-
1
-
-
36048937014
-
-
Several watch lists exist including, in the USA that of the Office of Foreign Assets Control available at: http://www.treasury.gov/offices/ enforcement/ofac/sdn/t11sdn.pdf as well as a United Nations list.
-
Several watch lists exist including, in the USA that of the Office of Foreign Assets Control (available at: http://www.treasury.gov/offices/ enforcement/ofac/sdn/t11sdn.pdf as well as a United Nations list.
-
-
-
-
2
-
-
36049010094
-
-
For an account of this incident, see the Weekend Herald, Saturday-Sunday, October 23-24 2004, A16.
-
For an account of this incident, see the Weekend Herald, Saturday-Sunday, October 23-24 2004, A16.
-
-
-
-
3
-
-
36049020340
-
-
This is discussed further below
-
This is discussed further below.
-
-
-
-
4
-
-
36049016792
-
-
British Columbia Government & Service Employees' Union (petitioner) v The Minister of Health Services and The Medical Services Commission (respondents) B.C.S.C., Victoria registry No. 04-0879.
-
British Columbia Government & Service Employees' Union (petitioner) v The Minister of Health Services and The Medical Services Commission (respondents) B.C.S.C., Victoria registry No. 04-0879.
-
-
-
-
5
-
-
36048982867
-
-
Freedom of Information and Protection of Privacy Amendment Act, 2004, S.B.C. 2004, c.64.
-
Freedom of Information and Protection of Privacy Amendment Act, 2004, S.B.C. 2004, c.64.
-
-
-
-
6
-
-
36048992478
-
-
Information & Privacy Commissioner for British Columbia 'Privacy and the USA Patriot Act: Implications for British Columbia Public Sector Outsourcing' (British Columbia, 2004). Available at: http://www.oipcbc.org/sector_public/usa_patriot_act/pdfs/report/ privacy-final.pdf.
-
Information & Privacy Commissioner for British Columbia 'Privacy and the USA Patriot Act: Implications for British Columbia Public Sector Outsourcing' (British Columbia, 2004). Available at: http://www.oipcbc.org/sector_public/usa_patriot_act/pdfs/report/ privacy-final.pdf.
-
-
-
-
7
-
-
36048942101
-
-
The PNR data elements include the 'PNR record locator code,' date of reservation, name, address, all forms of payment information, contact telephone numbers, travel agency, travel status of the passenger, e-mail address, general remarks, seat number, no-show history and any collected APIS (Advanced Passenger Information System) Information.
-
The PNR data elements include the 'PNR record locator code,' date of reservation, name, address, all forms of payment information, contact telephone numbers, travel agency, travel status of the passenger, e-mail address, general remarks, seat number, no-show history and any collected APIS (Advanced Passenger Information System) Information.
-
-
-
-
9
-
-
36048958591
-
-
European Parliament v Council of the European Union, ECJ, C-317/04 & C-318/04, 30 May 2006.
-
European Parliament v Council of the European Union, ECJ, C-317/04 & C-318/04, 30 May 2006.
-
-
-
-
11
-
-
0000320829
-
The Right to Privacy
-
See
-
See D Warren and LD Brandeis 'The Right to Privacy' (1890) 4 Harv LR 193.
-
(1890)
Harv LR
, vol.4
, pp. 193
-
-
Warren, D.1
Brandeis, L.D.2
-
12
-
-
36049052036
-
-
Restatement of the Law of Torts, 2d (American Law Institute: 1965-79) S 652A-F.
-
Restatement of the Law of Torts, 2d (American Law Institute: 1965-79) S 652A-F.
-
-
-
-
13
-
-
36048980006
-
-
Through application of the existing remedy of Breach of Confidence although influenced heavily by the Human Rights Act 1998 (UK) which implemented the European Convention on Human Rights; see Campbell v MGN Ltd [2004] 2 AC 457 HL
-
Through application of the existing remedy of Breach of Confidence although influenced heavily by the Human Rights Act 1998 (UK) which implemented the European Convention on Human Rights; see Campbell v MGN Ltd [2004] 2 AC 457 (HL).
-
-
-
-
14
-
-
36048955166
-
-
1 NZLR 1 CA
-
Hosking v Runting [2005] 1 NZLR 1 (CA).
-
(2005)
Hosking v Runting
-
-
-
15
-
-
36048962159
-
-
Early concern in New Zealand over privacy led to the enactment of the Wanganui Computer Centre Act 1976 which for the first time contained provisions safeguarding personal privacy of citizens
-
Early concern in New Zealand over privacy led to the enactment of the Wanganui Computer Centre Act 1976 which for the first time contained provisions safeguarding personal privacy of citizens.
-
-
-
-
17
-
-
36048948987
-
-
5 USC S 552(a) (1988).
-
5 USC S 552(a) (1988).
-
-
-
-
18
-
-
36048975724
-
-
Available at
-
Available at: www.oecd.org.
-
-
-
-
19
-
-
36049026883
-
-
Personal Information Protection and Electronic Documents Act, S.C. 2000, c.5.
-
Personal Information Protection and Electronic Documents Act, S.C. 2000, c.5.
-
-
-
-
20
-
-
36048975191
-
-
Above n 6, at p 38
-
Above n 6, at p 38.
-
-
-
-
21
-
-
36049048347
-
-
Privacy Commissioner of Canada, 'Annual Report to Parliament 2003-2004' (available at: http://www.privcom.gc.ca/information/ar/200304/ 200304_e.asp).
-
Privacy Commissioner of Canada, 'Annual Report to Parliament 2003-2004' (available at: http://www.privcom.gc.ca/information/ar/200304/ 200304_e.asp).
-
-
-
-
22
-
-
36049014405
-
-
Privacy Act, 1993, s 6.
-
Privacy Act, 1993, s 6.
-
-
-
-
23
-
-
36048949667
-
-
Privacy Amendment (Private Sector) Act 2000 (C'th, Aust).
-
Privacy Amendment (Private Sector) Act 2000 (C'th, Aust).
-
-
-
-
24
-
-
36048935051
-
-
Privacy Act 1993
-
Privacy Act 1993.
-
-
-
-
25
-
-
36048948985
-
-
Privacy Act 1988 (as amended) (C'th, Aust).
-
Privacy Act 1988 (as amended) (C'th, Aust).
-
-
-
-
26
-
-
36049029704
-
-
Personal Data (Privacy) Ordinance 1996.
-
Personal Data (Privacy) Ordinance 1996.
-
-
-
-
27
-
-
36049009128
-
-
Personal Information Protection Act (Law No. 57 of 2003).
-
Personal Information Protection Act (Law No. 57 of 2003).
-
-
-
-
28
-
-
36048941445
-
-
For example, the Video Privacy Protection Act 1988 was enacted by Congress as a result of the release of Judge Robert Bork's video rental records during his failed Supreme Court nomination.
-
For example, the Video Privacy Protection Act 1988 was enacted by Congress as a result of the release of Judge Robert Bork's video rental records during his failed Supreme Court nomination.
-
-
-
-
29
-
-
36049000573
-
-
Above n 6, at p 51
-
Above n 6, at p 51.
-
-
-
-
30
-
-
84920715164
-
Extraordinary Rendition, Complicity and its Consequences'
-
Involving the alleged extra-legal abduction and transfer of suspects to 'black-sites' in third countries where they have been allegedly subject to detention, torture and interrogation; see P Sands 'The International Rule of Law
-
Involving the alleged extra-legal abduction and transfer of suspects to 'black-sites' in third countries where they have been allegedly subject to detention, torture and interrogation; see P Sands 'The International Rule of Law: Extraordinary Rendition, Complicity and its Consequences' (2006) European Human Rights LR 408.
-
European Human Rights LR
, pp. 408
-
-
-
31
-
-
36049051368
-
-
See for instance C Doyle and M Bagaric, Privacy Law in Australia (The Federation Press, Sydney, 2005) at pp 50-56.
-
See for instance C Doyle and M Bagaric, Privacy Law in Australia (The Federation Press, Sydney, 2005) at pp 50-56.
-
-
-
-
32
-
-
36048986421
-
-
Above n 6, at p 44
-
Above n 6, at p 44.
-
-
-
-
33
-
-
36048936388
-
-
Public Policy Forum and ITAC Round Table, Ottawa, 20 May, at p
-
Public Policy Forum and ITAC Round Table, 'IT Offshore Outsourcing Practices in Canada' (Ottawa, 20 May 2004) at p 6.
-
(2004)
IT Offshore Outsourcing Practices in Canada
, pp. 6
-
-
-
34
-
-
36049018033
-
-
The process of satisfying the European Commission under the Privacy Directive is explained below
-
The process of satisfying the European Commission under the Privacy Directive is explained below.
-
-
-
-
35
-
-
36048958590
-
-
See generally the discussion in Dorothee Heisenberg, Negotiating Privacy: The European Union, the United States, and Personal Data Protection (Lynne Rienner Publishers, USA, 2005) at pp 112-113.
-
See generally the discussion in Dorothee Heisenberg, Negotiating Privacy: The European Union, the United States, and Personal Data Protection (Lynne Rienner Publishers, USA, 2005) at pp 112-113.
-
-
-
-
36
-
-
36048957252
-
-
Ibid.
-
-
-
-
37
-
-
36049007852
-
-
US, Bill H.R. 4366, Personal Data Offshoring Protection Act of 2004, 108th Cong., 2004.
-
US, Bill H.R. 4366, Personal Data Offshoring Protection Act of 2004, 108th Cong., 2004.
-
-
-
-
38
-
-
36048988777
-
-
Above n 6, at p 44
-
Above n 6, at p 44.
-
-
-
-
39
-
-
36048965875
-
-
Above n 6
-
Above n 6.
-
-
-
-
40
-
-
36048985060
-
-
Ibid, at p 136, see particularly Recommendations 4, 5 and 6.
-
Ibid, at p 136, see particularly Recommendations 4, 5 and 6.
-
-
-
-
41
-
-
36048998856
-
-
at p
-
Ibid, at p 49.
-
-
-
-
42
-
-
36049037952
-
-
In New Zealand, for example, see the Privacy Commissioner Act 1991 which has been replaced by Part X Privacy Act 1993.
-
In New Zealand, for example, see the Privacy Commissioner Act 1991 which has been replaced by Part X Privacy Act 1993.
-
-
-
-
43
-
-
36048995376
-
-
Privacy Act 1993, Part X.
-
Privacy Act 1993, Part X.
-
-
-
-
44
-
-
36049003733
-
-
Data-matching Program (Assistance and tax) Act 1990 (C'th). It should be noted that section 12 of this Act requires the Privacy Commissioner to issue Guidelines for the conduct of data matching programmes and that a breach of either the Act or Guidelines constitutes an interference with privacy under s 13 of the Privacy Act 1988 (C'th) thus enabling a person to complain to the Privacy Commissioner.
-
Data-matching Program (Assistance and tax) Act 1990 (C'th). It should be noted that section 12 of this Act requires the Privacy Commissioner to issue Guidelines for the conduct of data matching programmes and that a breach of either the Act or Guidelines constitutes an interference with privacy under s 13 of the Privacy Act 1988 (C'th) thus enabling a person to complain to the Privacy Commissioner.
-
-
-
-
45
-
-
36048947695
-
-
Privacy Act 1993, s 98.
-
Privacy Act 1993, s 98.
-
-
-
-
46
-
-
36048987060
-
-
Ibid, Part X.
-
Ibid, Part X.
-
-
-
-
48
-
-
36049009129
-
-
In other words a further 'black list' of those caught cheating the social welfare, for example, cannot be maintained after the initial adverse action is taken against the individuals concerned
-
In other words a further 'black list' of those caught cheating the social welfare, for example, cannot be maintained after the initial adverse action is taken against the individuals concerned.
-
-
-
-
49
-
-
36049047708
-
-
For example, programmes between the New Zealand Inland Revenue Department and its Netherlands counterparts for the purposes of assessing eligibility for superannuation, pension and welfare payments was undertaken in the 2004-2005 year, see 'Annual Report of the Privacy Commissioner' (Wellington, 2005) at pp 68-71.
-
For example, programmes between the New Zealand Inland Revenue Department and its Netherlands counterparts for the purposes of assessing eligibility for superannuation, pension and welfare payments was undertaken in the 2004-2005 year, see 'Annual Report of the Privacy Commissioner' (Wellington, 2005) at pp 68-71.
-
-
-
-
50
-
-
36049016147
-
-
Above n 8, Article 15.
-
Above n 8, Article 15.
-
-
-
-
51
-
-
67650125416
-
Dangers of tenant database
-
10 January
-
'Dangers of tenant database' The New Zealand Herald 10 January 2006.
-
(2006)
The New Zealand Herald
-
-
-
52
-
-
36049040691
-
Who Controls the Past Now Controls the Future: Counter-Terrorism, Data Mining and Privacy
-
See
-
See W Renke 'Who Controls the Past Now Controls the Future: Counter-Terrorism, Data Mining and Privacy' (2006) 43 Alberta LR 779.
-
(2006)
Alberta LR
, vol.43
, pp. 779
-
-
Renke, W.1
-
53
-
-
36049029707
-
-
Above n 6, at p 51
-
Above n 6, at p 51.
-
-
-
-
54
-
-
36048932415
-
-
US General Accounting Office, 'Data Mining: Federal Efforts Cover a Wide Range of Uses: Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget, and International Security' (Committee on Governmental Affairs, US Senate, May 2004) at p 1.
-
US General Accounting Office, 'Data Mining: Federal Efforts Cover a Wide Range of Uses: Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget, and International Security' (Committee on Governmental Affairs, US Senate, May 2004) at p 1.
-
-
-
-
55
-
-
36049029071
-
-
Above n 6, at p 52
-
Above n 6, at p 52.
-
-
-
-
56
-
-
36048982866
-
-
Ibid.
-
-
-
-
57
-
-
36049033129
-
-
Above n 6, at p 53
-
Above n 6, at p 53.
-
-
-
-
58
-
-
36049003734
-
-
Above n 52, at p 789
-
Above n 52, at p 789.
-
-
-
-
59
-
-
36049016148
-
-
Ibid.
-
-
-
-
60
-
-
36049013108
-
Balance of privacy vs security: A historical perspective of the USA PATRIOT Act
-
285 at pp
-
JT Soma, MM Nichols, SD Rynerson, LA Maish and JD Rogers 'Balance of privacy vs security: A historical perspective of the USA PATRIOT Act' (2005) 31 Rutgers Computer & Technology Law Journal 285 at pp 343-344.
-
(2005)
Rutgers Computer & Technology Law Journal
, vol.31
, pp. 343-344
-
-
Soma, J.T.1
Nichols, M.M.2
Rynerson, S.D.3
Maish, L.A.4
Rogers, J.D.5
-
62
-
-
36048999929
-
-
http://www.wired.com/news/privacy/0,1848,64748,00.html.
-
http://www.wired.com/news/privacy/0,1848,64748,00.html.
-
-
-
-
63
-
-
36048996631
-
-
Above n 6, Recommendation 10, p 138.
-
Above n 6, Recommendation 10, p 138.
-
-
-
-
64
-
-
36049023163
-
-
The risks and alleged benefits of data mining are thoroughly examined by Renke, above n 52. Renke argues, convincingly, that extreme caution must be exercised before employing such technology given the fact that modern terrorist organizations do not exhibit the same traits as those which existed in the past and also differ in many significant ways from organized criminal organizations. Many assumptions on which data mining is founded may therefore be incorrect, resulting in mistakes and consequent undermining of the public confidence in the efficacy of the practice.
-
The risks and alleged benefits of data mining are thoroughly examined by Renke, above n 52. Renke argues, convincingly, that extreme caution must be exercised before employing such technology given the fact that modern terrorist organizations do not exhibit the same traits as those which existed in the past and also differ in many significant ways from organized criminal organizations. Many assumptions on which data mining is founded may therefore be incorrect, resulting in mistakes and consequent undermining of the public confidence in the efficacy of the practice.
-
-
-
-
65
-
-
36049027798
-
-
USA Patriot Act, Pub. L. No. 107-56, 115 Stat.272 (2001).
-
USA Patriot Act, Pub. L. No. 107-56, 115 Stat.272 (2001).
-
-
-
-
66
-
-
36048973298
-
-
Above n 6, at p 23
-
Above n 6, at p 23.
-
-
-
-
67
-
-
36049044525
-
-
Above n 6, at p 70
-
Above n 6, at p 70.
-
-
-
-
68
-
-
36048973938
-
-
Ibid.
-
-
-
-
69
-
-
36048950300
-
-
at p
-
Ibid at p 71.
-
-
-
-
70
-
-
36048944808
-
-
Ibid.
-
-
-
-
71
-
-
84860937485
-
-
SS 1804 (a, 7, B) and 1823 a, 7, B
-
50 U.S.C. SS 1804 (a) (7) (B) and 1823 (a) (7) (B)
-
50 U.S.C
-
-
-
72
-
-
36049001856
-
-
the US courts have sanctioned the use of the powers for such expanded purposes, see for example In re: Sealed Case 310 F.3d 717 (U.S. Foreign Int. Surv. Ct. Rev. 2002)
-
the US courts have sanctioned the use of the powers for such expanded purposes, see for example In re: Sealed Case 310 F.3d 717 (U.S. Foreign Int. Surv. Ct. Rev. 2002)
-
-
-
-
73
-
-
36048930486
-
-
and United States v Sattar 2003 U.S. Dist. LEXIS 16164 (S.D.N.Y. 2003).
-
and United States v Sattar 2003 U.S. Dist. LEXIS 16164 (S.D.N.Y. 2003).
-
-
-
-
74
-
-
84888491658
-
-
S 2709 counterintelligence access to telephone toll and transactional records
-
18 U.S.C. S 2709 (counterintelligence access to telephone toll and transactional records)
-
18 U.S.C
-
-
-
75
-
-
36048976974
-
-
S 3414 special procedures for financial records
-
12 U.S.C. S 3414 (special procedures for financial records)
-
12 U.S.C
-
-
-
76
-
-
84956547845
-
-
S 1681 u credit record disclosures to FBI for counterintelligence purposes
-
15 U.S.C. S 1681 u (credit record disclosures to FBI for counterintelligence purposes).
-
15 U.S.C
-
-
-
77
-
-
36049020339
-
-
Above n 6, at p 73
-
Above n 6, at p 73.
-
-
-
-
78
-
-
36048959267
-
-
Ibid.
-
-
-
-
79
-
-
36048975723
-
-
For example see section 351, Patriot Act.
-
For example see section 351, Patriot Act.
-
-
-
-
80
-
-
85040407936
-
-
For discussion of different approaches to whistle-blowing see G Gunasekara 'Whistle-blowing: New Zealand and UK Solutions to a Common Problem' (2003) 24 Stat LR 39.
-
For discussion of different approaches to whistle-blowing see G Gunasekara 'Whistle-blowing: New Zealand and UK Solutions to a Common Problem' (2003) 24 Stat LR 39.
-
-
-
-
81
-
-
36049047074
-
Bank Data Is Sifted by U.S. in Secret to Block Terror
-
23 June
-
'Bank Data Is Sifted by U.S. in Secret to Block Terror' The New York Times 23 June 2006.
-
(2006)
The New York Times
-
-
-
82
-
-
36049051369
-
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say
-
15 December
-
'Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say' The New York Times 15 December 2005.
-
(2005)
The New York Times
-
-
-
83
-
-
36049015043
-
-
To be fair to the US Administration it did claim, in respect of the SWIFT disclosures, authority under the International Emergency Powers Act 50 U.S.C. ss 1701-1707 1977, whilst at the same time arguing that privacy legislation, such as the Right to Financial Privacy Act 1978, applied to banks, not to a banking co-operative such as Swift. Furthermore, the Admistration maintains the latter legislation applies to dealings between individuals and banks not to dealings between major institutions that route money through Swift on behalf of their customers. As to the basis for warrant-less eavesdropping, the Admistration appeared to rely on both Congressional resolutions on the campaign against terror as well as the argument that 'the Constitution vests in the President inherent authority to conduct warrant less intelligence surveillance of foreign powers or their agents, Assessment of the merits of these claims is beyond the scope of this article and at least some of the Administration's
-
To be fair to the US Administration it did claim, in respect of the SWIFT disclosures, authority under the International Emergency Powers Act 50 U.S.C. ss 1701-1707 (1977), whilst at the same time arguing that privacy legislation, such as the Right to Financial Privacy Act 1978, applied to banks, not to a banking co-operative such as Swift. Furthermore, the Admistration maintains the latter legislation applies to dealings between individuals and banks not to dealings between major institutions that route money through Swift on behalf of their customers. As to the basis for warrant-less eavesdropping, the Admistration appeared to rely on both Congressional resolutions on the campaign against terror as well as the argument that 'the Constitution vests in the President inherent authority to conduct warrant less intelligence surveillance of foreign powers or their agents. 'Assessment of the merits of these claims is beyond the scope of this article and at least some of the Administration's actions are currently under review by the US courts.
-
-
-
-
84
-
-
36049013109
-
-
Anti-terrorism Act, S.C. 2001, c. 41
-
Anti-terrorism Act, S.C. 2001, c. 41
-
-
-
-
85
-
-
36049029706
-
-
Canadian Security Intelligence Service Act, R.S.C. 1985, C-23.
-
Canadian Security Intelligence Service Act, R.S.C. 1985, C-23.
-
-
-
-
86
-
-
36048970438
-
-
Terrorism Suppression Act 2002, Financial Transactions Reporting Act 1996 and the New Zealand Security Intelligence Service Act 1969 (as amended).
-
Terrorism Suppression Act 2002, Financial Transactions Reporting Act 1996 and the New Zealand Security Intelligence Service Act 1969 (as amended).
-
-
-
-
87
-
-
36049038619
-
-
Commissioner of Security Warrants, required to have served as a High Court Judge, see Security Intelligence Service Act 1969 s 5A.
-
Commissioner of Security Warrants, required to have served as a High Court Judge, see Security Intelligence Service Act 1969 s 5A.
-
-
-
-
88
-
-
36049012461
-
-
Privacy Act s 57
-
Privacy Act s 57.
-
-
-
-
89
-
-
36048966954
-
-
Inspector General of Intelligence and Security Act 1996.
-
Inspector General of Intelligence and Security Act 1996.
-
-
-
-
90
-
-
84889777118
-
Counter-Terrorism law
-
See, for instance
-
See, for instance. Professor Matthew Palmer, 'Counter-Terrorism law' (2002) NZLJ 456.
-
(2002)
NZLJ
, pp. 456
-
-
Matthew Palmer, P.1
-
91
-
-
36048952130
-
-
Above n 21 at p 14
-
Above n 21 at p 14.
-
-
-
-
92
-
-
36048954510
-
-
Article 32
-
Article 3(2).
-
-
-
-
93
-
-
36049021892
-
-
Above n 9
-
Above n 9.
-
-
-
-
94
-
-
36049039892
-
-
For example, see the New Zealand Security Intelligence Act 1969 ss 4G & 4H (relating to the destruction of irrelevant records obtained by interception and the prevention or detection of serious crime).
-
For example, see the New Zealand Security Intelligence Act 1969 ss 4G & 4H (relating to the destruction of irrelevant records obtained by interception and the prevention or detection of serious crime).
-
-
-
-
95
-
-
36049043848
-
-
Above n 6 p 72
-
Above n 6 p 72.
-
-
-
-
97
-
-
36049043202
-
-
See the discussion in the previous section
-
See the discussion in the previous section.
-
-
-
-
98
-
-
36048996630
-
-
Article 25
-
Article 25.
-
-
-
-
99
-
-
36049006536
-
-
See, for example, in the UK, the Data Protection Act 1998 Schedule 1, Part I principle 8 and Schedule 1, Part II clause 13.
-
See, for example, in the UK, the Data Protection Act 1998 Schedule 1, Part I principle 8 and Schedule 1, Part II clause 13.
-
-
-
-
100
-
-
36048961505
-
-
Article 26: These include the consent of the data subject, contractual and other undertakings given by the transferee, matters considered further below.
-
Article 26: These include the consent of the data subject, contractual and other undertakings given by the transferee, matters considered further below.
-
-
-
-
101
-
-
36048960826
-
-
Heisenberg above n 35, at p 1
-
Heisenberg above n 35, at p 1.
-
-
-
-
102
-
-
36048950301
-
-
These are examined in detail by Heisenberg above n 35.
-
These are examined in detail by Heisenberg above n 35.
-
-
-
-
103
-
-
36048934376
-
Issuance of Safe Harbor Principles and Transmission to European Commission, 65
-
US Department of Commerce, 45666
-
US Department of Commerce, Issuance of Safe Harbor Principles and Transmission to European Commission, 65 Fed Reg 45666 (2000).
-
(2000)
Fed Reg
-
-
-
104
-
-
36048998211
-
-
Available at: http://web.ita.doc.gov/safeharbor/shlist.nsf/webPages/ safe+harbor+list!OpenDocument&Start=976
-
Available at: http://web.ita.doc.gov/safeharbor/shlist.nsf/webPages/ safe+harbor+list!OpenDocument&Start=976
-
-
-
-
105
-
-
67650833912
-
An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law
-
at p
-
D Lindsay, 'An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law' (2005) 29 Melbourne University LR 131, at p 175.
-
(2005)
Melbourne University LR
, vol.29
-
-
Lindsay, D.1
-
107
-
-
36048957935
-
-
Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 9.
-
Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 9.
-
-
-
-
108
-
-
36049039258
-
-
Heisenberg above n 35, at p 110
-
Heisenberg above n 35, at p 110.
-
-
-
-
109
-
-
36048980623
-
-
Personal Data (Privacy) Ordinance No 81 of 1995 s 33.
-
Personal Data (Privacy) Ordinance No 81 of 1995 s 33.
-
-
-
-
110
-
-
36048975722
-
-
Article 26; one point of distinction is that, under the European provisions, the onus is on the transferor to adduce 'sufficient safeguards'. meaning that concrete steps are necessary on its part; another is that rigorous duties of notification exist where transfer occurs together with the right of the Commission and Member states to object to the transfer. Despite this, the experience with Safe Harbor has shown that the Europeans in effect adopt a 'reasonableness' test in deciding whether third countries ensure an 'adequate' level of protection for personal data.
-
Article 26; one point of distinction is that, under the European provisions, the onus is on the transferor to adduce 'sufficient safeguards'. meaning that concrete steps are necessary on its part; another is that rigorous duties of notification exist where transfer occurs together with the right of the Commission and Member states to object to the transfer. Despite this, the experience with Safe Harbor has shown that the Europeans in effect adopt a 'reasonableness' test in deciding whether third countries ensure an 'adequate' level of protection for personal data.
-
-
-
-
111
-
-
32644436851
-
Offshore IT Outsourcing and the 8th Data Protection Principle - legal and regulatory requirements with reference to Financial Services
-
1 at p
-
R Baker, 'Offshore IT Outsourcing and the 8th Data Protection Principle - legal and regulatory requirements with reference to Financial Services' (2006) 14 International Journal of Law & Information Technology 1 at p 11.
-
(2006)
International Journal of Law & Information Technology
, vol.14
, pp. 11
-
-
Baker, R.1
-
112
-
-
36049015515
-
-
The almost identical UK provision is found in the Data Protection Act 1998, Schedule 4, cl 3 c.f. Privacy Act 1988 (C'th, Aust) Schedule 3, cl 9.
-
The almost identical UK provision is found in the Data Protection Act 1998, Schedule 4, cl 3 c.f. Privacy Act 1988 (C'th, Aust) Schedule 3, cl 9.
-
-
-
-
113
-
-
36048993167
-
-
See Baker, above n 106, at p 11.
-
See Baker, above n 106, at p 11.
-
-
-
-
115
-
-
36048933714
-
-
The US Safe Harbor scheme would presumably fall into the latter category
-
The US Safe Harbor scheme would presumably fall into the latter category.
-
-
-
-
116
-
-
36049026882
-
-
National Privacy Principle 4, Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 4.
-
National Privacy Principle 4, Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 4.
-
-
-
-
117
-
-
36048948986
-
-
Privacy Act 1993, s 6, Information Privacy Principle 5.
-
Privacy Act 1993, s 6, Information Privacy Principle 5.
-
-
-
-
118
-
-
36048993155
-
-
See Office of the Privacy Commissioner, Wellington, Recommendation, at p
-
See Office of the Privacy Commissioner, 'Necessary and Desirable: Privacy Act 1993 Review' (Wellington, 1998) Recommendation 35, at p 107.
-
(1998)
Necessary and Desirable: Privacy Act 1993 Review
, vol.35
, pp. 107
-
-
-
119
-
-
36048991204
-
-
Privacy Act 1988 (as amended) (C'th, Aust) s 5 B.
-
Privacy Act 1988 (as amended) (C'th, Aust) s 5 B.
-
-
-
-
120
-
-
36049010093
-
-
The precise meaning of 'collected... in Australia' would need clarification. See also the discussion relating to the French case of LICRA & UESF v Yahoo Tribunal de Grande Instance de Paris No RG: 00/ 5308 and the other cases discussed by Judge David Harvey in internet.law.nz (2 ed., LexisNexis: Wellington 2005) at pp 41-102.
-
The precise meaning of 'collected... in Australia' would need clarification. See also the discussion relating to the French case of LICRA & UESF v Yahoo Tribunal de Grande Instance de Paris No RG: 00/ 5308 and the other cases discussed by Judge David Harvey in internet.law.nz (2 ed., LexisNexis: Wellington 2005) at pp 41-102.
-
-
-
-
121
-
-
36049042646
-
-
Privacy Act 1993 s 10(2).
-
Privacy Act 1993 s 10(2).
-
-
-
-
122
-
-
36048948346
-
-
Ibid, s 3(4).
-
Ibid, s 3(4).
-
-
-
-
123
-
-
36049010720
-
-
Ibid, s 10(1).
-
Ibid, s 10(1).
-
-
-
-
124
-
-
36049049501
-
-
It should be noted that 'agency' is given a broad definition encompassing both the private and public sectors and includes natural persons, bodies of persons and corporations; see Privacy Act 1993 s 2
-
It should be noted that 'agency' is given a broad definition encompassing both the private and public sectors and includes natural persons, bodies of persons and corporations; see Privacy Act 1993 s 2.
-
-
-
-
125
-
-
36049019677
-
-
It would fall within the definition of 'agency' as set out above
-
It would fall within the definition of 'agency' as set out above.
-
-
-
-
126
-
-
36049010718
-
-
The applicability of this Act to conduct outside New Zealand is made clear by s 3 which stipulates: 'This Act extends to the engaging in conduct outside New Zealand by any person resident or carrying on business in New Zealand to the extent that such conduct relates to the supply of goods or services, or the granting of interests in land, within New Zealand.'
-
The applicability of this Act to conduct outside New Zealand is made clear by s 3 which stipulates: 'This Act extends to the engaging in conduct outside New Zealand by any person resident or carrying on business in New Zealand to the extent that such conduct relates to the supply of goods or services, or the granting of interests in land, within New Zealand.'
-
-
-
-
127
-
-
36049031858
-
-
Privacy Act 1993 s 10(3).
-
Privacy Act 1993 s 10(3).
-
-
-
-
128
-
-
36048929884
-
-
Privacy Act 1988 (as amended) (C'th, Aust) s 13 D.
-
Privacy Act 1988 (as amended) (C'th, Aust) s 13 D.
-
-
-
-
129
-
-
36049012460
-
-
Above n 75
-
Above n 75.
-
-
-
-
130
-
-
36049010719
-
-
See the discussion by M Schmidl, 'The Article 29 Working Party Opinion on Whistleblowing' (2006) 6 World Data Protection Report 23.
-
See the discussion by M Schmidl, 'The Article 29 Working Party Opinion on Whistleblowing' (2006) 6 World Data Protection Report 23.
-
-
-
-
131
-
-
36049029056
-
-
In New Zealand, for example, see Privacy Act 1993 s 6, Information Privacy Principle 11(d).
-
In New Zealand, for example, see Privacy Act 1993 s 6, Information Privacy Principle 11(d).
-
-
-
-
132
-
-
36049049001
-
-
A schedule, for example, can easily be attached to the contract containing the Fair Information/Privacy Principles
-
A schedule, for example, can easily be attached to the contract containing the Fair Information/Privacy Principles.
-
-
-
-
134
-
-
36049040692
-
-
2 Ph 774
-
(1848) 2 Ph 774.
-
-
-
-
135
-
-
36048960825
-
-
Burrows, Finn and Todd, Law of Contract in New Zealand (2 ed., LexisNexis, Wellington, 2004) at p 541.
-
Burrows, Finn and Todd, Law of Contract in New Zealand (2 ed., LexisNexis, Wellington, 2004) at p 541.
-
-
-
-
136
-
-
36049020338
-
-
Ibid
-
-
-
-
137
-
-
36049016790
-
-
see London County Council v Allen
-
see London County Council v Allen [1914] 3 KB 642.
-
(1914)
, vol.KB 642
, Issue.3
-
-
-
138
-
-
36048957934
-
-
See S Gardner, 'The Proprietary Effect of Contractual Obligations under Tulk v Moxhay and De Mattos v Gibson' (1982) 98 LQR 279.
-
See S Gardner, 'The Proprietary Effect of Contractual Obligations under Tulk v Moxhay and De Mattos v Gibson' (1982) 98 LQR 279.
-
-
-
-
139
-
-
36049012459
-
-
4 De G & J 276, 282
-
(1858) 4 De G & J 276, 282.
-
-
-
-
140
-
-
36048981570
-
-
Lord Stathcona SS Co v Dominion Coal Co
-
Lord Stathcona SS Co v Dominion Coal Co [1926] AC 108.
-
(1926)
, vol.AC 108
-
-
-
141
-
-
36049033755
-
-
Port Line Ltd v Ben Line Steamers Ltd
-
Port Line Ltd v Ben Line Steamers Ltd [1958] 2 QB 146.
-
(1958)
, vol.QB 146
, Issue.2
-
-
-
143
-
-
36048976972
-
-
Swiss Bank Corp v Lloyds Bank Ltd [1979] Ch 548, 575 per Browne-Wilkinson J.
-
Swiss Bank Corp v Lloyds Bank Ltd [1979] Ch 548, 575 per Browne-Wilkinson J.
-
-
-
-
145
-
-
36048978202
-
-
See the discussion above relating to jurisdictional approaches towards restricting exports of personal information
-
See the discussion above relating to jurisdictional approaches towards restricting exports of personal information.
-
-
-
-
146
-
-
36048944806
-
-
For example denial of credit, health insurance or the ability to access air travel, to name a few
-
For example denial of credit, health insurance or the ability to access air travel, to name a few.
-
-
-
-
147
-
-
36048988094
-
-
Privacy Act 1988 (as amended) (C'th, Aust) ss 6 A(2), 6 B(2) & 13 A(c): service providers contracted to the Commonwealth government are bound by the terms of their contract where this is inconsistent with the privacy principles. A breach of contract is deemed to be a breach of the privacy principles in these circumstances.
-
Privacy Act 1988 (as amended) (C'th, Aust) ss 6 A(2), 6 B(2) & 13 A(c): service providers contracted to the Commonwealth government are bound by the terms of their contract where this is inconsistent with the privacy principles. A breach of contract is deemed to be a breach of the privacy principles in these circumstances.
-
-
-
-
148
-
-
36048971107
-
-
See Baker, above n 106 at p 10.
-
See Baker, above n 106 at p 10.
-
-
-
-
149
-
-
36048977613
-
-
at pp
-
Ibid, at pp 10, 25.
-
-
-
-
150
-
-
36048996031
-
-
at p
-
Ibid, at p 13.
-
-
-
-
151
-
-
36048942099
-
-
at p
-
Ibid, at p 14.
-
-
-
-
152
-
-
36048937012
-
-
See
-
See: http://www.bp.com/popuppreviewtwocol.do?categoryId= 438&contentId=2008122.
-
-
-
-
153
-
-
36048974566
-
-
See, for example, Trade Practices Act 1974 (C'th, Aust) Part V Division 1 A, and Fair Trading Act (NZ) Parts 2 and 3.
-
See, for example, Trade Practices Act 1974 (C'th, Aust) Part V Division 1 A, and Fair Trading Act (NZ) Parts 2 and 3.
-
-
-
-
154
-
-
36048943356
-
-
See, for example, Trade Practices Act 1974 (C'th, Aust) Part IV B Industry Codes.
-
See, for example, Trade Practices Act 1974 (C'th, Aust) Part IV B Industry Codes.
-
-
-
-
155
-
-
36048982198
-
-
In New Zealand see, for instance, the Health Information Privacy Code 1994.
-
In New Zealand see, for instance, the Health Information Privacy Code 1994.
-
-
-
-
156
-
-
36048976345
-
-
Cartagena Protocol on Biosafety to the Convention on Biological Diversity adopted in May, and
-
Cartagena Protocol on Biosafety to the Convention on Biological Diversity (adopted in May 2000) Articles 8 and 20.
-
(2000)
Articles
, pp. 8-20
-
-
-
157
-
-
36049045773
-
-
Sarbanes-Oxley Act of 2002, Pub. L. No. 107-204, 116 Stat.745 (2002).
-
Sarbanes-Oxley Act of 2002, Pub. L. No. 107-204, 116 Stat.745 (2002).
-
-
-
-
158
-
-
36049031848
-
-
Such as the Enron debacle
-
Such as the Enron debacle.
-
-
-
-
159
-
-
36049011308
-
-
See Baker, above n 106, at p 10.
-
See Baker, above n 106, at p 10.
-
-
-
-
160
-
-
36048982854
-
-
Ibid.
-
-
-
-
161
-
-
36049015504
-
-
Companies Act 1993 s 175(2).
-
Companies Act 1993 s 175(2).
-
-
-
-
162
-
-
36049022482
-
-
Privacy Act 1993 (NZ) s 23.
-
Privacy Act 1993 (NZ) s 23.
-
-
-
-
163
-
-
36048971694
-
-
Heisenberg above n 35 at p 171
-
Heisenberg above n 35 at p 171.
-
-
-
-
165
-
-
36048977601
-
-
See the studies catalogued by Heisenberg above n 35 at pp 37-40.
-
See the studies catalogued by Heisenberg above n 35 at pp 37-40.
-
-
-
-
166
-
-
36048933059
-
-
See Article 12 of the United Nations Declaration of Human Rights and Article 17 of the International Covenant on Civil and Political Rights.
-
See Article 12 of the United Nations Declaration of Human Rights and Article 17 of the International Covenant on Civil and Political Rights.
-
-
-
-
167
-
-
36049012450
-
-
See for instance the APEC Privacy Framework, available at: http://www.apecsec.org.sg/apec/news_dia/2004_media_releases/ 201104_apecminsendorseprivacyfrmwk.html; the standards contained in it do not match those of the EU, however, as it fails, for example, to include any provisions relating to data exports.
-
See for instance the APEC Privacy Framework, available at: http://www.apecsec.org.sg/apec/news_dia/2004_media_releases/ 201104_apecminsendorseprivacyfrmwk.html; the standards contained in it do not match those of the EU, however, as it fails, for example, to include any provisions relating to data exports.
-
-
-
-
168
-
-
33745612768
-
The use of information contained in the airline passenger name record - some issues
-
See
-
See R Abeyratne 'The use of information contained in the airline passenger name record - some issues' (2005) 10 Communications Law 170.
-
(2005)
Communications Law
, vol.10
, pp. 170
-
-
Abeyratne, R.1
-
169
-
-
36048972641
-
-
For example the TRIPS agreement
-
For example the TRIPS agreement.
-
-
-
-
170
-
-
36048948969
-
-
Above n 150, Article 20.
-
Above n 150, Article 20.
-
-
-
-
171
-
-
36048996017
-
-
Ibid.
-
-
-
-
172
-
-
36048946702
-
-
16, available at
-
16 September, 2005 available at: http://www.libertysecurity.org/ article709.html.
-
(2005)
-
-
September1
-
173
-
-
36048931123
-
-
Available at
-
Available at: http://www.bakercyberlawcentre.org/ipp/.
-
-
-
|