Commonwealth of Australia Bills

[Index] [Search] [Download] [Related Items] [Help]


This is a Bill, not an Act. For current law, see the Acts databases.


CYBERCRIME LEGISLATION AMENDMENT BILL 2011

2010-2011
The Parliament of the
Commonwealth of Australia
HOUSE OF REPRESENTATIVES
Presented and read a first time
Cybercrime Legislation Amendment Bill
2011
No. , 2011
(Attorney-General)
A Bill for an Act to implement the Council of
Europe Convention on Cybercrime, and for other
purposes
i Cybercrime Legislation Amendment Bill 2011 No. , 2011
Contents
1 Short
title
...........................................................................................
1
2 Commencement
.................................................................................
1
3 Schedule(s)
........................................................................................
2
Schedule 1--Preservation regime for stored communications
4
Telecommunications Act 1997
4
Telecommunications (Interception and Access) Act 1979
4
Schedule 2--Amendments relating to Mutual Assistance
22
Part 1--Stored communications
22
Mutual Assistance in Criminal Matters Act 1987
22
Telecommunications (Interception and Access) Act 1979
23
Part 2--Telecommunications data
28
Mutual Assistance in Criminal Matters Act 1987
28
Telecommunications Act 1997
29
Telecommunications (Interception and Access) Act 1979
29
Part 3--Recovery of costs by carriage service providers etc.
for providing assistance to Australian law enforcement
authorities
39
Telecommunications Act 1997
39
Schedule 3--Computer offences amendments
40
Criminal Code Act 1995
40
Schedule 4--Telecommunications data confidentiality
42
Telecommunications (Interception and Access) Act 1979
42
Schedule 5--Miscellaneous
47
Telecommunications (Interception and Access) Act 1979
47
Cybercrime Legislation Amendment Bill 2011 No. , 2011 1
A Bill for an Act to implement the Council of
1
Europe Convention on Cybercrime, and for other
2
purposes
3
The Parliament of Australia enacts:
4
1 Short title
5
This Act may be cited as the Cybercrime Legislation Amendment
6
Act 2011.
7
2 Commencement
8
(1) Each provision of this Act specified in column 1 of the table
9
commences, or is taken to have commenced, in accordance with
10
column 2 of the table. Any other statement in column 2 has effect
11
according to its terms.
12
13
2 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Commencement information
Column 1
Column 2
Column 3
Provision(s)
Commencement
Date/Details
1. Sections 1 to 3
and anything in
this Act not
elsewhere covered
by this table
The day this Act receives the Royal Assent.
2. Schedules 1
and 2
The 28th day after this Act receives the
Royal Assent.
3. Schedule 3
The later of:
(a) the day this Act receives the Royal
Assent; and
(b) the day the Council of Europe
Convention on Cybercrime, done at
Budapest on 23 November 2001, comes
into force for Australia.
However, the provision(s) do not commence
at all if the event mentioned in paragraph (b)
does not occur within the period of 6 months
beginning on the day this Act receives the
Royal Assent.
The Minister must announce by notice in the
Gazette the day the Council of Europe
Convention on Cybercrime comes into force
for Australia.
4. Schedules 4
and 5
The 28th day after this Act receives the
Royal Assent.
Note:
This table relates only to the provisions of this Act as originally
1
enacted. It will not be amended to deal with any later amendments of
2
this Act.
3
(2) Any information in column 3 of the table is not part of this Act.
4
Information may be inserted in this column, or information in it
5
may be edited, in any published version of this Act.
6
3 Schedule(s)
7
Each Act that is specified in a Schedule to this Act is amended or
8
repealed as set out in the applicable items in the Schedule
9
Cybercrime Legislation Amendment Bill 2011 No. , 2011 3
concerned, and any other item in a Schedule to this Act has effect
1
according to its terms.
2
3
Schedule 1 Preservation regime for stored communications
4 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Schedule 1--Preservation regime for stored
1
communications
2
3
Telecommunications Act 1997
4
1 After paragraph 313(7)(c)
5
Insert:
6
(ca) complying with a domestic preservation notice or a foreign
7
preservation notice that is in force under Part 3-1A of that
8
Act; or
9
Telecommunications (Interception and Access) Act 1979
10
2 Subsection 5(1)
11
Insert:
12
certifying official, of an issuing agency, means:
13
(a) if the issuing agency is an enforcement agency or
14
interception agency--a certifying officer of the agency; and
15
(b) if the issuing agency is the Organisation--a certifying person
16
of the Organisation.
17
3 Subsection 5(1)
18
Insert:
19
domestic preservation notice has the meaning given by subsection
20
107H(1).
21
4 Subsection 5(1)
22
Insert:
23
foreign preservation notice has the meaning given by subsection
24
107N(1).
25
5 Subsection 5(1)
26
Insert:
27
historic domestic preservation notice has the meaning given by
28
subparagraph 107H(1)(b)(i).
29
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 5
6 Subsection 5(1) (paragraph (a) of the definition of
1
interception agency)
2
After "Part 2-6", insert ", Part 3-1A".
3
7 Subsection 5(1) (after paragraph (b) of the definition of
4
interception agency)
5
Insert:
6
(ba) for the purposes of Part 3-1A--an enforcement agency that
7
is:
8
(i) a Commonwealth agency; or
9
(ii) an eligible authority of a State in relation to which a
10
declaration under section 34 is in force; or
11
8 Subsection 5(1)
12
Insert:
13
issuing agency, in relation to a preservation notice, means the
14
agency that gives the notice.
15
9 Subsection 5(1)
16
Insert:
17
ongoing domestic preservation notice has the meaning given by
18
subparagraph 107H(1)(b)(ii).
19
10 Subsection 5(1)
20
Insert:
21
preservation notice means a domestic preservation notice or a
22
foreign preservation notice.
23
11 Subsection 5(1)
24
Insert:
25
preservation notice information has the meaning given by
26
section 6EAA.
27
12 Subsection 5(1)
28
Insert:
29
Schedule 1 Preservation regime for stored communications
6 Cybercrime Legislation Amendment Bill 2011 No. , 2011
preserve, in relation to a stored communication, means maintain
1
the integrity of:
2
(a) the stored communication; or
3
(b) a copy of the stored communication.
4
13 Subsection 5(1)
5
Insert:
6
relates:
7
(a) a stored communication relates to a person only if it is:
8
(i) a stored communication that the person has made; or
9
(ii) a stored communication that another person has made
10
and for which the person is the intended recipient; and
11
(b) a stored communication relates to a telecommunications
12
service only if it has passed over a telecommunications
13
system by way of the telecommunications service.
14
14 Subsection 5(1)
15
Insert:
16
relevant period, for a domestic preservation notice, means:
17
(a) for an historic domestic preservation notice--the period
18
referred to in subparagraph 107H(1)(b)(i); and
19
(b) for an ongoing domestic preservation notice--the period
20
referred to in subparagraph 107H(1)(b)(ii).
21
15 Subsection 5(1)
22
Insert:
23
working day means any day except:
24
(a) a Saturday or a Sunday; or
25
(b) a day that is a public holiday in any State or Territory.
26
16 After section 6EA
27
Insert:
28
6EAA Preservation notice information
29
A reference in this Act to preservation notice information is a
30
reference to:
31
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 7
(a) information about any of the following:
1
(i) the giving of a preservation notice;
2
(ii) for a foreign preservation notice--the making of a
3
request under section 107P to preserve stored
4
communications covered by the notice;
5
(iii) the existence or non-existence of a preservation notice;
6
(iv) the expiry of a preservation notice; or
7
(b) any other information that is likely to enable the
8
identification of:
9
(i) the person or telecommunications service specified in a
10
preservation notice; or
11
(ii) the person or telecommunications service to which a
12
preservation notice relates.
13
17 Chapter 3 (heading)
14
Repeal the heading, substitute:
15
Chapter 3--Preserving and accessing stored
16
communications
17
18 Before Part 3-1
18
Insert in Chapter 3:
19
Part 3-1A--Preserving stored communications
20
Division 1--Outline of this Part
21
107G Outline of this Part
22
This Part establishes a system of preserving certain stored
23
communications that are held by a carrier. The purpose of the
24
preservation is to prevent the communications from being
25
destroyed before they can be accessed under certain warrants
26
issued under this Act.
27
Under the system, certain agencies can give a preservation notice
28
to a carrier requiring the carrier to preserve all stored
29
communications that the carrier holds that relate to the person or
30
telecommunications service specified in the notice. The carrier will
31
Schedule 1 Preservation regime for stored communications
8 Cybercrime Legislation Amendment Bill 2011 No. , 2011
breach its obligations under section 313 of the Telecommunications
1
Act 1997 if it does not comply with the notice.
2
There are 2 types of preservation notices: domestic preservation
3
notices (which cover stored communications that might relate
4
either to a contravention of certain Australian laws or to security)
5
and foreign preservation notices (which cover stored
6
communications that might relate to a contravention of certain
7
foreign laws).
8
Division 2 deals with domestic preservation notices. There are 2
9
kinds of domestic preservation notices:
10
(a) historic domestic preservation notices, which cover stored
11
communications held by the carrier on a particular day; and
12
(b) ongoing domestic preservation notices, which cover stored
13
communications held by the carrier in a particular 30-day
14
period.
15
An issuing agency (which is an enforcement agency or the
16
Organisation for an historic domestic preservation notice, and an
17
interception agency or the Organisation for an ongoing domestic
18
preservation notice) can only give a domestic preservation notice if
19
the conditions in section 107J are satisfied. There are certain
20
grounds on which the notice must be revoked (see section 107L).
21
Division 3 deals with foreign preservation notices. Foreign
22
preservation notices, like historic domestic preservation notices,
23
cover stored communications held by the carrier on a particular
24
day. Only the Australian Federal Police can give a foreign
25
preservation notice to a carrier and it can only do so if a foreign
26
country has made a request for the preservation in accordance with
27
section 107P. There are certain grounds on which the notice must
28
be revoked (see section 107R).
29
Division 4 has miscellaneous provisions relating to both domestic
30
and foreign preservation notices (such as provisions about the
31
giving of evidentiary certificates by carriers and issuing agencies).
32
The Ombudsman has functions in relation to preservation notices
33
given by issuing agencies (other than the Organisation) and the
34
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 9
Inspector-General of Intelligence and Security has functions in
1
relation to preservation notices given by the Organisation.
2
Division 2--Domestic preservation notices
3
107H Domestic preservation notices
4
(1) An issuing agency may give a carrier a written notice (a domestic
5
preservation notice) requiring the carrier to preserve, while the
6
notice is in force, all stored communications that:
7
(a) relate to the person or telecommunications service specified
8
in the notice; and
9
(b) the carrier holds at any time during:
10
(i) the period that starts at the time the carrier receives the
11
notice and ends at the end of the day the carrier receives
12
the notice (in which case the notice is an historic
13
domestic preservation notice); or
14
(ii) the period that starts at the time the carrier receives the
15
notice and ends at the end of the 29th day after the day
16
the carrier receives the notice (in which case the notice
17
is an ongoing domestic preservation notice).
18
(2) However, the agency can only give the notice if the conditions in
19
subsection 107J(1) or (2) are satisfied.
20
(3) In the notice, the agency can only specify:
21
(a) one person; or
22
(b) one or more telecommunications services; or
23
(c) one person and one or more telecommunications services.
24
107J Conditions for giving domestic preservation notices
25
Notices given by enforcement agencies or interception agencies
26
(1) A domestic preservation notice may be given under subsection
27
107H(1) if:
28
(a) the issuing agency is:
29
(i) for an historic domestic preservation notice--an
30
enforcement agency; and
31
Schedule 1 Preservation regime for stored communications
10 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(ii) for an ongoing domestic preservation notice--an
1
interception agency; and
2
(b) the agency is investigating a serious contravention; and
3
(c) the agency considers that there are reasonable grounds for
4
suspecting that, in the relevant period for the notice, there are
5
stored communications in existence, or stored
6
communications might come into existence, that:
7
(i) might assist in connection with the investigation; and
8
(ii) relate to the person or telecommunications service
9
specified in the notice; and
10
(d) the agency intends that if, at a later time, the agency
11
considers that the stored communications would be likely to
12
assist in connection with the investigation, then the agency
13
will apply for a Part 2-5 warrant or a stored communications
14
warrant to access those communications; and
15
(e) for an ongoing domestic preservation notice--there is not
16
another ongoing domestic preservation notice in force that:
17
(i) was given by the agency to the same carrier; and
18
(ii) specifies the same person or telecommunications
19
service.
20
Notices given by the Organisation
21
(2) A domestic preservation notice may be given under subsection
22
107H(1) if:
23
(a) the issuing agency is the Organisation; and
24
(b) the Organisation considers that there are reasonable grounds
25
for suspecting that, in the relevant period for the notice, there
26
are stored communications in existence, or stored
27
communications might come into existence, that:
28
(i) might assist the Organisation in carrying out its function
29
of obtaining intelligence relating to security; and
30
(ii) relate to the person or telecommunications service
31
specified in the notice; and
32
(c) the Organisation intends that if, at a later time, the
33
Organisation considers that the stored communications would
34
be likely to assist in carrying out that function, then the
35
Director-General of Security will request a Part 2-2 warrant
36
to access those communications; and
37
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 11
(d) for an ongoing domestic preservation notice--there is not
1
another ongoing domestic preservation notice in force that:
2
(i) was given by the Organisation to the same carrier; and
3
(ii) specifies the same person or telecommunications
4
service.
5
107K When a domestic preservation notice is in force
6
A domestic preservation notice:
7
(a) comes into force when the carrier receives it; and
8
(b) ceases to be in force at the earliest of the following times:
9
(i) the end of the period of 90 days, starting on the day the
10
carrier receives it;
11
(ii) if the notice is revoked under section 107L--when the
12
carrier receives notice of the revocation;
13
(iii) if a Part 2-5 warrant or stored communications warrant
14
authorising access to the stored communications
15
covered by the notice is issued in relation to the issuing
16
agency--when the warrant ceases to be in force;
17
(iv) if a Part 2-2 warrant authorising access to the stored
18
communications covered by the notice is issued in
19
relation to the issuing agency--the end of the period of
20
5 days after the day the warrant was issued.
21
107L Revoking a domestic preservation notice
22
Discretionary revocation
23
(1) An issuing agency that has given a domestic preservation notice
24
may revoke the notice at any time.
25
Mandatory revocation
26
(2) An issuing agency that has given a domestic preservation notice
27
must revoke the notice if:
28
(a) if the issuing agency is an enforcement agency or
29
interception agency:
30
(i) the condition in paragraph 107J(1)(b) or (c) is no longer
31
satisfied; or
32
Schedule 1 Preservation regime for stored communications
12 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(ii) the agency decides not to apply for a Part 2-5 warrant or
1
stored communications warrant to access the stored
2
communications covered by the notice; or
3
(b) if the issuing agency is the Organisation:
4
(i) the condition in paragraph 107J(2)(b) is no longer
5
satisfied; or
6
(ii) the Organisation is satisfied that the Director-General of
7
Security will not request a Part 2-2 warrant to access the
8
stored communications covered by the notice.
9
Revocation effected by giving revocation notice
10
(3) A domestic preservation notice is revoked by the issuing agency
11
giving the carrier to whom it was given written notice of the
12
revocation.
13
107M Persons who act on the issuing agency's behalf
14
Historic domestic preservation notices
15
(1) An historic domestic preservation notice may only be given or
16
revoked on behalf of an issuing agency by:
17
(a) if the issuing agency is an enforcement agency--a person
18
who may, under section 110, apply on the agency's behalf for
19
a stored communications warrant to access the stored
20
communications covered by the notice; and
21
(b) if the issuing agency is the Organisation--a certifying
22
person.
23
Ongoing domestic preservation notices
24
(2) An ongoing domestic preservation notice may only be given on
25
behalf of an issuing agency by:
26
(a) if the issuing agency is an interception agency--an
27
authorised officer of the agency; and
28
(b) if the issuing agency is the Organisation--the
29
Director-General of Security.
30
(3) An ongoing domestic preservation notice may only be revoked on
31
behalf of an issuing agency by:
32
(a) if the issuing agency is an interception agency--an
33
authorised officer of the agency; and
34
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 13
(b) if the issuing agency is the Organisation--a certifying
1
person.
2
Division 3--Foreign preservation notices
3
107N When a foreign preservation notice can be given
4
(1) If the Australian Federal Police receives a request in accordance
5
with section 107P, the Australian Federal Police must give the
6
carrier to which the request relates a written notice (a foreign
7
preservation notice) requiring the carrier to preserve, while the
8
notice is in force, all stored communications that:
9
(a) relate to the person or telecommunications service specified
10
in the notice; and
11
(b) the carrier holds at any time during the period that starts at
12
the time the carrier receives the notice and ends at the end of
13
the day the carrier receives the notice.
14
(2) In the notice, the Australian Federal Police can only specify:
15
(a) one person; or
16
(b) one or more telecommunications services; or
17
(c) one person and one or more telecommunications services.
18
107P Condition for giving a foreign preservation notice
19
(1) If, under paragraph 15B(d) of the Mutual Assistance in Criminal
20
Matters Act 1987, a foreign country intends to request the
21
Attorney-General to arrange for access to stored communications
22
that:
23
(a) relate to a specified person or specified telecommunications
24
service; and
25
(b) are held by a carrier; and
26
(c) are relevant to an investigation, or investigative proceeding,
27
relating to a criminal matter involving a serious foreign
28
contravention;
29
then the foreign country may request the Australian Federal Police
30
to arrange for the preservation of those stored communications.
31
(2) The request to the Australian Federal Police must:
32
(a) be in writing; and
33
Schedule 1 Preservation regime for stored communications
14 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(b) specify the name of the authority concerned with the criminal
1
matter; and
2
(c) specify the serious foreign contravention that is the subject of
3
the investigation or investigative proceeding; and
4
(d) specify information identifying the stored communications to
5
be preserved and the relationship between those
6
communications and the serious foreign contravention; and
7
(e) specify any information the foreign country has that
8
identifies the carrier that holds the stored communications;
9
and
10
(f) if the stored communications relate to a specified person--
11
specify any information the foreign country has that
12
identifies the telecommunications service to which the stored
13
communications relate; and
14
(g) specify the reasons why the stored communications need to
15
be preserved; and
16
(h) specify that the foreign country intends to make a request
17
under paragraph 15B(d) of the Mutual Assistance in Criminal
18
Matters Act 1987 to access the stored communications.
19
107Q When a foreign preservation notice is in force
20
A foreign preservation notice:
21
(a) comes into force when the carrier receives it; and
22
(b) ceases to be in force at the earlier of the following times:
23
(i) if the notice is revoked under section 107R--when the
24
carrier receives notice of the revocation;
25
(ii) if a stored communications warrant authorising access
26
to the stored communications covered by the notice is
27
issued after the Attorney-General has given an
28
authorisation in relation to the warrant under
29
section 15B of the Mutual Assistance in Criminal
30
Matters Act 1987--when the warrant ceases to be in
31
force.
32
107R Revoking a foreign preservation notice
33
(1)
If:
34
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 15
(a) a foreign country makes a request under section 107P to
1
preserve stored communications that are held by a carrier;
2
and
3
(b) in response to the request, the Australian Federal Police gives
4
a foreign preservation notice to the carrier in relation to those
5
stored communications under subsection 107N(1); and
6
(c) during the period of 180 days starting on the day the carrier
7
was given the notice, the foreign country did not make a
8
request to the Attorney-General under paragraph 15B(d) of
9
the Mutual Assistance in Criminal Matters Act 1987 to
10
arrange for access to those communications;
11
then the Australian Federal Police must, by the third working day
12
after the end of that period, revoke the preservation notice by
13
giving the carrier to whom it was given written notice of the
14
revocation.
15
(2)
If:
16
(a) a foreign country makes a request under section 107P to
17
preserve stored communications that are held by a carrier;
18
and
19
(b) in response to the request, the Australian Federal Police gives
20
a foreign preservation notice to the carrier in relation to those
21
stored communications under subsection 107N(1); and
22
(c) the foreign country makes a request to the Attorney-General
23
under paragraph 15B(d) of the Mutual Assistance in Criminal
24
Matters Act 1987 to arrange for access to those
25
communications; and
26
(d) the Attorney-General refuses that request;
27
then the Australian Federal Police must, by the third working day
28
after it is notified of the refusal, revoke the preservation notice by
29
giving the carrier to whom it was given written notice of the
30
revocation.
31
(3)
If:
32
(a) a foreign country makes a request under section 107P to
33
preserve stored communications that are held by a carrier;
34
and
35
(b) in response to the request, the Australian Federal Police gives
36
a foreign preservation notice to the carrier in relation to those
37
stored communications under subsection 107N(1); and
38
(c) the foreign country withdraws the request;
39
Schedule 1 Preservation regime for stored communications
16 Cybercrime Legislation Amendment Bill 2011 No. , 2011
then the Australian Federal Police must, by the third working day
1
after it is notified of the withdrawal, revoke the preservation notice
2
by giving the carrier to whom it was given written notice of the
3
revocation.
4
107S Persons who act on the AFP's behalf
5
A foreign preservation notice must be given or revoked on behalf
6
of the Australian Federal Police by an authorised officer of the
7
Australian Federal Police.
8
Division 4--Provisions relating to preservation notices
9
107T Evidentiary certificates relating to actions by carriers
10
(1)
The
following:
11
(a) the Managing Director of a carrier or a body corporate of
12
which the carrier is a subsidiary;
13
(b) the secretary of a carrier or a body corporate of which the
14
carrier is a subsidiary;
15
(c) an employee of a carrier authorised in writing for the
16
purposes of this paragraph by a person referred to in
17
paragraph (a) or (b);
18
may issue a written certificate signed by him or her setting out such
19
facts as he or she considers relevant with respect to acts or things
20
done by, or in relation to, employees of the carrier in order to
21
comply with a preservation notice.
22
(2) A document purporting to be a certificate issued under
23
subsection (1) and purporting to be signed by a person referred to
24
in paragraph (a), (b) or (c) of that subsection:
25
(a) is to be received in evidence in an exempt proceeding
26
without further proof; and
27
(b) in an exempt proceeding, is conclusive evidence of the
28
matters stated in the document.
29
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 17
(3) For the purposes of this section, the question whether a body
1
corporate is a subsidiary of another body corporate is to be
2
determined in the same manner as the question is determined under
3
the Corporations Act 2001.
4
107U Evidentiary certificates relating to actions by issuing agencies
5
(1) A certifying official of an issuing agency may issue a written
6
certificate signed by him or her setting out such facts as he or she
7
considers relevant with respect to anything done by an officer or
8
staff member of the agency in connection with a preservation
9
notice.
10
(2) A document purporting to be a certificate issued under this section
11
by a certifying official of an issuing agency and purporting to be
12
signed by him or her:
13
(a) is to be received in evidence in an exempt proceeding
14
without further proof; and
15
(b) in an exempt proceeding, is prima facie evidence of the
16
matters stated in the document.
17
107V Certified copies of preservation notices
18
A document certified in writing by a certifying official of an
19
issuing agency to be a true copy of a preservation notice is to be
20
received in evidence in an exempt proceeding as if it were the
21
original preservation notice.
22
107W How notices are to be given to carriers
23
For the purposes of this Part:
24
(a) a preservation notice; or
25
(b) a revocation notice under section 107L or 107R;
26
may only be given to a carrier by giving it to an authorised
27
representative of the carrier.
28
19 Before subparagraph 108(2)(f)(i)
29
Insert:
30
(ia) preservation notices; or
31
20 Division 1 of Part 3-4 (heading)
32
Schedule 1 Preservation regime for stored communications
18 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Repeal the heading, substitute:
1
Division 1--Prohibition on dealing with accessed
2
information etc.
3
21 After subparagraph 133(1)(b)(ii)
4
Insert:
5
(iia) preservation notice information; or
6
Note:
The heading to section 133 is altered by omitting "or stored communications warrant
7
information" and substituting "etc.".
8
22 Section 134
9
Repeal the section, substitute:
10
134 Dealing in preservation notice information or stored
11
communications warrant information
12
A person may, for the purposes of Part 3-1A, 3-2, 3-3, 3-5 or 3-6:
13
(a) communicate preservation notice information or stored
14
communications warrant information to another person; or
15
(b) make use of preservation notice information or stored
16
communications warrant information; or
17
(c) make a record of preservation notice information or stored
18
communications warrant information; or
19
(d) give preservation notice information or stored
20
communications warrant information in evidence in a
21
proceeding.
22
23 After subsection 135(4)
23
Insert:
24
Preservation notice information
25
(4A) An employee of a carrier may, in the performance of his or her
26
duties as such an employee, communicate or make use of, or cause
27
to be communicated, preservation notice information if:
28
(a) the employee does so in the performance of his or her duties
29
as such an employee; and
30
(b) the information is reasonably necessary to enable the carrier
31
to comply with the preservation notice.
32
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 19
(4B) An employee of a carrier may communicate or cause to be
1
communicated to another carrier, or to an employee of another
2
carrier, preservation notice information if the information is
3
reasonably necessary to enable the carrier to comply with the
4
preservation notice.
5
24 After paragraphs 136(1)(a), 137(1)(a), 138(1)(a), 138(2)(a)
6
and 139(1)(a)
7
Insert:
8
(aa) preservation notice information;
9
25 Subsection 146(2)
10
After "give", insert "preservation notice information or".
11
26 Part 3-5 (heading)
12
Repeal the heading, substitute:
13
Part 3-5--Keeping and inspection of preservation
14
notice and access records
15
27 Division 1 of Part 3-5 (heading)
16
Repeal the heading, substitute:
17
Division 1--Keeping preservation notice and access
18
records
19
28 Before section 151
20
Insert into Division 1 of Part 3-5:
21
150A Enforcement agencies to keep documents connected with
22
giving preservation notices
23
The chief officer of an enforcement agency must cause to be kept
24
in the agency's records:
25
(a) each preservation notice given by the agency; and
26
(b) each instrument revoking such a notice; and
27
(c) a copy of each certificate issued under subsection 107U(1) by
28
a certifying officer of the agency.
29
Schedule 1 Preservation regime for stored communications
20 Cybercrime Legislation Amendment Bill 2011 No. , 2011
29 Division 2 of Part 3-5 (heading)
1
Repeal the heading, substitute:
2
Division 2--Inspection of preservation notice and access
3
records by Ombudsman
4
30 Paragraph 152(a)
5
After "150", insert ", 150A".
6
31 Subsection 153(3)
7
After "150", insert ", 150A".
8
32 At the end of Part 3-5
9
Add:
10
Division 3--Inspection of preservation notice records by
11
Inspector-General of Intelligence and Security
12
158A Functions of the Inspector-General of Intelligence and
13
Security
14
(1)
Under
the
Inspector-General of Intelligence and Security Act 1986,
15
the Inspector-General of Intelligence and Security has functions in
16
relation to preservation notices given by the Organisation.
17
(2) In particular, the Inspector-General of Intelligence and Security has
18
the function of:
19
(a) inquiring into any matter that relates to compliance by the
20
Organisation with this Act (see subparagraph 8(1)(a)(i) of
21
that Act); and
22
(b) conducting such inspections of the Organisation as the
23
Inspector-General considers appropriate for the purpose of
24
giving effect to the objects of that Act (see section 9A of that
25
Act).
26
33 After section 161
27
Insert:
28
Preservation regime for stored communications Schedule 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 21
161A Report to contain information about preservation notices
1
Domestic preservation notices
2
(1) The report must set out, for each enforcement agency:
3
(a) the relevant statistics about domestic preservation notices that
4
were given by the agency during that year; and
5
(b) the relevant statistics about revocation notices given by the
6
agency under section 107L during that year.
7
Foreign preservation notices
8
(2) If the enforcement agency is the Australian Federal Police, the
9
report must also set out:
10
(a) the relevant statistics about foreign preservation notices that
11
were given by the agency during that year; and
12
(b) the relevant statistics about revocation notices given by the
13
agency under section 107R during that year.
14
15
Schedule 2 Amendments relating to Mutual Assistance
Part 1 Stored communications
22 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Schedule 2--Amendments relating to Mutual
1
Assistance
2
Part 1--Stored communications
3
Mutual Assistance in Criminal Matters Act 1987
4
1 Subsection 3(1)
5
Insert:
6
carrier has the same meaning as in the Telecommunications
7
(Interception and Access) Act 1979.
8
2 Subsection 3(1)
9
Insert:
10
investigative proceeding means a proceeding covered by
11
paragraph (a) or (b) of the definition of proceeding.
12
3 Subsection 3(1)
13
Insert:
14
stored communication has the same meaning as in the
15
Telecommunications (Interception and Access) Act 1979.
16
4 After Part III
17
Insert:
18
Part IIIA--Assistance in relation to stored
19
communications
20
21
15B Requests by foreign countries for stored communications
22
The Attorney-General may, in his or her discretion, authorise the
23
Australian Federal Police or a police force or police service of a
24
State, in writing, to apply for a stored communications warrant
25
under section 110 of the Telecommunications (Interception and
26
Access) Act 1979 if the Attorney-General is satisfied that:
27
Amendments relating to Mutual Assistance Schedule 2
Stored communications Part 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 23
(a) an investigation, or investigative proceeding, relating to a
1
criminal matter involving an offence against the law of a
2
foreign country (the requesting country) has commenced in
3
the requesting country; and
4
(b) the offence to which the investigation, or investigative
5
proceeding, relates is punishable by a maximum penalty of:
6
(i) imprisonment for 3 years or more, imprisonment for life
7
or the death penalty; or
8
(ii) a fine of an amount that is at least equivalent to 900
9
penalty units; and
10
(c) there are reasonable grounds to believe that stored
11
communications relevant to the investigation, or investigative
12
proceeding, are held by a carrier; and
13
(d) the requesting country has requested the Attorney-General to
14
arrange for access to the stored communications.
15
Note:
Information obtained under the warrant may only be communicated to
16
the requesting country on certain conditions: see subsection 142A(1)
17
of the Telecommunications (Interception and Access) Act 1979.
18
Telecommunications (Interception and Access) Act 1979
19
5 Subsection 5(1)
20
Insert:
21
investigative proceeding has the same meaning as in the Mutual
22
Assistance in Criminal Matters Act 1987.
23
6 Subsection 5(1)
24
Insert:
25
mutual assistance application means an application for a stored
26
communications warrant made as a result of an authorisation under
27
section 15B of the Mutual Assistance in Criminal Matters Act
28
1987.
29
7 After section 5E
30
Insert:
31
Schedule 2 Amendments relating to Mutual Assistance
Part 1 Stored communications
24 Cybercrime Legislation Amendment Bill 2011 No. , 2011
5EA Serious foreign contraventions
1
For the purposes of this Act, a serious foreign contravention is a
2
contravention of a law of a foreign country that is punishable by a
3
maximum penalty of:
4
(a) imprisonment for 3 years or more, imprisonment for life or
5
the death penalty; or
6
(b) a fine of an amount that is at least equivalent to 900 penalty
7
units.
8
8 Paragraph 6H(c)
9
Omit "paragraph 116(1)(d)", substitute "subparagraph 116(1)(d)(i) or
10
(ii), as the case requires".
11
9 Paragraph 116(1)(d)
12
Omit all the words after "with", substitute:
13
: (i) in the case of an application other than a mutual
14
assistance application--the investigation by the agency
15
of a serious contravention in which the person is
16
involved (including as a victim of the serious
17
contravention); or
18
(ii) in the case of a mutual assistance application--the
19
investigation or investigative proceeding, by the foreign
20
country to which the application relates, of a serious
21
foreign contravention to which the application relates
22
and in which the person is involved (including as a
23
victim of the serious foreign contravention); and
24
10 Paragraph 116(1)(e)
25
After "subsection (2)", insert "or (2A) (as the case requires)".
26
11 Subsection 116(2)
27
Omit "The matters", substitute "In the case of an application other than
28
a mutual assistance application, the matters".
29
12 Paragraph 116(2)(c)
30
Omit "paragraph (1)(d)", substitute "subparagraph (1)(d)(i)".
31
13 After subsection 116(2)
32
Insert:
33
Amendments relating to Mutual Assistance Schedule 2
Stored communications Part 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 25
(2A) In the case of a mutual assistance application, the matters to which
1
the issuing authority must have regard are:
2
(a) how much the privacy of any person or persons would be
3
likely to be interfered with by accessing those stored
4
communications under a stored communications warrant; and
5
(b) the gravity of the conduct constituting the serious foreign
6
contravention; and
7
(c) how much the information referred to in
8
subparagraph (1)(d)(ii) would be likely to assist in
9
connection with the investigation, to the extent that this is
10
possible to determine from information obtained from the
11
foreign country to which the application relates.
12
14 Subsection 116(3)
13
After "contravention", insert "or serious foreign contravention, but
14
cannot relate to both a serious contravention and a serious foreign
15
contravention".
16
15 Subsection 118(3)
17
After "contravention", insert "or serious foreign contravention".
18
16 Subsection 118(3)
19
Omit "paragraph 116(1)(d)", substitute "subparagraph 116(1)(d)(i) or
20
(ii), as the case may be".
21
17 Subsection 139(1)
22
After "(2)", insert "or (4A)".
23
18 Subsection 139(2)
24
Omit "The", substitute "In the case of information obtained by the
25
agency other than through the execution of a warrant issued as a result
26
of a mutual assistance application, the".
27
19 After subsection 139(4)
28
Insert:
29
(4A) In the case of information obtained by the agency through the
30
execution of a warrant issued as a result of a mutual assistance
31
application, the purposes are purposes connected with:
32
Schedule 2 Amendments relating to Mutual Assistance
Part 1 Stored communications
26 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(a) providing the information to the foreign country, or an
1
appropriate authority of the foreign country, to which the
2
application relates; or
3
(b) the keeping of records by the agency under Part 3-5.
4
20 After section 142
5
Insert:
6
142A Communicating information obtained as a result of a mutual
7
assistance application to foreign country
8
(1) Despite subsection 139(4A) and section 142, a person may only
9
communicate information, obtained through the execution of a
10
warrant issued as a result of a mutual assistance application, to the
11
foreign country to which the application relates, subject to the
12
following conditions:
13
(a) that the information will only be used for the purposes for
14
which the foreign country requested the information;
15
(b) that any document or other thing containing the information
16
will be destroyed when it is no longer required for those
17
purposes;
18
(c) any other condition determined, in writing, by the
19
Attorney-General.
20
(2) A determination made under paragraph (1)(c) is not a legislative
21
instrument.
22
21 At the end of subsection 162(1)
23
Add:
24
; and (c) the relevant statistics about mutual assistance applications
25
that the agency made during that year; and
26
(d) for each offence (the foreign offence) against a law of a
27
foreign country in respect of which a stored communications
28
warrant was issued as a result of a mutual assistance
29
application made by the agency during the year--the offence
30
(if any), under a law of the Commonwealth, or of a State or a
31
Territory, that is of the same nature as, or a substantially
32
similar nature to, the foreign offence.
33
22 After paragraph 162(2)(b)
34
Amendments relating to Mutual Assistance Schedule 2
Stored communications Part 1
Cybercrime Legislation Amendment Bill 2011 No. , 2011 27
Insert:
1
(ba) the relevant statistics about mutual assistance applications
2
that were made during that year; and
3
23 At the end of subsection 162(2)
4
Add:
5
; and (e) for each offence (the foreign offence) against a law of a
6
foreign country in respect of which a stored communications
7
warrant was issued as a result of a mutual assistance
8
application made during the year--the offence (if any), under
9
a law of the Commonwealth, or of a State or a Territory, that
10
is of the same nature as, or a substantially similar nature to,
11
the foreign offence.
12
24 Application of amendments made by this Part
13
The amendments made by this Part apply in relation to a request by a
14
foreign country that is under consideration on or after the
15
commencement of this item, whether the request was made before or
16
after that commencement.
17
18
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
28 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Part 2--Telecommunications data
1
Mutual Assistance in Criminal Matters Act 1987
2
25 Subsection 3(1)
3
Insert:
4
communication has the same meaning as in the
5
Telecommunications (Interception and Access) Act 1979.
6
26 Subsection 3(1)
7
Insert:
8
telecommunications system has the same meaning as in the
9
Telecommunications (Interception and Access) Act 1979.
10
27 Before Part IV
11
Insert:
12
Part IIIB--Assistance in relation to
13
telecommunications data
14
15
15D Requests by foreign countries for telecommunications data
16
(1) This section applies if:
17
(a) a foreign country requests the disclosure of specified
18
information or specified documents that come into existence
19
during a specified period; and
20
(b) the information or documents relate to the fact of a
21
communication passing over a telecommunications system.
22
(2) To avoid doubt, information or documents do not relate to the fact
23
of a communication passing over a telecommunications system:
24
(a) if the information is the contents or substance of a
25
communication; or
26
(b) to the extent that the documents contain the contents or
27
substance of a communication.
28
Amendments relating to Mutual Assistance Schedule 2
Telecommunications data Part 2
Cybercrime Legislation Amendment Bill 2011 No. , 2011 29
(3) The Attorney-General may authorise the making of an
1
authorisation under section 180B of the Telecommunications
2
(Interception and Access) Act 1979, of a disclosure of information
3
or documents to which this section applies, if he or she is satisfied
4
that:
5
(a) an investigation relating to a criminal matter involving an
6
offence against the law of the foreign country has
7
commenced in that country; and
8
(b) the offence is punishable by imprisonment for 3 years or
9
more, imprisonment for life or the death penalty.
10
Telecommunications Act 1997
11
28 Subsection 305(1)
12
After "Division 4", insert "or 4A".
13
29 Subparagraph 306(1)(b)(ii)
14
Omit "or subsection 180(3)", substitute ", subsection 180(3) or
15
section 180A".
16
30 Paragraph 306A(1)(b)
17
After "section 180", insert "or 180B".
18
31 Paragraph 306A(1)(b)
19
After "subsection 180(2)", insert "or 180B(2)".
20
Telecommunications (Interception and Access) Act 1979
21
32 Subsection 5(1) (definition of authorised officer)
22
Repeal the definition, substitute:
23
authorised officer:
24
(a) in sections 180A, 180B, 180C and 180D, subsections 184(5)
25
and 185(2) and paragraph 186(1)(ca), means:
26
(i) the Commissioner of Police; or
27
(ii) a Deputy Commissioner of Police; or
28
(iii) a member of the Australian Federal Police who is
29
covered by an authorisation in force under subsection
30
5AB(1A); and
31
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
30 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(b) in any other case, means:
1
(i) the head (however described) of the enforcement agency
2
or a person acting as that head; or
3
(ii) a deputy head (however described) of the enforcement
4
agency or a person acting as that deputy head; or
5
(iii) a person who holds, or is acting in, an office or position
6
in the enforcement agency that is covered by an
7
authorisation in force under subsection 5AB(1).
8
33 Subsection 5(1)
9
Insert:
10
foreign law enforcement agency means:
11
(a) a police force (however described) of a foreign country; or
12
(b) any other authority or person responsible for the enforcement
13
of the laws of the foreign country.
14
34 Subsection 5AB(1)
15
Omit "paragraph (c)", substitute "subparagraph (b)(iii)".
16
Note:
The following heading to subsection 5AB(1) is inserted "Authorised officers of an
17
enforcement agency".
18
35 Subsection 5AB(2)
19
Repeal the subsection, substitute:
20
Authorised officers of the Australian Federal Police
21
(1A) The Commissioner of Police may authorise, in writing, a senior
22
executive AFP employee who is a member of the Australian
23
Federal Police to be an authorised officer.
24
(2) A copy of an authorisation must be given to the Communications
25
Access Coordinator:
26
(a) in the case of an authorisation made under subsection (1)--
27
by the head of the enforcement agency; and
28
(b) in the case of an authorisation made under subsection (1A)--
29
by the Commissioner of Police.
30
36 Subsection 171(1)
31
Omit "and 4", substitute ", 4 and 4A".
32
Amendments relating to Mutual Assistance Schedule 2
Telecommunications data Part 2
Cybercrime Legislation Amendment Bill 2011 No. , 2011 31
37 Subsection 171(1) (note 1)
1
Repeal the note, substitute:
2
Note 1:
Division 3 covers the Organisation. Division 4 covers disclosures for
3
the purposes of Australian enforcement agencies. Division 4A covers
4
disclosures for the purposes of foreign law enforcement.
5
38 At the end of subsection 171(3)
6
Add "or 4A".
7
39 Section 172
8
Omit "and 4", substitute ", 4 and 4A".
9
40 Subsection 180(5)
10
Repeal the subsection.
11
41 After Division 4 of Part 4-1
12
Insert:
13
Division 4A--Foreign law enforcement
14
Subdivision A--Primary disclosures
15
180A Authorisations for access to existing information or
16
documents--enforcement of the criminal law of a foreign
17
country
18
Disclosure to the Australian Federal Police
19
(1) Sections 276, 277 and 278 of the Telecommunications Act 1997 do
20
not prevent a disclosure of information or a document if the
21
information or document is covered by an authorisation in force
22
under subsection (2).
23
(2) An authorised officer of the Australian Federal Police may
24
authorise the disclosure of specified information or specified
25
documents that came into existence before the time the person
26
from whom the disclosure is sought receives notification of the
27
authorisation.
28
Note:
Section 184 deals with notification of authorisations.
29
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
32 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(3) The authorised officer must not make the authorisation unless he or
1
she is satisfied that the disclosure is reasonably necessary for the
2
enforcement of the criminal law of a foreign country.
3
Disclosure to a foreign law enforcement agency
4
(4) If specified information or specified documents are disclosed
5
because of an authorisation given under subsection (2), an
6
authorised officer of the Australian Federal Police may authorise
7
the disclosure of the information or documents so disclosed to a
8
foreign law enforcement agency.
9
(5) The authorised officer must not make the authorisation unless he or
10
she is satisfied that:
11
(a) the disclosure is reasonably necessary for the enforcement of
12
the criminal law of a foreign country; and
13
(b) the disclosure is appropriate in all the circumstances.
14
180B Authorisations for access to prospective information or
15
documents--enforcement of the criminal law of a foreign
16
country
17
Disclosure to the Australian Federal Police
18
(1) Sections 276, 277 and 278 of the Telecommunications Act 1997 do
19
not prevent a disclosure of information or a document if the
20
information or document is covered by an authorisation in force
21
under subsection (2) of this section.
22
Prospective authorisation
23
(2) An authorised officer of the Australian Federal Police may
24
authorise the disclosure of specified information or specified
25
documents that come into existence during the period for which the
26
authorisation is in force.
27
(3) The authorised officer must not make the authorisation unless:
28
(a) the Attorney-General has authorised the making of the
29
authorisation under the Mutual Assistance in Criminal
30
Matters Act 1987; and
31
(b) the authorised officer is satisfied that the disclosure is:
32
Amendments relating to Mutual Assistance Schedule 2
Telecommunications data Part 2
Cybercrime Legislation Amendment Bill 2011 No. , 2011 33
(i) reasonably necessary for the investigation of an offence
1
against a law of a foreign country that is punishable by
2
imprisonment for 3 years or more, imprisonment for life
3
or the death penalty; and
4
(ii) appropriate in all the circumstances.
5
(4) An authorised officer of the Australian Federal Police must revoke
6
the authorisation if he or she is satisfied that the disclosure is no
7
longer required.
8
Note:
Section 184 deals with notification of revocations.
9
(5) An authorisation under subsection (2):
10
(a) comes into force at the time the person from whom the
11
disclosure is sought receives notification of the authorisation;
12
and
13
(b) ceases to be in force at the time specified in the authorisation,
14
which must not be more than 21 days after the day the
15
authorisation is made, or that period as extended under
16
subsection (6), unless it is revoked earlier.
17
Note:
Section 184 deals with notification of authorisations.
18
Extension of prospective authorisation
19
(6) The period for which an authorisation under subsection (2) is in
20
force may be extended once only, by an authorised officer of the
21
Australian Federal Police, if the authorised officer is satisfied that
22
the extension is:
23
(a) reasonably necessary for the investigation of an offence
24
against a law of a foreign country that is punishable by
25
imprisonment for 3 years or more, imprisonment for life or
26
the death penalty; and
27
(b) appropriate in all the circumstances.
28
(7) An extension under subsection (6) must not be for more than 21
29
days from the day of the extension.
30
Disclosure to a foreign law enforcement agency
31
(8) If specified information or specified documents are disclosed
32
because of an authorisation given under subsection (2), an
33
authorised officer of the Australian Federal Police may authorise
34
the disclosure of the information or documents so disclosed to a
35
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
34 Cybercrime Legislation Amendment Bill 2011 No. , 2011
foreign law enforcement agency if the authorised officer is
1
satisfied that the disclosure is:
2
(a) reasonably necessary for the investigation of an offence
3
against a law of a foreign country that is punishable by
4
imprisonment for 3 years or more, imprisonment for life or
5
the death penalty; and
6
(b) appropriate in all the circumstances.
7
(9) An authorised officer must not make more than one authorisation a
8
day under subsection (8).
9
Subdivision B--Secondary disclosures
10
180C Authorisations to disclose information or documents--
11
enforcement of the criminal law of a foreign country
12
(1) If specified information or specified documents are disclosed
13
because of an authorisation given under Division 4, other than
14
because of an authorisation under section 178A (missing persons),
15
an authorised officer of the Australian Federal Police may
16
authorise the disclosure of the information or documents so
17
disclosed to a foreign law enforcement agency.
18
(2) The authorised officer must not make the authorisation unless he or
19
she is satisfied that:
20
(a) the disclosure is reasonably necessary for the enforcement of
21
the criminal law of a foreign country; and
22
(b) the disclosure is appropriate in all the circumstances.
23
180D Authorisations to disclose information or documents--
24
enforcement of the criminal law
25
(1) If specified information or specified documents are disclosed
26
because of an authorisation given under this Division, an
27
authorised officer of the Australian Federal Police may authorise
28
the following:
29
(a) the disclosure of the information or documents to the
30
Organisation or an enforcement agency;
31
(b) the use of the information or documents by the Australian
32
Federal Police.
33
Amendments relating to Mutual Assistance Schedule 2
Telecommunications data Part 2
Cybercrime Legislation Amendment Bill 2011 No. , 2011 35
(2) The authorised officer must not make the authorisation unless he or
1
she is satisfied that:
2
(a) in the case of a disclosure to the Organisation--the disclosure
3
is reasonably necessary for the performance by the
4
Organisation of its functions; and
5
(b) in the case of a disclosure to an enforcement agency--the
6
disclosure is reasonably necessary:
7
(i) for the enforcement of the criminal law; or
8
(ii) for the enforcement of a law imposing a pecuniary
9
penalty; or
10
(iii) for the protection of the public revenue; and
11
(c) in the case of a use by the Australian Federal Police--the use
12
is reasonably necessary:
13
(i) for the enforcement of the criminal law; or
14
(ii) for the enforcement of a law imposing a pecuniary
15
penalty; or
16
(iii) for the protection of the public revenue; and
17
(d) in any case--the disclosure or use is appropriate in all the
18
circumstances.
19
Subdivision C--Conditions of disclosure to foreign country
20
180E Disclosing information etc. obtained to foreign country
21
(1) A person must not disclose information or a document in
22
accordance with an authorisation under section 180A, 180B or
23
180C to a foreign country unless the disclosure is subject to the
24
following conditions:
25
(a) that the information will only be used for the purposes for
26
which the foreign country requested the information;
27
(b) that any document or other thing containing the information
28
will be destroyed when it is no longer required for those
29
purposes;
30
(c) in the case of information or a document disclosed under
31
section 180B--any other condition determined, in writing, by
32
the Attorney-General.
33
(2) A determination made under paragraph (1)(c) is not a legislative
34
instrument.
35
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
36 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Division 4B--Privacy to be considered when making
1
authorisations
2
180F Authorised officers to consider privacy
3
Before making an authorisation under Division 4 or 4A in relation
4
to the disclosure or use of information or documents, the
5
authorised officer considering making the authorisation must have
6
regard to how much the privacy of any person or persons would be
7
likely to be interfered with by the disclosure or use.
8
42 Paragraph 181(b)
9
Omit "or 4", substitute ", 4 or 4A".
10
43 Paragraph 182(1)(a)
11
After "Division 4", insert "or 4A".
12
44 After subsection 182(4)
13
Insert:
14
(4A) Paragraph (1)(b) does not apply to a disclosure or use of
15
information or a document if the disclosure or use is permitted by
16
section 180C or 180D.
17
Note:
A defendant bears an evidential burden in relation to the matter in
18
subsection (4A) (see subsection 13.3(3) of the Criminal Code).
19
45 Subsection 182(5) (definition of non-missing person
20
information)
21
After "Division 4", insert "or 4A".
22
46 Paragraph 183(1)(a)
23
Omit "or 4", substitute ", 4 or 4A".
24
47 At the end of section 184
25
Add:
26
Authorised officers of the Australian Federal Police
27
(5) If an authorised officer of the Australian Federal Police makes an
28
authorisation under subsection 180A(2) or 180B(2), or extends the
29
Amendments relating to Mutual Assistance Schedule 2
Telecommunications data Part 2
Cybercrime Legislation Amendment Bill 2011 No. , 2011 37
period for which an authorisation is in force under subsection
1
180B(6), a relevant staff member of the Australian Federal Police
2
must notify the person from whom the disclosure is sought.
3
(6) If, under subsection 180B(4), an authorised officer of the
4
Australian Federal Police revokes an authorisation, a relevant staff
5
member of the Australian Federal Police must notify the person
6
who was notified of the authorisation.
7
48 Section 185
8
Before "The", insert "(1)".
9
49 At the end of section 185
10
Add:
11
(2) The Commissioner of Police must retain an authorisation made
12
under Division 4A of Part 4-1 by an authorised officer of the
13
Australian Federal Police for the period of 3 years beginning on the
14
day the authorisation is made.
15
50 After paragraph 186(1)(c)
16
Insert:
17
(ca) if the enforcement agency is the Australian Federal Police--
18
the number of authorisations made under sections 180A,
19
180B, 180C and 180D by an authorised officer of the
20
Australian Federal Police during that year; and
21
51 Application of amendments made by this Part--
22
authorisations
23
(1)
The amendments made by this Part apply in relation to an authorisation
24
made on or after the commencement of this item.
25
(2)
To avoid doubt, an authorisation may be made under section 180C of
26
the Telecommunications (Interception and Access) Act 1979 even if an
27
authorisation given under Division 4 (as mentioned in that section) was
28
given before the commencement of this item.
29
52 Application of amendments made by this Part--requests
30
by foreign countries
31
Schedule 2 Amendments relating to Mutual Assistance
Part 2 Telecommunications data
38 Cybercrime Legislation Amendment Bill 2011 No. , 2011
The amendments made by this Part apply in relation to a request by a
1
foreign country that is under consideration on or after the
2
commencement of this item, whether the request was made before or
3
after that commencement.
4
53 Saving of existing authorisations
5
(1)
Despite the amendment of subsection 5AB(1) of the
6
Telecommunications (Interception and Access) Act 1979 by this Part,
7
any authorisation by the head of an enforcement agency that was in
8
force under that subsection immediately before the commencement of
9
this item continues in force on and after that commencement as if it
10
were an authorisation made under that subsection as in force after that
11
commencement.
12
(2)
In this item:
13
enforcement agency has the same meaning as in the
14
Telecommunications (Interception and Access) Act 1979.
15
16
Amendments relating to Mutual Assistance Schedule 2
Recovery of costs by carriage service providers etc. for providing assistance to
Australian law enforcement authorities Part 3
Cybercrime Legislation Amendment Bill 2011 No. , 2011 39
Part 3--Recovery of costs by carriage service
1
providers etc. for providing assistance to
2
Australian law enforcement authorities
3
Telecommunications Act 1997
4
54 After paragraph 313(3)(c)
5
Insert:
6
(ca) assisting the enforcement of the criminal laws in force in a
7
foreign country;
8
55 After paragraph 313(4)(c)
9
Insert:
10
(ca) assisting the enforcement of the criminal laws in force in a
11
foreign country;
12
56 Application of amendments made by items 54 and 55
13
(1)
The amendment made by item 54 of this Schedule applies to help given
14
by a carrier or carriage service provider on or after the commencement
15
of this item.
16
(2)
The amendment made by item 55 of this Schedule applies to help given
17
by a carriage service intermediary on or after the commencement of this
18
item.
19
20
Schedule 3 Computer offences amendments
40 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Schedule 3--Computer offences amendments
1
2
Criminal Code Act 1995
3
1 Subsection 476.1(1) of the Criminal Code (definition of
4
Commonwealth computer)
5
Repeal the definition.
6
2 Paragraph 477.1(1)(b) of the Criminal Code
7
Repeal the paragraph.
8
3 Subsection 477.1(2) of the Criminal Code
9
Repeal the subsection.
10
4 Subsections 477.1(4) and (5) of the Criminal Code
11
Repeal the subsections.
12
5 Subparagraph 477.2(1)(c)(ii) of the Criminal Code
13
Omit "data; and", substitute "data.".
14
6 Paragraph 477.2(1)(d) of the Criminal Code
15
Repeal the paragraph.
16
7 Subsection 477.2(2) of the Criminal Code
17
Repeal the subsection.
18
8 Paragraph 477.3(1)(b) of the Criminal Code
19
Omit "unauthorised; and", substitute "unauthorised.".
20
9 Paragraph 477.3(1)(c) of the Criminal Code
21
Repeal the paragraph.
22
10 Subsection 477.3(2) of the Criminal Code
23
Repeal the subsection.
24
11 Paragraph 478.1(1)(c) of the Criminal Code
25
Omit "unauthorised; and", substitute "unauthorised.".
26
Computer offences amendments Schedule 3
Cybercrime Legislation Amendment Bill 2011 No. , 2011 41
12 Paragraph 478.1(1)(d) of the Criminal Code
1
Repeal the paragraph.
2
13 Subsection 478.1(2) of the Criminal Code
3
Repeal the subsection.
4
14 Subsection 478.2(1) of the Criminal Code
5
Omit "(1)".
6
15 Paragraph 478.2(1)(c) of the Criminal Code
7
Omit "unauthorised; and", substitute "unauthorised.".
8
16 Paragraph 478.2(1)(d) of the Criminal Code
9
Repeal the paragraph.
10
17 Subsection 478.2(2) of the Criminal Code
11
Repeal the subsection.
12
18 Application of amendments
13
The amendments made by this Schedule apply to acts and omissions
14
that take place after the day on which this Schedule commences.
15
16
Schedule 4 Telecommunications data confidentiality
42 Cybercrime Legislation Amendment Bill 2011 No. , 2011
Schedule 4--Telecommunications data
1
confidentiality
2
3
Telecommunications (Interception and Access) Act 1979
4
1 Subsection 171(3)
5
Repeal the subsection, substitute:
6
(3) Division 6 creates offences for certain disclosures and uses of
7
information and documents.
8
2 Division 6 of Part 4-1 (heading)
9
Repeal the heading, substitute:
10
Division 6--Disclosure/use offences
11
3 Before section 182
12
Insert:
13
181A Disclosure/use offences: authorisations under Division 3
14
Disclosures
15
(1) A person commits an offence if:
16
(a) the person discloses information; and
17
(b) the information is about any of the following:
18
(i) whether an authorisation under Division 3 has been, or
19
is being, sought;
20
(ii) the making of such an authorisation;
21
(iii) the existence or non-existence of such an authorisation;
22
(iv) the revocation of such an authorisation;
23
(v) the notification of such a revocation.
24
Penalty: Imprisonment for 2 years.
25
(2) A person commits an offence if:
26
(a) the person discloses a document; and
27
Telecommunications data confidentiality Schedule 4
Cybercrime Legislation Amendment Bill 2011 No. , 2011 43
(b) the document consists (wholly or partly) of any of the
1
following:
2
(i) an authorisation under Division 3;
3
(ii) the revocation of such an authorisation;
4
(iii) the notification of such a revocation.
5
Penalty: Imprisonment for 2 years.
6
(3) Paragraphs (1)(a) and (2)(a) do not apply to a disclosure of
7
information or a document if:
8
(a) the disclosure is for the purposes of the authorisation,
9
revocation or notification concerned; or
10
(b) the disclosure is reasonably necessary:
11
(i) to enable the Organisation to perform its functions; or
12
(ii) to enforce the criminal law; or
13
(iii) to enforce a law imposing a pecuniary penalty; or
14
(iv) to protect the public revenue.
15
Note:
A defendant bears an evidential burden in relation to the matter in
16
subsection (3) (see subsection 13.3(3) of the Criminal Code).
17
Uses
18
(4) A person commits an offence if:
19
(a) the person uses information; and
20
(b) the information is about any of the following:
21
(i) whether an authorisation under Division 3 has been, or
22
is being, sought;
23
(ii) the making of such an authorisation;
24
(iii) the existence or non-existence of such an authorisation;
25
(iv) the revocation of such an authorisation;
26
(v) the notification of such a revocation.
27
Penalty: Imprisonment for 2 years.
28
(5) A person commits an offence if:
29
(a) the person uses a document; and
30
(b) the document consists (wholly or partly) of any of the
31
following:
32
(i) an authorisation under Division 3;
33
(ii) the revocation of such an authorisation;
34
Schedule 4 Telecommunications data confidentiality
44 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(iii) the notification of such a revocation.
1
Penalty: Imprisonment for 2 years.
2
(6) Paragraphs (4)(a) and (5)(a) do not apply to a use of information or
3
a document if:
4
(a) the use is for the purposes of the authorisation, revocation or
5
notification concerned; or
6
(b) the use is reasonably necessary:
7
(i) to enable the Organisation to perform its functions; or
8
(ii) to enforce the criminal law; or
9
(iii) to enforce a law imposing a pecuniary penalty; or
10
(iv) to protect the public revenue.
11
Note:
A defendant bears an evidential burden in relation to the matter in
12
subsection (6) (see subsection 13.3(3) of the Criminal Code).
13
181B Disclosure/use offences: certain authorisations under
14
Division 4
15
Disclosures
16
(1) A person commits an offence if:
17
(a) the person discloses information; and
18
(b) the information is about any of the following:
19
(i) whether an authorisation under Division 4 (other than
20
under section 178A) has been, or is being, sought;
21
(ii) the making of such an authorisation;
22
(iii) the existence or non-existence of such an authorisation;
23
(iv) the revocation of such an authorisation;
24
(v) the notification of such a revocation.
25
Penalty: Imprisonment for 2 years.
26
(2) A person commits an offence if:
27
(a) the person discloses a document; and
28
(b) the document consists (wholly or partly) of any of the
29
following:
30
(i) an authorisation under Division 4 (other than under
31
section 178A);
32
(ii) the revocation of such an authorisation;
33
Telecommunications data confidentiality Schedule 4
Cybercrime Legislation Amendment Bill 2011 No. , 2011 45
(iii) the notification of such a revocation.
1
Penalty: Imprisonment for 2 years.
2
(3) Paragraphs (1)(a) and (2)(a) do not apply to a disclosure of
3
information or a document if:
4
(a) the disclosure is for the purposes of the authorisation,
5
revocation or notification concerned; or
6
(b) the disclosure is reasonably necessary:
7
(i) to enable the Organisation to perform its functions; or
8
(ii) to enforce the criminal law; or
9
(iii) to enforce a law imposing a pecuniary penalty; or
10
(iv) to protect the public revenue.
11
Note:
A defendant bears an evidential burden in relation to the matter in
12
subsection (3) (see subsection 13.3(3) of the Criminal Code).
13
Uses
14
(4) A person commits an offence if:
15
(a) the person uses information; and
16
(b) the information is about any of the following:
17
(i) whether an authorisation under Division 4 (other than
18
under section 178A) has been, or is being, sought;
19
(ii) the making of such an authorisation;
20
(iii) the existence or non-existence of such an authorisation;
21
(iv) the revocation of such an authorisation;
22
(v) the notification of such a revocation.
23
Penalty: Imprisonment for 2 years.
24
(5) A person commits an offence if:
25
(a) the person uses a document; and
26
(b) the document consists (wholly or partly) of any of the
27
following:
28
(i) an authorisation under Division 4 (other than under
29
section 178A);
30
(ii) the revocation of such an authorisation;
31
(iii) the notification of such a revocation.
32
Penalty: Imprisonment for 2 years.
33
Schedule 4 Telecommunications data confidentiality
46 Cybercrime Legislation Amendment Bill 2011 No. , 2011
(6) Paragraphs (4)(a) and (5)(a) do not apply to a use of information or
1
a document if:
2
(a) the use is for the purposes of the authorisation, revocation or
3
notification concerned; or
4
(b) the use is reasonably necessary:
5
(i) to enforce the criminal law; or
6
(ii) to enforce a law imposing a pecuniary penalty; or
7
(iii) to protect the public revenue.
8
Note:
A defendant bears an evidential burden in relation to the matter in
9
subsection (6) (see subsection 13.3(3) of the Criminal Code).
10
Note:
The heading to section 182 is altered by adding at the end ": disclosures under
11
Division 4".
12
4 Application
13
Sections 181A and 181B of the Telecommunications (Interception and
14
Access) Act 1979 apply in relation to a disclosure, or use, of information
15
or a document on or after the commencement of this Schedule whether
16
the information or document came into existence before, on or after that
17
commencement.
18
19
Miscellaneous Schedule 5
Cybercrime Legislation Amendment Bill 2011 No. , 2011 47
Schedule 5--Miscellaneous
1
2
Telecommunications (Interception and Access) Act 1979
3
1 At the end of section 105
4
Add:
5
(5) Section 15.1 (extended geographical jurisdiction--category A) of
6
the Criminal Code applies to an offence against subsection 7(1) or
7
section 63.
8
2 Application of amendment
9
The amendment made by item 1 of this Schedule applies to acts or
10
things done on or after the day on which this Schedule commences.
11
3 Subsection 180(4)
12
Omit all the words after "reasonably necessary", substitute:
13
for the investigation of:
14
(a) a serious offence; or
15
(b) an offence against a law of the Commonwealth, a State or a
16
Territory that is punishable by imprisonment for at least 3
17
years.
18

 


[Index] [Search] [Download] [Related Items] [Help]