-
1
-
-
67650154469
-
-
Several watch lists exist including, in the United States, that of the Offi ce of Foreign Assets Control (available at: http://www.treasury.gov/ offices/enforcement/ofac/sdn/t11sdn.pdf) as well as a United Nations list.
-
Several watch lists exist including, in the United States, that of the Offi ce of Foreign Assets Control (available at: http://www.treasury.gov/ offices/enforcement/ofac/sdn/t11sdn.pdf) as well as a United Nations list.
-
-
-
-
2
-
-
67650098411
-
-
For an account of this incident see the Weekend Herald, Saturday-Sunday, October 23-24 2004, A16.
-
For an account of this incident see the Weekend Herald, Saturday-Sunday, October 23-24 2004, A16.
-
-
-
-
3
-
-
67650113852
-
-
This is discussed further below
-
This is discussed further below.
-
-
-
-
4
-
-
67650108822
-
-
British Columbia Government & Service Employees' Union (petitioner) v The Minister of Health Services and The Medical Services Commission (respondents) B.C.S.C., Victoria registry No. 04-0879.
-
British Columbia Government & Service Employees' Union (petitioner) v The Minister of Health Services and The Medical Services Commission (respondents) B.C.S.C., Victoria registry No. 04-0879.
-
-
-
-
5
-
-
67650177035
-
-
Freedom of Information and Protection of Privacy Amendment Act, 2004, S.B.C. 2004, c.64.
-
Freedom of Information and Protection of Privacy Amendment Act, 2004, S.B.C. 2004, c.64.
-
-
-
-
6
-
-
67650131605
-
-
Information & Privacy Commissioner for British Columbia 'Privacy and the USA Patriot Act: Implications for British Columbia Public Sector Outsourcing', (British Columbia, 2004). Available at: http://www.oipcbc.org/sector_public/usa_paariot_act/pdfs/report/ privacy-final.pdf.
-
Information & Privacy Commissioner for British Columbia 'Privacy and the USA Patriot Act: Implications for British Columbia Public Sector Outsourcing', (British Columbia, 2004). Available at: http://www.oipcbc.org/sector_public/usa_paariot_act/pdfs/report/ privacy-final.pdf.
-
-
-
-
7
-
-
67650163700
-
-
The PNR data elements include the 'PNR record locator code,' date of reservation, name, address, all forms of payment information, contact telephone numbers, travel agency, travel status of the passenger, e-mail address, general remarks, seat number, no-show history and any collected APIS (Advanced Passenger Information System) Information.
-
The PNR data elements include the 'PNR record locator code,' date of reservation, name, address, all forms of payment information, contact telephone numbers, travel agency, travel status of the passenger, e-mail address, general remarks, seat number, no-show history and any collected APIS (Advanced Passenger Information System) Information.
-
-
-
-
9
-
-
67650118007
-
-
European Parliament v Council of the European Union, ECJ, C-317/04 & C-318/04, 30 May 2006.
-
European Parliament v Council of the European Union, ECJ, C-317/04 & C-318/04, 30 May 2006.
-
-
-
-
12
-
-
67650167944
-
-
Restatement of the Law of Torts, 2d (American Law institute: 1965-79) S 652A-F.
-
Restatement of the Law of Torts, 2d (American Law institute: 1965-79) S 652A-F.
-
-
-
-
13
-
-
67650158623
-
-
Through application of the existing remedy of Breach of Confi dence although influenced heavily by the Human Rights Act 1998 (UK) which implemented the European Convention on Human Rights see Campbell v MGN Ltd [2004] 2 AC 457 HL
-
Through application of the existing remedy of Breach of Confi dence although influenced heavily by the Human Rights Act 1998 (UK) which implemented the European Convention on Human Rights see Campbell v MGN Ltd [2004] 2 AC 457 (HL).
-
-
-
-
14
-
-
36048955166
-
-
1 NZLR 1 CA
-
Hosking v Runting [2005] 1 NZLR 1 (CA).
-
(2005)
Hosking v Runting
-
-
-
15
-
-
67650161707
-
-
Early concern in New Zealand over privacy led to the enactment of the Wanganui Computer Centre Act 1976 which for the fi rst time contained provisions safeguarding personal privacy of citizens
-
Early concern in New Zealand over privacy led to the enactment of the Wanganui Computer Centre Act 1976 which for the fi rst time contained provisions safeguarding personal privacy of citizens.
-
-
-
-
17
-
-
67650098418
-
-
5 USC S 552(a) (1988).
-
5 USC S 552(a) (1988).
-
-
-
-
18
-
-
67650145084
-
-
Available at
-
Available at: www.oecd.org.
-
-
-
-
19
-
-
67650158629
-
-
Personal Information Protection and Electronic Documents Act, S.C. 2000, c.5.
-
Personal Information Protection and Electronic Documents Act, S.C. 2000, c.5.
-
-
-
-
20
-
-
67650154468
-
-
Above n 6, at p 38
-
Above n 6, at p 38.
-
-
-
-
21
-
-
67650154163
-
-
Privacy Commissioner of Canada, 'Annual Report to Parliament 2003-2004' (available at: http://www.privcom.gc.ca/information/ar/200304/ 200304_e.asp).
-
Privacy Commissioner of Canada, 'Annual Report to Parliament 2003-2004' (available at: http://www.privcom.gc.ca/information/ar/200304/ 200304_e.asp).
-
-
-
-
22
-
-
67650104294
-
-
Privacy Act, 1993, s 6.
-
Privacy Act, 1993, s 6.
-
-
-
-
23
-
-
67650108494
-
-
Privacy Amendment (Private Sector) Act 2000 (C'th, Aust).
-
Privacy Amendment (Private Sector) Act 2000 (C'th, Aust).
-
-
-
-
24
-
-
67650104295
-
-
Privacy Act 1993
-
Privacy Act 1993.
-
-
-
-
25
-
-
67650111629
-
-
Privacy Act 1988 (as amended) (C'th, Aust).
-
Privacy Act 1988 (as amended) (C'th, Aust).
-
-
-
-
26
-
-
67650113840
-
-
Personal Data (Privacy) Ordinance 1996.
-
Personal Data (Privacy) Ordinance 1996.
-
-
-
-
27
-
-
67650154139
-
-
Personal Information Protection Act (Law No. 57 of 2003).
-
Personal Information Protection Act (Law No. 57 of 2003).
-
-
-
-
28
-
-
67650167658
-
-
For example the Video Privacy Protection Act 1988 was enacted by Congress as a result of the release of Judge Robert Bork's video rental records during his failed Supreme Court nomination.
-
For example the Video Privacy Protection Act 1988 was enacted by Congress as a result of the release of Judge Robert Bork's video rental records during his failed Supreme Court nomination.
-
-
-
-
29
-
-
67650163437
-
-
Above n 6, at p 51
-
Above n 6, at p 51.
-
-
-
-
30
-
-
67650140622
-
-
Involving the alleged extra-legal abduction and transfer of suspects to 'black-sites' in third countries where they have been allegedly subject to detention, torture and interrogation; see P Sands 'The International Rule of Law: Extraordinary Rendition, Complicity and its Consequences' [2006] European Human Rights LR 408.
-
Involving the alleged extra-legal abduction and transfer of suspects to 'black-sites' in third countries where they have been allegedly subject to detention, torture and interrogation; see P Sands 'The International Rule of Law: Extraordinary Rendition, Complicity and its Consequences' [2006] European Human Rights LR 408.
-
-
-
-
31
-
-
67650122033
-
-
See for instance C Doyle and M Bagaric, Privacy Law in Australia (The Federation Press: Sydney 2005) at pp 50-56.
-
See for instance C Doyle and M Bagaric, Privacy Law in Australia (The Federation Press: Sydney 2005) at pp 50-56.
-
-
-
-
32
-
-
67650177023
-
-
Above n 6, at p 44
-
Above n 6, at p 44.
-
-
-
-
33
-
-
36048936388
-
-
Public Policy Forum and ITAC Round Table, Ottawa, 20 May, at p
-
Public Policy Forum and ITAC Round Table, 'IT Offshore Outsourcing Practices in Canada' (Ottawa, 20 May 2004) at p 6.
-
(2004)
IT Offshore Outsourcing Practices in Canada
, pp. 6
-
-
-
34
-
-
67650158624
-
-
The process of satisfying the European Commission under the Privacy Directive is explained below
-
The process of satisfying the European Commission under the Privacy Directive is explained below.
-
-
-
-
35
-
-
67650122032
-
-
See generally the discussion in Dorothee Heisenberg, Negotiating Privacy: The European Union, the United States, and Personal Data Protection (Lynne Rienner Publishers, USA, 2005) at pp 112-113.
-
See generally the discussion in Dorothee Heisenberg, Negotiating Privacy: The European Union, the United States, and Personal Data Protection (Lynne Rienner Publishers, USA, 2005) at pp 112-113.
-
-
-
-
36
-
-
67650147957
-
-
Ibid.
-
-
-
-
37
-
-
67650113575
-
-
US, Bill H.R. 4366, Personal Data Offshoring Protection Act of 2004, 108 th Cong., 2004.
-
US, Bill H.R. 4366, Personal Data Offshoring Protection Act of 2004, 108 th Cong., 2004.
-
-
-
-
38
-
-
67650161471
-
-
Above n 6, at p 44
-
Above n 6, at p 44.
-
-
-
-
39
-
-
67650177275
-
-
Above n 6
-
Above n 6.
-
-
-
-
40
-
-
67650122319
-
-
Ibid, at p 136, see particularly Recommendations 4, 5 and 6.
-
Ibid, at p 136, see particularly Recommendations 4, 5 and 6.
-
-
-
-
41
-
-
67650158622
-
-
at p
-
Ibid, at p 49.
-
-
-
-
42
-
-
67650125190
-
-
In New Zealand, for example, see the Privacy Commissioner Act 1991 which has been replaced by Part X Privacy Act 1993.
-
In New Zealand, for example, see the Privacy Commissioner Act 1991 which has been replaced by Part X Privacy Act 1993.
-
-
-
-
43
-
-
67650108823
-
-
Privacy Act 1993, Part X.
-
(1993)
, Issue.PART X
-
-
Act, P.1
-
44
-
-
67650117745
-
-
Data-matching Program (Assistance and tax) Act 1990 (C'th). It should be noted that section 12 of this Act requires the Privacy Commissioner to issue Guidelines for the conduct of data-matching programmes and that a breach of either the Act or Guidelines constitutes an interference with privacy under s 13 of the Privacy Act 1988 (C'th) thus enabling a person to complain to the Privacy Commissioner.
-
Data-matching Program (Assistance and tax) Act 1990 (C'th). It should be noted that section 12 of this Act requires the Privacy Commissioner to issue Guidelines for the conduct of data-matching programmes and that a breach of either the Act or Guidelines constitutes an interference with privacy under s 13 of the Privacy Act 1988 (C'th) thus enabling a person to complain to the Privacy Commissioner.
-
-
-
-
45
-
-
67650140965
-
-
Privacy Act 1993, s 98.
-
Privacy Act 1993, s 98.
-
-
-
-
46
-
-
67650127348
-
-
Ibid, Part X.
-
Ibid, Part X.
-
-
-
-
48
-
-
67650127341
-
-
In other words a further 'black list' of those caught cheating the social welfare for example cannot be maintained after the initial adverse action is taken against the individuals concerned
-
In other words a further 'black list' of those caught cheating the social welfare for example cannot be maintained after the initial adverse action is taken against the individuals concerned.
-
-
-
-
49
-
-
67650098148
-
-
For example programmes between the New Zealand Inland Revenue Department and its Netherlands counterparts for the purposes of assessing eligibility for superannuation, pension and welfare payments was undertaken in the 2004-2005 year, see 'Annual Report of the Privacy Commissioner, Wellington, 2005 at pp68-71
-
For example programmes between the New Zealand Inland Revenue Department and its Netherlands counterparts for the purposes of assessing eligibility for superannuation, pension and welfare payments was undertaken in the 2004-2005 year, see 'Annual Report of the Privacy Commissioner', (Wellington, 2005) at pp68-71.
-
-
-
-
50
-
-
67650113838
-
-
Above n 8, Article 15.
-
Above n 8, Article 15.
-
-
-
-
51
-
-
67650125416
-
Dangers of tenant database
-
10 January
-
'Dangers of tenant database' The New Zealand Herald 10 January 2006.
-
(2006)
The New Zealand Herald
-
-
-
52
-
-
36049040691
-
Who Controls the Past Now Controls the Future: Counter-Terrorism, Data Mining and Privacy
-
See
-
See W Renke 'Who Controls the Past Now Controls the Future: Counter-Terrorism, Data Mining and Privacy' (2006) 43 Alberta LR 779.
-
(2006)
Alberta LR
, vol.43
, pp. 779
-
-
Renke, W.1
-
53
-
-
67650140959
-
-
Above n 6, at p 51
-
Above n 6, at p 51.
-
-
-
-
54
-
-
67650098403
-
-
US General Accounting Offi ce, 'Data Mining: Federal Efforts Cover a Wide Range of Uses: Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget, and International Security', (Committee on Governmental Affairs, US Senate, May 2004) at p 1.
-
US General Accounting Offi ce, 'Data Mining: Federal Efforts Cover a Wide Range of Uses: Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget, and International Security', (Committee on Governmental Affairs, US Senate, May 2004) at p 1.
-
-
-
-
55
-
-
67650145074
-
-
Above n 6, at p 52
-
Above n 6, at p 52.
-
-
-
-
56
-
-
67650161711
-
-
Ibid.
-
-
-
-
57
-
-
67650144842
-
-
Above n 6, at p 53
-
Above n 6, at p 53.
-
-
-
-
58
-
-
67650140625
-
-
Above n 52, at p 789
-
Above n 52, at p 789.
-
-
-
-
59
-
-
67650113576
-
-
Ibid.
-
-
-
-
60
-
-
36049013108
-
Balance of privacy vs security: A historical perspective of the USA PATRIOT Act
-
285 at pp
-
J T Soma, MM Nichols, SD Rynerson, LA Maish & JD Rogers 'Balance of privacy vs security: A historical perspective of the USA PATRIOT Act' (2005) 31 Rutgers Computer & Technology Law Journal 285 at pp 343-344.
-
(2005)
Rutgers Computer & Technology Law Journal
, vol.31
, pp. 343-344
-
-
Soma, J.T.1
Nichols, M.M.2
Rynerson, S.D.3
Maish, L.A.4
Rogers, J.D.5
-
62
-
-
67650113594
-
-
http://www.wired.com/news/privacy/0,1848,64748,00.html.
-
http://www.wired.com/news/privacy/0,1848,64748,00.html.
-
-
-
-
63
-
-
67650098407
-
-
Above n 6, Recommendation 10, p 138.
-
Above n 6, Recommendation 10, p 138.
-
-
-
-
64
-
-
67650158384
-
-
The risks and alleged benefi ts of data mining are thoroughly examined by Renke, above n 52. Renke argues, convincingly, that extreme caution must be exercised before employing such technology given the fact that modern terrorist organisations do not exhibit the same traits as those which existed in the past and also differ in many significant ways from organised criminal organisations. Many assumptions on which data mining is founded may therefore be incorrect resulting in mistakes and consequent undermining of the public confi dence in the efficacy of the practice.
-
The risks and alleged benefi ts of data mining are thoroughly examined by Renke, above n 52. Renke argues, convincingly, that extreme caution must be exercised before employing such technology given the fact that modern terrorist organisations do not exhibit the same traits as those which existed in the past and also differ in many significant ways from organised criminal organisations. Many assumptions on which data mining is founded may therefore be incorrect resulting in mistakes and consequent undermining of the public confi dence in the efficacy of the practice.
-
-
-
-
65
-
-
67650147958
-
-
USA Patriot Act, Pub. L. No. 107-56, 115 Stat.272 (2001).
-
USA Patriot Act, Pub. L. No. 107-56, 115 Stat.272 (2001).
-
-
-
-
66
-
-
67650177031
-
-
Above n 6, at p 23
-
Above n 6, at p 23.
-
-
-
-
67
-
-
67650117738
-
-
Above n 6, at p 70
-
Above n 6, at p 70.
-
-
-
-
68
-
-
67650117739
-
-
Ibid.
-
-
-
-
69
-
-
67650125414
-
-
at p
-
Ibid at p 71.
-
-
-
-
70
-
-
67650177274
-
-
Ibid.
-
-
-
-
71
-
-
84860937485
-
-
SS 1804 (a, 7, B) and 1823 a, 7, B
-
50 U.S.C. SS 1804 (a) (7) (B) and 1823 (a) (7) (B);
-
50 U.S.C
-
-
-
72
-
-
67650108819
-
-
the United States courts have sanctioned the use of the powers for such expanded purposes, see for example In re: Sealed Case 310 F.3d 717 (U.S. Foreign Int. Surv. Ct. Rev. 2002)
-
the United States courts have sanctioned the use of the powers for such expanded purposes, see for example In re: Sealed Case 310 F.3d 717 (U.S. Foreign Int. Surv. Ct. Rev. 2002)
-
-
-
-
73
-
-
67650108509
-
-
and United States v Sattar 2003 U.S. Dist. LEXIS 16164 (S.D.N.Y. 2003).
-
and United States v Sattar 2003 U.S. Dist. LEXIS 16164 (S.D.N.Y. 2003).
-
-
-
-
74
-
-
84888491658
-
-
S 2709 counterintelligence access to telephone toll and transactional records
-
18 U.S.C. S 2709 (counterintelligence access to telephone toll and transactional records);
-
18 U.S.C
-
-
-
75
-
-
36048976974
-
-
S 3414 special procedures for fi nancial records
-
12 U.S.C. S 3414 (special procedures for fi nancial records);
-
12 U.S.C
-
-
-
76
-
-
84956547845
-
-
S 1681 u credit record disclosures to FBI for counterintelligence purposes
-
15 U.S.C. S 1681 u (credit record disclosures to FBI for counterintelligence purposes).
-
15 U.S.C
-
-
-
77
-
-
67650127091
-
-
Above n 6, at p 73
-
Above n 6, at p 73.
-
-
-
-
78
-
-
67650131348
-
-
Ibid.
-
-
-
-
79
-
-
67650131336
-
-
For example see section 351, Patriot Act.
-
For example see section 351, Patriot Act.
-
-
-
-
80
-
-
85040407936
-
-
For discussion of different approaches to whistle-blowing see G Gunasekara 'Whistle-blowing: New Zealand and UK Solutions to a Common Problem' (2003) 24 Stat LR 39.
-
For discussion of different approaches to whistle-blowing see G Gunasekara 'Whistle-blowing: New Zealand and UK Solutions to a Common Problem' (2003) 24 Stat LR 39.
-
-
-
-
81
-
-
67650122043
-
-
'Bank Data Is Sifted by U.S. in Secret to Block Terror' The New York Times June 23, 2006.
-
'Bank Data Is Sifted by U.S. in Secret to Block Terror' The New York Times June 23, 2006.
-
-
-
-
82
-
-
67650131361
-
Some Limits on Spying in U.S. After 9/11, Officials Say'
-
December 15
-
'Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say' The New York Times December 15, 2005.
-
(2005)
The New York Times
-
-
Secretly Lifted, B.1
-
83
-
-
67650113568
-
-
To be fair to the US Administration it did claim, in respect of the SWIFT disclosures, authority under the International Emergency Powers Act 50 U.S.C. ss 1701-1707 1977, whilst at the same time arguing that privacy legislation, such as the Right to Financial Privacy Act 1978, applied to banks, not to a banking co-operative such as Swift. Furthermore the Admistration maintains the latter legislation applies to dealings between individuals and banks not to dealings between major institutions that route money through Swift on behalf of their customers. As to the basis for warrant less eavesdropping the Admistration appeared to rely on both Congressional resolutions on the campaign against terror as well as the argument that 'the Constitution vests in the President inherent authority to conduct warrant less intelligence surveillance of foreign powers or their agents, Assessment of the merits of these claims is beyond the scope of this article and at least some of the Administration's a
-
To be fair to the US Administration it did claim, in respect of the SWIFT disclosures, authority under the International Emergency Powers Act 50 U.S.C. ss 1701-1707 (1977), whilst at the same time arguing that privacy legislation, such as the Right to Financial Privacy Act 1978, applied to banks, not to a banking co-operative such as Swift. Furthermore the Admistration maintains the latter legislation applies to dealings between individuals and banks not to dealings between major institutions that route money through Swift on behalf of their customers. As to the basis for warrant less eavesdropping the Admistration appeared to rely on both Congressional resolutions on the campaign against terror as well as the argument that 'the Constitution vests in the President inherent authority to conduct warrant less intelligence surveillance of foreign powers or their agents.' Assessment of the merits of these claims is beyond the scope of this article and at least some of the Administration's actions are currently under review by the United States courts.
-
-
-
-
84
-
-
67650154457
-
-
Anti-terrorism Act, S.C. 2001, c. 41;
-
Anti-terrorism Act, S.C. 2001, c. 41;
-
-
-
-
85
-
-
67650113588
-
-
Canadian Security Intelligence Service Act, R.S.C. 1985, C-23.
-
Canadian Security Intelligence Service Act, R.S.C. 1985, C-23.
-
-
-
-
86
-
-
67650147947
-
-
Terrorism Suppression Act 2002, Financial Transactions Reporting Act 1996 and the New Zealand Security Intelligence Service Act 1969 (as amended).
-
Terrorism Suppression Act 2002, Financial Transactions Reporting Act 1996 and the New Zealand Security Intelligence Service Act 1969 (as amended).
-
-
-
-
87
-
-
67650140636
-
-
Commissioner of Security Warrants, required to have served as a High Court Judge, see Security Intelligence Service Act 1969 s 5A.
-
Commissioner of Security Warrants, required to have served as a High Court Judge, see Security Intelligence Service Act 1969 s 5A.
-
-
-
-
88
-
-
67650154150
-
-
Privacy Act s 57
-
Privacy Act s 57.
-
-
-
-
89
-
-
67650101229
-
-
Inspector General of Intelligence and Security Act 1996.
-
Inspector General of Intelligence and Security Act 1996.
-
-
-
-
90
-
-
84889777118
-
Counter-Terrorism law
-
See for instance
-
See for instance Professor Matthew Palmer, 'Counter-Terrorism law' [2002] NZLJ 456.
-
(2002)
NZLJ
, pp. 456
-
-
Matthew Palmer, P.1
-
91
-
-
67650167672
-
-
Above n 21 at p 14
-
Above n 21 at p 14.
-
-
-
-
92
-
-
67650131598
-
-
Article 32
-
Article 3(2).
-
-
-
-
93
-
-
67650111638
-
-
Above n 9
-
Above n 9.
-
-
-
-
94
-
-
67650131347
-
-
For example see the New Zealand Security Intelligence Act 1969 ss 4G & 4H (relating to the destruction of irrelevant records obtained by interception and the prevention or detection of serious crime).
-
For example see the New Zealand Security Intelligence Act 1969 ss 4G & 4H (relating to the destruction of irrelevant records obtained by interception and the prevention or detection of serious crime).
-
-
-
-
95
-
-
67650145073
-
-
Above n 6 p 72
-
Above n 6 p 72.
-
-
-
-
97
-
-
67650144844
-
-
See the discussion in the previous section
-
See the discussion in the previous section.
-
-
-
-
98
-
-
67650163463
-
-
Article 25
-
Article 25.
-
-
-
-
99
-
-
67650117743
-
-
See for example, in the United Kingdom, the Data Protection Act 1998 Schedule 1, Part I principle 8 and Schedule 1, Part II clause 13.
-
See for example, in the United Kingdom, the Data Protection Act 1998 Schedule 1, Part I principle 8 and Schedule 1, Part II clause 13.
-
-
-
-
100
-
-
67650108507
-
-
Article 26: These include the consent of the data subject, contractual and other undertakings given by the transferee, matters considered further below.
-
Article 26: These include the consent of the data subject, contractual and other undertakings given by the transferee, matters considered further below.
-
-
-
-
101
-
-
67650098140
-
-
Heisenberg above n 35, at p 1
-
Heisenberg above n 35, at p 1.
-
-
-
-
102
-
-
67650154149
-
-
These are examined in detail by Heisenberg above n 35.
-
These are examined in detail by Heisenberg above n 35.
-
-
-
-
103
-
-
67650161478
-
-
United States Department of Commerce, Issuance of Safe Harbor Principles and Transmission to European Commission, 65 Fed Reg 45666 (2000).
-
United States Department of Commerce, Issuance of Safe Harbor Principles and Transmission to European Commission, 65 Fed Reg 45666 (2000).
-
-
-
-
104
-
-
67650104312
-
-
Available at: http://web.ita.doc.gov/safeharbor/shlist.nsf/webPages/ safe+harbor+list!OpenDocument&Start=976
-
Available at: http://web.ita.doc.gov/safeharbor/shlist.nsf/webPages/ safe+harbor+list!OpenDocument&Start=976
-
-
-
-
105
-
-
67650833912
-
An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law
-
at p
-
D Lindsay, 'An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law' (2005) 29 Melbourne University LR 131, at p 175.
-
(2005)
Melbourne University LR
, vol.29
-
-
Lindsay, D.1
-
107
-
-
67650125191
-
-
Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 9.
-
Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 9.
-
-
-
-
108
-
-
67650125180
-
-
Heisenberg above n 35, at p 110
-
Heisenberg above n 35, at p 110.
-
-
-
-
109
-
-
67650167681
-
-
Personal Data (Privacy) Ordinance No 81 of 1995 s 33.
-
Personal Data (Privacy) Ordinance No 81 of 1995 s 33.
-
-
-
-
110
-
-
67650131349
-
-
Article 26; one point of distinction is that, under the European provisions the onus is on the transferor to adduce 'sufficient safeguards' meaning that concrete steps are necessary on its part, another is that rigorous duties of notification exist where transfer occurs together with the right of the Commission and Member states to object to the transfer. Despite this, the experience with Safe Harbor has shown that the Europeans in effect adopt a 'reasonableness' test in deciding whether third countries ensure an 'adequate' level of protection for personal data.
-
Article 26; one point of distinction is that, under the European provisions the onus is on the transferor to adduce 'sufficient safeguards' meaning that concrete steps are necessary on its part, another is that rigorous duties of notification exist where transfer occurs together with the right of the Commission and Member states to object to the transfer. Despite this, the experience with Safe Harbor has shown that the Europeans in effect adopt a 'reasonableness' test in deciding whether third countries ensure an 'adequate' level of protection for personal data.
-
-
-
-
111
-
-
32644436851
-
Offshore IT Outsourcing and the 8th Data Protection Principle - legal and regulatory requirements with reference to Financial Services
-
1 at p
-
R Baker, 'Offshore IT Outsourcing and the 8th Data Protection Principle - legal and regulatory requirements with reference to Financial Services' (2006) 14 International Journal of Law & Information Technology 1 at p 11.
-
(2006)
International Journal of Law & Information Technology
, vol.14
, pp. 11
-
-
Baker, R.1
-
112
-
-
67650177032
-
-
The almost identical United Kingdom provision is found in the Data Protection Act 1998, Schedule 4, cl 3 c.f. Privacy Act 1988 (C'th, Aust) Schedule 3, cl 9.
-
The almost identical United Kingdom provision is found in the Data Protection Act 1998, Schedule 4, cl 3 c.f. Privacy Act 1988 (C'th, Aust) Schedule 3, cl 9.
-
-
-
-
113
-
-
67650140637
-
-
See Baker, above n 106, at p 11.
-
See Baker, above n 106, at p 11.
-
-
-
-
115
-
-
67650177033
-
-
The US Safe Harbour scheme would presumably fall into the latter category
-
The US Safe Harbour scheme would presumably fall into the latter category.
-
-
-
-
116
-
-
67650122044
-
-
National Privacy Principle 4, Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 4.
-
National Privacy Principle 4, Privacy Act 1988 (as amended) (C'th, Aust) Schedule 3, clause 4.
-
-
-
-
118
-
-
67650163453
-
-
See Office of the Privacy Commissioner, 'Necessary and Desirable: Privacy Act 1993 Review' (Wellington, 1998) Recommendation 35, at p 107.
-
See Office of the Privacy Commissioner, 'Necessary and Desirable: Privacy Act 1993 Review' (Wellington, 1998) Recommendation 35, at p 107.
-
-
-
-
119
-
-
67650147959
-
-
Privacy Act 1988 (as amended) (C'th, Aust) s 5 B.
-
Privacy Act 1988 (as amended) (C'th, Aust) s 5 B.
-
-
-
-
120
-
-
67650144843
-
-
The precise meaning of 'collected...in Australia' would need clarification. See also the discussion relating to the French case of LICRA & UESF v Yahoo Tribunal de Grande Instance de Paris No RG: 00/5308 and the other cases discussed by Judge David Harvey in internet.law.nz (2 ed., LexisNexis: Wellington 2005) at pp41-102.
-
The precise meaning of 'collected...in Australia' would need clarification. See also the discussion relating to the French case of LICRA & UESF v Yahoo Tribunal de Grande Instance de Paris No RG: 00/5308 and the other cases discussed by Judge David Harvey in internet.law.nz (2 ed., LexisNexis: Wellington 2005) at pp41-102.
-
-
-
-
121
-
-
67650154154
-
-
Privacy Act 1993 s 10(2).
-
Privacy Act 1993 s 10(2).
-
-
-
-
122
-
-
67650158403
-
-
Ibid, s 3(4).
-
Ibid, s 3(4).
-
-
-
-
123
-
-
67650127094
-
-
Ibid, s 10(1).
-
Ibid, s 10(1).
-
-
-
-
124
-
-
67650127099
-
-
It should be noted that 'agency' is given a broad definition encompassing both the private and public sectors and includes natural persons, bodies of persons and corporations; see Privacy Act 1993 s 2
-
It should be noted that 'agency' is given a broad definition encompassing both the private and public sectors and includes natural persons, bodies of persons and corporations; see Privacy Act 1993 s 2.
-
-
-
-
125
-
-
67650167674
-
-
It would fall within the defi nition of 'agency' as set out above
-
It would fall within the defi nition of 'agency' as set out above.
-
-
-
-
126
-
-
67650154151
-
-
The applicability of this Act to conduct outside New Zealand is made clear by s 3 which stipulates: 'This Act extends to the engaging in conduct outside New Zealand by any person resident or carrying on business in New Zealand to the extent that such conduct relates to the supply of goods or services, or the granting of interests in land, within New Zealand.'
-
The applicability of this Act to conduct outside New Zealand is made clear by s 3 which stipulates: 'This Act extends to the engaging in conduct outside New Zealand by any person resident or carrying on business in New Zealand to the extent that such conduct relates to the supply of goods or services, or the granting of interests in land, within New Zealand.'
-
-
-
-
127
-
-
67650122045
-
-
Privacy Act 1993 s 10(3).
-
Privacy Act 1993 s 10(3).
-
-
-
-
128
-
-
67650163455
-
-
Privacy Act 1988 (as amended) (C'th, Aust) s 13 D.
-
Privacy Act 1988 (as amended) (C'th, Aust) s 13 D.
-
-
-
-
129
-
-
67650154155
-
-
Above n 75
-
Above n 75.
-
-
-
-
130
-
-
67650163456
-
-
See the discussion by M Schmidl, 'The Article 29 Working Party Opinion on Whistleblowing' (2006) 6 World Data Protection Report 23.
-
See the discussion by M Schmidl, 'The Article 29 Working Party Opinion on Whistleblowing' (2006) 6 World Data Protection Report 23.
-
-
-
-
132
-
-
67650167673
-
-
A schedule, for example, can easily be attached to the contract containing the Fair Information/Privacy Principles
-
A schedule, for example, can easily be attached to the contract containing the Fair Information/Privacy Principles.
-
-
-
-
134
-
-
67650127097
-
-
2 Ph 774
-
(1848) 2 Ph 774.
-
-
-
-
135
-
-
67650125181
-
-
Burrows, Finn & Todd, Law of Contract in New Zealand (2 ed., LexisNexis: Wellington 2004) at p 541.
-
Burrows, Finn & Todd, Law of Contract in New Zealand (2 ed., LexisNexis: Wellington 2004) at p 541.
-
-
-
-
136
-
-
67650140641
-
-
Ibid;
-
-
-
-
137
-
-
67650098147
-
-
see London County Council v Allen
-
see London County Council v Allen [1914] 3 KB 642.
-
(1914)
, vol.KB 642
, Issue.3
-
-
-
138
-
-
67650101224
-
-
See S Gardner, 'The Proprietary Effect of Contractual Obligations under Tulk v Moxhay and De Mattos v Gibson' (1982) 98 LQR 279.
-
See S Gardner, 'The Proprietary Effect of Contractual Obligations under Tulk v Moxhay and De Mattos v Gibson' (1982) 98 LQR 279.
-
-
-
-
139
-
-
67650127098
-
-
4 De G & J 276, 282
-
(1858) 4 De G & J 276, 282.
-
-
-
-
143
-
-
67650163460
-
-
Swiss Bank Corp v Lloyds Bank Ltd [1979] Ch 548, 575 per Browne-Wilkinson J.
-
Swiss Bank Corp v Lloyds Bank Ltd [1979] Ch 548, 575 per Browne-Wilkinson J.
-
-
-
-
145
-
-
67650098142
-
-
See the discussion above relating to jurisdictional approaches towards restricting exports of personal information
-
See the discussion above relating to jurisdictional approaches towards restricting exports of personal information.
-
-
-
-
146
-
-
67650101225
-
-
For example denial of credit, health insurance or the ability to access air travel to name a few
-
For example denial of credit, health insurance or the ability to access air travel to name a few.
-
-
-
-
147
-
-
67650144846
-
-
Privacy Act 1988 (as amended) (C'th, Aust) ss 6 A(2), 6 B(2) & 13 A(c): service providers contracted to the Commonwealth government are bound by the terms of their contract where this is inconsistent with the privacy principles. A breach of contract is deemed to be a breach of the privacy principles in these circumstances.
-
Privacy Act 1988 (as amended) (C'th, Aust) ss 6 A(2), 6 B(2) & 13 A(c): service providers contracted to the Commonwealth government are bound by the terms of their contract where this is inconsistent with the privacy principles. A breach of contract is deemed to be a breach of the privacy principles in these circumstances.
-
-
-
-
148
-
-
67650167679
-
-
See Baker, above n 106 at p 10.
-
See Baker, above n 106 at p 10.
-
-
-
-
149
-
-
67650154161
-
-
at pp
-
Ibid, at pp 10, 25.
-
-
-
-
150
-
-
67650167678
-
-
at p
-
Ibid, at p 13.
-
-
-
-
151
-
-
67650158408
-
-
at p
-
Ibid, at p 14.
-
-
-
-
152
-
-
67650104311
-
-
See
-
See: http://www.bp.com/popuppreviewtwocol.do?categoryId= 438&contentId=2008122.
-
-
-
-
155
-
-
67650111640
-
-
In New Zealand see for instance the Health Information Privacy Code 1994.
-
In New Zealand see for instance the Health Information Privacy Code 1994.
-
-
-
-
156
-
-
67650167675
-
-
Cartagena Protocol on Biosafety to the Convention on Biological Diversity adopted in May, &
-
Cartagena Protocol on Biosafety to the Convention on Biological Diversity (adopted in May 2000) Articles 8 & 20.
-
(2000)
Articles
, pp. 8-20
-
-
-
157
-
-
67650122050
-
-
Sarbanes-Oxley Act of 2002, Pub. L. No. 107-204, 116 Stat.745 (2002).
-
Sarbanes-Oxley Act of 2002, Pub. L. No. 107-204, 116 Stat.745 (2002).
-
-
-
-
158
-
-
67650111645
-
-
Such as the Enron debacle
-
Such as the Enron debacle.
-
-
-
-
159
-
-
67650167676
-
-
See Baker, above n 106, at p 10.
-
See Baker, above n 106, at p 10.
-
-
-
-
160
-
-
67650144849
-
-
Ibid.
-
-
-
-
161
-
-
67650154159
-
-
Companies Act 1993 s 175(2).
-
Companies Act 1993 s 175(2).
-
-
-
-
162
-
-
67650131359
-
-
Privacy Act 1993 (NZ) s 23.
-
Privacy Act 1993 (NZ) s 23.
-
-
-
-
163
-
-
67650122051
-
-
Heisenberg above n 35 at p 171
-
Heisenberg above n 35 at p 171.
-
-
-
-
165
-
-
67650131358
-
-
See the studies catalogued by Heisenberg above n 35 at pp 37-40.
-
See the studies catalogued by Heisenberg above n 35 at pp 37-40.
-
-
-
-
166
-
-
67650122046
-
-
See Article 12 of the United Nations Declaration of Human Rights and Article 17 of the International Covenant on Civil and Political Rights.
-
See Article 12 of the United Nations Declaration of Human Rights and Article 17 of the International Covenant on Civil and Political Rights.
-
-
-
-
167
-
-
67650163454
-
-
See for instance the APEC Privacy Framework, available at: http://www.apecsec.org.sg/apec/news_media/2004_media_releases/ 201104_apecminsendorseprivacyfrmwk.html, the standards contained in it do not match those of the EU however as it fails, for example, to include any provisions relating to data exports.
-
See for instance the APEC Privacy Framework, available at: http://www.apecsec.org.sg/apec/news_media/2004_media_releases/ 201104_apecminsendorseprivacyfrmwk.html, the standards contained in it do not match those of the EU however as it fails, for example, to include any provisions relating to data exports.
-
-
-
-
168
-
-
33745612768
-
The use of information contained in the airline passenger name record - some issues
-
See
-
See R Abeyratne 'The use of information contained in the airline passenger name record - some issues' (2005) 10 Communications Law 170.
-
(2005)
Communications Law
, vol.10
, pp. 170
-
-
Abeyratne, R.1
-
169
-
-
67650154156
-
-
For example the TRIPS agreement
-
For example the TRIPS agreement.
-
-
-
-
170
-
-
67650104306
-
-
Above n 150, Article 20.
-
Above n 150, Article 20.
-
-
-
-
171
-
-
67650125182
-
-
Ibid.
-
-
-
-
172
-
-
67650131353
-
-
16, available at
-
16 September, 2005 available at: http://www.libertysecurity.org/ article709.html.
-
(2005)
-
-
September1
-
173
-
-
67650101222
-
-
Available at
-
Available at: http://www.bakercyberlawcentre.org/ipp/.
-
-
-
|