to every need, this one solution sufficing for every person. This concept fitted into the constraints and cost efficiencies of modern manufacturing and hence was the basis of the industrial society.
[82] Helen Dancer, *Interview with Taichi Sakaiya*, Jan 1993 Australian Personal Computer 129-134 at 130.
[83] Kapor M and Barlow J P, *Free Speech and Privacy Online*, Real Time Conference - General Electric Network for Information Interchange (GEnie) 1991, compiled in v3 n3.18 Computer Underground Digest May 28 1991.
[84] According to the EFF, electronic mail and computer conferencing enable us to build online communities, "the first settlements on an electronic frontier".
[85] most succesfully evidenced in Rio in 1992.
[86] Prof Hickling, *Reflections on the Monarchy*, Darwin Australia October 1993.
[87] discussed on 'Beyond 2000' (formally 'Towards 2000')during 1989.
[88] Cowen, *"The Private Man", the Boyer Lectures* 1969, cited in Storey at 515.
[89] Flaherty D., *CFP-2: International privacy law a mixed bag*, extract from speech at the second conference on Computers, Freedom and Privacy, Newsbytes March 27 1992, Ref # A12002694.
[90] Kirby at 26.
[91] (UN Doc. E/CN.4/Sub.2/1983/18) in 1983.
[92] UN Doc. E/CN.4/Sub.2/1983/18.
[93] UN Doc. E/CN.4/Sub.2/1988/22.
[94] Resolution 1988/29.
[95] Resolution 44/132.
[96] UN Dco.E/CN.4/1990/72.
[97] *Steve Jackson Games Case* and *Sun Devil Raids Case* discussed in Kapor M and Barlow J P.
[98] Mitchell D., *Being here and there*, April 1993 Australian Personal Computer 186.
[99] At present such technology starts at about AUD$131,000 per user however it is predicted that the technology will be commercially available at a mass market price by the end of 1994.
[100] s18N
[101] Greenleaf G., *Information Technology and the Law - The most restrictive credit reference laws in the Western World?*, Oct 1991 .
[102] Greenleaf G 66 ALJ 672 at 673.