Surveillance Final Report
Surveillance Final Report
Surveillance Final Report
Final Report 18
1
Contents
Preface 5 Major users of public place surviellance 32
Terms of reference 6 Victoria Police 32
Glossary 7 Corrections Victoria 34
Executive summary 11 Local councils 34
Recommendations 15 Public housing 35
Universities and TAFEs 35
Chapter 1: Introduction 19
Transport 35
Introduction 20
Major public events: concerts
Background 20
and sports 38
Important definitions 21
Crown Casino 39
What is surveillance? 21
The hospitality industry 40
What is a public place? 22
Shopping centres and retailers 40
Coverage of this report 22
The media 41
Federal areas of concern 22
Marketing companies 41
State law enforcement 23
Private investigators 41
Practices covered by information
Public and private insurers 42
privacy laws 23
The private security industry 42
Other law reform activity 24
Aged care 42
Australian Law Reform Commission 24
Personal uses 42
NSW Law Reform Commission 24
Conclusion 43
New Zealand Law Commission 25
UK House of Lords Select Committee 25 Chapter 3: Current Law 45
Hong Kong Law Reform Commission 26 Introduction 46
Law Reform Commission of Ireland 26 Surveillance devices legislation 46
Our process 26 Information privacy legislation 47
Consultation Paper 26 Information privacy laws and public
Final Report 26 place surveillance 48
Outline of this report 27 Enforcement of information privacy laws 49
Regulation of specific aspects of public
Chapter 2: Use of Surveillance in Public Places 29 place surveillance 50
Introduction 30 Common law protections 51
Surveillance technology 31 The Victorian Charter of Human Rights and
Closed-circuit television (CCTV) 31 Responsibilities 51
GPS and satellite technology 31 Limits on the right to privacy under
the Charter 52
Tracking mobile phones 31
Non-binding guidelines, standards and policies 52
Radio frequency identification (RFID) 31
Regulation in other jurisdictions 53
Automatic number plate recognition
(ANPR) 31 Other Australian jurisdictions 53
Body imaging devices and scanners 32 Other countries 54
Biometric technologies 32 Conclusion 54
Google Earth and Google Streetview 32 Table 1: Legislation and binding codes
relating to public place surveillance in Victoria 55
Table 2: Major non-binding instruments relating
to public place surveillance in Victoria 57
3
Contributors Contents
VICTORIAN LAW REFORM COMMISSION Chapter 7: Statutory Causes of Action 127
Chairperson Introduction 128
Professor Neil Rees* Civil action for serious invasion of privacy 128
Project Officer
Simone Marrocco
Librarian
Julie Bransden
Administrative Officers
Failelei Siatua Samuel Tucker
5
Terms of Reference
In light of the widespread use of surveillance and other privacy-invasive technologies in
workplaces and places of public resort, and the potential benefits and risks posed by
these technologies, the Victorian Law Reform Commission will inquire into and report
progressively upon
a. whether legislative or other reforms should be made to ensure that workers’
privacy, including that of employees, independent contractors, outworkers and
volunteers, is appropriately protected in Victoria. In the course of this inquiry, the
commission should consider activities such as
• surveillance and monitoring of workers’ communications;
• surveillance of workers by current and emerging technologies,
including the use of video and audio devices on the employers’
premises or in other places;
• physical and psychological testing of workers, including drug and
alcohol testing, medical testing and honesty testing;
• searching of workers and their possessions;
• collecting, using or disclosing personal information in workers’
records.
b. whether legislative or other measures are necessary to ensure that there is
appropriate control of surveillance, including current and emerging methods
of surveillance.* As part of this examination, the commission should consider
whether any regulatory models proposed by the commission in relation to
surveillance of workers, could be applied in other surveillance contexts, such as
surveillance in places of public resort, to provide for a uniform approach to the
regulation of surveillance.
In undertaking this reference, the commission should have regard to
• the interests of employers and other users of surveillance, including
their interest in protecting property and assets, complying with laws
and regulations, ensuring productivity and providing safe and secure
places;
• the protection of the privacy, autonomy and dignity of workers and
other individuals;
• the interaction between state and Commonwealth laws, and the
jurisdictional limits imposed on the Victorian parliament;
• the desirability of building on the work of other law reform bodies.
Civil penalty A fine or other sanction for a civil offence. It has a lower
standard of proof than a criminal penalty and there is no
finding of criminal responsibility.
Common law Law that derives its authority from the decisions of courts,
rather than from Acts of parliament.
Convergence When used in relation to technology, describes the
phenomenon in which technology is becoming
increasingly interconnected and multi-functional.
CrimTrac A Commonwealth agency that uses, develops, and
provides access to information technology and services for
police use.
Data mining The process of analysing data for known and unknown
data patterns.
7
Glossary
Global positioning A navigation system that relies on information received
system (GPS) from a network of satellites to provide the latitude and
longitude of an object or location.
Google Earth A web-based program that maps the earth by the
superimposition of images obtained from satellite imagery
and aerial photography.
Google Street View A feature of Google Maps and Google Earth that
provides 360 degrees horizontal and 290 degrees vertical
panoramic street views and enables users to view parts of
some regions of the world at ground level.
Happy slapping The practice of recording an assault on a victim
(commonly with a camera phone) for entertainment.
In-car video A video camera fitted inside a vehicle (for example, a
police vehicle or taxi). May be used to observe the interior
or exterior of the vehicle.
International Covenant A treaty giving effect to civil and political rights contained
on Civil and Political in the Universal Declaration of Human Rights. Australia is
Rights (ICCPR) a signatory to the ICCPR.
Location surveillance Identifying a person’s or an object’s whereabouts at a
particular time.
Mass surveillance Monitoring the public at large, or a significant part of the
public, instead of a particular individual.
Nuisance An unlawful interference with a person’s use or
enjoyment of land, or some right over or in connection
with it. May result in a right to sue.
Optical character Software designed to recognise letters and numbers from
recognition a captured image and to translate them into editable text.
Optical surveillance See Visual surveillance.
Own-motion The power of a regulator to investigate possible breaches
investigation of a law without the need for a complaint or referral by
a person.
Olfactory surveillance Purposeful monitoring of a person or object by smell,
including by the use of a device or animal.
Panopticon A type of prison building designed by Jeremy Bentham
to facilitate the observation of prisoners without the
prisoners being able to tell whether they are actually
being watched.
Participant monitoring Recording of conversations or activities by someone
participating in them.
9
Glossary
Tracking Monitoring a person or object’s whereabouts over a
period of time. Also called ‘location surveillance’.
Trespass Direct interference with a person, goods, or property of
another without lawful justification. May result in a right
to sue.
Universal Declaration A resolution of the United Nations General Assembly
of Human Rights affirming the importance of human rights and listing the
(UDHR) rights that UN member countries have pledged to uphold.
Upskirting The observation or recording of a person’s genital or anal
regions without their consent.
Visual surveillance Purposeful monitoring of a person or object by sight,
including by the use of a device. Also known as ‘optical
surveillance’.
Voice over Internet Generic term for technology that enables the delivery
Protocol (VoIP) of voice communication over the internet and other
networks.
Wire tapping The use of electronic or mechanical equipment to gain
access to transmission of private telephone conversations,
computer data or facsimiles.
background
Government agencies, private organisations and individuals use public place surveillance
extensively. Victorians can expect to be observed, recorded and tracked while engaging
in daily activities in streets, shopping centres and major public venues.
The capabilities of surveillance devices are also increasing rapidly. Surveillance devices
are able to locate individuals in a crowd, determine identity, track movements, record
conversations, and compile and share this information almost instantaneously. As
technologies become more sophisticated, so, too, do the applications for which they are
used. For example, devices may be used at airports to see through passengers’ clothing,
or identify individuals from within hundreds of cars on a freeway.
Many groups within our community rely heavily on surveillance technology in their
everyday activities, including police, transport operators, retailers, private investigators,
sports venues and journalists. Surveillance serves a number of important purposes,
including the promotion of public safety, the prevention and investigation of crime,
and newsgathering. In addition, many widely owned personal products, such as mobile
phones, have surveillance capabilities.
Negative consequences that may flow from the increased use of surveillance in public
places include a loss of privacy and anonymity. One concern is that this may cause
Victorians to alter the way we express ourselves and behave when in public. While these
adjustments may not be readily apparent in the short term, the long-term incremental
effect may be permanent changes to the way in which we use and enjoy public places.
Those people with the means to do so may retreat to private places whenever possible in
order to avoid unwanted observation.
In devising recommendations for reform, the commission has taken into account the
many benefits that arise from the use of public place surveillance, as well as the risks
posed by its misuse.
Constitutional constraints and practical considerations have limited our inquiries. We
have not considered national security uses of surveillance, or telecommunications and
data surveillance practices, because they are federal responsibilities. We recommend
that the surveillance activities of state law enforcement bodies be considered separately
because of the need to consider police investigation and information gathering activities
as a whole.
11
consultative process
In March 2009 the commission published a Consultation Paper that was informed by
extensive preliminary consultations. We presented a number of options for reform and
received detailed feedback in over 40 submissions from government agencies, private
organisations and community advocates.
We also hosted five forums with groups who experience public place surveillance,
including young people, people experiencing homelessness, and culturally and
linguistically diverse communities. We established a consultative committee of individuals
with different experiences of public place surveillance whom we consulted on a number
of occasions. In addition, we met members of the community, and visited major
Victorian surveillance users at their premises in order to gain a thorough understanding
of their use of surveillance technologies.
These submissions, consultations and meetings provided us with a thorough
understanding of the scope, nature and impact of public place surveillance in Victoria
(outlined in Chapter 2), and the benefits and risks that flow from its use (outlined in
Chapter 4).
current law
There is little regulation of the use of surveillance devices in public places. Existing laws
are unclear, they have not kept pace with technological change, and they do not appear
to be actively enforced. There is a widespread uncertainty among surveillance users and
the community about which surveillance activities are permitted in public places. The
three major bodies of relevant law—the Surveillance Devices Act 1999 (Vic) (SDA), the
Privacy Act 1988 (Cth) and the Information Privacy Act 2000 (Vic)—were not specifically
designed to regulate public place surveillance.
The development of laws to cover particularly offensive forms of surveillance, such as
upskirting and the recording of images related to child pornography, represent attempts
to address some of the limitations in the current regime. In addition, surveillance in some
contexts, for example in casinos and bars, is separately regulated.
No clear public policy emerges from these separate laws concerning the circumstances in
which public place surveillance is acceptable and those when it is not. We consider the
current regulatory framework in Chapter 3.
13
Executive Summary
The commission also recommends the introduction of a new offence to prohibit highly
offensive uses of surveillance devices, regardless of where the surveillance occurs. This
offence is designed to send a clear message to the community that various forms of
behaviour are unacceptable, including, for example, filming violence for entertainment
(happy slapping). Using surveillance to intimidate or prevent people from doing
something they are otherwise lawfully entitled to do, like attending an abortion clinic or
drug treatment centre, would also be covered by the offence.
In addition, we recommend that a civil penalty regime also apply to existing criminal
offences in the SDA. This would provide for greater flexibility in enforcement by allowing
a surveillance regulator to act on the less serious matters that come to his or her
attention without referring the matter to Victoria Police for criminal prosecution.
PRINCIPLES
2. The legislation should include the following guiding principles.
1. People are entitled to a reasonable expectation of privacy when in
public places
2. Users of surveillance devices in public places should act responsibly and
consider the reasonable expectations of privacy of individuals
3. Users of surveillance devices in public places should take reasonable
steps to inform people of the use of those devices
4. Public place surveillance should be for a legitimate purpose related to
the activities of the organisation conducting it
5. Public place surveillance should be proportional to its legitimate purpose
6. Reasonable steps should be taken to protect information gathered
through public place surveillance from misuse or inappropriate disclosure.
15
Recommendations
7. In addition to any other powers conferred on the regulator by legislation,
the regulator should have the power to do all things necessary or convenient
for, or in connection with, the performance of the functions of the regulator.
8. In addition to his or her annual reporting function, the regulator should also
have the power to report formally to the relevant Minister about any matters
relating to his or her functions. The Minister should be required to table all
reports provided by the regulator in parliament.
9. The functions of the regulator should be exercised by the Victorian Privacy
Commissioner.
10. The Commissioner for Law Enforcement and Data Security should conduct a
review of, and create guidelines for, Victoria Police’s use of surveillance and
surveillance-captured data.
17
Recommendations
27. The defences to the cause of action for serious invasion of privacy caused by
misuse of private information should be:
a. P consented to the use of the information
b. D’s conduct was incidental to the exercise of a lawful right of defence
of person or property, and was a reasonable and proportionate
response to the threatened harm
c. D’s conduct was authorised or required by law
d. D is a police or public officer who was engaged in his/her duty and
the D’s conduct was neither disproportionate to the matter being
investigated nor committed in the course of a trespass
e. if D’s conduct involved publication, the publication was privileged or
fair comment
f. D’s conduct was in the public interest, where public interest is a limited
concept and not any matter the public may be interested in.
28. The defences to the cause of action for serious invasion of privacy caused by
intrusion upon seclusion should be:
a. P consented to the conduct
b. D’s conduct was incidental to the exercise of a lawful right of defence
of person or property, and was a reasonable and proportionate
response to the threatened harm
c. D’s conduct was authorised or required by law
d. D is a police or public officer who was engaged in his/her duty and
the D’s conduct was neither disproportionate to the matter being
investigated nor committed in the course of a trespass
e. D’s conduct was in the public interest, where public interest is a limited
concept and not any matter the public may be interested in.
29. The remedies for both causes of action should be:
a. compensatory damages
b. injunctions
c. declarations.
30. Costs should be dealt with in accordance with section 109 of the VCAT Act.
31. Jurisdiction to hear and determine the causes of action for serious invasion
of privacy by misuse of private information and by intrusion upon seclusion
should be vested exclusively in the Victorian Civil and Administrative Tribunal.
32. These causes of action should be restricted to natural persons. Corporations
and the estates of deceased persons should not have the capacity to take
proceedings for these causes of action.
33. Proceedings must be commenced within three years of the date upon which
the cause of action arose.
19
1
Chapter 1 Introduction
introduction
1.1 This is the Victorian Law Reform Commission’s Final Report into surveillance in
public places. The Victorian Attorney-General asked the Victorian Law Reform
Commission (the commission) to inquire into two major issues of public concern
in relation to privacy: workplace privacy and the use of surveillance in public
places. The first phase of the reference concluded in 2005 with the publication of
the commission’s Workplace Privacy: Final Report.1
1.2 The terms of reference for the second phase asked the commission to consider
whether there is appropriate control of surveillance in public places.2 In January
2009 we produced Surveillance in Public Places: Consultation Paper (Consultation
Paper) in which we presented a number of options for reforming the law to better
regulate surveillance of public places.3 We have since received submissions and
engaged in consultations on the options we presented. In this report we present
our final recommendations.
1.3 The terms of reference also asked us to consider whether the commission’s
proposed model to regulate surveillance of workers could be applied in relation to
the regulation of surveillance in public places. There are a number of similarities
between the two sets of recommendations (including our proposal for the
introduction of overarching principles to guide legislative changes, and a ‘light-
touch’ regulatory approach). This is explained in more detail in Chapters 4 and 5.
background
1.4 Surveillance devices have become increasingly available, affordable and
sophisticated, and their use in public places has proliferated. For example, many
local councils in Victoria now operate closed-circuit television (CCTV) systems.
Police, transport authorities, sporting and entertainment venues and retail outlets
also use CCTV. In addition, the capacity to use information gathered by CCTV
systems is expanding. Many modern CCTV systems are now networked, and
images can be stored, searched, analysed, reproduced and made available on
the internet.
1.5 A variety of location and tracking devices is also being used in Victorian public
places to determine the whereabouts and movement of individuals. They
include the use of global positioning system (GPS) technology in phones and
cars, and automatic number plate recognition (ANPR) technology on freeways.
Google’s Street View application allows internet users to view and zoom in on
photographs of Australian streetscapes, and, potentially, individuals.4 The federal
government has also recently announced its intention to introduce body scanners
at international airports, which will effectively enable security personnel to see
through passengers’ clothing.5
1.6 Many common products now have surveillance capabilities. One obvious example
is mobile phones,6 many of which have the capacity to record images and
sounds and to transmit them to multiple destinations, almost instantaneously
and at low cost.
1.7 Numerous benefits arise from the use of surveillance devices, including crime
prevention, investigations, crowd control and the dissemination of information.
However, there are also risks, including the increased loss of individuals’
anonymity and personal space in public, particularly as devices can monitor
movement and capture information in ways not previously possible.
21
1
Chapter 1 Introduction
what is a public place?
1.15 In our Consultation Paper, we noted that it was difficult to draw a clear line
between a ‘public place’ and a ‘private place’.17 We suggested that any attempt
to do so should focus on the nature and degree of accessibility to a place by
members of the public, rather than whether a place is privately or publicly owned.
1.16 Drawing on the definition contained in the Racial Discrimination Act 1975 (Cth),
we suggested that ‘public place’ should be defined as ‘any place to which the
public have access as of right or by invitation, whether express or implied and
whether or not a charge is made for admission to the place’.18
1.17 Thus ‘public places’ include public areas such as parks and streets, as well as
government or privately owned places when they are open to the general public,
such as shopping centres, libraries, sporting arenas and local swimming pools.
This definition received general support in consultations and submissions.
23
1
Chapter 1 Introduction
1.30 Commonwealth and state information privacy laws regulate the use of ‘personal
information’.27 These laws contain privacy principles concerning the collection,
storage and use of personal information. While information privacy laws may
regulate some uses of public place surveillance,28 many of these activities are likely
to be beyond the reach of privacy laws.
1.31 Information privacy laws apply to government agencies and large businesses
only.29 In order to be defined as ‘personal information’, information must be
recorded,30 and must be about an individual ‘whose identity is apparent, or
can reasonably be ascertained’.31 The extent to which surveillance-captured
information is covered by this description is discussed in Chapter 3. Most
information captured by surveillance practices is unlikely to be ‘personal
information’ for the purposes of information privacy laws because the identity of
an individual cannot ‘reasonably be ascertained’ from that information.
1.32 However, because some ‘personal information’ is capable of being captured by
surveillance practices, there is potential for overlap between information privacy
laws and any regulation of surveillance. We have developed our recommendations
with this issue in mind.
25
1
Chapter 1 Introduction
hong kong law reform commission
1.44 The Hong Kong Law Reform Commission (HKLRC) has released a number of
reports considering surveillance related issues. Of particular relevance to our
inquiry is the report Privacy: The Regulation of Covert Surveillance.41 Legislation
enacted in 2006 adopted the recommendations in the HKLRC’s report by
prohibiting covert surveillance without judicial authorisation.42
law reform commission of ireland
1.45 In 1998, the Law Reform Commission of Ireland released a report into
surveillance.43 A parliamentary working group subsequently released another
report on privacy in 2006.44 Some of the recommendations from the surveillance
report informed the drafting of the Criminal Justice (Surveillance) Act 2009 which
provides for the use of covert surveillance by authorisation in relation to criminal
investigations.45
our process
consultation paper
1.46 The commission’s first step was to hold 31 roundtable discussions with
organisations including police, local councils, universities, transport operators,
media, entertainment venues, retailers, courts, security organisations, as well as
representatives of young people, the indigenous community, state government
and other community representatives.
1.47 The purpose of these consultations was to provide the commission with a broad
understanding of the way organisations and individuals use surveillance in public
places and how their use affects people. The consultations also helped us to
understand what ‘surveillance’ and ‘public places’ mean to members of the
community and to gauge their understanding of existing relevant laws.
1.48 In March 2009 we published a Consultation Paper, which was informed by
our consultations as well as extensive secondary research. The paper described
current uses of public place surveillance in Victoria and examined likely future
trends. The paper also explored the concept of privacy, provided an overview
of the relevant law in Victoria and other jurisdictions, and considered the risks
and benefits associated with public place surveillance. Finally, the Consultation
Paper presented a number of options for reform, designed to stimulate public
discussion. We called for submissions and posed 24 questions to guide responses.
These responses informed the recommendations in this report.
final report
1.49 This Final Report is the product of a year-long period of consultation and research
in which we sought feedback on the proposals made in our Consultation Paper,
and information about the scope, nature, and impact of public place surveillance
in Victoria.
27
1
Chapter 1 Introduction
1.58 Chapters 5, 6 and 7 contain the commission’s recommendations for the
regulation of surveillance in public places. The central focus is good advice
about best practice. In Chapter 5 we explain our overarching principles that are
designed to guide responsible use of public place surveillance by all users. We
also detail one of our major recommendations—the creation of an independent
S
L
S
regulator to inform and guide users about the practical implementation of these
principles and advise the public about their operation.
L
1.59 Although appropriate guidance about the responsible use of surveillance in
public places is a cornerstone of our recommendations, we do not believe that
guidance alone can protect people from some practices that seriously affect their
privacy. Chapters 6 and 7 deal with additional regulatory measures for particularly
offensive uses of surveillance. S
1.60 Although the SDA is the major piece of legislation that deals with public place
surveillance it was not designed for this purpose. Its primary aim is to prohibit
the use of covert surveillance devices in private places, while also allowing law
L
enforcement agencies to use such devices with judicial authorisation. In Chapter 6
we recommend amendments to clarify, modernise and strengthen the SDA. S
These include refining some of the existing prohibitions and introducing a civil
penalty regime. L
S
1.61 In Chapter 7 we recommend the introduction of two statutory causes of action
for serious invasions of privacy caused by misuse of surveillance devices in public
places. The first deals with misuse of private information, the second with
intrusion upon seclusion. We provide an overview of the current law in Australia
and other comparable jurisdictions, and discuss matters of detail such as the L
S
elements, defences and remedies.
L
S
L
S
L
S
L
29
2
Chapter 2 Use of Surveillance in Public Places
introduction
2.1
2.2
This chapter examines the various forms of public place surveillance in Victoria,
who uses it, and why.
There is no single comprehensive source of information about the use of public
place surveillance in Victoria. Therefore, our description has been informed by
the results of our discussions with users of public place surveillance and our
examination of published research. In this chapter we list the major users of public
place surveillance and describe their surveillance practices and the technologies
used. The many important purposes served by public place surveillance—including
safety, crime prevention and control, journalism and entertainment—are outlined
in Chapter 4.
2.3 Government agencies and departments, individuals and private organisations
of all sizes use public place surveillance extensively and its use is increasing.
Victorians can expect to be observed, recorded and tracked while engaging in
daily activities in our streets, shops and major public venues.
2.4 By far the most common form of surveillance is visual surveillance, particularly by
the use of CCTV cameras. As systems are becoming cheaper and easier to install
and use, CCTV is increasingly relied upon by government and private users. There
is also growing use of other surveillance technologies, notably tracking devices,
in Victoria. We provide definitions and descriptions of the various surveillance
technologies in this chapter.
2.5 In our Consultation Paper we discussed some current trends in relation to
surveillance use in Victoria. These are:
• the use of increasingly sophisticated technological devices with
greater capacities
• the decreasing cost of surveillance devices and their greater use by
businesses and individuals
• the increase in mass surveillance that monitors large groups of
people rather than specific individuals
• the widespread use of location and tracking devices
• the increased capacity to store, use and disseminate surveillance
data.1
2.6 There is also a tendency for technologies to converge, allowing for the creation
of devices with increased surveillance capabilities. CCTV, for example, may
be combined with facial recognition technology (described below) to identify
individuals from their images. Another example is modern mobile phones, which
combine telephonic services with GPS tracking software, digital visual and sound
recording capabilities, and connection to the internet. A consequence of the
convergence of surveillance technologies is the greater ability of surveillance users
to compile detailed pictures of members of the public,2 making it increasingly
difficult for individuals to maintain their privacy and anonymity.3
2.12 Another technology that can be used for location and tracking surveillance is
automatic number plate recognition (ANPR). ANPR uses a camera and optical
character recognition software to locate a vehicle’s number plate in an image of
the vehicle and convert the number plate to text.15 The car’s number plate can
be matched to a car registration database to identify the car owner or other
matters of interest.
31
2
Chapter 2 Use of Surveillance in Public Places
body imaging devices and scanners
2.13 Some types of body scanners have recently come into use at international airports
in a number of countries. One type relies on x-ray technology, which has been
used for over 100 years,16 most commonly for medical purposes. Recently, the
Australian Government has trialled the use of body scan x-ray machines as an
alternative to pat down checks to identify items such as weapons or explosives
concealed beneath a passenger’s clothing.17 Another type of body scanner that
was trialled is the millimetre wave scanner, which uses very low-level radio waves
(similar to a radar) to scan the human body. This creates an image that may also
be used to detect objects concealed under an individual’s clothing.18
2.14 Thermal imaging cameras work by detecting and measuring the heat radiating
from an object or person. This type of technology has been used in Australian
airports to identify individuals with higher than normal body temperatures that
may indicate a person suffering from a particular virus, for example, swine flu.19
2.15 Another type of technology is the residue scanner used in some airports and
prisons. It works by blowing air over an individual’s body in order to release small
particles attached to the skin, hair or clothing. The particles are analysed for trace
amounts of explosives or drugs.20
biometric technologies
2.16 Biometrics involves the collection of samples of biological information, such as
fingerprints and face or voice characteristics, for later comparison with samples
provided by the same person, or different individuals, to establish identity.21 An
example of a biometric technology used in combination with camera surveillance
is facial recognition technology, which compares a camera image of an individual’s
face with images held in a database to determine the individual’s identity.
google earth and google streetview
2.17 Google Inc., a publicly-listed US company specialising in internet search
technologies and other web-based services, has developed two popular services
using public place surveillance: Google Earth and Google Streetview. Google
Earth is a free online database of satellite images that provides a bird’s eye view
of a location, searchable by landmark or address.22 Google Streetview provides
a curbside view of streets and other locations. Vehicles with rooftop-mounted
cameras capture images. This application is also free and is searchable by address
or landmark. Streetview provides a higher level of clarity; in some cases it is
possible to identify faces and other identifying features such as number plates. To
address privacy concerns, these features may be blurred.23
33
2
Chapter 2 Use of Surveillance in Public Places
corrections victoria
2.24 Corrections Victoria also uses state-of-the art surveillance technology. While much
of its surveillance is not conducted in public places, Corrections Victoria does
track some people in public places under a home detention scheme.34 In some
cases, individuals placed on a home detention order can engage in employment
and some community activities but must wear a tamper-proof electronic tracking
bracelet equipped with an active RFID tag that enables supervising officials to
monitor the individual’s location.35 Before a home detention order can be granted,
the offender must sign an undertaking consenting to be monitored in this way.36
2.25 Since 2005 Corrections Victoria has also used a residue scanner in some prisons.
This machine blows air over an individual to detect trace amounts of explosives
and drugs. Iris scanning equipment was also introduced at the entry and exit of
the Melbourne Assessment Prison in 2005.37
local councils
CCTV
2.26 While the Victorian and federal governments fund some CCTV initiatives, local
councils are the primary government user of CCTV throughout the state.38
2.27 Melbourne City Council has the largest council-operated CCTV network in
Victoria. The network has been in place since 1997,39 and has had 54 cameras
in operation since an upgrade of the system in 2009.40 The cameras operate 24
hours a day, have the capacity to tilt and zoom, and can rotate 360 degrees. They
are placed throughout the city, including in areas known to have high crime rates,
and on some landmark buildings.41 The council also uses portable cameras for
crowd control during major events. These are mounted on poles and removed
within 24 hours.42 In addition, in 2009 the Melbourne City Council began trialling
the use of two CCTV security vehicles that are installed with cameras that record
a 360 degree view from the vehicle as it drives through the streets.43
2.28 Melbourne City Council has established detailed protocols that govern its use of
the CCTV system. These note the council’s commitment to privacy and include
procedures relating to security and access to footage, release of information and
provisions for sharing some types of information with Victoria Police. An external
consultant evaluates the policy every three years.44 Council’s use of CCTV is also
subject to scrutiny by an audit committee made up of senior staff and external
members. The committee provides oversight for council’s operations, including
storage, security, accuracy of documentation relating to CCTV footage and the
provision of footage to Victoria Police.45
2.29 A number of other metropolitan and regional councils also use CCTV cameras
in central business districts and high-crime areas. The arrangements regarding
the ownership and operation of systems vary between councils. One local
council has established a partnership with an incorporated body (made up of
local businesses owners and a councillor) to install CCTV systems in a shopping
strip and other identified areas.46 Footage from the systems is streamed live into
the local police station and monitored by an officer on duty.47 Procedures for
the operation and management of the CCTV system are set out in guidelines
agreed to by the incorporated body and Victoria Police. These stipulate that
the incorporated body is responsible for all costs and liability arising from the
operation of the CCTV cameras.48
35
2
Chapter 2 Use of Surveillance in Public Places
Trains
2.37 CCTV is used in and around metropolitan and regional train stations for a number
of purposes, including monitoring train movements, passenger safety, and
deterring and investigating crime. The number of cameras at a particular station
can be significant—Flinders Street Station, for example, has approximately 150
cameras and Southern Cross Station 180, all operating 24 hours a day. Most
cameras show only a fixed view and only a few have zoom, pan and tilt functions.
Some stations erect signs notifying of the surveillance.57
2.38 Cameras operate inside most train carriages on metropolitan train lines.58 Footage
cannot be viewed from train stations but can be viewed by the driver. When
a duress alarm sounds in a carriage, the driver is alerted to the view in that
carriage.59
2.39 At larger stations the station’s footage is monitored from an onsite control
room;60 on suburban lines footage for several stations is monitored from a
central suburban station.61 Control room operators and Department of Transport
personnel can view footage live, but do not have access to recorded footage;
recorded footage from cameras at train stations and inside trains is accessible
only to management centre staff.62 The commission was told that police requests
for footage was increasing. There is a formal process within the department for
dealing with all requests for footage.63
2.40 Myki, the new public transport ticketing system, uses passive RFID in plastic cards
to allow access to transport. The myki system ‘will provide passengers with smart
travel cards that can calculate and automatically deduct fares from pre-paid
accounts’.64 Except when issued on an anonymous basis, use of these cards could
potentially enable a person’s movements through the transport system to be
tracked and recorded.65
Trams
2.41 CCTV is used for operational and safety purposes on the Melbourne metropolitan
tram network. For example, footage from VicRoads traffic control cameras is
provided to Yarra Trams to monitor traffic conditions.66 Specific incidents can be
highlighted to better enable staff to monitor and manage incidents. CCTV also
operates on board newer Melbourne trams.67 These cameras are mounted on the
front and sides of trams and, in a bid to improve passenger safety, capture images
of cars that illegally drive past stationary trams.68
2.42 GPS tracking devices have also been installed in trams to allow trams to be
tracked in real time and for information to be relayed to passengers waiting at
tram stops.69 The tracking system also communicates with VicRoads to ensure
that trams are given priority at certain intersections across Melbourne.70 Trams
can also be tracked by individuals through an iPhone application.71
Buses
2.43 Some metropolitan buses have CCTV cameras that capture images inside buses.
These generally record while the bus is in operation. More modern buses also
have sound recording capabilities that record while the bus is in operation.
Footage and recordings may be reviewed at a later date in relation to a specific
incident. Some buses display signs notifying of surveillance.72 GPS tracking
systems are also used on some metropolitan bus routes. The information is used
by VicRoads to request priority at traffic lights and to provide accurate wait times
at bus stops.73
2.45 Approximately 90 per cent of Victorian taxis have GPS installed. In addition to 63 The Department of Transport process for
determining police requests for footage
assisting drivers to determine which route to follow, the system can also assist in is known as the ‘Keeper of Evidence’
process. See Site Visit 4.
emergencies. Once a driver triggers a duress alarm, the base operators can track
64 How Will I Use Myki?, myki <www.myki.
the vehicle. A one-way voice channel is also activated so that the conversation com.au/use-myki_your-key.aspx> at
inside the taxi can be heard at base.76 12 November 2008.
65 Metlink, above n 14.
2.46 Some local councils have established taxi ranks at which a customer’s 66 Yarra Trams, ‘Think Tram Takes a Closer
identification information is collected and photo identification may be scanned.77 Look at the Tram Network’ (Press Release,
3 February 2009) <www.yarratrams.com.
Privacy Victoria has expressed concern regarding the privacy implications of this au/desktopdefault.aspx/tabid-105/99_
practice and as a result some local councils have abandoned it.78 read-1748/> at 28 January 2010.
67 Stephen Moynihan, ‘Stop! Tram-Stop
Roads Sneaks will be in the Picture’, The Age
(Melbourne), 2 July 2007 <www.theage.
com.au/news/national/snap-tramstop-
Cameras sneaks-targetted/2007/07/01/118322896
0462.html?s_cid=rss_age> at 28 January
2.47 There are between 600 and 700 cameras used to monitor and manage traffic 2010.
on Victoria’s roads, including cameras owned by VicRoads and private toll road 68 Ibid.
operators Citylink and Eastlink. The majority of these cameras can be tilted and 69 Think Tram Projects, VicRoads
<www.vicroads.vic.gov.au/Home/
zoomed. VicRoads and private operators continuously monitor footage from PublicTransportAndEnvironment/
inhouse control rooms.79 VicRoads has at least two operators in a control room at PublicTransportOnRoads/TramProjects/
ThinkTramProjects.htm> at 14 January
all times. Once alerted to an incident or traffic situation, operators use cameras to 2010.
determine an appropriate traffic management response.80 70 Ibid.
71 Clay Lucas, ‘iPhone App Tracks Tram in
2.48 VicRoads generally does not record footage. Where footage is recorded, it is Real-Time’, The Sydney Morning Herald
usually for operational purposes such as reviewing the effectiveness of a change (Sydney), 15 June 2009 <www.smh.com.
au/digital-life/mobiles/iphone-app-tracks-
in a traffic management plan. There are no signs notifying the public that cameras trams-in-realtime-20090615-c8ut.html>
are in operation.81 at 28 January 2010.
72 Forum 3.
2.49 Footage can be provided to Victoria Police if requested for criminal investigations. 73 SmartBus Infrastructure, Department of
CityLink also provides real-time webcam images of major Melbourne roads on Transport (Vic) <www.transport.vic.gov.
au/web23/Home.nsf/AllDocs/90A14F13E
its website in order to enable individuals to view traffic conditions.82 VicRoads is ABE24E4CA25766600140C50?OpenDoc
considering the use of similar webcams.83 ument> at 28 January 2010.
74 Submission 3, Victorian Taxi Directorate,
Tracking devices Function and Performance Specification for
a Taxi Safety Camera System 2009 (2009).
2.50 Toll collecting systems on Citylink and Eastlink use RFID technology in e-tag 75 Site Visit 8.
transponders for billing and payments. When a car carrying an e-tag passes a 76 Site Visit 8.
reader on the freeway, a fee is automatically charged to the individual’s account 77 Office of the Victorian Privacy Commissioner,
Annual Report 2008–2009 (2009) 12;
without the car having to stop. If no e-tag registers as a vehicle passes, cameras Photo Identification Scheme for Geelong
Taxis (2008) ABC News <www.abc.net.
are triggered to capture images of the front and the back of the vehicle. The au/news/stories/2008/06/16/2275860.
information is downloaded and optical character recognition software is used htm> at 14 January 2010.
to read and record licence plate details. In most situations a toll is automatically 78 Office of the Victorian Privacy
Commissioner, above n 77, 12.
charged.84 79 Site Visit 1.
2.51 Where photographs do not provide a clear image, an operator will review the 80 Site Visit 9.
81 Site Visit 1.
footage to determine the licence details and may contact VicRoads for
82 See Citylink <www.citylink.com.au> at
registration details for billing purposes.85 VicRoads also uses fixed and mobile 28 January 2010.
cameras with ANPR technology to detect traffic infringements such as running 83 Site Visit 1.
red lights and speeding.86 84 Site Visit 9.
85 Site Visit 9.
86 Site Visit 1.
37
2
Chapter 2 Use of Surveillance in Public Places
Monitoring heavy vehicle movements
2.52 Heavy freight vehicles are restricted from using some roads because their size and
mass can damage infrastructure or threaten safety. The Intelligent Access Program
(IAP) is a voluntary program that allows controlled vehicles access to additional
roads on the condition they install a GPS monitoring device and allow tracking
by the Transport Certification Authority. In 2009 over 3000 vehicles voluntarily
registered for involvement in the IAP across Australia.87
Airports
2.53 Airports use a number of surveillance technologies. For example, since 2005 all
Australian passports have included embedded RFID chips88 that can be read by an
airport scanner. The chip contains information that includes the holder’s photograph,
name, signature, gender, date of birth, passport number and expiry date.89
2.54 In 2008 the SmartGate system was introduced at Melbourne international
airport.90 The system, which relies on facial recognition technology, enables
Australian and New Zealand citizens to process themselves through passport
control.91 If the machine does not detect a match, the individual must go through
manual processing with a customs official.92
2.55 In 2008 the federal government trialled the use of x-ray and millimetre-wave body
scanning systems at Melbourne, Sydney and Adelaide airports.93 These scanners
were used as an alternative to a pat-down search to see through passenger
clothing to determine whether items such as weapons or explosives had been
concealed. In February 2010 the federal government released plans to install x-ray
body scanners in international airports as part of increased security measures.94
2.56 Another technology sometimes used in airports is thermal imaging, which is used
to identify people with higher than normal body temperatures.95 In 2009, thermal
imaging machines were installed in Australian international airports to detect
passengers arriving from overseas who may have had the swine flu virus.
Port of Melbourne
2.57 The Port of Melbourne Authority operates 180 CCTV cameras to maintain
employee health and safety and to protect against crime, including theft and
terrorist acts. Some cameras are positioned around bulk liquid terminals; others
overlook the beach and the pier. Footage is relayed to a central control room
and is continuously monitored by contracted security personnel. Footage is also
provided to the Water Police. There are no signs notifying the public of the use of
surveillance cameras in the area.96
major public events: concerts and sports
2.58 The commission consulted with two major sporting venues in Melbourne: Etihad
Stadium (Etihad) and the Melbourne Cricket Ground (MCG). Both rely heavily
on surveillance technology for the management of crowds, the protection of
people and property, and for responding to claims about injuries sustained at
the venue.97
2.59 The MCG, which holds approximately 100 000 people, has 400 cameras in
operation.98 Etihad is much smaller, with a capacity of 58 000 people and 63
cameras.99 Both organisations are considering upgrading their systems in the
near future. Some cameras pan the crowd and several monitor the perimeter of
the premises. A powerful camera is used by the MCG to monitor crowd flow
from nearby train stations and traffic flow outside the MCG. It can zoom up to
1.5 kilometres.100 There are signs in both stadiums notifying patrons of the use
of these systems.101
39
2
Chapter 2 Use of Surveillance in Public Places
2.68 A number of staff continuously monitor the CCTV system. The cameras are
monitored in real time but footage can also be viewed retrospectively. The
Casino’s Security Communications Centre and the Victorian Commission for
Gambling Regulation can also access surveillance footage in real time.113
2.69 Crown Casino has installed software that is used in conjunction with some of
its cameras for surveillance purposes. For example, people-counting technology
(which does not identify individuals) is used in conjunction with tracking software
to determine the number of people entering the Casino. The Casino has also
conducted trials of facial recognition technology but has found it to be of
limited use.114
2.70 Crown Casino’s nightclubs use identification scanning technologies at their
entrances to record the details of the patrons entering. The use of this technology
has assisted police to apprehend at least one serious offender. Police often alert
the Casino to people who are of interest to their investigations. The identity
scanner can be used in conjunction with CCTV to identify such individuals and
monitor their movements.115
the hospitality industry
2.71 CCTV is widely used in the hospitality industry. Some licensed venues must
have CCTV cameras that operate to proscribed standards and security staff as a
condition of their licence,116 while other licensed venues choose to have security
cameras even though it is not a condition of their licence. In addition to cameras
within the premises, some venues also have cameras to view adjacent areas,
such as footpaths and carparks. Footage from these cameras can be viewed in
real time for crowd control purposes and to prevent criminal behaviour, and can
also be viewed later to investigate crime. In early 2009 some interstate hospitality
venues trialled the use of small cameras worn by security staff that record sound
as well as pictures.117
2.72 Some nightclubs operate other forms of surveillance, including identification
scanners and facial recognition technology.118 Identification scanners record the
image and written details on an individual’s driving licence or other identity card,
including their name and address.119 Facial recognition software scans patrons’
faces as they enter the nightclub and matches those images against a database of
photos. In this way the software can be used to identify patrons who have been
previously banned from a venue.120 The software can be shared among venues.
shopping centres and retailers
2.73 Many shopping centres and retail outlets such as service stations, supermarkets
and department stores rely on CCTV for crime prevention and detection.121
Large shopping centres typically use sophisticated CCTV systems that have many
cameras operating both inside and outside the centre. Cameras tend to be
concentrated on entrances and areas where there have been crime problems.
One consultation participant mentioned that as handbag theft was especially
common in food courts, there are more cameras in these areas.122 Service stations
use CCTV to deter theft and record the details of individuals who leave the service
station without paying for petrol so they can be provided to police.123 One large
shopping centre reported that its security personnel carry CCTV-captured images
of people who have been banned from the centre so they can be identified
and removed.124
41
2
Chapter 2 Use of Surveillance in Public Places
public and private insurers
2.83 Public and private insurers hire private investigators to engage in some public
place surveillance in order to determine the validity of some insurance claims.136
The surveillance might include, for example, the use of an optical recording device
in a public location, such as a park, to record the claimant’s behaviour in order to
test the truth of his or her statements.137
2.84 The commission was told that while the use of covert surveillance is an important
part of the insurance industry’s ability to investigate claims, it is not a particularly
common activity.138 Private insurance companies advise policy holders in their
disclosure statements that surveillance may be used to assess the veracity of any
claim and to investigate possible fraud.139
the private security industry
2.85 Many surveillance systems in Victoria are managed and monitored by private
security companies. The commission met a number of organisations (including
government departments, local councils and private organisations) that outsource
all or part of their security needs to private security firms.140 There are many different
arrangements. Some private security companies manage operations from their
own premises using their own equipment (often for a number of clients) and
others work at the venue itself under direction of venue staff. In contrast, some
other organisations employ inhouse security staff to manage their operations.141
2.86 Contracted security personnel are required to undergo training,142 which must
be provided by a registered training organisation at Certificate II or Certificate III
level.143 A Certificate III course typically takes three to four weeks to complete.144
Some people we consulted raised concerns that, in contrast, inhouse security staff
are not required to have any certification or training.145
aged care
2.87 RFID and GPS technology is used as a method to monitor the location of aged
care patients suffering from dementia and other memory-affecting conditions.
Alzheimer’s Australia recommends that carers consider the use of a tracking
device to monitor a person with dementia so that the individual can freely go for
walks on their own but are also easily located if they become lost or disoriented.
A device can be worn around the wrist, waist or neck. Some devices can be
activated only by the person wearing the device, while others enable an external
party to monitor the whereabouts of the person wearing the device.146
personal uses
2.88 Individuals use surveillance devices in public places for a number of reasons. Optical
surveillance devices, such as cameras and video recorders, are commonplace.
The Victorian Association of Photographic Societies noted in its submission that
photographers frequently use photography for legitimate purposes.147
2.89 It is also now possible for individuals to track each other. Telstra, for example, offers a
service that locates any Telstra mobile phone and marks the approximate address
on an online map.148 Although this service can be used only with the consent of
the phone user and the person receiving the alert, there are other covert phone
tracking services offered in Australia. One Sydney-based company offers ‘mobile
phone monitoring software’ that can be downloaded onto a mobile phone
without notification to the owner and can covertly copy, record and send to
another account all communications made to and from that phone.149 This type of
service has been marketed, for example, to people to monitor their spouse. There
have also been newspaper reports of an increasing number of parents tracking
their children, including by mobile phone tracking systems.150
43
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
45
3
Chapter 3 Current Law
introduction
3.1 Most public place surveillance in Victoria takes place without any regulation.
Although some of the most offensive forms of surveillance are prohibited, the
two main relevant bodies of law—the Surveillance Devices Act 1999 (Vic) (SDA)
and Commonwealth and Victorian privacy laws1—have limited application
to public place surveillance. While some businesses, such as licensed venues,
taxis and casinos, operate under industry specific laws that regulate their use
of surveillance, these laws are not consistent. The result has been piecemeal
regulation. This chapter outlines the regulatory regime governing surveillance in
public places and highlights the gaps in the law. Table 1, on page 55, sets out all
legislation relating to public place surveillance in Victoria.
47
3
Chapter 3 Current Law
3.12 In its 2008 report, For Your Information: Australian Privacy Law and Practice,
the ALRC noted that ‘Australian privacy laws are multi-layered, fragmented and
inconsistent’.26 The ALRC recommended the creation of a unified set of privacy
principles to apply to all federal government agencies and the private sector,27
and to state and territory government agencies through an intergovernmental
cooperative scheme.28 In its response in October 2009 the Commonwealth
Government committed to enacting a single set of Privacy Principles, noting that
this ‘will mark a significant step toward consistent privacy laws in Australia’.29
The government noted that the ultimate aim was to have a ‘consistent set of
privacy standards for the Commonwealth, state and territory public sectors, as
well as the private sector’ and that additional national consistency issues would be
considered in the government’s second stage response.30
information privacy laws and public place surveillance
3.13 Although information privacy laws regulate some types of public place
surveillance31 there are a number of reasons why many of the more common
public place surveillance activities fall beyond the reach of these laws. First,
information privacy laws do not apply to all members of the community; they
apply only to government agencies and businesses with a gross annual turnover
of more than $3 million. Individuals and smaller businesses are not covered.32 In
2008 the ALRC recommended the removal of the small business exemption in the
Privacy Act.33 The government will consider this recommendation in its second
stage response to the ALRC report.34
3.14 Secondly, as information privacy laws cover only information that is recorded,
they do not apply to any surveillance activities that do not involve the recording
of information.35
3.15 Thirdly, information privacy laws apply only to ‘personal information’; that is,
information collected about an individual ‘whose identity is apparent, or can
reasonably be ascertained, from the information or opinion’.36 The extent to
which surveillance-captured information falls within this description is not clear.
The Victorian Civil and Administrative Tribunal (VCAT) has found a surveillance-
captured image to be ‘personal information’ in cases where the image was
directly linked to other information about an individual.37 This may occur when
someone who knew the individual held the image, or when the image was
accompanied by the individual’s name. Thus, a CCTV-recorded image of a person
may be ‘personal information’ if, for example, that person’s image is also on the
organisation’s security blacklist.
3.16 The limited case law does not provide much guidance about the circumstances
in which a person’s identity ‘can be reasonably ascertained’. In one case it
was decided that this may extend to circumstances in which it is possible for
an organisation to cross-match information within its own databases, but not
necessarily with an external database to which it has access.38 Therefore, if
someone’s identity can be ascertained by reference to external material that may
be obtained without an obscure or lengthy process, the information may be
‘personal information’ covered by Commonwealth and state privacy laws.39
3.17 Although some surveillance-captured information is about identified individuals,
it is unlikely that the majority of images captured on a public place CCTV system
constitute ‘personal information’ for the purposes of information privacy laws.
This is because the identity of many of the individuals depicted cannot be
‘reasonably ascertained’ from the footage.
49
3
Chapter 3 Current Law
3.23 The Federal Privacy Commissioner can investigate a complaint, including by
way of obtaining information and documents and examining witnesses.50 The
Commissioner can make a non-binding order for the payment of damages and
institute court proceedings to enforce a determination.51 The government recently
accepted the ALRC’s recommendation that the Commissioner should be granted
additional powers, including the power to seek civil penalties for serious or
repeated breaches of the Privacy Act.52
3.24 The Victorian Privacy Commissioner can investigate and conciliate a complaint.53
Conciliation may involve an undertaking by one of the parties to take
some action, including the provision of compensation or an apology.54 The
Commissioner can serve a compliance notice when there has been a ‘serious or
flagrant contravention’ of the IPA or an organisation has committed a breach of
the Act at least five times within the previous two years.55 It is an offence not to
comply with a compliance notice.56 To date the Commissioner has issued two
compliance notices.57
3.25 If conciliation fails, the Victorian Privacy Commissioner may refer a complaint to
VCAT at the request of the complainant.58 The Minister may also refer a complaint
directly to VCAT if he or she considers that the complaint ‘raises an issue of important
public policy’.59 When VCAT finds that a complaint is legitimate, it may make a
number of orders. These include restraining the respondent from repeating or
continuing the act or payment of compensatory damages up to $100 000.60
law regulates some surveillance activities, 30, 33, 34A. 72 An action for trespass requires showing
there was a direct interference with
but does so indirectly when protecting other 54 See eg, Complainant X v Contracted the plaintiff’s land; an action for
Service Provider to a Department [2005] nuisance requires showing some indirect
interests, such as those in property. VPrivCmr 6, where the respondent agreed interference with the plaintiff’s right
to pay the complainant compensation to use and enjoy their land. Danuta
3.31 In some instances a person can take action for for humiliation and distress, to formally Mendelson, The New Law of Torts (2007)
trespass or nuisance to protect their privacy apologise, and to destroy all surveillance- 117, 529.
collected information it held regarding the
if surveillance activities interfere with their complainant. 73 Raciti v Hughes (1995) 7 BPR 14 837. See
also Stoakes v Brydes [1958] QWN 5;
interest in land.72 A person may, for example, 55 Information Privacy Act 2000 (Vic) s 44(1). Khorasandjian v Bush [1993] QB 729.
bring a trespass action to prevent other people 56 In the case of a body corporate the 74 Grosse v Purvis [2003] QDC 151;
offence attracts 3000 penalty units; in any Jane Doe v Australian Broadcasting
from entering his or her land to engage in other case 600 penalty units: Information Corporation [2007] VCC 281.
surveillance activities. A person may also bring Privacy Act 2000 (Vic) s 48.
75 The term ‘public authority’ is defined
57 Office of the Victorian Privacy
a nuisance action to prevent someone from Commissioner, Report 03.06 Mr C’s Case
broadly in the Charter of Human Rights
and Responsibilities Act 2006 (Vic) s 4.
persistently conducting video surveillance of his (2006) 47; Office of the Victorian Privacy It includes police, local councils and
Commissioner, Report 01.06 Jenny’s Case
or her property.73 Importantly, the actions of (2006) 79.
private entities that have functions of
a public nature.
trespass and nuisance provide limited protection 58 Information Privacy Act 2000 (Vic) s 37. 76 Charter of Human Rights and
in relation to public place surveillance because 59 Information Privacy Act 2000 (Vic) s 31(1). Responsibilities Act 2006 (Vic) s 38(1).
only owners of private land can bring these 60 Information Privacy Act 2000 (Vic) ss 43(1) 77 Charter of Human Rights and
(a). Responsibilities Act 2006 (Vic) s 13(a).
actions before a court. 61 Crimes Act 1958 (Vic) ss 68–70; Criminal 78 International Covenant on Civil and
Code Act 1995 (Cth) sch [474.19]. Political Rights, opened for signature
3.32 Although two Australian trial courts have 62 Crimes Act 1958 (Vic) s 21A. 16 December 1966, 999 UNTS 171, art
recognised a right to sue for an invasion 63 Criminal Code Act 1995 (Cth) sch
17 (entered into force 23 March 1976).
79 Guidelines suggest that surveillance that
of privacy,74 there are no decisions of the [474.17].
enables a public authority to monitor or
Australian High Court or intermediate appellate 64 Summary Offences Act 1966 (Vic) div
trace the movements of a person within
4A. Penalties include three months
Victoria should act as a policy trigger for
courts that have confirmed the existence of imprisonment for observing a person’s
consideration of the right to freedom
genital or anal areas from beneath and
this right. This issue is discussed in detail in two years imprisonment for visually
of movement: Human Rights Unit,
Department of Justice [Victoria], Charter
Chapter 7. capturing or distributing images of a
of Human Rights and Responsibilities:
person’s genital or anal region: Summary
Guidelines for Legislation and Policy
Offences Act 1966 (Vic) ss 41A, 41B
the victorian charter of human rights and 41C.
Officers in Victoria (2008).
51
3
Chapter 3 Current Law
3.35 There has not been any judicial consideration of the scope of the right to
privacy in section 13 of the Charter. However, the United Nations Human Rights
Committee (the Human Rights Committee), the body charged with monitoring
implementation of the ICCPR, has recognised that the right to privacy may be
breached through some surveillance practices.80 Likewise, the European Court of
Human Rights, in considering the right to privacy under the European Convention
on Human Rights, found invasions in relation to publication of photographs of a
celebrity81 and television broadcast of CCTV street footage.82
3.36 Draft guidelines prepared by the Victorian Department of Justice (DOJ Draft
Guidelines),83 to assist with implementation of the Charter identify public place
surveillance as a possible policy trigger for consideration of the right to privacy.
Two forms of surveillance are listed:
• surveillance of persons for any purpose (such as CCTV)
• surveillance or other monitoring where recorded personal
information is collected, accessed, used or disclosed.84
limits on the right to privacy under the charter
3.37 The Charter recognises that the right to privacy is not absolute. Section 13 of
the Charter prohibits interferences with the right to privacy only if they are
unlawful or arbitrary. The term ‘arbitrary’ has not yet been considered by a
court in Victoria. The Human Rights Committee has said that an interference is
not arbitrary if it is ‘reasonable’,85 that is, proportionate to the end sought and
necessary in the circumstances.86
3.38 In order to demonstrate that surveillance is reasonable, guidelines prepared by the
Department of Justice say that a public authority using surveillance must be able
to demonstrate that the limitation on privacy ‘is justified in the circumstances’.87
The guidelines also suggest that
• the purported purpose of the surveillance must at minimum be a
societal concern that is pressing and substantial and this is more
than just an effort to achieve a common good88 and
• the purpose of surveillance would need to relate to an area of
public or social concern that is important, and not trivial. Economic
considerations alone (other than a serious fiscal crisis) will almost
never be important enough to justify a limitation to a right.89
3.39 In addition, any right under the Charter may be limited by the application
of another right. For example, although the use of a surveillance device may
interfere with the right to privacy, that activity may also be an exercise of the right
to freedom of expression set out in section 15 of the Charter.90 Section 7(2)—the
general limitations clause—of the Charter is designed to assist in resolving conflict
between human rights. For example, in determining if the right to privacy can be
reasonably limited in order to exercise the right to freedom of expression, it would
be necessary to consider a number of factors, including the importance of the
right to freedom of expression in the particular context.91 The right to privacy,
and other rights potentially affected by public place surveillance, are discussed
more in Chapter 4.
53
3
Chapter 3 Current Law
other countries
3.45 Public place surveillance is more directly regulated in some other countries than
it is in Victoria. In the UK,99 New Zealand,100 Canada,101 Ireland,102 Norway103 and
the Netherlands104 surveillance practices are regulated through data protection
or privacy laws. In a recent development, the UK Minister for Policing announced
the creation of a new National CCTV Oversight Body and appointed an interim
CCTV regulator. The regulator will work with the National CCTV Strategy Board to
develop recommendations about the use of CCTV in public places.105
3.46 Other countries, such as Sweden,106 Denmark,107 and France,108 have separate
laws that specifically regulate surveillance in public places. In addition, some
countries have created a right to sue for invasion of privacy, either through the
courts or by legislation. These models are discussed in Chapter 7.
conclusion
3.47 Although the practice of surveillance in public places continues to grow in
Victoria, the law has not kept pace with the expanded capabilities and uses of
surveillance devices. Devices have become increasingly affordable, available and
sophisticated. The two major bodies of law regulating public place surveillance—
the SDA and information privacy laws—are limited when it comes to public place
surveillance because they were not specifically designed to regulate this activity.
3.48 The development of laws to cover particularly offensive forms of surveillance (such
as upskirting and surveillance related to child pornography), and to regulate some
industries (for example, casinos and bars), has been an attempt to address some
of the limitations in the current regime. The result has been piecemeal regulation.
Victorians do not have laws of general application, based on a set of guiding
principles, that seek to balance the competing interests at stake when surveillance
devices are used in public places.
55
3
Chapter 3 Current Law
Legislation
Application to public place
surveillance
Regulates the collection, use and
disclosure of ‘personal information’
Users covered
Guidelines
Application to public
Organisation Instrument Users covered
place surveillance
Victorian
Guidelines relating to Guidance on how to comply Government
Victorian Privacy
information privacy with various aspects of agencies and
Commissioner
laws information privacy laws. contracted service
providers
57
3
Chapter 3 Current Law
Guidelines
Organisation Instrument
Application to public
place surveillance
Users covered
S
L
Policy and
Procedures for the
Establishes a system for the
handling of CCTV footage,
including that it be treated
S
L
Department of Public transport
Management of in accordance with privacy
Infrastructure (Vic) systems
CCTV Evidence principles contained in the
S
Records Information Privacy Act
2000 (Vic).
L
Provides guidance to
Australian Guidelines for petrol station owners
Petrol station
Institute of Service Station and staff relating to their
owners and staff
S
Petroleum Security responsibilities in carrying
out surveillance.
Voluntary standards
Application to public
L
S
Organisation Instrument Users covered
place surveillance
Designed to protect
L
Radio Frequency
consumer privacy; covers
Australian Identification (RFID)
areas including notice to
Retailers in Retail: Consumer Retail outlets
S
consumers, education, and
Association Privacy Code of
retention, use and security
Practice
of data.
National Code of
Standards for use of CCTV
systems on mass passenger L
S
transport. Covers permissible Specified forms
Council of Practice for CCTV
uses and disclosure of of mass public
Australian Systems for the Mass
surveillance footage for transport,
L
Governments Passenger Transport
counter-terrorism purposes including trains,
(COAG) Sector for Counter-
and recommends community trams and buses
Terrorism
consultation on camera
location and installation.
Includes recommendations
S
Australian Standard:
on the operation,
management, selection,
planning and installation
L
S
Standards Closed circuit
of CCTV systems. Outlines All
Australia television (CCTV),
good practice, including
Parts 1–3
L
that cameras not be used
to infringe the individual’s
privacy rights.
Policies on placement of
cameras and no-go areas
for cameras, signage, Government and
Individual
Internal policies access to footage by private sector
businesses
staff, inappropriate use users
of surveillance cameras,
disclosure to third parties, etc.
59
4
Chapter4 A Balanced Approach to Regulation
introduction
4.1 In Chapter 2 we described the many ways Victorians experience surveillance in
public places. Examples include the widespread presence of CCTV on city streets
and in shopping centres, the various surveillance devices in public transport and the
increasing use of personal surveillance, such as cameras and GPS in mobile phones.
4.2 In this chapter, we consider the impact surveillance is having on the lives of
Victorians. In particular, we report what we have learnt from users of public place
surveillance, as well as members of the public and community organisations,
about the benefits and risks of its use. In response, we have devised a balanced
approach to regulation—one that strives to maximise the benefits of public place
surveillance while minimising its risks.
4.3 In developing our recommendations for reform, the commission has drawn
on two particular sources. The first is the Charter of Human Rights and
Responsibilities Act 2006 (Vic) (the Charter). This contains a useful framework for
achieving a balanced approach to regulation when rights are in conflict and when
there is a need to place limits upon the capacity to exercise a particular right. The
second is modern theories of responsible regulation, which are also useful when
considering how best to regulate a complex activity where interests may differ
quite markedly. We discuss the applicability of these sources to the development
of our approach below.
4.4 We conclude the chapter by outlining our recommendations for reform in general
terms. Chapters 5, 6 and 7 contain detailed discussion of each recommendation.
benefits
4.8 The uses and users of surveillance have changed markedly over the past few
years. Surveillance technology is increasingly able to collect and disseminate
information in ways previously not thought possible. Today, police and many
other Victorian agencies rely on sophisticated surveillance technology for their
everyday operational and business activities. Surveillance devices are also utilised
by individuals for a number of important purposes. The commission met a wide
variety of users of surveillance, who told us why they use the technology and the
benefits they derive from it. These are outlined below.
61
4
Chapter4 A Balanced Approach to Regulation
4.16 Other technologies are also used to detect or prevent crime. For example,
RFID technology is widely used in the retail sector to deter and apprehend
shoplifters. Stock is fitted with a passive device that sounds an alarm if it passes
through a reader (generally at the exit of a store).19 RFID chips also are used in
modern Australian passports to assist in the prevention of identity fraud.20 Other
sophisticated technology, such as facial recognition technology, body scanners
and residue scanners are also used in some international airports for the same
purposes. This is discussed in Chapter 2.
4.17 Although crime prevention and control are major reasons for using CCTV,
the evidence suggests its effectiveness in reducing crime is debateable. This is
discussed below.
saftey
4.18 Another important benefit of public place surveillance is the promotion of
community and employee safety. The commission was told that CCTV cameras
are frequently installed to enhance the safety of an area (including suburban
train stations, car parks and some metropolitan streets), particularly at night.21
Businesses also use surveillance to protect their employees, particularly those
vulnerable to armed robbery, such as petrol stations and bottle shops.22
4.19 Public safety is an important reason underlying the use of surveillance in the
transport sector. Surveillance cameras can assist transport operators to respond
when a fire has erupted23 and when determining if passengers are clear of a
departing train or tram before allowing it to leave.24 There are over 600 CCTV
cameras operated by roads authorities for the purpose of traffic monitoring and
accident response.25 Safety is also a major reason for use of surveillance by local
councils. Surveillance is used for monitoring road traffic, the movement of fires,
access for emergency vehicles and crowd flow at major venues.26
4.20 Individuals may also carry surveillance devices to protect themselves and other
family members. We were told, for example, of the use of surveillance in domestic
violence and family law matters, such as a woman recording her ex-husband’s
conversations with her as evidence of him breaching his intervention order.27
We were also told of individuals recording scenes at protests ‘where there
are community concerns that violence may occur’.28 Interestingly, when we
consulted community groups—such as youth, multicultural groups and people
experiencing homelessness—there was a mixed response to whether CCTV made
them feel safer.29
4.21 Another way surveillance devices are used to enhance safety is by assisting in
locating people who have gone missing. Tracking devices in mobile phones, for
example, are used by some parents to keep track of a child’s whereabouts,30
and by carers for tracking people suffering from memory loss,31 or who have
fallen unconscious.32
4.22 Another beneficial use of surveillance devices is in the management of serious
incidents or emergencies. For example, in an emergency evacuation camera
surveillance can be used to ensure that every person has safely and successfully
left the premises.33 Transport providers and shopping centres told us that camera
surveillance has also been useful in facilitating speedy assistance to people if they
are injured or in danger.34
4.25 Some organisations use surveillance technologies for advertising or marketing 29 Some people told us that the presence of
cameras made them feel safer: Forums 2,
purposes, for example, through mobile phones with Bluetooth functionality.40 3, 5. Other people said the presence of
CCTV cameras did not make them feel
This is discussed in Chapter 2. safer: Forums 3, 4.
managing the movement and conduct of people 30 See eg, ‘Tracking teens: Parents use GPS
Cell Phones to Keep up with Their Children’
4.26 Surveillance cameras are also used to ensure that public spaces remain accident LA Times/Washington Post wire service,
27 June 2006, <medialab.semissourian.
free by monitoring crowd behaviour. Large stores and entertainment venues com/story/1158246.html> at 30 June 2008.
use surveillance for public safety purposes and for crowd control. Cameras are 31 See Katina Michael, Andrew McNamee,
M G Michael, ‘The Emerging Ethics
monitored and information is passed on to ground staff about how best to of Humancentric GPS Tracking and
manage crowd movement.41 Surveillance also offers similar benefits for managing Monitoring’ (Paper presented at the
International Conference on Mobile
the movement of large volumes of people through public transport hubs during Business: IEEE Computer Society.
busy periods.42 Police can access existing CCTV networks (such as those operated Copenhagen, Denmark, 25–7 July 2006)
<ro.uow.edu.au/cgi/viewcontent.cgi?articl
by local councils or transport operators) during special events to monitor and e=1384&context=infopapers> at
manage crowd movement.43 21 May 2008.
32 Chris Rizos, ‘You Are Where You’ve Been:
news gathering and the dissemination of information Location Technologies’ Deep Privacy
Impact’ (Speech delivered at the You
4.27 Public place surveillance is a tool used by journalists to record people’s activities Are Where You’ve Been: Technological
Threats to Your Location Privacy Seminar,
in public places as part of the newsgathering process. One media organisation Sydney, 23 July 2008).
told us their activities frequently included ‘crowd shots taken at sporting events, 33 Site Visit 10.
filming people participating in street demonstrations, recording of public events 34 Submissions 22, 25; Site Visits 2, 4, 15.
and activities, such as outdoor concerts, and recording of events having a public 35 Site Visits 1, 9.
36 Site Visit 1; Think Tram Projects,
interest dimension, such as police actions’.44 VicRoads <www.vicroads.vic.gov.au/
Home/PublicTransportAndEnvironment/
4.28 The dissemination of information by the media is of great benefit to the public PublicTransportOnRoads/TramProjects/
because it allows the community to know about issues as they arise. ThinkTramProjects.htm> at 14 January
2010; SmartBus Infrastructure, Department
artistic purposes, entertainment and other personal uses of Transport (Vic) <www.transport.vic.
gov.au/web23/Home.nsf/AllDocs/90A14F
4.29 Individuals also conduct public place surveillance for a number of beneficial 13EABE24E4CA25766600140C50?Open
Document> at 28 January 2010.
reasons. The use of optical surveillance, such as cameras and video recorders, is 37 Site Visit 1.
commonplace. In its submission to the commission, the Victorian Association of 38 Teresa Scassa et al, ‘Consumer Privacy
Photographic Societies noted the frequent use of photography by professional and Radio Frequency Identification
Technology’ (2005–6) 37 Ottawa Law
and recreational photographers for legitimate artistic purposes to record events Review 215, 219.
and capture images.45 People also use audio recording devices—including 39 Lachlan Heywood, ‘Public Told not to Fear
Council Spies in the Sky’, The Courier Mail
recorders contained in mobile phones or hand-held computers—to record (Brisbane), 19 September 2003, 18.
lectures, presentations or important conversations. Individuals may also use 40 How It Works, Bluetooth Advertising
tracking devices in public places for personal purposes. Use of GPS technology in <www.bluetoothadvertising.com.au/
how_it_works.html> at 28 January 2010.
mobile phones and vehicles is now widespread. 41 Site Visits 6, 14; Roundtables 13, 20, 31.
42 Site Visits 2, 4.
43 Site Visits 1, 5.
44 Submission 10.
45 Submission 15.
63
4
Chapter4 A Balanced Approach to Regulation
risks
4.30 Although public place surveillance has many benefits, there are also a number
of risks associated with its use. Because some of those risks are subtle and
incremental, they may not be widely discussed. Other risks are difficult to
characterise. As one privacy commentator has noted, ‘most privacy problems lack
dead bodies’.46 In addition, invasion of privacy may result in harm that the law
finds difficult to remedy. We outline below the risks identified by the commission
through our research, site visits and consultations.
threat to privacy
4.31 Most, if not all, people have reasonable expectations of some privacy in public
places. The nature of those reasonable expectations will change according to
time and place. Most people would reasonably expect, for example, that a
conversation on a secluded park bench or a quiet beach would not be overheard
or recorded, and most people would similarly expect that a brief intimate
moment, such as a kiss or embrace, in a secluded public place would not be
observed or recorded. It may be unreasonable to have similar expectations on a
crowded tram or in a busy shopping mall.
4.32 Some current surveillance practices may interfere with people’s reasonable
expectations of privacy in public places. Many people may be shocked to discover
that their movements or conversations in public places have been recorded by
unseen CCTV cameras or listening devices. The commission was told of numerous
instances of surveillance occurring without clear notice to the public.47 Even
where signs are used, they do not necessarily contain sufficient information: they
may not identify why cameras are used; who owns, operates, or is responsible
for them; how footage is managed, where it goes, the people to whom it can be
released; and how to complain about abuse.48
4.33 Another surveillance practice that has raised privacy concerns is the use of x-ray
body scanners, trialled in 2009, and planned for installation in some Australian
airports.49 The scanners provide operators with an image of passengers without
clothes. A recent UK case of a man caught ogling the image of his colleague has
sparked concerns in the UK.50
4.34 The need to retain privacy in public places is sometimes concerned with the desire
to keep particular information private. This information may relate to a person’s
political views, medical issues (such as attendance at an abortion clinic or a drug
and alcohol treatment centre), and social matters (such as attendance at a gay
bar).51 It is strongly arguable that people ought to be able to restrict access to
information about themselves of this nature.
social exclusion
4.35 Young people, Indigenous communities, people experiencing homelessness, and
other marginalised and vulnerable members of society use public spaces more
than others do because these groups rely on public places as social, living and
cultural spaces.52 As a result, these groups experience more surveillance in public
places than do other members of the community.
monitored on CCTV they are more likely to be charged with this offence. 56 See eg, Submissions 5, 14, 40, 42.
57 Forums 2, 3, Roundtable 16.
The Legal Service is also concerned that increasingly homeless persons
58 Roundtable 18.
are being pushed out of areas where they might previously have found 59 Walter Siebel and Jan Wehrheim, ‘Security
shelter by the proliferation of CCTV cameras. For example, a CCTV camera and the Urban Public Sphere’ (2006) 3 (1)
German Policy Studies 19, 22.
positioned to record the sheltered waiting area of a railway station may
60 Submission 12. Other submissions
have a ‘security’ function, but it can also facilitate train authorities ‘moving expressed similar views, see eg,
on’ a homeless person who uses the area to shelter for the night.55 Submissions 32, 42.
61 Submission 25; Consultation 27; Site
4.38 Participants in our consultations suggested that CCTV could also exclude other Visit 13.
marginalised groups from public places,56 For example, including complaints by 62 Submission 34.
63 Submission 42.
young people about being moved on when congregating in public areas.57
4.39 The risk that certain people will be denied access to public space is magnified
by the increase in privately owned public places, such as shopping centres and
entertainment complexes. Some community organisations noted that their clients
report difficulties arising from the use of surveillance and security in shopping
centres.58 Walter Siebel and Jan Wehrheim suggest that the temptation to move
along ‘undesirables’ may be acted upon with less public accountability in the case
of private public places than would be the case with police on city streets.59
Access to services
4.40 Surveillance can also disproportionately affect access to services. The commission
was told of a number of instances in which young people and other marginalised
groups have been moved on by security guards at shopping complexes and train
stations, which has prevented them from enjoying public places and also moved
them ‘away from sites they have elected to be in because they are safe’.60 The
commission was informed that security guards frequently use CCTV images to
help them identify groups or individuals for attention.61
4.41 It was suggested that the practice of ejecting ‘undesirables’ essentially establishes
that some people have a less legitimate claim to being in public places than
others. The result is that they ‘develop a clearer sense of marginalisation and
alienation’.62 One submission suggested that the right to freedom of movement
includes ‘the right to avoid being forced to move’.63
65
4
Chapter4 A Balanced Approach to Regulation
Access to CCTV footage
4.42 The issue of access to and retention of surveillance data—in particular CCTV
footage—was of concern to several organisations the commission met.64 They
noted that only those conducting the surveillance are aware of the period of time
data are kept, and that community members are unlikely to be able to access the
footage in time, particularly if the process involves getting legal advice.65 It was
suggested that this is indicative of the general power imbalance between users
and subjects of surveillance.66
4.43 We were also told of people who had been victims of assault at nightclubs and
other CCTV monitored places who were refused access to the footage of the
incident.67 In submissions and forums it was alleged that assaults have been
committed against members of the public by persons in positions of authority who
were aware of the placement of CCTV and intentionally avoided being within its
range.68 A surveillance user noted that police usually request access to the footage
before it has been destroyed but that requests from the public are usually too late.69
67
4
Chapter4 A Balanced Approach to Regulation
criminal conduct and offensive uses
4.53 As surveillance devices become cheaper, they become increasingly accessible to
people who may wish to use them for criminal or offensive conduct. For example,
there have been several cases of people using hidden cameras to record under the
skirts of unsuspecting women.87 This practice is known as ‘upskirting’ and is now
a specific criminal offence.88 Surveillance in public places is also used to facilitate
other crimes. For example, covert surveillance cameras have been installed at
ATMs to capture individual PINs for the purpose of stealing from individual
accounts. There is also the possibility of blackmail based on recorded images of
embarrassing conduct.89
Technological limits
4.61 During consultations the commission was often
reminded that surveillance technology is fallible.
We were told, for example, that CCTV systems
had sometimes failed to capture footage of a
serious incident or failed to produce footage to
a standard where the offender was identifiable.
Similarly, biometric evidence, often touted as
foolproof, can also provide inaccurate results.
For example, a number of organisations told
us that facial recognition technology has a
tendency to register false positives.105
69
4
Chapter4 A Balanced Approach to Regulation
4.62 The use of camera footage in conjunction with expert identification evidence in
criminal prosecutions has been questioned because it is not always accurate.106
Experts in criminal prosecutions use facial mapping techniques to compare the
face of the accused with that contained in the camera image of the offender.
These techniques are neither standardised nor consistently applied. Critics have
suggested that as a result this method of identification risks being ‘unreliable and
unfairly prejudicial’.107
71
4
Chapter4 A Balanced Approach to Regulation
4.77 Privacy is, however, notoriously difficult to define.139 It is a fluid concept that has
developed over time in response to new technologies and changes in cultures
and lifestyles.140 It concerns a range of ideas, including secrecy, confidentiality,
solitude, anonymity, control over information, freedom from surveillance and
protection of one’s reputation.141 Accordingly, one leading commentator has
referred to privacy as ‘a concept in disarray’.142
4.78 Privacy is considered by some to be ‘essential for freedom, democracy,
psychological well-being, individuality, and creativity’.143 Privacy enables
individuals to develop a ‘better constructed’ view of themselves and the world
around them.144 It also gives people the freedom to develop, discuss and criticise
society and government ‘anonymously … and without fear of community
reprisal’.145
4.79 Some authors suggest that protecting a right to privacy can have negative
consequences. It can cloak illegal activities by protecting them from scrutiny and
inhibit some security and law enforcement steps. The enforcement of privacy
rights can also dilute transparency and accountability by limiting the extent to
which private activities and conversations can be monitored.146 There can often
be an inherent tension between the security objectives of government and the
privacy rights of individual members of the community.
73
4
Chapter4 A Balanced Approach to Regulation
4.93 The general limitations clause in section 7 of the Charter requires that rights
be ‘balanced against each other and against competing public interests’.162 It
states that the human rights contained in the Charter may be subject to action
that limits the right, but only if the action is authorised by law. It also says
the limitation must be ‘reasonable’ and ‘demonstrably justified in a free and
democratic society based on human dignity, equality and freedom’.163 When
determining whether a limit is reasonable, the following factors must be taken
into account:
• the nature of the right
• the importance and purpose of the limitation
• the nature and extent of the limitation
• the relationship between the limitation and its purpose
• any less restrictive means reasonably available to achieve the
purpose that the limitation seeks to achieve.
4.94 Section 7 provides a useful framework when human rights conflict, that is, when
protecting one person’s rights limits the rights of another. As previously discussed,
although the use of a surveillance device may interfere with the right to privacy,
that activity may also be an exercise of the right to freedom of expression set
out in section 15 of the Charter. In such cases, section 7 instructs us to consider
the importance of the right to freedom of expression in that context (‘the
importance and purpose of the limitation’) and whether that right was advanced
by interfering with the privacy rights of others (‘the relationship between the
limitation and its purpose’).164
4.95 One submission explained the restricted way Charter rights can be limited in
relation to the use of surveillance in public places. It stated that the Charter
requires proportionality between the surveillance practice and the purpose it seeks
to achieve:
This means that a user of surveillance ought to use the least privacy-
intrusive means of achieving the purpose, and excessively intrusive forms
of surveillance may only be justifiable when designed to protect individuals
from grave physical harm.165
Criminal
penalties
Civil penalties
Warnings
Persuasion
Collaboration
75
4
Chapter4 A Balanced Approach to Regulation
4.105 The pyramid model emphasises that most effort should be directed towards
initiatives at the base of the pyramid. Escalation to methods further up the
pyramid should occur only when efforts to secure compliance through persuasion
have failed. This reflects that ‘cooperative approaches such as education,
persuasion and restorative justice are normally better … as a first strategy’.174
4.106 Having a specific regulator in place to administer the system in question is
important to the success of the model. The model works by providing a regulator
with flexibility and a range of tools that focus on cooperative compliance and only
revert to coercion if efforts at persuasion fail. Self-regulation, co-regulation and
direct regulation all fall within the pyramid.175
4.107 Those subject to regulation are essentially categorised into three different groups.
First, at the base of the pyramid, the organisation or individual is presumed to
be willing to comply. Secondly, in the centre of the pyramid, it is presumed the
organisation or individual is rational but needs incentives to comply. Thirdly, the
apex of the pyramid deals with the irrational organisation or individual whose
actions require a much heavier sanction.
4.108 Responsive regulation acknowledges that ‘persuasive and compliance-oriented
enforcement methods are more likely to work where they are backed up by the
possibility of more severe methods’.176 Thus, where regulation seeks to promote
socially responsible ends, there is a need to focus on persuasive means to
encourage responsible, law-abiding behaviour. Ayres and Braithwaite write that
when creating obligations involving social responsibility, models work best when
the regulator has ‘benign big guns’.177 By this the authors mean that ‘persuasion
will normally only be more effective than punishment in securing compliance
when the persuasion is backed up by punishment’.178 A culture of cooperation
is easier to establish when there are serious consequences for misbehaviour,
but when supportive methods are the first means of attempting to promote
good behaviour.179
Compliance-based regulation
4.109 Many scholars have considered how best to achieve compliance through
persuasion. These studies suggest that ‘in practice … officials have often relied
on education, persuasion and cooperation rather than deterrence to persuade
business to preventatively comply with regulatory goals’.180 The body of theory
that explains this approach can be described as compliance-based regulatory theory.
4.110 Compliance-oriented regulation relies on a range of strategies. First, it aims
to secure compliance with regulatory goals through ‘(a) codes of conduct and
self-regulation, (b) voluntary agreements between government and industry,
(c) industry standards and internal management systems, and (d) economic
instruments and market mechanisms’.181 Like principle-based regulation (discussed
below), compliance-based regulation focuses on the desired outcome rather than
the means used to achieve it. This permits flexibility of approach to regulation.
4.111 Like responsive regulation, the first efforts by a regulator in a compliance-based
system are education, cooperation and structured guidance. A compliance-based
approach is about
providing incentives and encouragement to voluntary compliance and
nurturing the ability for private actors to secure compliance through
self-regulation, internal management systems, and market mechanisms
where possible.182
3. use of process or outcome-based regulation where possible to maximise 178 Braithwaite, above n 170, 19.
179 Ayres, above n 169, 48–9.
voluntary compliance
180 Parker, above n 176, 533.
4. provision of rewards and incentives for high/voluntary compliance 181 Ibid 542.
182 Ibid 539.
5. informed monitoring of non-compliance 183 Ibid 535
6. dialogue and restorative justice when compliance fails, and 184 Ibid 536–7.
185 Ibid 539.
7. tit-for-tat enforcement when restorative justice fails.183 186 Ibid 534.
187 Ibid 538.
4.113 Compliance-based regulation also requires a strong emphasis on monitoring 188 See eg, Julia Black, Martyn Hopper and
for non-compliance. Monitoring determines whether the system is achieving Christa Band, ‘Making a Success of
Principles-Based Regulation’ (2007) May
its aims.184 A system that includes monitoring recognises that not all impacts Law and Financial Markets Review 191;
are foreseeable, and that gaps and loopholes in the regulatory model can be Surendra Arjoon, ‘Striking a Balance
Between Rules and Principle-Based
identified using the information gathered. Approaches for Effective Governance:
a Risks-Based Approach’ (2003) 68(1)
4.114 Secondly, compliance-based regulation takes a rehabilitative approach to Journal of Business Ethics 53.
enforcement rather than a punitive one. Parker writes that in the face of 189 Black, above n 188, 195.
non-compliance this approach would require an ‘attempt to restore or nurture 190 Australian Law Reform Commission, For
Your Information: Australian Privacy Law
compliance rather than reverting immediately to a purely punishment-oriented and Practice: Volume 1: Final Report 108
approach’.185 (2008) [4.4].
4.115 Critics argue that a major weakness in compliance-based regulatory theory is that in
practice businesses will only do the right thing when it is in their interest to do so.186
However, studies have found that this is not always the case. One US study examined
whether cooperative enforcement, or punitive, sanction-based, enforcement, was a
more effective means of protecting the environment. It found that there was greater
success and compliance when using a cooperative approach in which a regulator
worked with stakeholders to develop commitment and capacity for compliance.187
Principle-based regulation
4.116 A consequence of compliance-based regulation is that it places great emphasis
on principles that articulate the desired outcomes of any use of regulation.
Scholars who support principle-based regulation suggest that regulation that
relies exclusively on proscriptive rules is a creature of the past and does not have
the flexibility required for regulation in the modern era.188 ‘Principles … have
the benefit of congruence: of communicating the regulatory objectives and
promoting behaviour that will achieve those objectives.’189
4.117 Principle-based regulation focuses on outcomes and uses overarching principles
to guide the regulatory regime. It seeks to address the problems inherent in
rule-based regulation by enabling the regime to respond to new issues as they
arise without having to create new rules. In a rapidly changing field, such as
public place surveillance, a principles-based approach can focus the aims of new
regulation and provide a set of overarching standards than can adapt to new
technologies and practices.
4.118 Principle-based approaches are already in place in state and federal information
privacy laws. In its recent review of federal privacy laws, the ALRC recognised
the importance of principle-based regulation when dealing with privacy.190 The
commission agrees with this approach and the surveillance principles described in
Chapter 5 form the centrepiece of our recommendations.
77
4
Chapter4 A Balanced Approach to Regulation
4.119 One of the criticisms of principle-based regulation is that it leads to uncertainty
and inconsistency as organisations and agencies interpret and adapt to the
principles.191 Moreover, principles-based regulation is considered inadequate as
a form of regulation on its own.192 The ALRC’s approach to privacy regulation
is, however, a hybrid model that relies on principles as high level objectives and
uses more traditional rule-based regulation to ensure certainty and compliance.193
The commission has adopted a similar approach to the regulation of public place
surveillance.194
79
4
Chapter4 A Balanced Approach to Regulation
an overview of our recommendations and our approach
4.131 The commission’s conclusions about the best possible regulatory approach are
guided by our extensive consultations, site visits, submissions and research. Our
Consultation Paper contained a range of reform options that produced helpful
responses from many organisations and individuals.
4.132 Our research and consultations have led us to recommend a regulatory approach
that is primarily educative. The commission believes that regulation must focus
on encouraging best practice use of surveillance rather than placing additional
burdens on business and government.
4.133 The commission faced a number of challenges when developing its reform
options. First, in this area ‘there is no clear-cut wrongdoer, no indisputable villain
whose activities lack social value’.205 Secondly, the capacity of the technology
used to engage in surveillance in public places is constantly changing. Thirdly,
it is extremely difficult to regulate most of the activities of once-off uses of
surveillance devices, such as people who use mobile phones that have a range
of functions.206
4.134 An approach that emphasises information collection and guidance about
responsible practices is a useful first step in a field in which there has been little
regulation. As technology develops and the potential for harm increases, it is
important to provide guidance to users and information to the community about
the use of surveillance.
4.135 The commission has developed a principle-based, outcome-focused approach
to regulation of public place surveillance. We have devised a set of overarching
principles that can be included in legislation. Those principles, which are set out in
Chapter 5, seek to balance competing rights and interests.
4.136 The commission recommends that an independent regulator be appointed. In line
with modern regulatory theory, the primary function of the independent regulator
will be to work collaboratively with surveillance users. The regulator will assist
users to comply with the principles and will inform the public about the operation
of surveillance in public places. The commission has recommended in Chapter
5 that the independent regulator have a range of powers to guide and ensure
compliance with the principles.
4.137 In the chapters that follow we describe other recommendations that are designed
to deal with the most serious misuses of surveillance in public places. These
responses include the introduction of civil penalties for breaches of the SDA,
clarifying the reach of existing criminal prohibitions in the SDA, the creation of
a new offence designed to deal with the most offensive uses of surveillance and
two new civil causes of action for misuse of surveillance.
conclusion
4.138 Public place surveillance offers both benefits and risks. It affects important rights.
Do the risks outweigh the benefits? Which rights are paramount? The responses
depend on a range of matters, including the type of public place surveillance
under consideration, the purpose for which it is used, and the organisation or
person conducting the surveillance.
81
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
Public Places
public places
83
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
introduction
5.1 This chapter contains details of the commission’s recommendations for promoting
the responsible use of surveillance in public places in Victoria. We have developed an
approach to regulation that is based on principles and focuses upon outcomes. The
first limb of the commission’s regulatory approach is a set of overarching legislative
principles to guide all users about responsible use of public place surveillance.
5.2 The second limb is the creation of an independent regulator who will assist users
to comply with the principles and inform the public about responsible surveillance
use. In this chapter we outline the range of functions and powers necessary
for the regulator to fulfil these tasks, bearing in mind that the least restrictive
regulatory methods are desirable. In preparing these recommendations, we have
drawn upon the opinions expressed in submissions and consultations and the
views of our Consultative Committee.
5.3 Although appropriate guidance about the responsible use of surveillance in public
places is a cornerstone of our recommendations, we believe that guidance alone
cannot protect people from some practices that seriously affect their privacy.
Chapters 6 and 7 deal with additional regulatory measures for particularly
offensive uses of surveillance.
85
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.15 Although there may be shared expectations of privacy in public places, the
extent and reasonableness of those expectations differs according to context.
Commentators have identified a number of factors relevant to the expectation
of privacy in public places.13 Submissions and consultations also noted certain
relevant factors. The commission’s view is that the reasonableness of any
expectation of privacy in public will depend on, among other things, the following
factors:
• the location
• the nature of the activity being observed
• whether the activity is recorded and disseminated
• the type of surveillance used
• the identity of the person being observed (for example a public
official, celebrity or a member of the public)
• whether the surveillance was harassing in nature
• whether the surveillance was covert
• whether the person specifically consented to the surveillance.14
2. Users of surveillance devices in public places should act responsibly and consider
the reasonable expectations of privacy of individuals
5.16 This principle seeks to oblige surveillance users to consider the reasonable
expectations of privacy of people who may be subject to that surveillance.
For example, this principle should make it quite clear that the use of visual
surveillance in a department store’s fitting rooms to deter theft would be contrary
to reasonable expectations of privacy. Consequently, it would not be responsible
practice to use a visual surveillance device in this area for this purpose.
5.17 There may be situations in which the ‘reasonable expectations’ of privacy of
individuals is not clear. In these instances surveillance users should be able to turn
to the regulator for guidance about what is appropriate in the circumstances.
87
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.27 Given the many situations in which surveillance in public places occurs, it is not
possible to describe in general terms those surveillance activities that may be
proportional in particular circumstances. Instead, it is hoped this principle will
encourage surveillance users to assess their practices and consider whether there
are less intrusive ways to achieve the same purpose. The regulator will be well
placed to issue guidelines and to assist individual users of surveillance.
RECOMMENDATIONS
1. The Victorian parliament should enact new laws that promote the
responsible use of surveillance devices in public places.
2. The legislation should include the following guiding principles.
1. People are entitled to a reasonable expectation of privacy when in
public places.
2. Users of surveillance devices in public places should act responsibly and
consider the reasonable expectations of privacy of individuals.
3. Users of surveillance devices in public places should take reasonable
steps to inform people of the use of those devices.
4. Public place surveillance should be for a legitimate purpose related to
the activities of the organisation conducting it.
5. Public place surveillance should be proportional to its legitimate
purpose.
6. Reasonable steps should be taken to protect information gathered
through public place surveillance from misuse or inappropriate
disclosure.
surveillance guidelines.
5.35 The UK government has recently taken the first step down this path. As a result of
its 2007 report on a national CCTV strategy, the Home Office has established an
interim independent regulator for CCTV in the UK. The regulator has 12 months
to draft recommendations to the Minister for Home Affairs on how CCTV should
be regulated.30 The regulator is required to raise public awareness, set standards
and establish a complaints process.
5.36 A broadly similar regime to that proposed by the commission was introduced
federally in 1999 under the Equal Opportunity for Women in the Workplace
Act 1999 (Cth) (EOWWA),31 which established a regulator to promote equal
opportunity for women in the workplace. That regime emphasises a facilitative
rather than a punitive approach to compliance.32 The primary role of the regulator
is to provide advice to employers, to undertake research, and to promote
understanding and acceptance of the equal opportunity principle.33
5.37 Under the Act, all employers of more than 100 people must develop a program
for fostering equal opportunities for women, and report outcomes to the regulator.34
Where they fail to do so, the regulator may report them to the Minister.35
5.38 Although the regime covers government and private employers, it avoids
imposing an undue regulatory burden on business by exempting employers with
less than 100 employees and by keeping compliance costs to a minimum.36
89
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.39 The level of compliance with the Act is significant—the 2008 annual report
listed 12 non-compliant employers and noted that there were 2501 compliant
employers. The report also noted that public feedback about the scheme was
overwhelmingly positive.37
5.40 The commission is of the view that a broadly similar model is appropriate for the
regulation of public place surveillance.
RECOMMENDATION
3. A regulator should be responsible for the oversight of public place
surveillance in Victoria.
regulatory functions
5.41 Responsive regulation requires a suite of tools for the regulator when encouraging
compliance with best practice guidelines. We have designed a multifaceted
regime that places emphasis on education and encouragement, and moves to
more punitive enforcement mechanisms only as a last resort.
5.42 First, the regulator should have responsibility for monitoring surveillance use and
technology, and for educating surveillance users and the general community
about their rights and responsibilities. The development of best practice guidelines
to aid users of public place surveillance is central to this role. We discuss these
functions below under ‘Encouraging responsible practice’.
5.43 Secondly, it is the commission’s view that the regulator should work closely with
significant government and private users of public place surveillance to ensure they
employ best practice standards. This should include reviewing advice prepared by
the users and advising on any areas for improvement, examining their surveillance
practices where appropriate, and reporting findings to parliament. We discuss these
functions below under ‘Significant surveillance users: ensuring responsible practice’.
5.44 Thirdly, the commission is of the view that it is appropriate for the regulator to
seek civil penalties for the principal offences in the Surveillance Devices Act 1999
(Vic) when this course is preferable to criminal prosecutions. This is discussed
below and further in Chapter 6.
91
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.53 Other submissions expressed the view that standards may not have much practical
effect if they are not enforceable.45 The Victorian Privacy Commissioner, for
example, noted:
While the introduction of voluntary standards could be perceived to be an
initial ‘light touch’ regulatory action … in my view the rights and interest
at stake are of such importance and the scope, extent and nature of public
place surveillance is already so overwhelming that some form of mandatory
regulation is required.46
5.54 The commission proposes the adoption of voluntary standards accompanied by
an obligation upon major users of public place surveillance to provide advice
to the regulator about their compliance with those standards. The regulator
should develop, in consultation with users, best practice guidelines for specific
surveillance technologies, such as sophisticated CCTV systems, ANPR, body-
scanners and biometrics.47 This is the most appropriate way to provide users
of surveillance with practical guidance about how to comply with public place
surveillance principles. The guidelines would encourage users to conduct public
place surveillance responsibly while also protecting their own interests. They
would also provide the community with an understanding of their rights in
relation to public place surveillance.
5.55 In 2009 the New Zealand Privacy Commissioner published Privacy and CCTV,
guidelines to help businesses ensure that their use of CCTV was compliant with
their obligations under the Privacy Act 1993 (NZ).48
5.56 The New Zealand guidelines advise CCTV users to
• clearly identify whether CCTV is appropriate and, if so, for what
purposes
• develop a business plan for its use
• consult with affected people if appropriate
• choose equipment to achieve the desired aims with minimal
invasion of privacy, and, where possible, use privacy enhancing
technologies
• erect signage to alert the public to the use of cameras and train
staff to answer questions about it
• limit the hours when footage is collected, and only retain footage as
long as necessary to achieve the stated purposes
• ensure that the footage is stored securely and protected from
unauthorised access.49
5.57 Some individual users of surveillance and industry groups have developed their
own CCTV standards. VicRoads, Crown Casino, the Department of Transport,
Melbourne City Council and Victoria Police have internal guidelines that deal with
specific aspects of surveillance use.50 Victoria Police has arrangements with some
local councils concerning access, use and storage of council CCTV footage.51
Victoria Police noted that the protocols it has with Melbourne City Council work
well and could be applied in other areas.52
93
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.63 The commission believes the following users of public place surveillance should be
subject to additional accountability mechanisms:
•
•
public authorities
‘significant private users’ of public place surveillance.
Public authorities
5.64 Bodies that exercise the power of the state (public authorities) should be held to
the highest standards of compliance with laws and guidelines concerning public
place surveillance. The term ‘public authority’ is defined in the Charter to include
bodies such as government departments, statutory agencies, local government
and entities performing functions of a public nature on behalf of a government
body.54 The commission believes these users of public place surveillance should be
required to work collaboratively with a regulator to strive for best practice. This
will increase accountability of government use of surveillance and will give the
regulator the opportunity to provide advice to parliament about the use of public
place surveillance in Victoria.
5.65 Government agencies were among the most significant users of surveillance we
consulted. Many government agencies have large, sophisticated surveillance
systems that monitor activities in the streets, in public housing estates and
on public transport. These systems have the capacity to record private, and
potentially sensitive, information. It is important that there are appropriate
safeguards concerning the way public authorities handle this information.
5.66 As described in Chapter 4, public authorities are required to give effect to privacy
rights, as well as other rights, under the Charter. Adoption of best practice
guidelines will ensure that agencies are meeting their obligations under the
Charter. Demonstration of government compliance with best practice guidelines
will also provide leadership to other users of public place surveillance.
5.67 Many public authorities already have processes in place to comply with a
range of best practice guidelines and to respond to their numerous reporting
requirements. Furthermore, a number of public authorities already have their
own internal protocols concerning their use of public place surveillance. Some,
such as Melbourne City Council, clearly follow current best practice in this area.
Compliance with protocols of this nature is not expensive, especially when
contrasted with the resources necessary to implement and operate a sophisticated
surveillance system. Some public authorities, however, do not have appropriate
protocols in place concerning their use of public place surveillance. In these cases
the regulator should work with the authority to develop appropriate procedures.
5.68 When the regulator considers the use of public place surveillance is so
insignificant as not to warrant additional accounting mechanisms, we believe
that the regulator should have the power to exempt the public authority from
additional accountability mechanisms until such time as the authority’s use of
surveillance changes.
95
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
reviewing advice prepared by significant users of public
place surveillance
5.77 It is the commission’s view that significant users of public place surveillance
devices should provide regular advice to the regulator about their use of
surveillance in public places, including their compliance with law and best practice
guidelines. One of the functions of the regulator would be to provide users with
a template for the provision of advice, so that users can understand what is
expected of them. The regulator would also be responsible for reviewing advice
and providing reports to government.
5.78 A requirement to report is a feature of a number of other educative regulatory
regimes. The EOWWA, for example, requires all organisations with more than 100
employees to produce a workplace program and report to the regulator.58 The
regulator has developed a number of educational tools and other resources to
assist employers when making their reports.59
5.79 Similar reporting requirements are already used in Victoria. Victorian public
sector bodies are required to prepare action plans outlining their initiatives to
make workplaces accessible for people with disabilities, and to report on the
implementation of their plans.60 The Victorian Government’s policy, A Fairer
Victoria 2006, requires all departments to develop a cultural diversity plan.61
Likewise, the government’s Our Environment Our Future policy requires all
departments and agencies to report on their integration of the government’s
Environmental Sustainability Framework.62 The commission is of the view that
broadly similar reporting requirements are appropriate for significant users
of public place surveillance. The level of detail required in reports should be
determined by the regulator, and would vary according to the class of user and
type of surveillance technology.
examining the practices of significant users of public place surviellance
5.80 The commission recommends that the regulator be responsible for examining the
practices of significant users of public place surveillance.
5.81 This is a similar function to one held by the Victorian Privacy Commissioner. The
Commissioner has a responsibility to ‘examine the practices of an organisation
with respect to personal information maintained by that organisation for the
purpose of ascertaining whether or not the information is maintained according
to the Information Privacy Principles’.63 The Privacy Commissioner has the ‘power
to do all things that are necessary or convenient to be done for or in connection
with the performance of his or her functions’.64
5.82 It is envisaged that the surveillance regulator may examine the practices of
significant surveillance users on a systematic basis (that is, routinely, by class
of user or type of device). The regulator may wish to examine a particular
surveillance user if it did not provide advice to an appropriate standard, or if the
advice was unsatisfactory in some way. An examination may also be triggered
by the regulator’s research, or in response to a report by a member of the public
about the surveillance practices of a particular user.
advising of a significant user’s failure to comply
5.83 In line with the responsive regulatory approach outlined in the previous chapter,
the commission believes that the regulator should have a number of options
when a significant user of public place surveillance fails to comply with the law or
with best practice guidelines.
97
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
Reporting non-compliance with best practice guidelines by significant users
5.92 Reporting is used as a successful compliance tool in a number of federal and
state regimes. For example, reporting is the ultimate sanction for continued
non-compliance with laws under the EOWWA regime discussed above. The NSW
Food Authority publishes a ‘Register of Penalty Notices’, a public list of details
of cafes and restaurants that have failed to comply with food standards.70 In its
first three weeks of operation, the website was accessed 25 000 times71 and 1.5
million times during its first year.72 Victorian legislators plan to implement a similar
scheme in the food industry from mid 2010.73
5.93 The commission takes the view that the most appropriate way to deal with
routine non-compliance by significant users of surveillance with best practice
guidelines is by reporting these users to parliament.
5.94 Reputation is important to both the government and the private sectors. To
government, a loss of reputation raises obvious political risks. Studies have shown
that damage to reputation is also a significant concern for private organisations.74
Modern regulatory theorists have noted that public reporting can help add to a
‘culture of compliance’75 with the particular regime in question.
6. The Victorian Government should define ‘significant private user’ for the 78 Australian Law Reform Commission, For
Your Information: Australian Privacy Law
purposes of the regulatory regime. and Practice: Volume 1: Final Report 108
(2008) Rec 50–2.
7. In addition to any other powers conferred on the regulator by legislation, 79 See powers under the Australian
the regulator should have the power to do all things necessary or Securities and Investment Commission Act
2001 (Cth) s 13 and the Trade Practices
convenient for, or in connection with, the performance of the functions Act 1974 (Cth) s 155.
of the regulator.82 80 See eg, powers under the Financial
Services Reform Act 2001 (Cth).
8. In addition to his or her annual reporting function, the regulator should also 81 Trade Practices Act 1974 (Cth) ss 77 and
have the power to report formally to the relevant Minister about any matters 151BY.
82 Modelled on s 10(2) of the Equal
relating to his or her functions. The Minister should be required to table all Opportunity for Women in the Workplace
reports provided by the regulator in parliament. Act 1999 (Cth).
83 Department of Treasury and Finance,
Victorian Guide to Regulation (2nd ed,
2007) 3–7.
99
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.101 The vast majority of submissions and consultations supported this suggestion.84
The Privacy Commissioner herself said:
While I have no settled view as to who should perform this independent
regulatory role, a number of the proposed functions are similar to those
currently bestowed on the Victorian Privacy Commissioner by the IPA,
which include some regulation of surveillance when undertaken by
Victorian public sector agencies or contracted service providers. It may
therefore make sense, in the absence of a new, specialist, independent
regulator, for the functions to be added to these. In addition, in other
jurisdictions, privacy or data protection commissioners have regulation of
surveillance included in their functions,85 to varying extents.86
5.102 The Privacy Commissioner also noted, however, that
additional functions will require substantial resources. The extension of the
functions of an existing regulator should not be seen as a ‘cost neutral’
option, otherwise neither the proposed surveillance related functions nor
the existing privacy functions will be adequately fulfilled.87
5.103 The Victorian Privacy Commissioner currently has a regulatory role in relation to
the privacy of personal information held by Victorian government agencies. There
is often a close relationship between the use of surveillance and the personal
information gathered by those practices. The commission believes that the Privacy
Commissioner is the most appropriate body to exercise regulatory functions
concerning the use of public place surveillance.88
5.104 The Privacy Commissioner has an existing role in relation to some information
captured by the use of surveillance in public places. For example, the
Commissioner’s existing oversight functions extend to surveillance-captured
information held by Victorian agencies where that information constitutes
‘personal information’ for the purposes of privacy legislation.89 These
functions include educative, examination and monitoring responsibilities.90
The Commissioner is also empowered to receive and resolve complaints about
the handling of personal information by a public sector agency (including that
captured by a surveillance regulator), to issue compliance notices, and to carry out
investigations for these purposes.91
5.105 While the Commissioner is currently empowered to deal with complaints about
public agencies only, her educative function is not limited to public agencies.92
The commission is of the view that it is a natural extension of the Commissioner’s
existing functions to regulate the use of surveillance in public places.
relationship with other surveillance regulators
5.106 As well as the Victorian and federal Privacy Commissioners, there are a number
of other regulators with responsibility for some limited aspects of public place
surveillance. These include
• the Commissioner for Law Enforcement and Data Security, in
relation to Victoria Police’s handling of surveillance-captured data in
its possession93
• the Director of Liquor Licensing, in relation to the procedures
concerning use of security cameras and retention and storage of
footage by some licensed venues94
100 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
• the Victorian Commission for Gambling Regulation, in relation to 84 Submissions 5, 9, 12, 29; Consultations 5,
9, 14, 27, 28.
the collection, storage and retention of security footage by Crown 85 Including the Netherlands, the UK,
Casino95 Ireland, Canada, New Zealand, Germany,
Norway, Greece.
• the Special Investigations Monitor, in relation to compliance with 86 Submission 29.
the SDA by the four Victorian agencies authorised to apply for 87 Submission 29.
surveillance device warrants under the Act—Victoria Police, the 88 Surveillance is regulated under
information privacy laws in a number of
Office of Police Integrity, The Department of Primary Industries, and countries, including New Zealand, the UK,
the Department of Sustainability and Environment.96 Canada, Ireland and The Netherlands.
See Victorian Law Reform Commission,
5.107 The new regulator should liaise with these agencies about their functions to Surveillance in Public Places, Consultation
Paper 7 (2009) [5.15–5.172] for detail.
ensure that the regulatory regimes are consistent, and that particular users are 89 This is discussed in detail in
not unnecessarily burdened by obligations under more than one regime. Chapter 3.
90 Information Privacy Act 2000 (Vic)
ss 58(o),(g), (l), (k).
RECOMMENDATION 91 Information Privacy Act 2000 (Vic) pt 5,
pt 6, ss 34, 45.
9. The functions of the regulator should be exercised by the Victorian Privacy 92 Information Privacy Act 2000 (Vic) s 58(a).
Commissioner. 93 Commissioner for Law Enforcement Data
Security Act 2005 (Vic) ss 4, 11, 12.
94 Liquor Control Reform Act 1998 (Vic)
s 18B.
95 Casino Control Act 1991 (Vic) ss 59(2),
review of victoria police surveillance practices 122(1)(r).
5.108 Victoria Police, Victoria’s major law enforcement body, has access to state-of- 96 Major Crimes (Special Investigations
Monitor) Act 2004 (Vic) ss 4,11,12;
the-art surveillance technology. Its use of surveillance devices is extensive. We Surveillance Devices Act 1999 (Vic)
s 30P.
consulted a number of organisations that provided insight into police use of
97 The leaking of confidential files from
surveillance, including numerous departments and officers within Victoria Police, the Victoria Police’s covert surveillance
as well as oversight bodies, including the Commissioner for Law Enforcement unit to organised crime figures in 2008
highlights the complexity of issues that
Data Security, the Office of Police Integrity, the Special Investigations Monitor and surround police surveillance. The incident
the Supreme Court. lends support to commission’s view
that consideration of police surveillance
5.109 Although the benefits of police use of surveillance are significant—importantly, practices would be best undertaken by
a body that has broad ranging access
preventing and solving crime on behalf of the community—the consequences for to covert police units as well as police
a person subject to surveillance can also be profound. These include the potential information and policies. See Nick
McKenzie and Richard Baker, ‘Secret
loss of personal liberty following an arrest or conviction.97 Police Files Leaked’, The Age (Melbourne),
2 December 2008, 1. See also Office
5.110 The commission believes that regulation of police use of surveillance is best of the Victorian Privacy Commissioner,
‘Briefing on the Aquasure Memorandum
achieved through an entirely separate regime from the one we have proposed of Understanding’ (Press Release,
for general users of surveillance. Surveillance is only one of the many powers of 10 December 2009).
investigation and crime prevention available to police, and the commission’s view 98 Minister for Police and Emergency
Services, ‘Facial Recognition Technology
is that to consider police use of surveillance in isolation from the broader contexts will Catch Criminals’ (Press Release,
would be to consider only part of the picture. Appropriately, police use of 30 April 2007).
101
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
5.112 In addition to video surveillance, police commonly use listening devices, including
handheld devices and those installed at specific locations. Potential suspects
may also be tracked, for example, through their mobile phone. Other less
common methods of surveillance, such as drug and explosive-detection dogs,
are also used. Police must obtain a warrant issued by a judge to conduct intrusive
covert surveillance.99
5.113 There is also a growing trend for police to use data provided by other Victorian
bodies, including government departments, local councils, private organisations
and individuals. In some cases this is provided on an adhoc basis, in others, there
are formal agreements in place. The collection and subsequent use of these data
frequently falls outside the regulatory regime designed to deal with police use
of surveillance.
5.114 It is important that regulation of police use of surveillance data responds to the
rapidly increasing sophistication of surveillance technologies and the increasing
variety of methods to obtain data. The SDA (the primary Act relating to law
enforcement use of surveillance in Victoria) is over a decade old and no longer
adequately covers all surveillance technologies or surveillance-captured data
accessed by police. For this reason, it is the commission’s view that there should
be a review of both police use of public place surveillance technologies and
the data acquired by its use. Victoria Police, like other users of public place
surveillance, should have the benefit of appropriate ‘best practice’ guidelines.
Such guidelines should take into account the principles proposed by the
commission to regulate general surveillance use.
5.115 There are a number of specialist bodies that have an oversight role in relation to
Victoria Police and, importantly, access to its data. The Commissioner for Law
Enforcement Data Security (CLEDS) is the most appropriate body to undertake a
review of the use of surveillance by Victoria Police.
5.116 The CLEDS’s primary role is to ‘promote the use by Victoria Police of appropriate
and secure management practices for law enforcement data’.100 All data,
including ‘any information obtained, received or held’ by Victoria Police, fall
within the Commissioner’s jurisdiction,101 and, importantly, this includes data
obtained through the surveillance activities of other bodies. The powers of the
Commissioner include the capacity to establish standards, monitor compliance
with those standards, and to conduct periodic reviews of ‘any matter related to
law enforcement data security’.102
5.117 The commission is of the view that the CLEDS should conduct a review of, and
create guidelines for, Victoria Police’s use of surveillance and surveillance-captured
data. Consideration may need to be given to whether current CLEDS powers are
sufficient for the Commissioner to comprehensively carry out these functions.
RECOMMENDATION
10. The Commissioner for Law Enforcement and Data Security should conduct a
review of, and create guidelines for, Victoria Police’s use of surveillance and
surveillance-captured data.
102 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
regulatory features not recommended at this stage 99 Law enforcement use of surveillance is
described in more detail in Chapter 2.
registration or licensing of some surveillance users 100 Commissioner for Law Enforcement Data
Security, About CLEDS (2009) <www.
5.118 In our Consultation Paper we canvassed the options of requiring users of cleds.vic.gov.au/content.asp?Document_
ID=10470> at 16 December 2009.
surveillance to register their use with a regulator, or to apply for a licence for their
101 Commissioner for Law Enforcement Data
use of specific public place surveillance devices. Many European countries require Security Act 2005 (Vic) s 3.
some users of public place surveillance to register with a regulator,103 or to obtain 102 Commissioner for Law Enforcement Data
Security, above n 100.
a licence for their surveillance use.104
103 The European Parliament and the Council
5.119 There was a mixed response to these proposals. A number of submissions of the European Union, Directive 95/46/
EC of the European Parliament and of
supported a registration scheme, mainly because such a scheme would the Council of 24 October 1995 on the
provide the regulator with knowledge of surveillance users in Victoria.105 Other Protection of Individuals with Regard to
the Processing of Personal Data and on
submissions raised concerns about the introduction of such a scheme. It was the Free Movement of Such Data [1995]
noted that such a scheme could lead to the potential for data to be shared more OJ L 281/31.
104 Including Norway, Germany and Sweden.
readily between organisations and agencies.106 Some stakeholders (including See Victorian Law Reform Commission,
Victoria Police) questioned the practicability of a registration scheme and above n 88, 150 for detail.
noted the potential for it to be very resource intensive.107 It was suggested 105 Submissions 5, 14, 29, 31, 33, 34, 40, 42.
106 Submission 34.
that the benefits of such a scheme should be carefully weighed up against the
107 Submissions 11, 21.
potential costs.108 108 Submission 21.
5.120 The response to the proposal of a licensing scheme for users of some forms 109 Submission 38.
110 Consultation 4.
of surveillance was also mixed. A number of submissions supported licensing
111 Submission 34.
for surveillance practices described variously as those that are ‘invasive’,109 112 Submission 39.
‘intrusive’,110 that ‘have a significant impact on privacy’111 or are used in 113 Submission 13.
‘particularly sensitive situations/areas’.112 On the other hand, many submissions 114 Submission 29. The Commissioner
noted that in the absence of a warrant,
commented on the cost or resource requirements of establishing and maintaining prohibition should include, at a minimum,
a licensing system.113 The Victorian Privacy Commissioner was ‘sceptical of the covert surveillance, x-ray body scanners,
infrared equipment and other equipment
efficacy of a licensing regime’, and preferred the prohibition of some forms of operating outside the visible light
invasive or potentially offensive surveillance.114 spectrum.
115 Discussed in Chapter 2.
5.121 The commission believes that requiring significant surveillance users to provide 116 Anthony Albanese MP, Minister for
regular advice about their surveillance use is a better way for the regulator to Infrastructure, Transport, Regional
Development and Local Government,
acquire information than a registration scheme. The introduction of our proposed ‘Strengthening Aviation Security’ (Press
scheme would render registration unnecessary. The commission does not think Release, 9 February 2010).
103
5
Chapter 5
Promoting Responsible Use of
Surveillance in Public Places
a complaint-handling power for the regulator
5.123 Some submissions suggested that the regulator should receive and investigate
complaints made by members of the public about misuse of public place
surveillance.117 The proposed regime is a more appropriate model for regulating
public place surveillance than a complaints-based regime, as it is designed to deal
primarily with systemic issues rather than individual grievances.
5.124 There are already some processes in place to deal with individual complaints
arising from some aspects of misuse of public place surveillance. Existing federal
and Victorian privacy laws, for example, have a mechanism for dealing with
complaints relating to misuse of personal information, including that captured
by way of a surveillance device.118 Additionally, the proposed statutory causes of
action discussed in Chapter 7 will allow an individual response to serious invasions
of privacy. These mechanisms should provide adequate redress for individuals
harmed by misuse of a surveillance device.
5.125 The commission’s proposed model places the onus on users to demonstrate their
compliance with laws and best practice guidelines, rather than on individuals to
notify the regulator of misuse. This is particularly appropriate in the public place
surveillance context, as in many instances it is likely that people will be unaware
of the fact that they are the victim of misuse of a surveillance device.
5.126 There is a noticeable shift away from complaints-based models in regimes
designed to protect people’s rights. For example, the Victorian Attorney-General
noted the shortcomings of a complaints-based model in relation to Victoria’s
equal opportunity laws in his 2008 Justice Statement:
This rather narrow approach places the onus for change on the willingness
of individual victims of discrimination to come forward and take the risks
and burden of pursuing a complaint through an unfamiliar legal system.119
5.127 Under the proposed model the regulator may receive notification from the public
about suspected inappropriate use of surveillance devices. The regulator will not
be obliged to act on this advice in every case. Instead, the regulator may choose
to request information from the surveillance user, or examine their surveillance
practices, to determine if they are acting in compliance with the law and best
practice guidelines.
general own-motion investigatory powers
5.128 The commission recommends that the regulator have limited investigatory
powers in relation to the most serious instances of inappropriate use of public
place surveillance. In some cases, such investigations may lead to civil penalty
proceedings.
5.129 In our Consultation Paper we suggested the regulator could be given the power
to carry out investigations into the public place surveillance practices of particular
agencies and organisations. There was a mixed response to this proposal.120
5.130 The Victorian Privacy Commissioner’s current investigative power is limited to
her complaint-handling function.121 The commission is of the view that it is
more appropriate that the focus of the surveillance regulator be on educating,
providing advice and working collaboratively with surveillance users to encourage
them to employ best practice. If, later, the regulator believes that the educative
role is not sufficient, and that investigatory powers are needed, the government
can be advised of this in a report to parliament.
104 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
117 Submissions 5, 12, 42.
procurement standards as a tool to encourage compliance 118 Discussed in Chapter 3.
5.131 In our Consultation Paper we raised the possibility of making compliance 119 Department of Justice [Victoria], Attorney-
with a voluntary public place surveillance standard a condition of entering General’s Justice Statement 2: The Next
Chapter (2008) 22.
into a contractual agreement with the Victorian Government. Although 120 Supporters of the proposal included
some organisations supported the proposal of linking voluntary standards to Submissions 5, 12, 36, 40; Consultations
5, 9, 28. Other submissions did not
government procurement criteria,122 it was also noted this strategy may have support the proposal, or did not canvass
limited effect for a number of reasons, including that only a small proportion of the issue.
121 See Information Privacy Act 2000 (Vic)
businesses compete for contracts with government through the tender process, ss 34 and 58(i).
and that the government sector makes up a large proportion of surveillance users.123 122 Submissions 4, 5, 7, 26, 35, 37, 40;
Consultation 27.
5.132 The commission is of the view that requiring all government agencies and larger 123 Submissions 14, 29, 33.
private users of public place surveillance to provide advice to a regulator about
their compliance with best practice standards is a more effective way of ensuring
that the major users are conducting public place surveillance responsibly. Many of
the organisations who provide goods and services to the Victorian Government
will be covered by these requirements; it is unnecessary to burden them with
further requirements.
conclusion
5.133 This chapter outlines the first and second limbs of the commission’s proposed
regulatory model for regulating public place surveillance in Victoria. These are
based on the approach to regulation outlined in Chapter 4—a flexible, principle-
based approach that is primarily educative and focuses on achieving best practice.
5.134 In devising our principles and the functions of a proposed surveillance regulator,
the commission has been guided by its extensive consultations, site visits
and submissions. It has also been informed by the Charter framework for
balancing the competing rights and interests that arise in relation to public
place surveillance.
5.135 The second limb of the commission’s regulatory approach—the creation of an
independent regulator—is designed to provide surveillance users with practical
advice on how to apply the principles to their use of surveillance. The focus of the
regulator is to encourage users to conduct surveillance responsibly, and to inform
the public about their rights and responsibilities.
5.136 Regulatory options for dealing with particularly offensive or privacy-invasive forms
of surveillance are outlined in the following chapters.
105
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
106 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6
SURVEILLANCE SURVEILLANCE SURVEILLANCE
LLANCE SURVEILLANCE SURVEILLANCE SURVEILLANCE
SURVEILLANCE SURVEILLANCE SURVEILLANCE
Chapter 6
LLANCE SURVEILLANCE SURVEILLANCE SURVEILLANCE
Modernising the CONTENTS
SURVEILLANCE SURVEILLANCE SURVEILLANCE
LLANCESurveillance
108 Introduction
108 Background
107
6
Chapter 6
Modernising the Surveillance
Devices Act
introduction
6.1 This chapter deals with those parts of the Surveillance Devices Act 1999 (Vic)
(SDA) where the commission recommends change to deal with advances in
technology and to modernise the way we regulate the use of surveillance devices.
background
6.2 The Victorian parliament first dealt with surveillance devices in 1969 when it
introduced the Listening Devices Act 1969 (Vic), which prohibited the use of
listening devices to record or monitor private conversations. That Act also included
requirements for obtaining a warrant to undertake covert surveillance with a
listening device and provided exemptions for police in specific circumstances.
6.3 In 1999 parliament responded to advances in technology and the more
widespread use of surveillance by passing the SDA. This Act regulates the use of
optical surveillance devices, tracking devices and data surveillance devices as well
as listening devices. The SDA has been amended on a number of occasions since
then. Major amendments include prohibiting surveillance of workers in toilets and
change rooms,1 and establishing an oversight and monitoring role for the Special
Investigations Monitor in relation to law enforcement use of surveillance.2
6.4 Surveillance technology has become increasingly sophisticated, affordable,
concealable and unobtrusive. Its use is now commonplace. People are subject to
surveillance every day when they use public transport, shop for groceries, attend
sporting events and walk down city streets.3
6.5 Technology has also changed the way people use public places. Activities
that many people would still consider private, such as personal telephone
conversations, now regularly take place in public places on mobile phones.
6.6 To reflect these changes in behaviour, and to ensure that the law keeps pace
with advances in technology, the commission recommends a number of changes
to clarify, modernise and strengthen the SDA. These include amending some
important definitions to reflect contemporary uses of surveillance devices,
expressly prohibiting surveillance in toilets and change rooms, strengthening
the prohibition on participant monitoring, introducing a new offence to
prohibit particularly offensive uses of surveillance devices, and introducing a civil
enforcement regime into the Act.
definitions
PRIVATE ACTIVITY
6.7 The SDA prohibits a person from using a listening device to monitor4 a
‘private conversation’ to which they are not a party if not all the people in the
conversation have given their consent.5 Similarly, the Act prohibits a person
from using an optical surveillance device to monitor a ‘private activity’ to which
they are not a party if not all the people conducting the activity have given their
consent.6
6.8 Under the Act, a conversation or activity is ‘private’ if it occurs in circumstances
that reasonably indicate the parties desire it to be heard or observed by
themselves only, and when they may reasonably expect that they will not be
heard or observed by someone else.7
108 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.9 Currently, the definitions of ‘private conversation’ and ‘private activity’ differ in 1 Surveillance Devices Act 1999 (Vic)
s 9B. This was in response to our
relation to the physical location of the conversation or activity being monitored. recommendation: Victorian Law Reform
Although an activity cannot be ‘private’ if it occurs outside a building, a Commission, Workplace Privacy: Final
Report (2005) rec 30.
conversation may be ‘private’ regardless of where it occurs. It is unlawful for a 2 Surveillance Devices Act 1999 (Vic)
person to use a listening device to record a private conversation without consent, ss 30P, 30Q.
either indoors or outdoors.8 By contrast, although a person cannot use an optical 3 The use of surveillance in Victoria is
detailed in Chapter 2.
surveillance device indoors to record a private activity without consent, there 4 The word ‘monitor’ is used here in a
is no such prohibition on the use of an optical surveillance device outdoors. generic sense. Section 6 of the Act makes
it unlawful to use a listening device ‘to
Consequently, the SDA offers no protection against highly intrusive visual overhear, record, monitor or listen to a
surveillance in outdoor places.9 private conversation’. Surveillance Devices
Act 1999 (Vic) s 6.
6.10 During the parliamentary debates that accompanied the passage of the SDA a 5 Surveillance Devices Act 1999 (Vic) s 6.
number of members referred to the lack of protection for private activities in 6 Surveillance Devices Act 1999 (Vic) s 7.
outdoor places, such as beaches and backyards.10 This issue generates community 7 The terms ‘private activity’ and ‘private
conversation’ are defined in section 3 of
interest from time to time, such as when the satellite images and photographs the Surveillance Devices Act 1999 (Vic).
published by Google Street View, and used by some NSW and Victorian councils, 8 Surveillance Devices Act 1999 (Vic) s 6.
109
6
Chapter 6
Modernising the Surveillance
Devices Act
Recommendation
11. The words ‘an activity carried on outside a building’ should be removed
from the definition of ‘private activity’ in section 3 of the SDA so that it
reads:
private activity means an activity carried on in circumstances that may
reasonably be taken to indicate that the parties to it desire it to be
observed only by themselves, but does not include an activity carried on
in any circumstances in which the parties to it ought reasonably to expect
that it may be observed by someone else.
IMPLIED CONSENT
6.15 The prohibitions in the SDA concerning the use of listening, optical, tracking or
data surveillance devices do not apply if the surveillance user has the express or
implied consent of the person being monitored.15 As the Act does not define
‘consent’ common law principles concerning the meaning of consent probably
apply. For example, at common law, a person must have capacity for consent to
be valid and that consent must be given freely and voluntarily.16
6.16 The notion of consent—particularly implied consent—is sometimes difficult to
characterise when dealing with many common surveillance practices in public
places. If, for example, a retail outlet has a sign on the door stating that cameras
are in use on the premises, does this mean that all customers give their implied
consent to being filmed when they walk into the shop, including when they
enter change rooms to try on clothing? Does this include people who might not
have the capacity to give consent, or those who cannot read the sign? In some
circumstances it may be inconvenient (or impossible) for a person to opt out of
being subject to surveillance, and therefore any implied consent may not be
truly voluntary.
6.17 In its Privacy Report the Australian Law Reform Commission (ALRC) discussed
the difficulties raised by the concept of consent, noting, in relation to personal
information:
There is a pressing need for contextual guidance on consent. What is
required to demonstrate that consent has been obtained is often highly
dependant on the context in which personal information is collected, used
or disclosed.17
6.18 To address this, the ALRC recommended that the Office of the Privacy Commissioner
‘develop and publish further guidance about what is required of agencies and
organisations to obtain an individual’s consent for the purposes of the Privacy
Act’.18 In our Consultation Paper we asked stakeholders whether a regulator
should develop guidelines to clarify the meaning of consent. Many submissions
supported this proposition. However, of those that did not, Victoria Police said
this was a matter for parliament and the judiciary,19 and the Victorian Privacy
Commissioner said the meaning of consent should be defined in the SDA itself.20
6.19 Submissions also noted the difficulties in defining ‘implied behaviour’. The St Kilda
Legal Service noted that consent should not be implied when an individual has
no reasonable choice about being in a particular place. The service noted that the
most marginalised groups—for example, homeless people—have little choice in
avoiding public place surveillance.21 The Victorian Privacy Commissioner noted
that even implied consent should be free, revocable and fully informed.22
110 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.20 From a commercial perspective Sensis (the information and advertising arm of 15 Surveillance Devices Act 1999 (Vic) ss 6–9.
16 Jeremy Douglas-Stewart, Annotated
Telstra) said the lawfulness of their location-based services relied on implied National Privacy Principles (2007), cited in
consent. When, for example, a mobile phone user is offered details of the Australian Law Reform Commission, For
Your Information: Australian Privacy Law
location of the closest petrol station via text message, the service provider must and Practice: Volume 1, Final Report 108
identify the phone owner’s location in order to provide that information. By (2008) [19.9].
requesting the service has the phone owner consented to having their location 17 Australian Law Reform Commission, For
Your Information above n 16 [19.59].
tracked by the service provider? Sensis said the status quo, where implied consent 18 Ibid rec 19–1.
is not defined, operates effectively and flexibly and does not require legislative 19 Submission 11.
amendment.23 20 Submission 29.
21 Submission 14.
6.21 The commission acknowledges that in many instances it makes little sense to 22 Submission 29.
suggest that people whose activities are monitored by surveillance equipment 23 Submission 19.
in public places have given actual consent to a ‘private activity’ or a ‘private 24 We use the term ‘implied consent’ to
mean behaviour by a person, falling short
conversation’ being monitored by an optical surveillance device or a listening of express agreement, which would cause
device. Nevertheless, the notion of ‘implied consent’24 remains the most practical a reasonable observer to conclude that
the person has agreed to a particular
dividing line between behaviour that should be prohibited in a public place course of conduct.
because it is highly intrusive, unannounced and undetectable, and behaviour that
should be permitted because reasonable attempts have been made to alert members
of the public to the fact that some form of intrusive surveillance is occurring.
6.22 Given the widespread use of surveillance devices in public places, it is important
to encourage surveillance device users to give adequate notice of their activities
when they engage in practices that may involve monitoring of a ‘private
conversation’ or a ‘private activity’. The SDA should actively encourage the
practice of giving adequate notice of surveillance, by signage or other means, in
these circumstances. The SDA should be amended to direct courts, when deciding
whether a person has given implied consent to conduct that would otherwise fall
within sections 6–9 and 11–12 of the SDA, to consider whether the defendant
should have given adequate notice of the surveillance activities and whether
in fact that notice was given. Although common law principles concerning the
meaning of implied consent would otherwise continue to apply, this change
would encourage surveillance users to ensure they do not conduct highly intrusive
public place surveillance without providing adequate notice of their activities.
6.23 In some instances it may be appropriate to make limited use of well-placed signs,
perhaps containing an image of a camera, to give people adequate notice of the
fact that a CCTV surveillance system is being used in a way that is particularly
intrusive. The regulator will be well placed to advise people about how to strike a
balance between reasonable notice, the cost of erecting signs and the unsightly
impact of some notices.
recommendation
12. The SDA should be amended so that courts are directed to consider
whether a public place surveillance user has given adequate notice of their
surveillance activities when considering whether a person has given ‘implied
consent’ to any of the conduct that falls within sections 6–9 and 11–12 of
the SDA.
111
6
Chapter 6
Modernising the Surveillance
Devices Act
prohibition of surveillance devices in toilets
6.24 At present, the SDA prohibits use of an optical surveillance device to monitor
‘private activity’—defined in the Act as an activity where parties may reasonably
expect that they may not be observed by someone else—without consent. The
explanatory memorandum to the Act suggests that the prohibition extends to
activities in toilet cubicles, shower areas and change rooms.25
6.25 There is, however, uncertainty about the reach of this prohibition because in
some instances a person would reasonably expect to be seen by others when
using communal facilities, such as in open showers and at urinals.26 Perhaps
because of the uncertainty about the reach of the current law, some fitness
centres have independently instituted policies to ban mobile telephones (which
may have camera devices) in such areas.27 The Victorian Privacy Commissioner has
queried whether the comment in the explanatory memorandum to the SDA is an
accurate description of the terms of the Act:
While courts can take note of the explanatory memoranda to statutes, courts
might be reluctant to impose criminal liability for conduct that does not clearly
fall within the terms of the Surveillance Devices Act, as currently drafted. It
may be better to state explicitly in the Surveillance Devices Act that private
activities do occur in certain public places and that invading the privacy of
persons in those places is prohibited, with serious penalties for breach.28
6.26 The commission is of the view that the SDA should be amended to include an
express prohibition on the use of all optical surveillance devices in toilet areas,
shower areas and change rooms. As with other prohibitions in the SDA, this
prohibition would not apply to law enforcement officers acting under warrant.
6.27 A prohibition of this nature appears to be in keeping with public expectations that
these are no go areas where all surveillance is regarded as unacceptable. This view
was strongly expressed in submissions and consultations.29 Further, many international
codes of practice and guidelines30 prohibit, or greatly restrict,31 surveillance in such areas.
6.28 This reform proposal reflects our recommendation in the Workplace Privacy report
that employers should be prohibited from using optical surveillance and listening
devices to monitor the activities of workers in toilets, change rooms, lactation
rooms and bathrooms.32 The Victorian parliament adopted that proposal in 2006
by inserting section 9B into the SDA.
recommendation
13. The SDA should be amended to expressly prohibit the use of an optical
surveillance device or listening device to observe, listen to, record or monitor
any activity in toilets, shower areas and change rooms which form a part
of any public place. This prohibition should include a law enforcement
exemption similar to that in section 9B(2) of the SDA.
112 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.30 This distinction reflects the serious privacy implications of tracking a person 25 Explanatory Memorandum, Surveillance
Devices Bill 1999 (Vic) cl 3.
without their consent. These implications were discussed by the New Zealand Law 26 Office of the Victorian Privacy
Commission (NZLC), which recommended that tracking a person without their Commissioner, Mobile Phones with
Cameras, Info Sheet 05.03 (2003) 4.
consent should be generally prohibited in New Zealand. The NZLC notes:
27 ‘Tighter Rules on Camera Phones’, Herald
Covert tracking robs people of the ability to choose whether or not Sun (Melbourne), 1 July 2004, 1.
28 Office of the Victorian Privacy
others know where they are at a particular time. It can reveal very private Commissioner, above n 26, 4.
information: that a person visited an abortion clinic or a gay bar for 29 Submissions 2, 4, 5, 9, 13, 29, 33, 34, 37,
example … In the most serious cases, being tracked may make people feel 38, 40; Roundtables 2, 8, 9, 10, 12, 13,
14, 15, 20, 21, 24, 25, 26, 27.
insecure, or may genuinely threaten their safety if it is done by a violent 30 See eg, Office of the Privacy
ex-partner, for example.33 Commissioner of Canada, OPC Guidelines
for the Use of Video Surveillance of Public
6.31 Currently, not all tracking devices are regulated under the SDA. Although an Places by Police and Law Enforcement
Authorities (2006) <www.privcom.
optical or listening device is defined as ‘any device capable’ of being used to gc.ca/information/guide/vs_060301_e.
record a person’s voice or activity under the Act, a tracking device is defined as a asp> at 18 November 2008; Information
Commissioner’s Office [UK], CCTV
device the primary purpose of which is to determine the geographical location of Code of Practice (2008) <www.ico.
a person or an object.34 This means that a device that is capable of tracking, but is gov.uk/upload/documents/library/data_
protection/detailed_specialist_guides/
not primarily used for that purpose (such as a mobile phone with GPS capacity), is ico_cctvfinal_2301.pdf> at 4 March 2009.
not a tracking device covered by the Act. 31 See eg, Information Commissioner’s
Office [UK], above n 30, 9.
6.32 In our Consultation Paper we asked whether it was appropriate for the definition 32 Victorian Law Reform Commission,
of ‘tracking device’ to be amended so it includes any electronic device capable Workplace Privacy, above n 1 rec 30.
33 New Zealand Law Commission, Invasion
of being used to determine the geographical location of a person or object. This of Privacy: Penalties and Remedies, Report
change would mean that the definition of ‘tracking device’ is consistent with the No 113 (2010) [3.51].
definitions of other surveillance devices that are concerned with the capacity of a 34 Surveillance Devices Act 1999 (Vic) s 3.
35 Submission 36.
device rather than its primary purpose.
36 Surveillance Devices Act 1999 (Vic) s 8(2).
6.33 There was broad support for amending the definition of ‘tracking device’ in this
way. Consultees raised concerns about the unregulated use of some tracking
devices. For example, the Victorian Women’s Legal Service expressed concern
about ‘stalkers’ using tracking devices with no protection for the person who is
being stalked.35
6.34 Amending the definition of ‘tracking device’ would create consistency with NSW
legislation. The Surveillance Devices Act 2007 (NSW) does not use the ‘primary
purpose’ test. It defines a ‘tracking device’ as ‘any electronic device capable of
being used to determine or monitor the geographical location of a person or an
object’ (emphasis added).
6.35 The commission recommends that the definition of ‘tracking device’ in the SDA
be amended so that it includes all electronic devices capable of being used to
determine the geographical location of a person or object. However, we also
recognise that there are many legitimate and beneficial uses of tracking devices.
The SDA currently includes the following exemptions:
• the installation, use or maintenance of a tracking device in
accordance with a warrant, emergency authorisation, corresponding
warrant or corresponding emergency authorisation
• the installation, use or maintenance of a tracking device in
accordance with a detention order or supervision order or an interim
order under the Serious Sex Offenders (Detention and Supervision)
Act 2009 (Vic)
• the installation, use or maintenance of a tracking device in
accordance with a law of the Commonwealth.36
113
6
Chapter 6
Modernising the Surveillance
Devices Act
6.36 The commission is of the view that these are appropriate and necessary
exemptions, and should continue to apply. In addition, there are other legitimate
uses of tracking devices that should be exempted from the general prohibition
against the use of a tracking device without consent. These are discussed below.
automatic number plate recognition
6.37 Automatic number plate recognition (ANPR) devices use pattern recognition
software to automatically detect and read the licence plates of vehicles that pass the
system’s cameras and match these against registration records on a database. ANPR
identifies the time and date of the scan and the GPS location. When multiple
ANPR devices are used together, they can track the movement of a vehicle.
6.38 ANPR technology is a classic example of ‘convergence’37 of surveillance
technologies, as it uses both optical surveillance (cameras) and tracking devices
(GPS) in order to determine the location of a vehicle. The use of ANPR does not
infringe the prohibition on the use of optical surveillance devices in the SDA, as
optical surveillance is prohibited in relation to a private activity only. However, as
the current and proposed prohibition on the use of tracking devices is not limited
to ‘private activities’, the continued use of ANPR is relevant when considering the
regulation of tracking devices.
6.39 A number of organisations in Victoria use ANPR technology. For example, in
2009 Victoria Police trialled the use of ANPR in police cars to record the details
of passing vehicles and detect those that may be unregistered or stolen.38 It is
also possible for police to search for persons of interest using this technology.
ANPR is also used to assist in the collection of road tolls on private tollways in
Melbourne,39 and VicRoads uses the technology with red-light and speeding
cameras across Victoria. In addition, ANPR may be used by governments and
private organisations for a number of applications, including controlling access to
restricted areas, congestion taxes, monitoring freight movement and calculating
fees for unattended car parks.40
6.40 Government agencies in many countries use ANPR technology for road safety and
law enforcement purposes.41 It is estimated that there are at least 10 000 ANPR
cameras in operation in the UK. These cameras provide data about over 10 million
number plates per day to a national database run on behalf of the Association of
Chief Police Officers. The data are kept for two years and are used for a number
of purposes, including evidence in criminal trials. Concerns have been raised
about possible misuse of this information.42
6.41 In its submission to the commission Victoria Police noted that the commission’s
proposed changes to the definition of tracking device would have a significant
impact on police operations, particularly their use of ANPR technology, which
they believe does not currently fall within section 8 of the SDA. Victoria Police
believes that it would be ‘administratively unworkable’ to require police to obtain
a warrant each time they wish to use ANPR. Victoria Police also raised concerns
about the impact on emergency services in the case of missing persons.43 In
addition, it seems desirable that VicRoads and tollway operators be permitted to
continue to use ANPR for road safety and tolling purposes.
6.42 In NSW, ANPR has been an integral part of the Safe-T-Cam traffic monitoring
system since 1989.44 In addition, NSW Police trialled ANPR use in 2009.45 It
appears that these activities fall outside of the general prohibition against the
use of tracking devices in section 9 of the Surveillance Devices Act 2007 (NSW)
because of the exception in section 9(2)(c) that extends to ‘the installation, use or
maintenance of a tracking device for a lawful purpose’.
114 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.43 This exception to the prohibition against using a tracking device without consent 37 Convergence is discussed in Chapter 2.
38 Michael Daley MP, NSW Minister for
is both vague and unnecessarily broad. There are better ways of ensuring that Police, ‘New Mobile Technology to Help
all relevant interests are taken into account when deciding whether technology Capture Unregistered and Stolen Vehicles’
(Press Release, 17 September 2009).
of this nature should be used to track the movements of people who are acting
39 Site Visit 9.
lawfully, as well as those who are acting unlawfully. One way would be to allow 40 Parliamentary Travelsafe Committee,
specific law enforcement activities to be exempted by regulation from the general Queensland Parliament, Inquiry into
Automatic Number Plate Recognition
prohibition against using a tracking device without consent. Technology, Report 51 (2007) 2.
6.44 This process should ensure that there is appropriate oversight of any decision to 41 Ibid 4.
42 See eg, S A Mathieson, The ANPR
provide a law enforcement exception to the general prohibition against using Secret (2010) Kable <www.kable.co.uk/
a tracking device without consent. It is highly likely that the government would automatic-numberplate-recognition-
police-anpr-gc-feb10> at 3 March 2010.
seek advice from the Privacy Commissioner and the proposed new surveillance
43 Submission 11.
regulator before preparing a regulation. Any regulation would be subject to 44 Parliamentary Travelsafe Committee,
parliamentary scrutiny and disallowance under the relevant provisions of the above n 40, 5.
Subordinate Legislation Act 1994 (Vic). 45 Daley, above n 38.
46 Parliamentary Travelsafe Committee,
6.45 The use of ANPR technology should be carefully monitored because of its above n 40, 14.
potential for capturing vast amounts of information about individuals who 47 Queensland Government, Queensland
Government Response to the
are behaving lawfully. ANPR was the subject of a study by the Queensland Parliamentary Select Committee on
Travelsafe’s Report No 51: Report on
Parliamentary Travelsafe Committee, which released a report in September 2008. the Inquiry into Automatic Number
A number of submissions (including those by the federal and Victorian Privacy Plate Recognition Technology (2009)
<www.parliament.qld.gov.au/view/
Commissioners) raised privacy concerns in relation to the technology, including legislativeAssembly/tableOffice/
the appropriateness of recording and retaining data of people not identified documents/TabledPapers/2009/5309T434.
pdf> at 9 March 2010.
as having done something illegal, and the potential for ANPR to be used for
48 Alzheimer’s Australia, Update Sheet:
unintended purposes, referred to as ‘function creep’.46 Safer Walking for People with Dementia:
Approaches and Technologies, Update
6.46 The Committee made a number of recommendations, including the installation Sheet 16 (April 2009) 3.
of signs that inform motorists that their image may be recorded, and legislation 49 New Zealand Law Commission, above
n 33, [3.54].
that contains safeguards and controls governing the use of ANPR technology. The
Queensland government has implemented a number of the recommendations,
including amending signs, and has committed to consider the Committee’s other
recommendations concerning legislation.47
6.47 The commission recommends that the proposed regulator should advise
parliament regularly about the use of ANPR technology in Victoria, including
whether the current regulatory controls are adequate.
management and care of patients
6.48 Another issue that arises in relation to tracking devices is their use in the
management and care of people suffering from dementia and other memory-
affecting conditions. Alzheimer’s Australia recommends that carers consider the
use of a GPS-enabled tracking device, such as a bracelet-type device, to monitor a
person with dementia so that the individual can freely go for walks on their own
but can be easily located if they are lost or disoriented.48 In many instances the
person being tracked may not have the capacity to consent to being monitored by
a device that enables them to be located.
6.49 It should be possible to use tracking devices to protect the health, safety and
wellbeing of people in these circumstances. The New Zealand Law Commission
has considered this issue in relation to its proposal that new surveillance legislation
include a prohibition on the use of tracking devices. The Commission notes:
We think that it should be a defence to the tracking device offence that
the use of the tracking device was necessary for the protection of the
health, safety or wellbeing of any person, or for the protection of public
health or safety, and was no more extensive than reasonably necessary for
those purposes.49
115
6
Chapter 6
Modernising the Surveillance
Devices Act
6.50 The Commission notes the defence would cover such situations as
•
•
use of tracking devices to monitor the movements of dementia
patients
use of tracking devices by parents or guardians to monitor the
location of their children
• use by hospital management to track the movements of patients
within the hospital.50
6.51 These defences may go too far. The family, friends and/or carers of people
suffering from dementia and other memory-affecting conditions should be able
to use a tracking device to locate that person if they are lost or disorientated. That
person’s freedom of decision and action is enhanced by permitting them to move
around the community as freely as possible so long as they do not pose a threat
to their own safety or that of others. If the person is unable to consent to the use
of the tracking device because of lack of capacity, there should be an automatic
substitute consent-giving regime that is similar to that which applies to consent
for medical treatment set out in Part 4A of the Guardianship and Administration
Act 1986 (Vic).
6.52 The Guardianship and Administration Act 1986 (Vic) establishes a hierarchy of
people, known as the ‘person responsible’, who may consent to most forms of
medical treatment on behalf of a person who cannot consent to it themselves.
These people range from a medical agent and guardian to a spouse or primary
carer.51 This regime should be extended so that the ‘person responsible’ may
consent to the wearing of a tracking device.
6.53 The issue of substituted consent for using a tracking device to monitor the
location of a child is far more complex. Children of a certain age should be able
to move freely around the community without parents tracking them, no matter
how well meaning they may be. The proposed new regulator may choose to
report to parliament about this issue.
Recommendation
14. The definition of ‘tracking device’ in section 3 the SDA should be amended
so that it includes all electronic devices capable of being used to determine
the geographical location of a person or object.
15. The Governor in Council should be permitted to make regulations that
allow specific law enforcement activities to be exempted from the general
prohibition in section 8 of the SDA against using a tracking device without
consent.
16. The proposed new regulator should advise parliament regularly about the
use of ANPR technology in Victoria, including whether the current regulatory
controls are adequate.
17. The automatic substitute consent regime in Part 4A of the Guardianship
and Administration Act 1986 (Vic) should be extended so that the ‘person
responsible’ may consent to the installation of a tracking device for a
person over the age of 18 years who is incapable of giving consent to the
installation of that device.
116 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
50 Ibid.
removing the participant monitoring exception 51 Guardianship and Administration Act
1986 (Vic) s 37.
6.54 The SDA’s prohibition on recording a conversation or activity using a surveillance
52 Section 6 of the SDA prohibits a person
device applies only to people who are not a party to the conversation or activity. using a listening device to monitor a
It does not prohibit a person from recording a private conversation or activity to private conversation to which the person
is not a party. Section 7 contains a similar
which they are a party.52 This activity is known as ‘participant monitoring’. prohibition on the use of an optical
surveillance device.
6.55 At present it is quite lawful for one person to secretly record his or her 53 Surveillance Devices Act 2001 (Vic)
conversation with another person on a park bench, or to secretly film an s 11(1).
encounter with another on a secluded beach. These are places where it might 54 Note that a person’s conversation might
also be secretly recorded by an individual
be reasonable for a person to expect that a conversation or activity would not be acting for the police. Specifically, the SDA
overheard or seen by others. allows a law enforcement officer, without
a warrant, to use a listening device to
6.56 Publication of information gained through participant monitoring is unlawful monitor or record a private conversation
to which he or she is not a party if at least
however. Section 11 of the SDA prohibits publication of a record or report one party to the conversation consents,
and where the officer is acting in the
of ‘private conversation’ or ‘private activity’ that has been made by using a course of his or her duty and believes the
surveillance device.53 There are a number of exceptions to this prohibition that recording is needed to protect the safety
of any person: Surveillance Devices Act
are set out in section 11(2) of the SDA. 2001 (Vic) s 6(2)(c).
6.57 It is strongly arguable that it is offensive in most circumstances to record a 55 This is what was found to have occurred
in Giller v Procopets (2008) 40 Fam LR
private conversation or activity to which a person is a party without informing 378; [2008] VSCA 236.
the other participants.54 Without this knowledge, those people cannot refuse to 56 Victorian Law Reform Commission,
Surveillance in Public Places, Consultation
be recorded or alter their behaviour. These concerns apply even more strongly in Paper No 7 (2009) [6.134]; and see
the case of activities or conduct in private places. For example, the SDA currently Surveillance Devices Act 2007 (NSW)
s 7(1)(b); Listening Devices Act 1992
permits a participant in a sexual act to record that activity without the knowledge (ACT) s 4(1)(b); Surveillance Devices Act
and consent of the other party involved.55 1998 (WA) s 5(1)(b); Listening Devices Act
1991 (Tas) s 5(1)(b); and Listening and
6.58 Finally, as we noted in our Consultation Paper, most Australian states prohibit Surveillance Devices Act 1972 (SA) s 4.
57 Surveillance Devices Act 1999 (Vic) s 6(1);
participant monitoring under their surveillance devices legislation.56 Only Invasion of Privacy Act 1971 (Qld) s 43(1)
Queensland and the Northern Territory have similar participant monitoring (a); Surveillance Devices Act 2007 (NT)
s 11(1a).
exceptions to those in the Victorian legislation.57
58 Australian Law Reform Commission,
Privacy, Report No 22 (1983) [1129].
allowing some instances of participant monitoring 59 Submission 4.
6.59 It is also arguable that some forms of participant monitoring are beneficial 60 Submission 11.
and should continue to be permitted. Participant monitoring allows individuals 61 Surveillance Devices Act 2007 (NSW)
s 7(3)(a); Surveillance Devices Act 1998
to protect their interests, particularly in ‘commercial, business and domestic (WA) ss 5(3)(c), 6(3)(a); Listening Devices
contexts’.58 For example, the commission was told that participant monitoring Act 1992 (ACT) s 4(3)(a); Listening Devices
Act 1991 (Tas) s 5(3)(a).
is used by parties in domestic violence and family law matters, such as when a
62 Surveillance Devices Act 2007 (NSW)
woman records her ex-husband’s conversations with her as evidence of breach s 7(3)(b)(i); Listening Devices Act 1991
of an intervention order.59 Police also use participant monitoring when gathering (Tas) s 5(3)(b)(i); Listening Devices Act
1992 (ACT) s 4(3)(b)(i); Surveillance
evidence for criminal prosecutions.60 Devices Act 1998 (WA) ss 5(3)(c), 6(3)
(iii); Listening and Surveillance Devices Act
6.60 In those Australian jurisdictions where participant monitoring is unlawful (NSW, 1972 (SA) s 7(1)(b).
Western Australia, ACT, South Australia and Tasmania), the legislation contains a 63 See eg, Surveillance Devices Act 1998
(WA) s 3 (‘principal party’).
range of exceptions. A common exception is where all parties to the conversation 64 Sepulveda v R (2006) 167 A Crim R 108;
or activity consent.61 Other exceptions are outlined directly below. [2006] NSWCCA 379.
117
6
Chapter 6
Modernising the Surveillance
Devices Act
6.63 Although ‘reasonably necessary’ means only ‘reasonably appropriate’ (rather than
essential),65 the Court held that it was not reasonably appropriate for a sexual
assault victim to secretly record the perpetrator admitting to the assault. This was
because the victim could have approached the police with his complaints.66
6.64 Thus, the exception does not allow for ‘covert recordings of a conversation by
any person who alleges that he or she is a victim of crime, and who speaks to the
alleged offender for the purpose of obtaining admissions of offences’.67
6.65 Moreover, what is reasonably necessary is an objective test, having regard to
the circumstances that existed at the time the recording was made.68 Thus, it is
not sufficient that the surveillance user believed it to be reasonably necessary
to protect a lawful interest. The Court also declined to give the term ‘lawful
interests’ a broad meaning.69 It held that ‘lawful interests’ do not include an
interest in vindicating one’s right not to be a victim of crime.70
Police duties
6.66 NSW, Tasmanian, Western Australian and South Australian71 surveillance device
legislation also exempts participant monitoring by law enforcement officers from
the general prohibition against participant monitoring. In the Western Australian
legislation, the prohibition against recording a private conversation or a private
activity to which a person is a party does not apply to a police officer acting in
the course of his or her duty.72 Moreover, the Act also exempts a person who acts
under instruction from a law enforcement officer in the course of investigating a
criminal offence.73 There is a similar provision in the South Australian legislation.74
6.67 NSW and Tasmania75 have broader exemptions. For example, the NSW legislation
exempts a law enforcement officer who is a party to a private conversation
and is participating in an authorised operation (within the meaning of the Law
Enforcement (Controlled Operations) Act 1997 (NSW)) under an assumed name
from the prohibition on the installation, use and maintenance of a listening device.76
Submissions
6.70 There was support in submissions for the proposal in our Consultation Paper
that Victoria should prohibit participant monitoring using surveillance devices.81
Liberty Victoria, for example, noted that the reform would promote privacy and
consistency between jurisdictions, bringing provisions of the SDA in line with
NSW, South Australia, Tasmania, Western Australia and ACT.82
118 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.71 Those who opposed any change noted the beneficial uses of participant 65 Meaning that surveillance was the only
means by which a person could protect
monitoring. For example, Victoria Police argued that the use of participant the lawful interest: Sepulveda v R [2006]
monitoring enables police to perform important functions such as evidence NSWCCA 379 [117].
66 Sepulveda v R [2006] NSWCCA 379 [139].
gathering and the protection of undercover operatives.83 The Lilydale Centre Safe
67 Sepulveda v R [2006] NSWCCA 379
Committee noted its use by parties in domestic violence and family law matters, [142]. But see R v Riganias (2009) 9 DCLR
such as a woman recording her ex-husband’s conversations with her as evidence (NSW) 235; [2009] NSWDC 216 where
the court found it reasonably necessary
of him breaching his intervention order.84 In fact, the Committee favours such for the protection of lawful interests
monitoring by both parties, because when they do they ‘tend to be civil to one the secret recording by an investor of
conversations with an individual to whom
another averting further breaches and allegations of breaches’.85 he gave money and who he believed may
not have been properly investing
6.72 One submission suggested that the ban on participant monitoring was ultimately his money.
uncontroversial given the prohibition on communicating or publishing the 68 Sepulveda v R [2006] NSWCCA 379
[139]. See also R v Riganias [2009]
information gained. In consultation with media representatives the commission NSWDC 216 [13].
was told that extending the participant monitoring ban would have little effect 69 Sepulveda v R [2006] NSWCCA 379
[141].
on journalistic practices. As one television news executive told the commission,
70 Sepulveda v R [2006] NSWCCA 379
whether participant monitoring should be banned is an academic point because, [135], [142].
as it stands, the material obtained through participant monitoring cannot be used.86 71 Listening and Surveillance Devices Act
1972 (SA) s 7(1)(b).
6.73 In general, submissions in favour of the ban also supported exemptions that 72 Surveillance Devices Act 1998 (WA)
would allow participant monitoring in limited circumstances. For example, the ss 5(3)(a), 6(3)(b)(i).
73 Surveillance Devices Act 1998 (WA)
St Kilda Legal Service said there should be an exception to allow for evidence ss 5(3)(b), 6(3)(b)(ii).
gathering in family violence and family law matters: 74 Listening and Surveillance Devices Act
1972 (SA) s 7(2).
Without [such an exemption] individuals may find it more difficult to gather 75 Listening Devices Act 1991 (Tas) s 5(2)(e).
evidence to support their case. This is because in family violence matters, 76 Surveillance Devices Act 2007 (NSW)
for example, there are often no witnesses to the alleged abuse apart from s 7(4)(1).
77 Surveillance Devices Act 2007 (NSW)
the victim and the perpetrator.87 s 7(3)(b)(ii); Listening Devices Act 1991
(Tas) s 5(3)(b)(ii); Listening Devices Act
6.74 Liberty Victoria supported the exceptions now found in the SDA (NSW) ‘which 1992 (ACT) s 4(3)(b)(ii).
ensure the practice remains legal in limited and appropriate circumstances’.88 The 78 Listening Devices Act 1991 (Tas) s 5(2)(c).
Office of the Victorian Privacy Commissioner went further, suggesting it would be 79 Listening Devices Act 1991 (Tas) s
5(4)–(7).
preferable if the exceptions were warrant-based.89
80 Listening and Surveillance Devices Act
6.75 The commission is of the view that, as a rule, a person should be able to conduct 1972 (SA) ss 4, 7(1).
81 Submissions 2, 5, 14, 29, 33.
private conversations and engage in private activities without those events
82 Submission 5.
being recorded without their consent. Such an expectation is consistent with 83 Submission 11.
the overall purpose of surveillance devices legislation, which is to protect privacy 84 Submission 4.
by prohibiting the covert use of surveillance devices other than in exceptional 85 Submission 4.
circumstances associated with law enforcement. We recommend that the general 86 Consultation 12.
87 Submission 14.
participant monitoring exception in sections 6(1) and 7(1) of the SDA be removed.
88 Submission 5.
6.76 We accept, however, that in some circumstances this general rule should not 89 Submission 29.
apply. Any exceptions to a general prohibition against participant monitoring 90 Surveillance Devices Act 1999 (Vic)
ss 6(1), 7(1).
should not greatly diminish the usual expectation that conversations and activities
should not be covertly recorded by anyone.
6.77 There is no need to prohibit participant monitoring when all parties to the
conversation or activity consent. The prohibitions in the SDA already provide
an exception when each party to a conversation or activity gives their consent,
express or implied, to the use of a surveillance device.90 Consequently, even if the
words ‘to which the person is not a party’ are removed from sections 6(1) and
7(1), there is no need to create an additional exception for those instances when
each party has given his or her consent to the recording.
119
6
Chapter 6
Modernising the Surveillance
Devices Act
6.78 Participant monitoring by a principal party to a conversation should be possible
where it is reasonably necessary for the protection of that party’s lawful interests.
This exception should not be too broad. For example, we do not favour the
exception recently suggested by the New Zealand Law Commission, which would
permit non-consensual recording of a conversation to keep a more accurate
record than memory could provide.91
6.79 Although we favour a narrow view of the ‘lawful interests’ exception, we
suggest that it should not be as narrow as the one suggested by the NSW Court
of Criminal Appeal. We favour an interpretation that allows for participant
monitoring for evidentiary purposes, as suggested in a number of the submissions
we discussed above.
6.80 Similarly, although we support allowing participant monitoring by law
enforcement officers in the course of their duties and without a warrant, we
favour limiting the exception to situations in which an officer reasonably suspects
the person being recorded has committed an offence or is doing so.
6.81 We have not proposed the exception found in legislation elsewhere that permits
a person to engage in covert participant monitoring when the recording is made
without the purpose of sharing the material with others. In these circumstances
it is still possible that recordings made by a party to a conversation or activity
may fall into the hands of third parties. We have also chosen not to recommend
a broad public interest exception because its scope is too uncertain for use in a
regime that contains criminal sanctions.
Recommendation
18. Sections 6 and 7 of the SDA should be amended to prohibit participant
monitoring using a listening or optical surveillance device subject to the
following additional exceptions:
a. the use of a listening or optical surveillance device by a law enforcement
officer to record a private conversation or private activity to which he or
she is a party if:
i) the law enforcement officer is acting in the course of his or her
duty; and
ii) the law enforcement officer reasonably believes at least one party
to the conversation or activity of having committed or being in the
course of committing an offence
b. the use of a listening device or optical surveillance device by a party to a
private conversation or private activity if:
i) a principal party to the conversation or activity consents to the
listening device being so used; and
ii) recording of the conversation or activity is reasonably necessary for
the protection of the lawful interests of that principal party.
120 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
91 New Zealand Law Commission, above
a civil penalty regime n 33 [3.87].
92 Surveillance Devices Act 1999 (Vic)
6.82 The SDA provides criminal sanctions when a person uses a surveillance device, ss 6–12.
or publishes information gained by the use of a surveillance device, in prohibited 93 Surveillance Devices Act 1999 (Vic) ss 6(1),
ways.92 The more serious offences attract a maximum penalty of two years 7(1), 8(1). The penalty unit rate is $116.82
for the financial year 2009–10. Thus, the
imprisonment, or a fine of up to 240 penalty units for an individual (1200 penalty current maximum fine for an individual is
units for a corporation), or both.93 $26 836.80 and the maximum fine for a
body corporate is $140 184.
6.83 The commission has only been able to find evidence of four successful 94 See Mark Russell, ‘Privacy Threatened by
Hidden Cameras’, The Age (Melbourne),
prosecutions for breach of the SDA since its inception on 1 January 2000. All 30 September 2009, 2; ‘Former Drama
cases concerned the unlawful use of optical surveillance devices in particularly Teacher Pleads Guilty to Porn Charges’,
The Age (Melbourne), 1 March 2010, 8;
offensive circumstances.94 One explanation for the small number prosecutions Steve Butcher, ‘Man May Face Jail For
may be that the criminal sanctions in the SDA are too severe for use in cases Pointing Camera at Woman in Toilet’, The
Age (Melbourne), 4 March 2010, 10.
where the wrongful behaviour is not highly offensive. 95 Eamonn Moran, ‘Enforcement Mechanisms
(including Alternatives to Criminal
6.84 There is growing support for the use of civil penalties when dealing with many Penalties)’ (2009) 2 The Loophole 12.
violations of the law. One legislator noted ‘a modern complex society with limited 96 Australian Government, Attorney-
judicial resources and an economic need for efficiency must necessarily seek General’s Department, A Guide to
Framing Commonwealth Offences,
mechanisms for the enforcement of its rules additional to traditional criminal Civil Penalties and Enforcement Powers
processes’.95 In 2007 the Commonwealth Attorney-General’s Department stated (December 2007) 63–4.
97 The ALRC recommended the Privacy Act
that civil penalties are most likely to be appropriate and effective where 1988 (Cth) be amended to ‘allow the
Federal Privacy Commissioner to seek
• criminal punishment is not merited (for example, offences involving a civil penalty in the Federal Court or
harm to a person or a serious danger to public safety should always Federal Magistrates Court where there is
a serious or repeated interference with
result in a criminal punishment) the privacy of an individual’: Australian
Law Reform Commission, above n 16
• the penalty is sufficient to justify court proceedings rec 50–2. Currently, the Act empowers
the Privacy Commissioner to make
• there is corporate wrongdoing.96 orders—including the payment of
compensation or that other action be
6.85 These matters were considered by the ALRC when it recommended a civil taken (s 52)—but does not impose civil
penalties regime for breaches of the Privacy Act 1988 (Cth).97 The ALRC penalties or criminal offences in most
circumstances. The Act does contain a
concluded that ‘criminal sanctions would be disproportionate to the level of harm number of criminal offences in relation to
caused by a serious or repeated interference with an individual’s privacy’.98 specific actions, including the disclosure of
information (s 80Q) and credit reporting
(ss 18K, 18L, 18N, 18P, 18R).
6.86 In our Consultation Paper we suggested the introduction of a civil penalty regime
98 Ibid [50.50].
for existing offences in the SDA. This would allow a surveillance regulator to act 99 Australian Law Reform Commission,
on the less serious matters that come to his or her attention without referring the Principled Regulation: Federal Civil and
Administrative Penalties in Australia,
matter to Victoria Police. Report No 95 (2002) [2.81].
6.87 Introducing civil penalties is also likely to reduce the cost and complexity of 100 Department of Treasury and Finance,
Victorian Guide to Regulation (2nd ed,
the regulatory process.99 This is consistent with the current approach taken by 2007) i.
the Victorian government, which ‘continues to work towards minimising [the 101 Under the Trade Practices Act 1974 (Cth).
regulatory] burden’ on ‘businesses, not-for-profit organisations, government 102 Under the Corporations Act 2001 (Cth).
103 Under the Environmental Protection and
sector organisations … and society as a whole’.100 Biodiversity Conservation Act 1999 (Cth).
6.88 A number of federal oversight bodies have the power to bring civil penalty 104 Including the Banking Act 1959 (Cth) and
the Fair Work (Registered Organisations
proceedings, including the Australian Competition and Consumer Commission Act) 2009 (Cth).
(ACCC),101 Australian Securities and Investment Commission (ASIC)102 and the 105 Essential Services Commission Act 2001
(Vic) s 54A.
Environment Protection Authority (EPA).103 Civil penalty orders are available under
106 Rail Corporations Act 1996 (Vic) ss 68–9.
many pieces of Commonwealth legislation.104 107 Victorian Renewable Energy Act 2006
(Vic) s 71.
6.89 In Victoria, there has also been growing use of civil penalties. For example, the
108 Outworkers (Improved Protection) Act
Essential Services Commission is responsible for bringing civil penalty proceedings 2003 (Vic) s 47.
under a number of Acts, including the Essential Services Commission Act 2001 109 Long Service Leave Act 1992 (Vic) s 88.
(Vic),105 the Rail Corporations Act 1996 (Vic),106 and the Victorian Renewable 110 Owners Corporation Act 2006 (Vic) s 166.
Energy Act 2006 (Vic).107 The courts may make a civil penalty order under the
Outworkers (Improved Protection) Act 2003 (Vic)108 and the Long Service Leave
Act 1992 (Vic).109 VCAT may make a civil penalty order under the Owners
Corporation Act 2006 (Vic).110
121
6
Chapter 6
Modernising the Surveillance
Devices Act
6.90 There was broad support for the introduction of a civil penalty regime among
submissions to the commission. The Victorian Privacy Commissioner argued
that one reason the current criminal regime was ineffective was due to an
inherent conflict of interest: the police who prosecute illegal uses of surveillance
devices also have an interest in obtaining footage from third parties to assist
their investigations.111
6.91 The Federation of Community Legal Centres supported civil penalties but also
promoted an educational approach.112 Victoria Police noted they seek ‘protection
from liability for police officers acting for a lawful purpose in the course of their
duties’.113
6.92 The commission believes that a greater range of regulatory measures should be
available to control the use of surveillance in Victoria.
6.93 In our Consultation Paper we noted it may be appropriate to retain criminal
penalties in the SDA if a civil penalties regime is introduced. The introduction of
civil penalties should not restrict police from pursuing criminal prosecutions under
the existing provisions of the SDA, or for surveillance-related offences in other
Acts. This includes those dealing with stalking,114 indecent, offensive or insulting
behaviour115 and ‘upskirting’.116 A number of federal regulators, including the
ACCC117, ASIC118 and the EPA, have the power to bring civil penalty proceedings
when criminal prosecutions are also available.119
Recommendation
19. Sections 6–9 and 11–12 of the SDA should be amended to include civil
penalties as an alternative to criminal penalties. The regulator should be
permitted to commence proceedings for the imposition of a civil penalty.
122 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.96 The commission is aware of a number of 111 Submission 29. 126 ‘Pair Jailed for Drugging, Raping 14-Year-
112 Submission 40. Old Girls’, The Age (Melbourne),
instances of surveillance devices being used 8 December 2009 <www.theage.com.au/
113 Submission 11.
to intimidate, demean or harass people. For 114 Crimes Act 1958 (Vic) s 21A.
national/pair-jailed-for-drugging-raping-
14yearold-girls-20091208-kgb0.html>
example, in submissions and consultations we 115 Summary Offences Act 1966 (Vic) s 17. at 21 January 2010. See also’Gang Sex
learnt about individuals filming violence for Attack Filmed on Mobile Phone’, The Age
116 Summary Offences Act 1966 (Vic) ss 41A,
(Melbourne), 17 May 2007 <http://news.
41B, 41C.
entertainment—a practice known colloquially theage.com.au/national/gang-sex-attack-
117 Under the Trade Practices Act 1974 (Cth). filmed-on-mobile-phone-20070517-db9.
as ‘happy slapping’. For example, in 2007 a 118 Under the Corporations Act 2001 (Cth). html> at 18 November 2009.
group of young people lured a teenage girl to 119 Under the Environmental Protection and 127 Professor Kerry Carrington quoted in
a park and sexually assaulted her, set fire to Biodiversity Conservation Act 1999 (Cth). Robyn Ironside, ‘Girl Fight Videos Posted
120 Surveillance Devices Act 1999 (Vic) ss 6–9. on Internet Amid Violence Surge’, The
her hair and urinated on her.122 They filmed Courier-Mail (Brisbane), 12 January 2010
121 Submissions 11, 29, 33, 36.
the incident and distributed the footage on <www.news.com.au/national/girl-fight-
122 Mex Cooper, ‘Werribee DVD Sex Case: videos-posted-on-internet-amid-violence-
DVD.123 Other examples include an incident at Teens’ Attack Sickening, Says Girls Dad’, surge/story-e6frfkvr-1225818238872> at
a secondary school in Pakenham, where a fight Geelong Advertiser (Geelong), 18 October 22 January 2010.
2007 <www.geelongadvertiser.com.au/ 128 (2008) 40 Fam LR 378; [2008] VSCA 236.
between students was recorded on another article/2007/10/18/7951_news.html> at The court awarded Ms Giller a total of
18 November 2009; Greg Roberts, ‘Boys
student’s mobile phone.124 Other school yard Escape Detention Over Assault Film’, The
$135 000 in damages.
assaults have also been captured on mobile Age (Melbourne), 5 November 2007 129 Gemma Jones and Anna Caldwell,
<http://news.theage.com.au/national/ ‘Onlookers Film Burning Car as Sisters Lay
phone cameras, with those behind the camera boys-escape-detention-over-assault-film- Dying’, Courier Mail (Brisbane),
audibly encouraging the violence.125 In some 20071105-18ct.html> at 18 November 30 December 2009 <www.news.com.
2009. au/couriermail/story/0,23739,26535799-
cases the use of a surveillance device may 952,00.html> at 25 January 2010; Peter
123 See Cooper, above n 122. Michael, ‘Police Condemn Ghoulish
exacerbate criminal behaviour. For example, in 124 Anthony Dowsley, ‘Schoolboy Filmed by People Who Filmed Backpacker’s Dying
one case, it was reported that a man waved at Classmates Being Bashed’, Herald Sun Moments’, Courier Mail (Brisbane),
(Melbourne), 15 October 2009, 4. 8 January 2010 <www.news.com.au/
a camera during a sexual assault.126 national/police-condemn-ghoulish-people-
125 See eg, Alyssa Betts, ‘Boxing Champ Filmed
who-filmed-backpackers-dying-moments/
6.97 The fact that the images can be distributed in School Bashing’, NT News (Darwin), 4
story-e6frfkvr-1225817200736> at
December 2009 <www.ntnews.com.au/
widely and quickly further compounds the article/2009/12/04/106431_ntnews.html> 25 January 2010.
problem. One academic stated that ‘the at 22 January 2010. 130 Michael, above n 129.
123
6
Chapter 6
Modernising the Surveillance
Devices Act
6.100 Sometimes surveillance devices are used for the purpose of intimidation or to
prevent people from doing something they are otherwise lawfully entitled to do.
Some submissions to our Consultation Paper expressed concern about surveillance
being used in this manner.131 Local examples include anti-abortion campaigners
setting up surveillance outside abortion clinics and people being filmed entering
gay bars or drug treatment clinics.132
6.101 In consultations and submissions concern was expressed at the power relationship
that exists between users of surveillance and people under surveillance.133 At
the extreme end of the scale, classic cases of blackmail involve the threat of the
release of personal or embarrassing information. Submissions gave examples of
people involved in an embarrassing incident who have been recorded, and then
the footage later broadcast on television or uploaded to the internet.134
other jurisdictions
6.102 Some other countries have criminalised the act of filming violence for entertainment.
For example, in 2007, the French government inserted provisions into its criminal
code as a response to the rising incidences of ‘happy slapping’.135 Now, only
professional journalists may film real-world violence and distribute it on the
internet.136 The offence is punishable by up to five years imprisonment and/or a
fine of up to €75 000.137
6.103 The New Zealand Law Commission has recently delivered its final report into
invasion of privacy. Recommendations include strengthening and streamlining
prohibitions against inappropriate uses of surveillance devices. For example, the
Commission recommends that the sections of the Crimes Act 1961 (NZ) dealing
with intimate visual recordings (which aim to prevent the filming of a person’s
sexual activity or intimate areas without their consent)138 should be moved
into their proposed new Surveillance Devices Act.139 Further, the Commission
recommends that ‘keeping a person under surveillance’ should be added as a
specified form of surveillance regulated under the Harassment Act 1997 (NZ).140
6.104 Newspaper articles from the UK cite particularly violent incidents of happy
slapping,141 including instances in which a victim ultimately died from their
injuries.142 In the UK there is no specific offence prohibiting filming violent
attacks for entertainment, however, other offences may be used to deal with
this behaviour. In 2008 a teenager who used her mobile phone to film the fatal
bashing of a man pleaded guilty to aiding and abetting manslaughter, even
though she did not physically participate in the attack. She was sentenced to two
years imprisonment.143
6.105 The commission is of the view that it is desirable to introduce a new offence that
demonstrates clear community disapproval of the growing use of a surveillance
device to intimidate, demean or harass people. There is considerable educative
value in a strong legislative statement that it is unacceptable to use a surveillance
device for these purposes. Although there are already some offences concerning
certain specific uses of surveillance devices, such as stalking or ‘upskirting’, and
while offensive behaviour of any nature in a public place is unlawful,144 there is no
specific offence concerned with the grossly offensive use of a surveillance device.
124 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
6.106 The SDA currently prohibits the publication or recording of a private conversation 131 Submissions 5, 33.
132 Submission 6; Forum 1.
or private activity.145 The current SDA prohibitions are limited to private conduct.
133 Submission 14.
These provisions do not apply where parties ought reasonably to expect that 134 Submission 5.
someone else could observe what they are doing or saying.146 Many of the 135 ‘France: New Law Says Only Scribes can
inappropriate uses of surveillance devices would probably constitute an offence Upload Violence Snaps’, The Times (India),
8 March 2007 <www.asiamedia.ucla.edu/
of obscene, indecent or offensive behaviour under the Summary Offences Act article.asp?parentid=65364> at
1966 (Vic).147 This longstanding offence does not provide the community with a 22 January 2010.
136 Legifrance, Law No 2007–297 of 5 March
clear message, however, that use of a surveillance device to intimidate, demean 2007 (2010) <www.legifrance.gouv.fr/
or harass another person is unacceptable. The commission is of the view that a affichTexte.do?cidTexte=JORFTEXT000
000615568&dateTexte=> at 3 February
separate offence in the SDA would appropriately serve this purpose. 2010.
6.107 The new offence should apply in two situations. First, where a surveillance 137 New Prevention of Criminality Law Poses
Threat to Citizen Reporting (2007),
device is used to intimidate, demean or harass a person of ordinary sensibilities. Reporters Without Borders <www.rsf.org/
Secondly, where a surveillance device is used to prevent or hinder a person from New-prevention-of-criminality-law.html>
at 27 January 2010.
performing an act they are lawfully entitled to do. This latter situation includes, 138 Crimes Act 1961 (NZ) ss 216G–216N.
for example, using a surveillance device to discourage people from entering places 139 New Zealand Law Commission, above
such as abortion clinics or gay bars. n 33, rec 6.
140 Ibid rec 21.
6.108 Some submissions expressed concern that any amendments to the SDA should 141 See eg, a recent case in which two
brothers tortured four people over
avoid criminalising legitimate uses of surveillance devices.148 We believe that the several hours, one of whom nearly
proposed new offence strikes an appropriate balance and would not outlaw died. ‘Edlington: Full Text of Mr Justice
Keith’s Comments to Torture Brothers’,
acceptable uses of surveillance devices. For example, the use of a surveillance The Times Online (London), <www.
device by the media to record the aftermath of a natural disaster is part of their timesonline.co.uk/tol/news/uk/crime/
article6998667.ece> at 25 January 2010.
legitimate newsgathering activity, and is not conducted for the purpose of
142 ‘“Happy Slapper” Killers Jailed’ (8 July
intimidating, demeaning or harassing an individual. 2007) ABC News <http://abc.gov.au/
news/stories/2007/07/28/1990731.htm>
at 25 January 2010.
Recommendation 143 Angela Balakrishnan, Girl Jailed for
Filming “Happy Slap” Killing (18 March
20. A new offence should be included in the SDA that makes it unlawful to use a 2008) guardian.co.uk <www.guardian.
co.uk/uk/2008/mar/18/happyslap.killing>
surveillance device in such a way as to: at 25 January 2010.
144 Summary Offences Act 1966 (Vic) div 4A;
a. intimidate, demean or harass a person of ordinary sensibilities; or to Crimes Act 1958 (Vic) s 21A.
b. prevent or hinder a person of ordinary sensibilities from performing an 145 Surveillance Devices Act 1999 (Vic) s 11.
146 Surveillance Devices Act 1999 (Vic)
act they are lawfully entitled to do. ss 3, 11.
21. A civil and alternative criminal penalty should apply for breach of the 147 Summary Offences Act 1966 (Vic) s 17.
148 Submissions 7, 19.
offence. The regulator should be permitted to commence proceedings for
the imposition of a civil penalty.
conclusion
6.109 At present the SDA regulates the use of surveillance devices inconsistently—
certain activities are prohibited while others are effectively permitted because the
Act says nothing about them. Furthermore, breaches of the Act attract serious
criminal sanctions, which have proven not particularly effective in regulating
public place surveillance. In this chapter we have explained our recommended
changes to the Act to address these shortcomings, and to modernise the way in
which the use of surveillance devices is regulated.
125
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
S
L
126 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7
SURVEILLANCE SURVEILLANCE SURVEILLANCE
LLANCE SURVEILLANCE SURVEILLANCE SURVEILLANCE
SURVEILLANCE SURVEILLANCE SURVEILLANCE
Chapter 7
LLANCE SURVEILLANCE SURVEILLANCE SURVEILLANCE
Statutory Causes CONTENTS
SURVEILLANCE SURVEILLANCE SURVEILLANCE
LLANCEofSURVEILLANCE
Action
128 Introduction
128 Civil action for serious
SURVEILLANCE SURVEILLANCE
invasions of privacy
141 Other law reform
127
7
Chapter 7 Statutory Causes of Action
introduction
7.1 One of the options discussed in our Consultation Paper is a statutory cause of
action1 for a serious invasion of privacy. In the interests of national consistency,
we suggested that the cause of action for a serious invasion of privacy
recommended by the Australian Law Reform Commission (ALRC) in 2008 could
be used as the model for any new Victorian law.2
7.2 The ALRC recommended that its proposed cause of action be included in
Commonwealth legislation.3 Any such legislation would probably remove
Victoria’s ability to enact a similar cause of action because of constitutional
restrictions.4 However, as the Commonwealth may not implement the ALRC’s
recommendation, or may take some time to do so,5 Victoria is still in a position to
provide leadership in this area.
7.3 Since the release of the ALRC report, the NSW Law Reform Commission
(NSWLRC) has recommended a different version of a statutory cause of action
for invasion of privacy.6 Consequently, national harmony in this field may be a
long-term goal.
7.4 This chapter begins with a summary of the relevant law in Australia and other
comparable jurisdictions. We then discuss the views of those who made
submissions about our Consultation Paper proposal. The Consultation Paper
proposal attracted support and opposition. Some supporters also suggested
different causes of action to that proposed by the ALRC.
7.5 We recommend the introduction of two statutory causes of action for serious
invasions of privacy: the first dealing with misuse of private information, the
second with intrusion upon seclusion. Although our focus is an appropriate legal
response to the misuse of surveillance in public places, these new causes of action
would not necessarily be limited to conduct that occurred in a public place or that
involved the use of a surveillance device. We have drawn upon the work of the
ALRC and the NSWLRC when devising these causes of action.
7.6 Our recommendations deal with the legal characterisation of these causes of
action, their elements, the defences, the remedies, the people granted rights by
the law, the limitations period, and the tribunal that should hear these cases.
128 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.9 Development of an Australian body of common 1 A cause of action is a right to sue another 9 See eg, the House of Lords decision in
person. Campbell v MGN Ltd [2004] 2 AC 457.
law to protect the growing interest in privacy 2 Australian Law Reform Commission, For 10 Recent appellate court decisions
may have been hindered by the fact that ‘there Your Information: Australian Privacy Law concerning the reach of the action for
and Practice: Volume 3: Final Report breach of confidence involved the use of
is no easy, embracing formula for dealing with 108 (2008) rec 74–1. a surveillance device (a video camera) in
all the different practices involved’ and because 3 Ibid. private places (see Australian Broadcasting
Corporation v Lenah Game Meats Pty
the proper balance to be struck between the 4 S 109 of the Constitution renders
Limited (2001) 208 CLR 199 [34]-[39];
a state law inoperative when it is
diverse interests ‘varies greatly and demands inconsistent with a Commonwealth
Giller v Procopets [2008] 40 Fam LR 378.
individualised solutions’.12 Former Chief Justice law. A state law may be inconsistent 11 Danuta Mendelson, The New Law of Torts
with a Commonwealth law when the (2007) 6.
of the Australian High Court Murray Gleeson Commonwealth law seeks to be the sole 12 John Fleming, The Law of Torts (9th ed,
has referred to ‘the lack of precision of the law covering a particular activity. In these 1998) 665.
circumstances, the Commonwealth law 13 Australian Broadcasting Corporation v
concept of privacy’ and to ‘the tension that covers the field. Lenah Game Meats Pty Limited (2001)
exists between interests in privacy and interests 5 On 14 October 2009 Cabinet Secretary 208 CLR 199 [41].
Senator Joe Ludwig released the
in free speech’.13 The limited capacity of the Commonwealth Government’s
14 See Giller v Procopets [2008] 40 Fam
LR 378 for discussion of the available
traditional common law remedies to deal with response to the ALRC’s Report 108. remedies.
The Commonwealth Government has
the damage caused by invasion of privacy may neither accepted nor rejected the ALRC’s
15 Australian Broadcasting Corporation
v Lenah Game Meats Pty Limited
have also contributed to the fact that there recommendations concerning a statutory
(2001) 208 CLR 199. See Ian Callinan,
cause of action for serious invasions of
have been few privacy cases to assist in the privacy. It announced that the relevant
‘Privacy, Confidence, Celebrity and
Spectacle’ (2007) 7 Oxford University
formulation of broad principles.14 recommendations will be considered
Commonwealth Law Journal 1.
later (Australian Government, Enhancing
7.10 Although no decision of the High Court, or of National Privacy Protection: First Stage 16 Hosking v Runting [2005] 1 NZLR 1
Response to the Australian Law Reform [59] (Gault P and Blanchard J). This
any Australian intermediate appellate court, has Commission Report 108 ‘For Your statement was made following a detailed
confirmed the existence of an Australian tort of Information: Australian Privacy Law and consideration of the relevant judgments
Practice’, October 2009). in Australian Broadcasting Corporation
invasion of privacy, in 2001 various members 6 NSW Law Reform Commission, Invasion
v Lenah Game Meats Pty Limited (2001)
of the High Court observed that there is no 208 CLR 199.
of Privacy, Consultation Paper No 1
(2007), 3. 17 Grosse v Purvis [2003] QDC 151;
barrier to the creation of such a tort.15 As two Jane Doe v Australian Broadcasting
7 See Chapter 3 for a brief discussion of
members of the New Zealand Court of Appeal compensation awards for information
Corporation [2007] VCC 281.
subsequently pointed out, ‘the High Court privacy breaches. 18 [2003] QDC 151.
8 See Australian Broadcasting Corporation 19 Grosse v Purvis [2003] QDC 151 [442].
of Australia has not ruled out the possibility v Lenah Game Meats Pty Limited (2001)
of a common law tort of privacy, nor has it 208 CLR 199 [132].
embraced it with open arms’.16
7.11 Since 2001, two Australian trial courts have
recognised a tort of invasion of privacy.17 In
Grosse v Purvis18 a judge in the Queensland
District Court concluded that a prolonged
course of stalking and harassment was an
unlawful invasion of the plaintiff’s privacy. The
Court decided that the conduct in question was
unlawful because it amounted to a breach of
‘the actionable right of an individual person to
privacy’.19
129
7
Chapter 7 Statutory Causes of Action
7.12 The court determined that the essential elements of an action for invasion of
privacy are
a.
b.
a willed act by the defendant
which intrudes upon the privacy or seclusion of the plaintiff
c. in a manner which would be considered highly offensive to a
reasonable person of ordinary sensibilities
d. and which causes the plaintiff detriment in the form of mental,
psychological or emotional harm or distress, or because it prevented or
hindered her from doing an act which she was lawfully entitled to do.20
7.13 In Doe v Australian Broadcasting Corporation21 a Victorian County Court judge
held that the publication of the name of a rape victim entitled her to damages
for breach of confidence, negligence, breach of statutory duty and invasion of
privacy. Judge Hampel observed that the ‘development of a tort of invasion of
privacy is intertwined with the development of the cause of action for breach of
confidence’ and that both causes of action are concerned with ‘a recognition
of the value of, and importance of the law recognising and protecting human
dignity’.22 Although Judge Hampel did not consider it appropriate to formulate
an exhaustive description of the elements of the cause of action for invasion of
privacy, she concluded that the wrong done in the case was ‘the publication of
personal information, in circumstances where there was no public interest in
publishing it, and where there was a prohibition on its publication’.23
130 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.17 In Campbell v MGN Ltd31—a case concerning disclosure by a newspaper that 20 Grosse v Purvis [2003] QDC 151 [444].
21 [2007] VCC 281. Although an appeal was
model Naomi Campbell had attended a Narcotics Anonymous meeting—the lodged against the decision, the case was
House of Lords confirmed that the action for breach of confidence ’has now settled before the appeal was heard.
firmly shaken off the limiting constraint of the need for an initial confidential 22 [2007] VCC 281 [148].
23 [2007] VCC 281 [163].
relationship’.32 The court held that the obligation to respect the confidentiality of
24 Breen v Williams (1996) 186 CLR 71, 115
information extends to a person who knows, or ought to know, that information (Gaudron and McHugh JJ).
that he or she receives is confidential.33 The essence of the action for breach of 25 Ibid.
confidence is now misuse of private information. It seeks to protect ‘two different 26 Wainright v Home Office [2004] 2 AC
406 [35] (Lord Hoffman).
interests: privacy and secret (confidential) information’.34 27 Hosking v Runting [2005] 1 NZLR 1 [110]
(Gault P and Blanchard J).
7.18 Human rights principles were a catalyst for the common law developments
28 Wainright v Home Office [2004] 2 AC
in Campbell. In 2003,35 the European Court of Human Rights had found that 406 [35]
public disclosure of CCTV footage of a man who had attempted suicide in an 29 The elements of the traditional action for
breach of confidence were explained by
English street breached his right to privacy.36 Moreover, it had found that English Megarry J in Coco v A N Clark (Engineers)
law provided him with ‘no effective remedy in relation to the violation of his Ltd [1969] RPC 41.
right to respect for his private life guaranteed by Article 8 of the Convention’.37 30 Campbell v MGN Ltd [2004] 2 AC 457
[13] (Lord Nicholls). There is uncertainty
When Campbell was decided in 2004, all of the members of the House of Lords about whether the cause of action is
considered European human rights issues.38 Lord Nicholls said that ‘the values properly described as a tort, as a majority
of the House of Lords in Campbell
enshrined in articles 8 and 10 [of the European Convention on Human Rights] are did not formally adopt Lord Nicholls’
now part of the cause of action for breach of confidence’ and that change has characterisation (See eg, Mosley v News
Group Newspapers Limited [2008] EWHC
been achieved ‘by absorbing the rights protected by articles 8 and 10 into this 177 [184] (QB)).
cause of action’.39 Article 8 of the European Convention is concerned with 31 [2004] 2 AC 457.
privacy while article 10 is concerned with freedom of expression.40 Lord Nicholls 32 Campbell v MGN Ltd [2004] 2 AC 457
[14] (Lord Nicholls).
went on to say: 33 Campbell v MGN Ltd [2004] 2 AC 457, [14].
The values embodied in articles 8 and 10 are as much applicable in 34 Campbell v MGN Ltd [2004] 2 AC 457,
[14]–[15].
disputes between individuals or between an individual and a non- 35 Peck v United Kingdom [2003] ECHR 44.
governmental body such as a newspaper as they are in disputes between 36 Peck v United Kingdom [ 2003] ECHR 44
individuals and a public authority.41 [62]–[63].
37 [2003] ECHR 44 [113]. Article 13 of the
European Convention of Human Rights
Elements requires an effective national remedy for
any violation of Convention rights.
7.19 The law concerning the elements, defences and remedies that apply to the
38 Although the House of Lords was divided
cause of action for misuse of private information is embryonic. The elements of (3–2) on the question of whether the
the cause of action appear to be, first, ‘whether the claimant had a reasonable plaintiff should succeed on the facts of
the case, all five Law Lords supported the
expectation of privacy in relation to the particular information in question’ and, development of the cause of action for
secondly, ‘whether there is some countervailing public interest such as to justify misuse of private information.
39 Campbell v MGN Ltd [2004] 2 AC 457 [17].
overriding that prima facie right’.42 Both issues are ‘essentially questions of fact’.43
40 Article 8 of the European Convention
The English courts have provided limited guidance about matters to consider, or deals with ‘respect for private and family
steps to take, when resolving these questions of fact. life’ and Article 10 with ‘freedom of
expression’.
7.20 The first element—a reasonable expectation of privacy—involves an objective 41 Campbell v MGN Ltd [2004] 2 AC 457 [17].
evaluation of the expectation of ‘a reasonable person of ordinary sensibilities … 42 The Author of a Blog v Times Newspapers
Limited [2009] EWHC 1358 (QB) [7]
placed in the same position as the claimant and faced with the same publicity’.44 (Eady J). An act of the defendant that led
The Court of Appeal has recently listed a number of factors that can be considered to the publication of the information in
question appears to be subsumed within
when deciding whether the claimant had a reasonable expectation of privacy.45 these two elements.
These include the attributes of the claimant, the nature of the activity he or she was 43 Murray v Big Pictures (UK) Limited [2008]
EWCA Civ 446 [41] (Clarke MR).
engaged in, the place where it occurred, the nature and purpose of any intrusion,
44 Campbell v MGN Ltd [2004] 2 AC 457
the presence or absence of consent, how the information came into the possession [99] (Lord Hope); Murray v Big Pictures
of the publisher, and the effect of publication on the claimant.46 Although the (UK) Limited [2008] EWCA Civ 446 [35]
(Clarke MR).
courts have warned against generalisations about the sort of behaviour that 45 Murray v Big Pictures (UK) Limited [2008]
attracts a reasonable expectation of privacy, in those cases where the claimant has EWCA Civ 446 [36] (Clarke MR).
been successful, ‘the information in question has been of a strictly personal nature 46 Murray v Big Pictures (UK) Limited [2008]
EWCA Civ 446 [36] (Clarke MR).
concerning, for example, sexual relationships, mental or physical health, financial 47 The Author of a Blog v Times Newspapers
affairs, or the claimant’s family or domestic arrangements’.47 Limited [2009] EWHC 1358 (QB) [9]
(Eady J).
131
7
Chapter 7 Statutory Causes of Action
7.21 The second element involves striking a balance between an individual’s right to
privacy and a publisher’s right to publish. Resolving ‘the tension between privacy
and freedom of expression’48 is not easy, as the result in Campbell demonstrates.
The House of Lords divided 3–2 in favour of the plaintiff on this point. Although
no appellate court has yet identified a list of factors to be considered when
seeking to strike this balance, it appears that an evaluation of the worth or value
of the private information disclosed has been significant in some cases.49 In
addition, the ‘difficult question of proportionality may arise’ when considering
how to assess any interference with one person’s right to privacy or another’s
freedom of expression.50 What this may mean is, for example, that an act
done to further one person’s right to freedom of expression must not have a
disproportionate impact upon another’s right to privacy.
Defences
7.22 The English courts have not yet articulated any defences to a claim for misuse
of private information. It does appear, however, that consent is a defence, just
as it is to most torts. There may also be a ‘defence’51 that is quite similar to
the defence of qualified privilege in defamation law.52 In Campbell all five Law
Lords accepted that it was quite lawful for the newspaper in question to publish
the fact that Naomi Campbell was a drug addict because she had made many
public statements to the contrary.53 Lord Nicholls said that ‘where a public figure
chooses to present a false image and make untrue pronouncements about his or
her life, the press will normally be entitled to put the record straight’.54
Remedies
7.23 It is not clear whether the wrong of misuse of private information requires proof
of actual damage or whether, like the tort of trespass, it may be committed
without proof of any damage. This lack of clarity has created uncertainty about
the types of damages that may be awarded.55
7.24 Damages awards have generally been modest in these cases, perhaps because the
courts have been asked to order compensation for injury that is difficult to assess
and quantify. The cause of action seeks ‘to protect such matters as personal dignity,
autonomy and integrity’, and ‘damages for such an infringement may include
distress, hurt feelings and loss of dignity’.56 In Mosley v News Group Newspapers
Limited, which attracted the largest damages award of £60 000, Eady J said ‘an
infringement of privacy cannot ever be effectively compensated by a monetary
award’.57 He also noted that ‘once privacy has been infringed, the damage is
done and the embarrassment is only augmented by pursuing a court action’.58
When concluding that £60 000 was the appropriate sum in the case, Eady J stated
that Mr Mosley ‘is hardly exaggerating when he says that his life was ruined’.59
7.25 The British courts have also issued injunctions to prevent the initial publication, or
continued publication, of material in some misuse of private information cases.
Injunctions have prevented publication of the addresses of convicted murderers
once they have been released from prison,60 the details of the extra-marital sex life
of a football player,61 the private life of a musician,62 and the musings of Prince
Charles in his diary.63
7.26 By contrast, in the recent case of John Terry v Persons Unknown,64 the court
rejected an application for an injunction to prevent the media from publishing
information about an affair between the English football captain and a then-
unidentified woman. Justice Tugendhat concluded that disclosing the existence
of the relationship was not of itself highly intrusive,65 and that there was room for
argument about the social utility of publishing this information.66
132 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
48 Campbell v MGN Ltd [2004] 2 AC 457
Costs [28] (Lord Nicholls).
7.27 Even though damages awards have generally been quite small in misuse of private 49 See eg, Campbell v MGN Ltd [2004] 2 AC
457; Mosley v News Group Newspapers
information litigation, costs awards have been quite extraordinary in some of the Limited [2008] EWHC 177 (QB).
more notorious cases. Naomi Campbell was awarded damages of £3500 and 50 Campbell v MGN Ltd [2004] 2 AC 457
costs of £1.08 million.67 Max Mosley was awarded damages of £60 000 and costs [20] (Lord Nicholls).
51 Lord Nicholls suggested that this issue
of £850 000.68 Costs orders have also outstripped damages awards in some of may fall within one of the elements of
the significant European Court of Human Rights cases. One man was awarded the cause of action because it may affect
the ‘reasonableness’ of the claimant’s
damages of £11 800 and costs of £18 075 for the broadcasting of CCTV footage expectation of privacy (Campbell v MGN
of his suicide attempt.69 Ltd [2004] 2 AC 457 [24]).
52 See Patrick George, Defamation Law in
Criticism of the cause of action Australia (2006).
53 The case was ultimately fought over the
7.28 Viewed from one perspective, many of the more prominent English misuse issue of whether it was lawful for the
newspaper to publish a photo of Naomi
of private information cases are little more than legal actions by celebrities to Campbell, covertly taken and at a distance,
suppress inconvenient truths. For example, English Law Lord, Baroness Hale, in a public street, leaving a Narcotics
Anonymous meeting as well as details of
described the Campbell case as ‘a prima donna celebrity against a celebrity- what occurred at those meetings (Campbell
exploiting newspaper’,70 noting that ‘each in their time has profited from the v MGN [2004] 2 AC 457 [23]–[25]).
other. Both are assumed to be grown-ups who know the score’.71 The New Zealand 54 Campbell v MGN Ltd [2004] 2 AC
457 [24] (Lord Nicholls). Lord Nicholls’
Law Commission referred to ‘the more highly-developed celebrity culture, and statement can be traced back to the
the more aggressive nature of the media, in Britain’ when commenting upon the Court of Appeal decision in Woodward
v Hutchins [1977] 1 WLR 760. For a
differences between the types of cases that had arisen in the UK and New Zealand.72 discussion, see Sam Ricketson, ‘Public
Interest and Breach of Confidence’ (1979)
7.29 Some British cases have provided an effective forum, however, to determine the 12 Melbourne University Law Review 176.
limits that should be placed upon the publication of information obtained by use 55 See eg, Mosley v News Group Newspapers
Limited [2008] EWHC 177 (QB) [214].
of surveillance devices. Although people must expect to be observed in many 56 Mosley v News Group Newspapers
public places, recent UK cases have illustrated conduct that may fall beyond the Limited [2008] EWHC 177 (QB)
[214]–[216].
limits of reasonable exposure to the gaze of others, or to the use of information
57 Mosley v News Group Newspapers
obtained by the use of a surveillance device in a public place. Is it acceptable, for Limited [2008] EWHC 177 (QB) [231].
example, to broadcast CCTV footage of a man who has just slashed his wrists in 58 Mosley v News Group Newspapers
Limited [2008] EWHC 177 (QB) [230].
the street,73 or to publish a photo of a small child—whose mother happens to be
59 Mosley v News Group Newspapers
a famous author—being pushed down the street in a stroller?74 Limited [2008] EWHC 177 (QB) [236].
60 Venables v News Group Newspapers Ltd
7.30 The English courts have been criticised for distorting settled legal principle [2001] Fam 430.
because they have been content to develop existing legal rules in response to new 61 A v B plc [2003] QB 195.
situations rather than devise entirely new common law rules as their New Zealand 62 McKennitt v Ash [2008] QB 73.
counterparts have done. Butler has questioned 63 Associated Newspapers Ltd v HRH Prince
of Wales [2008] Ch 105.
the legitimacy of the theoretical transformation of an equitable doctrine, 64 [2010] EWHC 119 (QB).
based on a confidante’s obligations of good conscience and for which 65 [2010] EWHC 119 (QB) [68].
an injunction is the major discretionary remedy, into what is studiously 66 [2010] EWHC 119 (QB). [102]–[105].
67 Campbell v MGN Ltd Limited [2005]
referred to by several judges as the ‘action’ for breach of confidence but 2 AC 457.
which is evidently a tort protecting an aspect of human dignity, the major 68 ‘Mosley Wins £60 000 in Privacy Case’
remedy for which is substantive damages.75 Metro, 24 July 2008 <www.metro.
co.uk/news/article.html?in_article_
id=233683&in_page_id=34> at
7.31 There is some power to this criticism. Private information may be quite different 19 November 2009.
to confidential information. The traditional equitable action for breach of 69 Peck v United Kingdom [2003] ECHR 44.
confidence dealt with the wrongful use of information acquired in the course of 70 Campbell v MGN [2004] 2 AC 457 [143].
a confidential relationship. This cause of action sought to preserve the element 71 Campbell v MGN [2004] 2 AC 457 [143].
of trust that forms part of any confidential relationship. Privacy, however, is 72 New Zealand Law Commission, Invasion
of Privacy: Penalties and Remedies Review
concerned with control of information that may never be revealed to anyone. of the Law of Privacy Stage 3 Issues Paper
No 14 (2009) [4.69].
Preservation of human dignity lies at the core of privacy protection. As two
73 Peck v United Kingdom [2003] ECHR 44.
members of the New Zealand Court of Appeal said in a leading case: 74 Murray v Big Pictures (UK) Limited [2008]
EWCA Civ 446.
Privacy and confidence are different concepts. To press every case calling
75 Des Butler, ‘A Tort of Invasion of Privacy
for a remedy for unwarranted exposure of information about private lives in Australia?’ (2005) 29 Melbourne
of individuals into a cause of action having as its foundation trust and University Law Review 339, 352.
76 Hosking v Runting [2005] 1 NZLR 1[48]
confidence will be to confuse those concepts.76 (Gault P and Blanchard J).
133
7
Chapter 7 Statutory Causes of Action
7.32 The response to this criticism by one Law Lord has been to observe that the action
for breach of confidence has split in two. Lord Nicholls said that ‘the law has
developed’ so that ‘breach of confidence, or misuse of confidential information,
now covers two distinct causes of action, protecting two different interests:
privacy and secret (“confidential”) information’.77
7.33 The continued development of that branch of the breach of confidence cause
of action that protects privacy may be troublesome, however, because as Lord
Walker has observed, its ‘uncontrolled growth’ may ‘tend to bring incoherence
into the law of intellectual property’.78
134 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.38 The majority judges said that it is up to the legislature to develop ‘any high- 77 OBG Ltd v Allan [2008] 1 AC 1 [255] (Lord
Nicholls).
level and wide tort of invasion of privacy’.88 In developing the new tort the 78 OBG Ltd v Allan [2008] 1 AC 1 [292].
majority referred to New Zealand’s international human rights obligations and 79 See [7.55–7.62].
observed that the ‘intrusiveness of the long-range lens and listening devices 80 Kaye v Robertson [1991] FSR 62.
and the willingness to pay for and publish the salacious are factors in modern 81 Kaye v Robertson [1991] FSR 62, 66
(Glidewell LJ), 70 (Bingham LJ), 71
society of which the law must take account’.89 They went on to say that it is ‘the (Leggatt LJ).
very process of the common law’ for the courts to devise new civil remedies in 82 Campbell v MGN Ltd [2004] 2 AC 457
[15].
response to these developments. 90
83 Wainwright v Home Office [2004] 2 AC
406.
Elements 84 Wainwright v Home Office [2004] 2 AC
7.39 The elements of this new tort of invasion of privacy by publicising private 406 [18] (Lord Hoffmann).
85 Hosking v Runting [2005] 1 NZLR 1.
information are
86 Hosking v Runting [2005] 1 NZLR 1[148]
• the existence of facts in respect of which there is a reasonable (Gault P and Blanchard J); Tipping J
expressed general agreement with Gault
expectation of privacy P and Blanchard J [223].
87 Hosking v Runting [2005] 1 NZLR 1[48]
• publicity given to those private facts that would be considered (Gault P and Blanchard J).
highly offensive to a reasonable person.91 88 Hosking v Runting [2005] 1 NZLR 1[110]
(Gault P and Blanchard J).
7.40 In Hosking v Runting the New Zealand Court of Appeal concluded that these
92
89 Hosking v Runting [2005] 1 NZLR 1[109]
elements were not made out by a celebrity couple who were seeking to prevent (Gault P and Blanchard J).
publication of photographs taken on a public street of their 18-month-old twins. 90 Hosking v Runting [2005] 1 NZLR 1[109]
(Gault P and Blanchard J).
The court found that the photographs did not publicise a fact in respect of 91 Hosking v Runting [2005] 1 NZLR 1 [117]
which there was a reasonable expectation of privacy, and that their publication (Gault P and Blanchard J).
was not one that a person of ordinary sensibilities would find highly offensive 92 [2005] 1 NZLR 1.
93 Hosking v Runting [2005] 1 NZLR 1
or objectionable.93 The court held that the photographs only disclosed what any [164]–[165].
member of the public in that area could see on the particular day, and there was 94 Hosking v Runting [2005] 1 NZLR 1
no harm in publication of the photographs, even though they were of children.94 [164]–[165].
95 Hosking v Runting [2005] 1 NZLR
7.41 The second element of the New Zealand tort—that the publicity given to private 1[125]–[126] (Gault P and Blanchard J).
facts is highly offensive to a reasonable person—is not found in the UK action 96 Murray v Big Pictures (UK) Limited [2008]
EWCA Civ 446.
for breach of confidence. The majority judges in Hosking v Runting explained 97 The case was an appeal against a decision
the reasoning that led to the adoption of this test drawn from US privacy law. by the trial judge to strike out the
proceedings because the pleaded facts
After acknowledging that people give up expectations of complete privacy and did not disclose a cause of action. The
seclusion by living in communities, they said they were concerned with ‘wide- Court of Appeal overturned that decision
and directed the case proceed to trial.
spread publicity of very personal and private matters’ which is ‘truly humiliating 98 Murray v Big Pictures (UK) Limited [2008]
and distressful or otherwise harmful to the individual concerned’.95 EWCA Civ 446 [57].
7.42 The result in Hosking v Runting is different to that reached in a very similar recent UK
case involving the publication of photographs of the infant son of noted children’s
author J K Rowling, taken by a professional photographer with a long-range lens.96
The two courts reached different conclusions about whether there was a reasonable
expectation of privacy in relation to photographs of a child of a celebrity taken
in a public street. The English Court of Appeal held that J K Rowling’s action on
behalf of her son should be permitted to proceed97 because
the law should … protect children from intrusive media attention, at any
rate to the extent of holding that a child has a reasonable expectation that
he or she will not be targeted in order to obtain photographs in a public
place for publication which the person who took or procured the taking of
the photographs knew would be objected to on behalf of the child.98
135
7
Chapter 7 Statutory Causes of Action
Defences
7.43 The majority judges in Hosking v Runting suggested that there should be a
defence of legitimate public concern in order to ensure that ‘the scope of privacy
protection should not exceed such limits on the freedom of expression as is
justified in a free and democratic society’.99 They used the term ‘public concern’
rather than public interest to differentiate ‘matters of general interest or curiosity
to the public, and matters which are of legitimate public concern’.100 They
acknowledged that this might require judges to balance interests by considering
‘community norms, values and standards’.101
7.44 Although the New Zealand courts have had few opportunities to develop the
defences to this new cause of action, the New Zealand Law Commission has
suggested that consent should be a defence, as it is to all torts.102 The Commission
has also pointed out that it should be possible to rely upon a defence that an act
was privileged, or performed under legal authority, if it did not fall within the
broad defence of legitimate public concern identified in Hosking v Runting.103
Remedies
7.45 The majority judges said that the ‘primary remedy upon a successful claim will
be an award of damages’ and that ‘injunctive relief may be appropriate in some
circumstances’.104 They said actual damage in the sense of ‘personal injury or
economic loss’ is unnecessary and that the ‘harm to be protected against is in the
nature of humiliation and distress’.105 Proof of recognised psychiatric harm
is unnecessary.106
7.46 When dealing with the availability of injunctive relief, the majority judges
acknowledged legitimate concerns about ‘prior restraint’ of material the media
wish to publish.107 They suggested an injunction should not be granted to restrain
publication unless there is ‘compelling evidence of most highly offensive intended
publicising of private information and there is little legitimate public concern in
the information’.108
Comment
7.47 The precise status of the New Zealand tort of invasion of privacy by publishing
private facts is uncertain because some members of the country’s new highest
court, the Supreme Court, have cast doubts upon its continued acceptance
and its content. In a recent case109 Justice Anderson, who was one of the two
dissenting judges in Hosking v Runting,110 said that, in his view, the existence of
the tort and its scope were matters for debate in the Supreme Court.111 Chief
Justice Elias queried the details of the tort, particularly the need for the second
element concerning the ‘highly offensive’ nature of the publicity.112
7.48 There have been relatively few cases in New Zealand dealing with the tort of
invasion of privacy by publishing private facts since developments started at the
trial court level in the mid 1980s. It appears that ‘fifteen people have brought
cases wholly or partly based on privacy, and many of them have been neither rich
nor famous’.113 The New Zealand Law Commission has published brief details of
all of these cases.114 Damages were ordered in only two cases, with the highest
award being NZ$25 000.115 An injunction restraining publication was granted on
five occasions.116
136 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.49 The New Zealand Law Commission has recently recommended that development 99 Hosking v Runting [2005] 1 NZLR
1[129]–[130] (Gault P and Blanchard J).
of the tort recognised in Hosking v Runting should be left to the common law.117 100 Hosking v Runting [2005] 1 NZLR 1[133]
Although the Commission acknowledged that a statutory cause of action would (Gault P and Blanchard J).
make the law more accessible and certain, it referred to the absence of ‘evidence 101 Hosking v Runting [2005] 1 NZLR 1[135]
(Gault P and Blanchard J).
that the current state of the law is causing practical difficulties to anyone’.118 102 New Zealand Law Commission, Invasion
of Privacy: Penalties and Remedies Stage 3
Intrusion upon seclusion Report No 113 [6.91].
103 Ibid.
7.50 The majority of the Court of Appeal in Hosking v Runting119 said that they were
104 Hosking v Runting [2005] 1 NZLR 1[149]
dealing with only one of the four strands of the US privacy tort120—wrongful (Gault P and Blanchard J).
publicity given to private lives—and that the scope of the cause of action should 105 Hosking v Runting [2005] 1 NZLR 1[135]
(Gault P and Blanchard J).
be left to incremental development by the courts. They stated that it was
106 Ibid.
unnecessary to decide ‘whether a tortious remedy should be available … for 107 Hosking v Runting [2005] 1 NZLR 1[151]
unreasonable intrusion into a person’s solitude or seclusion’.121 (Gault P and Blanchard J).
108 Hosking v Runting [2005] 1 NZLR 1[158]
7.51 In its Issues Paper, the New Zealand Law Commission argued for the introduction (Gault P and Blanchard J).
of a separate intrusion upon seclusion tort, suggesting that some intrusions upon 109 Rogers v Television New Zealand Ltd
[2008] 2 NZLR 277 (SC).
spatial privacy may be regarded as unacceptable invasions of privacy, regardless of
110 [2005] 1 NZLR 1.
whether they are accompanied by unwanted disclosure of private information.122 111 Rogers v Television New Zealand Ltd
[2008] 2 NZLR 277 [144] (SC).
7.52 The New Zealand Law Commission ultimately recommended that any recognition
112 Rogers v Television New Zealand Ltd
and development of a tort of intrusion into seclusion should be left to the [2008] 2 NZLR 277 [25] (SC).
common law.123 The Commission concluded that ‘the development of such a 113 Professor John Burrows, ‘Privacy and the
Courts’ (Address to the Privacy Forum,
tort deserves serious consideration’ and said that the ‘real question is whether Wellington New Zealand, 27 August
it should be introduced by statute, or whether it should be left to develop at 2008) <www.privacy.org.nz/assets/
Files/PAW/10.-Speaker-Professor-John-
common law’.124 Because of its support for the common law tort of invasion Burrows.doc > at 10 November 2009.
of privacy by publishing private facts, the Commission was content to leave 114 New Zealand Law Commission, above
development of an intrusion tort to the courts.125 n 72, 158–160.
115 Brown v Attorney-General [2006] DCR 630.
the law in the united states 116 New Zealand Law Commission above n 72.
117 New Zealand Law Commission, above
7.53 Nearly all US states now recognise a right to privacy, either at common law or, in n 102, 91.
a few states, as a creation of statute.126 There are four types of invasion of privacy: 118 Ibid 90.
119 [2005] 1 NZLR 1.
• intrusion of seclusion
120 See [7.55–7.69] for a discussion of the US
privacy tort.
• appropriation of name or likeness
121 Hosking v Runting [2005] 1 NZLR 1[118]
• publicity given to private life (Gault P and Blanchard J).
122 New Zealand Law Commission, above
• publicity placing a person in a false light.127 n 72 [11.2].
123 New Zealand Law Commission, above
7.54 Although most plaintiffs in privacy cases rely on more than one of the privacy n 102, 93.
torts,128 the two causes of action most relevant to surveillance are intrusion upon 124 Ibid 92.
the seclusion of, and publicity given to, private life. These are also the two privacy 125 Ibid 93.
126 W Page Keeton et al (eds) Prosser and
torts most concerned with ‘the fundamental value of personal autonomy’.129 Keeton on the Law of Torts (5th ed) (1984)
851 with reference to statutes in New York,
Tort of intrusion upon seclusion Utah, Virginia, Wisconsin, and Nebraska.
127 William Prosser, ‘Privacy’ (1960) 48 (3)
Elements California Law Review 383, 388–389.
128 Andrew McClurg, ‘Bringing Privacy Law
7.55 According to the Restatements of the Law, published to give judges greater Out of the Closet: A Tort Theory of Liability
clarity about the law, ‘one who intentionally intrudes, physically or otherwise, for Intrusions in Public Places’ (1995) 73
North Carolina Law Review 989, 1008.
upon the solitude or seclusion of another or his private affairs or concerns, is
129 Australian Broadcasting Corporation v
subject to liability to the other for invasion of privacy, if the intrusion would be Lenah Game Meats Pty Ltd (2001) 208
highly offensive to a reasonable person’.130 The tort includes physical intrusions, CLR 199 [125] (Gummow and Hayne JJ)
citing Sedley LJ in Douglas v Hello! Ltd
as well as ‘sensory intrusions such as eavesdropping, wiretapping, and visual and [2001] QB 967 at 1001.
photographic spying’.131 130 Restatement (Second) of Torts § 652B
(1977).
131 Ruth Shulman v Group W Productions
(1998) 18 Cal 4th 200, 230–231; 955 P2d
469, 489; 74 Cal Rptr 2d 843, 863 citing
Restatement (Second) of Torts § 652B
cmt b (1977).
137
7
Chapter 7 Statutory Causes of Action
7.56 The tort has two elements:
•
•
intrusion into a private place, conversation or matter; and
in a manner highly offensive to a reasonable person.132
7.57 The requirement that the intrusion upon seclusion be ‘highly offensive to a
reasonable person’ means that the interference with seclusion must be substantial
and involve conduct that would elicit strong objection from a reasonable
person.133 An often-cited example is a press photographer who enters the hospital
room of a woman who has a rare illness and takes her photograph, even though
she previously objected to giving an interview.134
7.58 The intrusion itself subjects the defendant to liability, regardless of whether he or
she has published information gained from the intrusion.135 According to Andrew
McClurg: ‘this is important because it insulates the tort of intrusion from many of
the free speech obstacles that infiltrate the other privacy torts, most notably the
tort of public disclosure of private facts’.136
7.59 The US Supreme Court has held that the First Amendment to the US Constitution
prohibits actions for invasion of privacy where the published matter is truthful
and lawfully obtained information of legitimate public concern.137 By contrast,
the US Constitution provides only a limited right to gather information, which is
the right more directly implicated by intrusions into seclusion.138 Further, because
the ‘public interest test’ does not apply in the tort of intrusion, ‘it is technically
irrelevant whether the subject of intrusion is a public figure and/or whether
information acquired during the intrusion is a matter of public interest’.139
138 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
132 Ruth Shulman v Group W Productions
Tort of publicity given to private life (1998) 18 Cal 4th 200, 231; 955 P2d 469,
490; 74 Cal Rptr 2d 843, 864.
Elements 133 Restatement (Second) of Torts § 652B
7.63 The Restatements defines the tort of publicity given to private life in the following cmt d (1977).
134 Restatement (Second) of Torts § 652B
terms: cmt b, illus 1 (1977).
One who gives publicity to a matter concerning the private life of another 135 Restatement (Second) of Torts § 652B
cmts a–b (1977).
is subject to liability to the other for invasion of privacy, if the matter 136 McClurg, above n 128, 1070.
publicized is of a kind that 137 Cox Broadcasting Co v Cohn, 420 US 469
(1975); The Florida Star v BJF, 491 US 524
• would be highly offensive to a reasonable person, and (1989).
138 McClurg, above n 128, 1070–1.
• is not of legitimate concern to the public.147 139 Ibid 1078–1079.
7.64 Thus, like the tort of intrusion upon seclusion, the tort of publicity given to private 140 Ibid 999.
141 Prosser, above n 127, 391–2.
life requires that the information publicised is highly offensive to a reasonable
142 McClurg, above n 128,1026.
person.148 In contrast to the tort of unreasonable intrusion, however, publication
143 Restatement (Second) of Torts § 652B
is a necessary element of the tort of unreasonable publicity. cmt c (1977).
144 Restatement (Second) of Torts § 652B
7.65 The further requirement that the matter publicised is not of legitimate concern cmt c (1977).
to the public stems from concerns with freedom of the press, and the privilege 145 Harvey Martin and David Whitten v
Robert Patterson, individually, and d/b/a
under the common law to giving publicity to news, and other matters of public Patterson Construction (2007) 975 So 2d
interest.149 According to the Restatements, ‘when the matter to which publicity 984, 994.
is given is true, it is not enough that the publicity would be highly offensive 146 See eg, Galella v Onassis, 487 F2d 986
(2nd Cir, 1973); Nader v General Motors
to a reasonable person’.150 The US Supreme Court has found that the First Corporation, 255 NE 2d 765 (NY Ct
Amendment to the US Constitution prohibits actions for invasion of privacy where App 1970); Robert Gellman, ‘A General
Survey of Video Surveillance in the
the matter publicised is truthful and was lawfully obtained.151 United States’ in Sjaak Nouwt et al (eds)
Reasonable Expectations of Privacy?
Application in public places Eleven Country Reports on Camera
Surveillance and Workplace Privacy
7.66 Like the tort of seclusion, the tort of publicity is generally not available when (2005), 7, 32 citing Annotation, ‘Right of
Privacy—Surveillance’, 13 ALR 3rd (1967)
the information in question was gathered in a public place. According to the 1025, 1026.
Restatements 147 Restatement ( Second) of Torts § 652D
(1977).
there is no liability for giving further publicity to what the plaintiff himself 148 Keeton, above n 126, 857.
leaves open to the public eye. Thus he normally cannot complain when 149 Ibid 860.
his photograph is taken while he is walking down the public street and is 150 Restatement (Second) of Torts § 652D
cmt d (1977).
published in the defendant’s newspaper.152
151 Cox Broadcasting Co v Cohn 420 US 469
(1975); The Florida Star v BJF (1989) 491
Defences US 524, 541.
7.67 Leading commentators suggest that consent may be the only defence in actions 152 Restatement (Second) of Torts § 652D
cmt b (1977).
for invasion of privacy.153 Consent may not in fact be a true defence because one 153 Keeton, above n 126, 868.
element of the tort—an offensive invasion of privacy—could not be established if 154 Ibid 867.
the plaintiff had consented to the conduct in question.154 155 Restatement (Second) of Torts § 652H
(1977).
Remedies 156 Restatement (Second) of Torts § 652H
(1977).
7.68 In the US, a successful claim of invasion of privacy under common law entitles the 157 Robert Gellman, ‘A General Survey of
plaintiff to recover damages on three bases: Video Surveillance in the United States’,
in Sjaak Nouwt et al (eds) Reasonable
• the harm from the loss of privacy Expectations of Privacy? Eleven Country
Reports on Camera Surveillance and
Workplace Privacy (2005) 7, 34.
• mental distress reasonably suffered
• when there is cause for ‘special damages’.155
7.69 It remains unclear whether damages can be awarded in the absence of proof of
actual harm.156 Injunctions are not readily ordered.157
139
7
Chapter 7 Statutory Causes of Action
the law in canada
Statutory causes of action for invasion of privacy
7.70 There is no common law tort of invasion of privacy in Canada.158 However, four
provinces—British Columbia, Manitoba, Saskatchewan, and Newfoundland
and Labrador—have statutory causes of action for invasion of privacy.159 British
Columbia enacted the first Privacy Act in 1968, followed by Manitoba (1970),
Saskatchewan (1974), and Newfoundland and Labrador (1981).160
Defences
7.76 All four Acts list exceptions or defences to the cause of action. The common
exceptions or defences are:
• the plaintiff consented to the conduct
• the defendent’s conduct was incidental to the exercise of a lawful
right of defence of person or property
• the defendant’s conduct was authorised or required by law
• the defendent is a police or public officer who was engaged in
his/her duty and the conduct was neither disproportionate to the
matter being investigated nor committed in the course of a trespass
• if the defendant’s conduct involved publication, the publication was
privileged, fair comment or was in the public interest.
140 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.77 The Saskatchewan Privacy Act also contains a defence of acting in the scope of 158 Neither the Supreme Court of Canada
nor any provincial courts of appeal have
newsgathering, while the Manitoba Act has a defence for a person who neither endorsed a common law tort of invasion
knows, nor reasonably should have known, that the act in question would violate of privacy: Colin McNairn and Alexander
Scott, Privacy Law in Canada (2001) 45;
the privacy of any person. Simon Chester, Jason Murphy and Eric
Robb, ‘Zapping the Paparazzi: Is the Tort
Remedies of Privacy Alive and Well?’ (2003) 27
Advocates Quarterly 357, 360. However,
7.78 The Canadian statutes, other than the British Columbia Privacy Act, specify the some lower courts have been prepared
to do so. See eg, Somwar v MacDonald’s
remedies that a court may order for an unlawful invasion of privacy. Common Restaurants of Canada Ltd [2006] OJ No
remedies are: 64 as discussed in Alex Cameron and
Mimi Palmer, ‘Invasion of Privacy as a
• damages Common Law Tort in Canada (2009)
6(11) Canadian Privacy Law Review 105.
• an injunction 159 Privacy Act, RSBC 1996, c 373, Privacy
Act, RSM 1987, c P125, Privacy Act, RSS
• an order for the defendant to account to the plaintiff for profits in 1978, c P–24, Privacy Act, RSNL 1990,
c P–22. The province of Quebec, which
consequence of the violation is a civil rather than a common law
jurisdiction, has also enacted a statutory
• an order for the defendant to deliver the documents obtained in cause of action for invasion of privacy.
consequence of the violation. McNairn, above n 158, 66, citing Articles
35–40 of the Civil Code of Quebec, SQ
7.79 In British Columbia, damages are the only remedy that has been ordered by 1991, c 64.
160 McNairn, above n 158, 68, 70, 72.
the courts.167
161 Privacy Act, RSBC 1996, c 373, s 1(1).
162 Privacy Act, RSBC 1996, c 373, s 1(2).
Comment 163 McNairn, above n 158, 79 citing Davis v
7.80 There have been relatively few privacy cases in Canada. By 2001, there had been McArthur (1969) 10 DLR (3d) 250 (BCSC).
no more than 25 privacy cases under the four provincial statutes.168 Most of those 164 British Columbia Law Institute, Report
on the Privacy Act of British Columbia
cases had been taken under the British Columbia Privacy Act.169 BCLI Report No 49 (2008) 11 citing
Hollinsworth v BCTV (1998) 59 BCLR
7.81 The small number of cases may be due in part to the cost of litigation. For (3d) 121 (CA) and Getejanc v Brentwood
example, in British Columbia, jurisdiction is vested solely in the Supreme Court, College Association (2001) 6 CCLT (3d)
261 at [22] (BCSC).
where the high cost of bringing an action is a disincentive to litigation.170 165 McNairn, above n 158, 67.
166 Ibid 76.
other law reform commission recommendations 167 British Columbia Law Institute, above n
164, 40–1.
australian law reform commission 168 McNairn, above n 158, 73.
169 Chester, above n 158, 364.
7.82 The ALRC proposed a new statutory cause of action for serious invasion of
170 McNairn, above n 158, 70.
privacy in its report about protection of privacy in Australia.171 When the 171 Australian Law Reform Commission,
Australian Government announced its intention to implement many of the ALRC’s above n 2, 19.
recommendations in a document published in October 2009, it indicated it would 172 Australian Government, Australian
Government First Stage response to the
not respond to the recommendations concerning a new cause of action until an ALRC Report 108 (2009).
unspecified later date.172 173 Australian Law Reform Commission,
above n 2, rec 74–1.
7.83 The ALRC recommended a broad statutory cause of action for serious invasion of 174 Australian Law Reform Commission,
privacy.173 Although the ALRC did not seek to define ‘serious invasion of privacy’, above n 2 [74.119]. It appears that
‘unauthorised surveillance’ is surveillance
it did provide a non-exhaustive list of the circumstances that could give rise to the not authorised by any law. This
cause of action. They were: description probably includes most
surveillance that currently takes place
• if there has been an interference with an individual’s home or in Victoria.
family life
• if an individual has been subjected to unauthorised surveillance
• if an individual’s correspondence or private written, oral or electronic
communication has been interfered with, misused or disclosed
• if sensitive facts relating to an individual’s private life have
been disclosed.174
141
7
Chapter 7 Statutory Causes of Action
7.84 The ALRC concluded that a statutory cause of action was ‘the best way’ to
protect people from ‘unwanted intrusions into their private lives or affairs in
a broad range of contexts’.175 It supported legislative intervention because of
concern about ‘a lengthy period of uncertainty and inconsistency as the courts
refine the law in this area’.176 The ALRC suggested that a statutory cause of action
would overcome ‘the distinction between equitable and tortious causes of action,
and between the defences and remedies available under each’.177
Defences
7.89 The ALRC recommended that there be three defences to the proposed statutory
cause of action for serious invasion of privacy:
• where the act or conduct is incidental to the exercise of a lawful
right of defence of person or property
• where the act or conduct is required or authorised by or under law
• where publication of the information is subject to privilege under
the law of defamation.183
7.90 The ALRC suggested that defences that are commonly recognised in other
countries—such as consent, information in the public domain, and disclosure to
rebut an untruth—are subsumed within the elements of the cause of action. For
example, a person who consented to a particular course of conduct could not
have a reasonable expectation of privacy and nor could the defendant’s actions
be highly offensive to an ordinary person of reasonable sensibilities.184
142 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
Remedies 175 Australian Law Reform Commission,
above n 2 [74.117].
7.91 The ALRC’s proposed cause of action does not require proof of actual damage. 176 Ibid.
This means that proof of physical or economic harm is unnecessary and that 177 Ibid.
the cause of action extends to conduct that causes insult or humiliation. The 178 Ibid rec 74–2.
ALRC suggested that a successful plaintiff should have access to a wide range 179 Ibid rec 74–2.
180 See discussion at 7.16–7.33.
of remedies, including ordinary and aggravated damages (but not exemplary
181 Australian Law Reform Commission,
damages), an account of profits, an injunction, an order requiring the respondent above n 2 [74.144], [74.147].
to apologise to the claimant, a correction order, an order for the delivery up and 182 NSW Law Reform Commission, above
n 6 [7.24].
destruction of material, and a declaration. The ALRC did not recommend any
183 Australian Law Reform Commission,
limits to the amount of damages that could be awarded. Although the ALRC did above n 2 [74.169].
not directly address the matter, it seems apparent that the Federal Court and the 184 Ibid [74.174].
Federal Magistrates Court would exercise jurisdiction in these cases. 185 NSW Law Reform Commission, Invasion
of Privacy, Report No 120, (2009).
143
7
Chapter 7 Statutory Causes of Action
7.96 The NSWLRC suggested that the proposed cause of action should be
characterised as a statutory action rather than as a tort for two reasons. First,
it reasoned that the methodology of the cause of action is not that usually
associated with torts because they ‘do not generally require the courts to engage
in an overt balancing of relevant interests … in order to determine whether or not
the elements of the cause of action in question are satisfied’. Secondly, it argued
that the proposed cause of action ‘should not necessarily be constrained by rules
or principles generally applicable in the law of torts’.193
7.97 The NSWLRC identified two tort rules or principles that were of concern: the state
of mind of the wrongdoer and the extent to which actual damage forms part of
the cause of action. If the cause of action were characterised as a tort it would
be necessary to determine whether the wrongdoer’s conduct was intentional in
order to attract liability. Although the Commission was of the view that liability
should generally arise only where the conduct in question was intentional, it
preferred to leave the matter to the courts because there might be circumstances
in which a person should be held liable for reckless or negligent conduct, such as
when a doctor negligently discloses medical records. If the cause of action were
characterised as a tort it would also be necessary to determine whether it was
a tort that is actionable without proof of damage, such as trespass, or whether
actual proof of damage is necessary, as in the tort of negligence. The Commission
was of the view that this requirement of tort law ‘is inapposite to the statutory
cause of action, which is designed primarily to protect the plaintiff from suffering
non-economic loss, including mental distress’.194
Defences
7.98 The NSWLRC recommended that there should be five statutory defences to the
cause of action for invasion of privacy. These defences are similar to those found
in the Canadian provinces that have statutory causes of action. The defendant
bears the burden of proof in relation to the statutory defences, which are:
• D’s conduct was required or authorised by law
• D’s conduct was done in lawful defence of a person or property
• D’s conduct involved publication of information in circumstances
where under defamation law D could rely upon the defences of
absolute privilege or fair reporting
• D’s conduct involved publication of information as an employee or
agent of a subordinate distributor and D could not have reasonably
known that the publication constituted an invasion of privacy
• D’s conduct involved publication of information in circumstances
similar to those that attract the defence of qualified privilege in
defamation law and D’s conduct was not actuated by malice.195
7.99 There are no public interest defences in the draft legislation prepared by the
NSWLRC. Rather, in determining whether an individual’s privacy has been
invaded for the purposes of the action, a court must consider any relevant public
interest, including the interest of the public in being informed about matters of
public concern.196
144 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
193 Ibid [5.55].
Remedies 194 Ibid [5.57].
7.100 The NSW Commission proposes that a court be permitted to order a range of 195 Ibid 85–6.
statutory remedies, including compensatory damages, injunctive style prohibitory 196 Ibid 86.
orders and orders of a declaratory nature. The draft legislation caps the amount 197 Australian Law Reform Commission,
above n 2, rec 74–1.
of compensation that may be awarded for non-economic loss at $150 000, with 198 Submissions 2, 5, 7, 9, 12, 20, 27, 29,
this maximum figure being adjusted on an annual basis. Exemplary or punitive 33, 34, 35, 36, 37, 38, 40, 42, 44;
Consultations 4, 5, 9, 27.
damages are specifically excluded.
199 Submissions 27, 36, 38, 40, 42;
Consultation 5.
Jurisdiction 200 Submissions 16, 19, 22, 25, 28.
7.101 The NSWLRC proposed that the cause of action be created by state legislation 201 Submission 29; Consultation 5. See also
Submissions 5, 20.
as part of a uniform national law project. Jurisdiction should be vested in a state
202 Submission 29.
court of competent jurisdiction. 203 Submission 27.
7.102 The cause of action is available only to living ‘individuals’ or natural persons. Any
cause of action would not survive the death of the complainant. Proceedings
must be commenced within 12 months of the date upon which the cause of
action accrues unless a court extends that limitation period. Any extension cannot
exceed three years from the date upon which the cause of action accrued.
145
7
Chapter 7 Statutory Causes of Action
7.107 In some instances, submissions expressed the view that the introduction of a
statutory cause of action is preferable to waiting for the courts to develop the
cause of action as part of the common law.204 For example, the Victorian Privacy
Commissioner wrote:
Relying on the courts to recognise a cause of action for privacy may not
be the best approach, given the inherent limitations associated with the
courts only being able to consider particular matters brought before them
by parties resourced to access justice at the requisite level. In addition,
the courts would be limited by existing remedies developed within the
common law or equity.
Legislators have a better opportunity to craft a cause of action that is
more precisely targeted and which takes into account competing public
interests. Moreover, protection of a fundamental human right such as
privacy should not be dependent on the efforts of a particularly persistent
and well resourced plaintiff, to take an action all the way to the High Court
of Australia in order to definitively establish the existence of a cause of
action.205
7.108 Similarly, the Law Institute of Victoria noted that the evolution of common law
protection for privacy was ‘too slow and too limited’ to provide protection from
new surveillance technologies and other pressures on privacy protection such as
counter-terrorism.206
7.109 A number of submissions referred to the limited capacity of a cause of action
for serious invasions of privacy to control misuse of public place surveillance,
especially when compared to other regulatory measures.207 The Fitzroy Legal
Service, for example, acknowledged that a cause of action for serious invasions
of privacy could protect the rights of individuals, but also noted that it would not
address systemic discrimination, racial profiling, or harassment in the context of
surveillance in public places.208
7.110 The capacity of the proposed statutory cause of action to be useful to the
average person was questioned by some people. Some expressed concern that
the cause of action would probably assist only those individuals able to afford
the high cost of litigation.209 On the other hand, several people suggested that
judicial consideration of the cause of action would set useful precedents for
the entire community even if proceedings were taken only by the wealthy.210 It
was suggested that a high profile case would send an educative message about
acceptable use of surveillance in public places.211
7.111 Although there was considerable support for a statutory cause of action, some
organisations opposed the proposal that there be a cause of action for serious
invasions of privacy.212 For example, some noted that a cause of action for
invasion of privacy is best established at the federal level.213 One submission
suggested that the cause of action would alter the balance between privacy and
competing rights, including freedom of communication.214 Other organisations
said that the introduction of a statutory cause of action is ‘excessive’,215 and that
current regulation of the media sufficiently protects any potential infringement of
an individual’s privacy.216
7.112 The federal Privacy Commissioner, who supports development of a statutory
cause of action for invasion of privacy, encouraged ‘national consistency in the
regulation of surveillance’ and ‘ongoing collaboration between governments
to propose a cause of action that could be uniformly applied across all
jurisdictions’.217
146 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
204 Submissions 27, 29.
the commission’s recommendation: two statutory causes of action 205 Submission 29.
7.113 The commission is of the view that Victorians should be able to take civil action 206 Submission 27.
in response to threatened or actual serious invasions of privacy by the use of 207 Submissions 16, 19, 22, 25, 28.
208 Submission 34.
surveillance in a public place. Privacy is a value of increasing importance to
209 Consultation 5.
the entire community because it recognises and promotes human dignity. The 210 Submission 5; Consultation 5.
preamble to the Charter acknowledges that ‘all people are born free and equal in 211 Consultation 5.
dignity and rights’. 212 Submissions 19, 28.
213 Submissions 16, 21, 24.
7.114 The reach of current privacy law is limited. There are Commonwealth and state 214 Submission 28.
laws that regulate how public authorities and some larger businesses deal with 215 Submission 19.
matters concerning information privacy. The Surveillance Devices Act 1999 (Vic) 216 Submission 28.
(SDA) and the Summary Offences Act 1966 (Vic) regulate the most flagrant 217 Submission 35.
218 John Burrows, ‘Privacy and the Courts’
invasions of privacy by use of a surveillance device. The extent to which the (Address to the Privacy Forum, Hotel
common law protects privacy is unclear. Intercontinental, Wellington, New
Zealand, 27 August 2008) <www.privacy.
7.115 Although the commission believes the introduction of proper guidelines, coupled org.nz/assets/Files/PAW/10.-Speaker-
Professor-John-Burrows.doc > at
with appropriate education about their implementation, will be an effective 10 November 2009.
means of promoting responsible use of public place surveillance, new civil 219 See Campbell v MGN [2004] 2 AC 457
causes of action are warranted because, inevitably, some people will choose not [16]–[20] (Lord Nicholls), [49]–[50] (Lord
Hoffmann; Hosking v Runting [2004]
to follow the guidelines. The possibility of civil action ‘can create a climate of NZCA 34 [2]–[6] (Gault P and Blanchard J).
restraint which ensures that serious breaches do not happen in the first place’, 220 The remedies available in the general law
action for breach of confidence were
and can provide a unique response in particularly serious cases which require ‘an recently clarified by the Victorian Court of
injunction to stop an offensive publication happening in the first place’.218 Appeal in Giller v Procopets [2008] 40 Fam
LR 378. This decision is discussed in Robert
7.116 There is a clear gap in the current regulatory regime. Although the criminal law deals Dean, ‘Sex, Videotape and the Law’
(2009) 83.08 Law Institute Journal 52.
with the most offensive invasions of privacy, there is no parallel civil cause of action 221 Charter of Human Rights and
for people harmed by that behaviour. There is also no right of action for serious Responsibilities Act 2006 (Vic) s 13.
misuse of a surveillance device that falls short of criminal conduct. The Victorian 222 While the Charter does not contain any
express provision that directs the courts to
Privacy Commissioner informed the commission that people contact her office with consider human rights when developing
complaints about interferences with spatial privacy or misuse of private information the common law in light of changing
social conditions (cf section 32 of the
for which for there is no redress under Victorian and Commonwealth law. Charter, which deals with interpretation
of statutory provisions), the courts could
7.117 Events in other comparable countries suggest that the courts will face increasing quite properly consider ‘the human
pressure to develop a response to misuse of surveillance devices in a public place rights that Parliament specifically seeks to
protect and promote’ (section 7(1) of the
unless there is appropriate legislation. The developments in other common law Charter) when doing so.
countries, most notably the UK and New Zealand, suggest it will take a long time
before a reasonably clear body of law emerges. Until that time, many people and
organisations with a direct interest in the evolution of privacy causes of action will
face substantial legal compliance costs to satisfy themselves that their proposed
activities are lawful. The UK experience suggests a few pioneering plaintiffs, and
some media organisations, will outlay significant sums of money in legal costs
to develop the general law through the courts. This means of developing an
important aspect of our law should be avoided if possible.
7.118 It is open to both the High Court and the Victorian Court of Appeal to recognise
causes of action for wrongful publication of private information and for intrusion
upon seclusion in the absence of any legislative action. This outcome could be
achieved by following long recognised principles about the process by which the
common law evolves. It is important to note that both the House of Lords and the
New Zealand Court of Appeal were influenced by human rights principles when
developing a cause of action for wrongful publication of private information.219
The Victorian Court of Appeal may follow a similar course.220 That Court might
be asked to consider what effect, if any, the right to privacy in the Victorian
Charter221 should have upon the common law as that body of law responds to
changing social conditions.222
147
7
Chapter 7 Statutory Causes of Action
7.119 Former High Court Chief Justice Sir Anthony Mason has suggested that a human
rights charter guaranteeing a right to privacy ‘could provide a platform for the
development of a common law right’.223 Although the extent to which the
High Court should, or may, consider the rights in the Victorian Charter when
developing the Australian common law is a complex question, it can consider
the right to privacy in international human rights instruments ratified by the
Australian Government when doing so.224
7.120 The commission believes there should be two overlapping statutory causes of
action for some serious invasions of privacy caused by misuse of a surveillance
device in a public place. As national harmony of privacy law is likely to be a
long-term goal, Victoria is well placed to demonstrate leadership in this area.
The Charter is a useful catalyst for legislative action because ‘privacy’225 is one
of the human rights that ‘Parliament specifically seeks to protect and
promote’.226
7.121 The evidence from within Australia and other comparable countries suggests
that there is unlikely to be a flood of litigation in response to the creation of any
new causes of action for invasion of some privacy interests. There have been
very few Australian cases in the eight years since the High Court indicated in
Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd that there were
no common law barriers to the development of a cause of action for invasion of
privacy.227 In New Zealand there have been approximately 15 privacy cases since
1985228 and Sir David Eady, the English High Court judge who has presided in
some of the most significant privacy cases in that country, has recently written
that after an early flurry of activity ‘things seem to have settled down to a large
extent’.229 He suggests this may mean ‘that journalists and their lawyers have
developed a feel for what is now acceptable to the general public (and to the
courts) and what is not’.230
7.122 The commission believes that access to any causes of action for invasion of privacy
should not be restricted to the few wealthy people who can afford the legal
fees involved in court proceedings and have the financial capacity to accept the
risk involved in any litigation. At the same time, senior judicial officers who have
experience in weighing competing interests and shaping the law should hear the
more difficult cases. The Victorian Civil and Administrative Tribunal (VCAT) is an
ideal forum for these purposes because it is a low cost jurisdiction comprised of a
broad range of judicial officers headed by a Supreme Court judge.
7.123 The commission believes it is not desirable for there to be one statutory cause
of action for all serious invasions of privacy because the concept of privacy is
too broad and imprecise to be of use when creating legal rights and obligations.
Many appellate court judges and academic commentators have warned of the
difficulty in devising a workable legal definition of privacy. In Lenah Game Meats
Gleeson CJ said that ‘the lack of precision of the concept of privacy is a reason for
caution in declaring a new tort’,231 while Justices Gummow and Hayne referred to
the ‘difficulties in obtaining in this field something approaching definition rather
than abstracted generalisation’.232 Members of the House of Lords233 and the New
Zealand Court of Appeal234 made similar comments when rejecting invitations to
devise a broad tort of invasion of privacy.
148 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.124 Two internationally recognised academic commentators on privacy law, Daniel 223 Anthony Mason, ‘Legislative and
Judicial Law-Making: Can we locate
Solove and Raymond Wacks, make similar points. Solove suggests that while an identifiable boundary?’ (2003) 24
‘privacy is an issue of profound importance around the world’,235 it is ‘a concept Adelaide Law Review 15, 35–6.
224 See eg, International Covenant of Civil
in disarray’ because ‘nobody can articulate what it means’.236 He argues that and Political Rights Art 17.
because ‘we should understand privacy as a set of protections against a plurality 225 Charter of Human Rights and
of distinct but related problems’237 it is advisable to identify particular types of Responsibilities Act 2006 (Vic) s 13.
226 Charter of Human Rights and
privacy problems when considering regulation. Two of Solove’s privacy problem Responsibilities Act 2006 (Vic) s 7(1).
areas—information dissemination and invasion—are of particular relevance 227 Australian Broadcasting Corporation v
when considering new statutory causes of action involving misuse of surveillance Lenah Game Meats Pty Ltd (2001) 208
CLR 199 [107] (Gummow and Hayne JJ).
devices. According to Solove, ‘information dissemination involves the transfer 228 Burrows, above n 218.
and publicizing of personal data’ and ‘invasion involves interference with one’s 229 David Eady (Speech delivered at
personal life’.238 the University of Hertfordshire,
10 November 2009) <www.judiciary.
7.125 Wacks suggests that one of the reasons why a tort of privacy has not evolved as gov.uk/docs/speeches/justice-eady-
univ-of-hertfordshire-101109.pdf> at
part of the English common law is the lack of a coherent and consistent meaning 20 April 2010.
of the notion of privacy.239 He argues that it is more constructive to identify the 230 Ibid.
specific interests the law ought to protect and suggests that ‘at the core of the 231 (2001) 208 CLR 199 [41].
232 (2001) 208 CLR 199 [116].
preoccupation with the “right to privacy” is protection against the misuse of
233 Wainwright v Home Office [2004] 2 AC
personal, sensitive information’.240 406 (Lord Hoffmann).
234 Hosking v Runting [2005] 1 NZLR 1 (Gault
7.126 The commission believes there should be two overlapping statutory causes of P and Blanchard J).
action concerning the privacy interests most likely to be adversely affected by 235 Daniel Solove, Understanding Privacy
(2008) 2.
the misuse of public place surveillance. Those causes of action should deal with
236 Ibid 1.
misuse of private information and what is often referred to as intrusion upon
237 Ibid 171.
seclusion, or unwarranted interference with spatial privacy. Legislating to protect 238 Ibid 172.
these broadly recognised sub-categories of privacy is likely to promote greater 239 Raymond Wacks, ‘Why there will never be
clarity about the precise nature of the legal rights and obligations that have been an English common law privacy tort’, in
Andrew T Kenyon and Megan Richardson
created than by creating a broad civilly enforceable right to privacy. (eds) New Dimensions in privacy
law: International and Comparative
Perspectives (2006) 183.
22. There should be two statutory causes of action dealing with serious invasion
of privacy caused by misuse of surveillance in a public place.
149
7
Chapter 7 Statutory Causes of Action
7.129 The gist of this cause of action is the misuse of private information. In most,
but not necessarily all, cases the misuse of private information will involve
some form of publication. This may range from photocopying documents and
distributing them to others, to broadcasting footage on television or posting it
on the internet. Whether the private information in question has been misused
is best determined by the application of an objective test rather than by relying
solely upon the views of the person to whom the information relates. Again, this
approach means that the tribunal should consider values and attitudes widely
held throughout the community before deciding whether the use of the private
information was highly offensive. Examples of the sort of behaviour that could fall
within this cause of action because the use of the private information was highly
offensive to a reasonable person include publishing footage of a person entering
an abortion clinic or a hospice for the dying.
recommendation
23. The first cause of action should deal with serious invasion of privacy by
misuse of private information.
150 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
241 The offence of ‘upskirting’ is dealt with
recommendation in sections 41A and 41B of the Summary
Offences Act 1966 (Vic), while using
24. The second cause of action should deal with serious invasion of privacy by a listening device to monitor a private
intrusion upon seclusion. conversation is an offence under section 6
of the Surveillance Devices Act 1999 (Vic).
242 Mendelson, The New Law of Torts, above
n 11. See esp Ch 19 for a discussion of
statutory causes of action the law of breach of statutory duty.
243 NSW Law Reform Commission, above
7.134 The commission believes that any new causes of action should be statutory n 6 [1.5].
causes of action rather than torts. As the NSWLRC pointed out, there is little 244 See Mendelson, The New Law of Torts,
above n 11. See esp Ch 1 for a discussion
to be gained—and many complex rules of law to be navigated—if any new of classification in the law of torts.
cause of action is characterised as a tort.243 Integration within the law of torts 245 Ibid esp Ch 21 for a discussion of
would involve classification of the cause of action as one that is either actionable remedies and Ch 22 for a discussion of
the different types of liability in the law
without proof of damage or that requires proof of damage.244 It would also of torts.
involve incorporation of the detailed rules that have arisen in tort law concerning 246 Commissioner of Police v Estate of Russell
(2002) 55 NSWLR 232 [70]–[75].
remedies and the various types of liability that may attach to actual wrongdoers 247 Australian Law Reform Commission,
and to those persons who are legally liable for the actions of others.245 above n 2, 127.
248 Ibid [74.135].
7.135 Chief Justice Spigelman of the NSW Supreme Court has suggested that ‘torts’ refer 249 Ibid [74.135].
to rights or causes of action generally enforceable in courts. As the commission 250 Submission 27.
recommends that jurisdiction in these new causes of action be vested solely in a 251 Submission 27.
tribunal, this observation about the ‘usual’ venue for torts is another reason why it
is preferable to characterise them as statutory causes of action rather than torts.246
elements
7.136 A number of submissions and consultations supported the creation of a cause of
action for serious invasions of privacy but criticised aspects of the model proposed
by the ALRC.
151
7
Chapter 7 Statutory Causes of Action
7.141 According to the LIV, the application of the concept of reasonableness together
with the public interest test ‘would provide appropriate limits on the cause of
action, such as the right to freedom of expression’.252
7.142 The commission believes that as legal protections for privacy develop, we should
ensure that minor or trivial invasions do not divert attention away from the more
significant cases. This is best done by including an element that a reasonable
person of ordinary sensibilities must find the defendant’s conduct to be highly
offensive. In other new areas of law, such as racial and religious vilification, there
are intensifiers in the statutory language used to describe unlawful conduct.
Sections 7 and 8 of the Racial and Religious Tolerance Act 2001 (Vic) prohibit
conduct that incites serious contempt for, or severe ridicule of, people on racial
and religious grounds. Presumably, this language has been used with the aim
of ensuring that important new social policies are not undermined by adverse
community responses to inconsequential claims.
7.143 The commission believes that the elements of the cause of action for serious
invasion of privacy caused by misuse of private information should be:
• D (the defendant) misused, by publication or otherwise, information
about P (the plaintiff) in respect of which he/she had a reasonable
expectation of privacy; and
• a reasonable person would consider D’s misuse of that information
highly offensive.
7.144 Similarly, the commission believes the elements of the cause of action for serious
invasion of privacy caused by intrusion upon seclusion should be:
• D intruded upon the seclusion of P when he/she had a reasonable
expectation of privacy; and
• a reasonable person would consider D’s intrusion upon P’s seclusion
highly offensive.
152 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
252 Submission 27.
recommendations 253 Privacy Act, RSBC 1996, c 373, s 1(1);
Privacy Act, RSS 1978, c P–24, s 2; Privacy
25. The elements of the cause of action for serious invasion of privacy caused by Act, RSNL 1990, c P–22, s 3(1).
misuse of private information should be: 254 Submission 38.
255 Victorian Law Reform Commission,
a. D misused, by publication or otherwise, information about P in respect Surveillance in Public Places: Consultation
of which he/she had a reasonable expectation of privacy; and Paper Consultation Paper 7 (2009)
[6.168].
b. a reasonable person would consider D’s misuse of that information 256 Australian Law Reform Commission,
highly offensive. above n 2 [74.169]. As noted above, a
public interest justification for the invasion
26. The elements of the cause of action for serious invasion of privacy caused by of privacy is not a defence to the cause of
action because it is to be considered by
intrusion upon seclusion should be: the court at an earlier stage in deciding
whether the cause of action is made out.
a. D intruded upon the seclusion of P when he/she had a reasonable 257 Keeton, above n 126, 867–8, stating
expectation of privacy; and ‘It has been said that chief among the
defences at common law is the plaintiff’s
b. a reasonable person would consider D’s intrusion upon P’s seclusion consent to the invasion’ and that
‘[o]ther defences have appeared only
highly offensive. infrequently’ in the surveyed case law;
also Helen Fenwick and Gavin Phillipson,
Media Freedom Under the Human Rights
Act (2006) 772 stating that in the UK, the
Defences most often invoked are implied consent
(or ‘waiver’) and press freedom (or
7.149 Our Consultation Paper proposal for a statutory cause of action for serious invasions freedom of expression).
of privacy listed the three defences recommended by the ALRC,255 namely: 258 Australian Law Reform Commission,
above n 2 [74.174].
• where the act or conduct is incidental to the exercise of a lawful 259 NSW Law Reform Commission, above
n 185 [5.46]; see also clause 74(4) of the
right of defence of person or property Commission’s draft bill.
Consent
7.151 In the US and the UK, consent is one of the most commonly used defences in
privacy actions.257 Consent is also an important defence in the Canadian Privacy Acts.
7.152 The ALRC did not include consent as a defence to its proposed cause of action
because it believed it was unnecessary to do so. It reasoned that if a ‘claimant
had consented to the invasion of his or her privacy … it is unlikely that the
elements of the cause of action would be satisfied’ as there would be no
reasonable expectation of privacy and the conduct of the defendant would not
be highly offensive.258
7.153 The NSWLRC included lack of consent as an element of its proposed cause of
action.259 This means that the plaintiff would bear the burden of proof in relation
to the issue of consent.
153
7
Chapter 7 Statutory Causes of Action
7.154 The commission is of the view that consent should be an express defence to
both proposed causes of action. The defendant, rather than the plaintiff, should
carry the burden of proving that his or her conduct was justified by the plaintiff’s
consent. To do otherwise is to force the plaintiff to engage in the difficult task of
proving a negative.
154 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.164 As the defences in defamation law seek to 260 Privacy Act, RSBC 1996, c 373, s 2(2)(b); 269 Privacy Act, RSBC 1996, c 373, s 2(2)(d);
Privacy Act, RSM 1987, c P125, s 5(c); Privacy Act, RSM 1987, c P125, s 5(e);
strike a balance between protection of a Privacy Act, RSS 1978, c P–24, s 4(1)(b); Privacy Act, RSS 1978, c P–24, s 4(1)(d);
plaintiff’s reputation and freedom of speech, Privacy Act, RSNL 1990, c P–22, s 5(1)(b). Privacy Act, RSNL 1990, c P–22, s 5(1)(d).
261 Australian Law Reform Commission, 270 Not a defence in defamation cases under
they may also be usefully employed when above n 2, rec 74–4(a); NSW Law Reform the common law where truth alone is a
seeking to strike a balance between privacy and Commission, above n 185 [6.2]. defence. Patrick George, Defamation Law
in Australia (2006) 243.
freedom of speech. 262 McNairn, above n 158, 84–5 citing United
Food and Commercial Workers, Local 271 Mendelson, The New Law of Torts, above
1400 v Saskatoon Co-operative Assn Ltd n 11, 579.
Privilege (1992) 101 Sask R 1 (QB). 272 Defamation Act 2005 (Vic) ss 6(1)–(2).
7.165 A privilege can be absolute or it can be 263 British Columbia Law Institute, above 273 George, above n 270, (2006) 260.
n 164, 14.
qualified. Examples of absolute privilege include 264 NSW Law Reform Commission, above
274 Ibid 269.
275 Ibid quoting from the High Court in
statements made by a member of parliament n 185, 86.
Roberts v Bass (2002) CLR 1, 26.
and by participants in court proceedings.273 265 McNairn, above n 158, 84–5 citing United
276 Privacy Act, RSBC 1996, c 373, s 2(3)(b);
Food and Commercial Workers, Local
By contrast, a qualified privilege requires 1400 v Saskatoon Co-operative Assn Ltd Privacy Act, RSM 1987, c P125, s 5(f)(ii);
(1992) 101 Sask R 1 (QB) and Druken Privacy Act, RSS 1978, c P–24, s 4(2)(b),
the defendant to show that he or she had v RG Fewer and Associates Inc (1998) Privacy Act, RSNL 1990, c P–22, s 5(2)(b).
a legitimate duty and interest to publicise 171 Nfld & PEIR 312 (Nfld TD). See also 277 NSW Law Reform Commission, above
Ireland Law Reform Commission, Privacy: n 185, [6.2].
the private matter.274 The law protects Surveillance and the Interception of 278 Australian Law Reform Commission,
such revelations because they promote the Communications Report 57 (1998) 132 above n 2, rec 74–4.
where, under the defence of ‘fulfilling a
welfare of society.275 Sections 27 and 30 of legal duty, or exercising a legal power,
279 Lord Nicholls suggested that this issue
may fall within one of the elements of
the Defamation Act 2005 (Vic) provide for a or defending or maintaining a legal
the cause of action because it may affect
right’, the Law Reform Commission of
defence of absolute and qualified privilege, Ireland includes as an example where one
the reasonableness of the claimant’s
expectation of privacy (Campbell v MGN
respectively, in any cause of action for employs a private detective to investigate
[2004] 2 AC 457 [24]).
another for the purpose of defending or
defamation in Victoria. maintaining a civil action. 280 See George, above n 270, Ch 22.
266 Privacy Act, RSBC 1996, c 373, s 2(2)(c); 281 Ibid.
7.166 Privilege is a defence in the Canadian Privacy Privacy Act, RSM 1987, c P125, s 5(d); 282 Ibid 338.
Acts,276 and the NSWLRC277 and ALRC proposed Privacy Act, RSS 1978, c P–24, s 4(c); 283 Ibid 338–9.
Privacy Act, RSNL 1990, c P–22, s 5(1)(c).
causes of action.278 It is a defence to the Law 284 Ibid 339.
267 Australian Law Reform Commission,
Reform Commission of Ireland’s proposed tort above n 2, rec 74–4(b); NSW Law Reform
of disclosure of information obtained by privacy Commission, above n 185 [6.2].
268 As noted by Australian Law Reform
invasive surveillance. A ‘defence’279 similar to Commission, above n 2 [74.171] and
the defence of qualified privilege in defamation NSW Law Reform Commission, above
n 185 [6.3].
law280 may be available in the UK cause of action
for misuse of private information. Finally, the
New Zealand Law Commission has suggested
that actions that are privileged should be a
defence to the New Zealand tort if they do not
fall within the broad defence of legitimate public
concern recognised in Hosking v Runting.281
155
7
Chapter 7 Statutory Causes of Action
7.168 The Defamation Act 2005 (Vic) provides for a defence of honest opinion, which,
though largely intended to reflect the common law, differs in some respects from
the defence of fair comment.285
7.169 Fair comment is a defence in the Canadian Privacy Acts286 and the NSWLRC
proposal.287 By contrast, the ALRC proposal does not include fair comment as
a separate defence, as it is subsumed within the public interest test that is an
element of the proposed cause of action.288
Public interest
7.170 In contrast to privilege and fair comment, where the primary concern is protection
of communications, the defence of public interest may involve other matters of
community concern that might justify an intrusion into privacy. The Law Reform
Commission of Ireland lists the following four specific, but non-exhaustive,
strands in their public interest defence:
• the detection and prevention of crime
• the exposure of illegality or serious wrongdoing
• informing the public on a matter of public importance
• preventing the public from being misled by the public utterances of
public figures (broadly defined) where private beliefs and behaviour
are directly at variance with the same.289
7.171 Freedom of expression remains a central reason for any public interest defence.290
For example, the New Zealand tort of invasion of privacy by publication of private
facts includes the defence that the publication concerned a matter of legitimate
public concern.291
7.172 The public interest defence appears in other existing and proposed statutory causes
of action for invasion of privacy. In the case of the Canadian Privacy Acts,292 and the
proposal of the Law Reform Commission of Ireland, the defence is limited to where
there has been a publication, and so may not apply where there is surveillance
without publication of the material. By contrast, in the proposals of the NSWLRC
and the ALRC, where the cause of action is not limited to publication of private
matters, the defence would likely apply to mere surveillance activities.293
7.173 The commission is of the view that, when devising new causes of action
concerning invasion of privacy, it is important to protect revelations that would
fall within the defences of privilege and honest opinion (fair comment) in
defamation law. If some statements merit protection because of their value to
the community, even when they are defamatory, it is strongly arguable that they
should be similarly protected, even when they are invasive of privacy. Because
the defences of privilege and fair comment are concerned with the publication of
information, they would apply only to the proposed cause of action concerned
with misuse of private information.
7.174 The public interest in protecting revelations of particular forms of conduct, such
as abuse of the powers associated with public office, is widely acknowledged,
even when it involves some invasion of privacy. The public interest defence should
apply to both recommended causes of action. It is not logical to limit this defence
to those cases that involve publication of private information because otherwise
people would be encouraged to publish everything they discover that may be
invasive of privacy in order to avail themselves of the defence. There will be
occasions in which it ought to be possible for investigative journalists, and others,
to rely upon a defence of public interest when their conduct would otherwise be
an intrusion upon a person’s seclusion.
156 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.175 There are different approaches to the question of which party should bear the 285 Mendelson, above n 11, 616, 622–3.
286 Privacy Act, RSBC 1996, c 373, s 2(3)(a);
burden of proof when the public interest is a relevant issue in a privacy dispute. Privacy Act, RSM 1987, c P125, s 5(f)(iii);
Privacy Act, RSS 1978, c P–24, s 4(2)(a);
7.176 In an action under the New Zealand tort, the defendant bears the onus of Privacy Act, RSNL 1990, c P–22, s 5(2)(a).
establishing there is a legitimate public concern in the publication of otherwise 287 NSW Law Reform Commission, above
private facts.294 The defendant also bears the onus of proof of public interest under n 185, [6.2].
288 Australian Law Reform Commission,
the Canadian Privacy Acts and the Law Reform Commission of Ireland proposal. above n 2, [74.170].
7.177 In the US the plaintiff bears the burden of proof in actions for the tort of publicity 289 Law Reform Commission [Ireland],
above n 265, 36; Australian Law Reform
given to private life. A plaintiff must show that the matter publicised is highly Commission, above n 2 [8.10]; NSW Law
Reform Commission, above n 185, [6.2].
offensive to a reasonable person, and that it is not of legitimate concern to the
290 Australian Law Reform Commission,
public.295 Although the public interest is not a defence to the UK cause of action above n 2 [74.147].
for misuse of private information, the second element of the action requires a 291 Hosking v Runting [2005] 1 NZLR
1[129]–[130] (Gault P and Blanchard J).
court to balance the right to press freedom and the right to privacy.296
292 Privacy Act, RSBC 1996, c 373, s 2(3)(a);
7.178 As both the ALRC and NSWLRC proposals treat the public interest as an Privacy Act, RSM 1987, c P125, s 5(f)(i);
Privacy Act, RSS 1978, c P–24, s 4(2)(a);
element of their causes of action—the plaintiff bears the burden of proof in Privacy Act, RSNL 1990, c P–22, s 5(2)(a).
relation to this matter. For example, under the NSWLRC proposed cause of 293 Australian Law Reform Commission,
above n 2 [74.170], where it is an
action, a court is required to consider ‘any relevant public interest (including the element rather than a defence.
interest of the public in being informed about matters of public concern)’ when 294 New Zealand Law Commission, above
deciding whether an individual’s privacy has been invaded.297 In the case of the n 6, [6.63].
295 Restatement (Second) of Torts § 652D
ALRC proposal, a court must take into account ‘whether the public interest in (1977).
maintaining the claimant’s privacy outweighs other matters of public interest 296 Helen Fenwick and Gavin Phillipson,
(including the interest of the public to be informed about matters of public Media Freedom Under the Human Rights
Act (2006) 771.
concern and the public interest in allowing freedom of expression)’.298 297 Ibid 86, citing NSWLRC Draft Civil Liability
Amendment (Privacy) Bill 2009
7.179 The submission from legal academic David Lindsay expressed concern that s 74(2).
requiring the plaintiff to establish that there is no countervailing public interest 298 Australian Law Reform Commission,
(such as freedom of expression) may be too high a burden because it requires the above n 2, rec 74–2.
299 Consultation 5.
plaintiff to prove a negative. 299
300 George, above n 270, 338–9.
7.180 The commission believes that a plaintiff should not have to prove a negative, such 301 David Morrison and Michael Svennevig,
‘The Defence of Public Interest and
as the lack of a countervailing public interest. The defendant should carry the the Intrusion of Privacy’ (2007) 8 (1)
burden of proof in relation to the public interest defence. The defendant should Journalism 44, 55.
be required to introduce evidence (if necessary) and satisfy the tribunal that it was 302 Ibid 45.
303 Jennifer Mullaly, ‘Privacy: Are the
in the public interest to engage in conduct that would otherwise be unlawful. Media a Special Case?’ (1997) 16 (1)
Communication Law Bulletin 10, 11.
7.181 In Canada and New Zealand the defendant has the burden of proof in relation
to the public interest. In other areas of law involving statutory causes of action
the defendant carries the burden of proof with respect to public interest
considerations. Vilification law is an example in point. Under section 11 of the
Racial and Religious Tolerance Act 2001 (Vic) the defendant must establish that
conduct which would otherwise be racial or religious vilification was justified
because it was in the public interest. In the law of defamation, public interest
considerations are dealt with as a defence rather than as one of the elements of
the cause of action that must be negatived by the plaintiff.300
7.182 The defence that publicity given to a private matter is justified because it concerns a
matter of public interest begs the question: What is a matter of public interest? There
is no settled and clear definition of public interest.301 Rather, more commonly, there
are categories believed to cover what may fall within public interest,302 including:
• information needed by the public to evaluate a government official’s
fitness for office
• information for the exposure of crime, corruption and other
wrongdoing in public life
• other information affecting the public at large.303
157
7
Chapter 7 Statutory Causes of Action
7.183 There are different perspectives about whether publication of any matter
of interest to the public should constitute a defence to invasion of privacy.
The approach of treating any subject matter that is of interest to the public
as a matter of public concern is seen in the United States, where the law
regards whatever the media consider to be worthy of print or broadcast as
‘newsworthy’.304 This approach does not distinguish between speech about
celebrities’ lives and the lives of politicians, and speech about public figures and
people cast into the public spotlight.305
7.184 Supporters of the approach of equating all speech with matters of public interest
can point to several justifications for their stance. These include: the difficulty
of distinguishing between speech of a ‘public interest’ nature and that which is
not;306 the fact that there may never be consensus on what constitutes the public
interest;307 the fact that information about celebrities’ lives could serve a social
function, because people can model their lives on the choices celebrities make;308
and finally, if there is no consensus on what constitutes the public interest, who
should be assigned the task of deciding what it is?309
7.185 An alternative approach avoids equating the public interest with matters that may
interest the public.310 A notable example is the 2004 decision of the European
Court of Human Rights in Von Hannover v Germany.311 In this case, the Court
concluded that Princess Caroline of Monaco’s right to private life had been
breached following publication of photographs of her in public places engaged in
activities such as shopping and practising sport.312 The Court deemed the freedom
of interest values at stake to be minimal: the photos did not contribute to any
debate of general interest to society, but merely satisfied the curiosity of readers
about her private life.313
7.186 Some existing and proposed causes of action for invasion of privacy attempt to
exclude matters that are merely of interest to a public curious about the private
lives of others from the ambit of the defence of public interest. For example,
the draft legislation proposed by the Law Reform Commission of Ireland states
that a disclosure ‘is not in the public interest merely because the object of such
surveillance, or such information or material, is or would be newsworthy’.314
7.187 The commission is of the view that not all matters of interest to the public are
matters of public interest that ought to deprive a person of their right to privacy.
In particular, the public interest defence ought not to extend to matters that
satisfy a curiosity about the private lives of others, but serve no other purpose
relevant to the common good. Tribunals and courts should be aware of this
important point when interpreting and applying the proposed new laws.
158 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
304 Camrin Crisci, ‘All the World is Not
recommendations a Stage: Finding a Rights to Privacy
in Existing and Proposed Legislation’
27. The defences to the cause of action for serious invasion of privacy caused by (2002) 6 New York University Journal
misuse of private information should be: of Legislation and Public Policy 207,
219–20. See also Restatement (Second)
a. P consented to the use of the information of Torts § 652D cmt g (1977) stating:
‘To a considerable extent, in accordance
b. D’s conduct was incidental to the exercise of a lawful right of defence with the mores of the community,
the publishers and broadcasters have
of person or property, and was a reasonable and proportionate themselves defined the term [news]’.
response to the threatened harm 305 Ibid 225.
306 Morrison, above n 301, 55.
c. D’s conduct was authorised or required by law 307 Ibid 48.
308 See Richard Posner, ‘The Right of Privacy’
d. D is a police or public officer who was engaged in his/her duty and (1978) 12 Georgia Law Review 393, 396;
the D’s conduct was neither disproportionate to the matter being Crisci, above n 304, 217.
investigated nor committed in the course of a trespass 309 Ibid 209.
310 Morrison, above n 301, 44.
e. if D’s conduct involved publication, the publication was privileged or 311 Von Hannover v Germany 59320/00
fair comment [2004] VI Eur Court HR [61].
312 Von Hannover v Germany 59320/00
f. D’s conduct was in the public interest, where public interest is a limited [2004] VI Eur Court HR [61].
concept and not any matter the public may be interested in. 313 Von Hannover v Germany 59320/00
[2004] VI Eur Court HR [65].
28. The defences to the cause of action for serious invasion of privacy caused by 314 Law Reform Commission [Ireland], above
n 265, 129.
intrusion upon seclusion should be:
315 Submission 27.
a. P consented to the conduct 316 Submission 27.
317 Submissions 10, 11, 21.
b. D’s conduct was incidental to the exercise of a lawful right of defence 318 Submission 28.
of person or property, and was a reasonable and proportionate 319 Submission 27.
response to the threatened harm 320 Submission 21.
321 Submission 21.
c. D’s conduct was authorised or required by law
d. D is a police or public officer who was engaged in his/her duty and
the D’s conduct was neither disproportionate to the matter being
investigated nor committed in the course of a trespass
e. D’s conduct was in the public interest, where public interest is a limited
concept and not any matter the public may be interested in.
Exemptions?
7.190 In their submissions to the commission, some organisations suggested that they,
or their members, should be exempted from any new causes of action.317 For
example, Australia’s Right to Know, a coalition of major media organisations, wrote:
There is no need for any additional privacy rights or remedies in Australia.
If any need for an additional privacy right or remedy is identified in future,
it should be very clearly and narrowly defined and there should be a broad
media exemption.318
7.191 The LIV opposed a media exemption, arguing that the balancing test in the cause
of action was sufficient to protect media activities.319
7.192 The Insurance Council of Australia argued that exemptions were required for the
legitimate need of insurers to undertake surveillance.320 According to the Council,
its ‘members have a vital interest in being able to undertake surveillance in public
places, for example to assess a personal injury claim (particularly for Compulsory
Third Party and workers’ compensation claims) and in defence of a decision to
decline a claim’.321
159
7
Chapter 7 Statutory Causes of Action
7.193 Another group seeking an exemption was Victoria Police, who suggested police
officers acting for a lawful purpose in the course of their duties should be
protected from liability.322
7.194 The commission’s view is that no organisations or classes of people should be
exempted from the proposed statutory causes of action. The defences adequately
protect people engaged in legitimate activities from unmeritorious actions for
serious invasion of privacy.
remedies
7.195 A remedy is a step or an action that a defendant is ordered to take, such as
the payment of damages, once a court or tribunal finds that a wrong has been
committed.
Damages
7.196 The most common remedy in civil actions is an order for the payment of
damages. In the law of torts, damages means a court order that the defendant
compensate the plaintiff monetarily for the harm caused by the defendant’s
wrongful conduct.323 Damages are usually awarded to restore a plaintiff, to the
extent money can do so, to the position he or she would have been in had the
wrong not been committed.324 Damages of this nature are compensatory.
7.197 By contrast, exemplary (or punitive) damages are designed to punish the
defendant for particularly reprehensible conduct and to deter him or her (and
others) from acting in this way in the future.325
7.198 Although exemplary damages are part of Australian law, they are rarely awarded,
and only if the defendant engaged in conscious wrongdoing in flagrant disregard
of the plaintiff’s rights.326 Exemplary damages also raise unresolved concerns, such
as whether the criminal law, with its safeguards for defendants, might be the
more appropriate forum for punishing a wrongdoer and whether their award may
amount to an unfair windfall for the plaintiff.327
7.199 Exemplary damages have been awarded at common law in defamation cases.328
However, section 37 of the Defamation Act 2005 (Vic) now provides that
exemplary damages cannot be awarded in defamation actions. As the NSW Court
of Appeal recently noted:
Parliament has tended to cut down exemplary damages at common
law. Secondly, in the fields where Parliament has created new rights
or developed existing rights, it has generally not conferred a right to
exemplary damages.329
7.200 Neither the ALRC nor the NSWLRC proposed that causes of action for invasion of
privacy provide for exemplary damages.
160 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.202 In most of the jurisdictions we reviewed proof of actual damage is unnecessary 322 Submission 11.
323 See eg, Mendelson, above n 10, 31.
in privacy actions. The Court of Appeal in Hosking v Runting made it clear that
324 George, above n 278, 370.
under the New Zealand privacy tort, proof of actual damage in the sense of 325 NSW Law Reform Commission, Invasion
‘personal injury or economic loss’ is unnecessary and the ‘harm to be protected of Privacy, Consultation Paper, above n 5
[8.11].
against is in the nature of humiliation and distress’.334 Similarly, proof of damage
326 Gray v Motor Accident Commission
is unnecessary under the Canadian Privacy Acts,335 and in the proposal of the Law (1998) 196 CLR 1, 5, 9.
Reform Commission of Ireland for a tort of privacy-invasive surveillance.336 The 327 See Ibid 42–3 discussing Gray v Motor
Accident Commission (1998) 196 CLR
ALRC and NSWLRC proposals for a cause of action for invasion of privacy are also 1 and Rachael Mulheron, ‘Exemplary
actionable without proof of damage.337 Damages and Tort: an International
Comparison (2000) 2 UNDALR 17. But
see Gray v Motor Accident Commission
Limits to the amount of damages (1998) 196 CLR 1, 7 (Gleeson CJ,
7.203 Caps to the amount of compensation a court may award for non-economic loss McHugh, Gummow and Hayne JJ) noting
that there is tension between using
are common in Australia.338 Their purpose is to ensure that awards are not too civil proceedings to compensate a party
who is wronged and using the same
high, given that non-economic, as opposed to economic, loss cannot be precisely proceedings to punish the wrongdoer
quantified. Under the Defamation Act 2005 (Cth), for example, the maximum only if it is assumed there is a sharp
dividing line between the criminal law and
amount of damages that a court may award in defamation cases is generally the law of torts and contract, and noting
$250 000.339 the intermingling of criminal and civil law,
such as ‘the increasing frequency with
7.204 Damages awards in invasion of privacy and breach of confidence cases in which civil penalty provisions are enacted’.
Australia and elsewhere have not been excessive. In Giller v Procopets,340 the 328 Uren v John Fairfax & Sons Pty Ltd (1966)
117 CLR 118.
plaintiff was awarded $50 000 damages (including aggravated damages) for 329 Harris v Digital Pulse Pty Ltd [2003]
non-economic loss; in Jane Doe v ABC341 the plaintiff was awarded $110 000 for NSWCA 10 at [296].
non-economic loss; and in Grosse v Purvis,342 the plaintiff was awarded $108 000 330 Meaning literally, ‘by itself’.
331 Mendelson, above n 10, 46.
for non-economic loss.
332 Ibid 46.
7.205 Damages awards have ranged from small to moderate in both Canada and the 333 Australian Law Reform Commission,
above n 2 [74.167] citing Francis
UK. In the UK, Mosley attracted the largest award, £60 000.343 Trindade, Peter Cane, Mark Lunney, The
Law of Torts in Australia (3rd ed, 1999) 23.
7.206 The NSWLRC proposal places a cap on the award of damages for non-economic
334 Hosking v Runting [2005] 1 NZLR 1[128]
loss at $150 000, adjustable yearly based on average weekly total earnings of (Gault P and Blanchard J).
full-time adults over the preceding four quarters. This is the form of adjustment 335 Privacy Act, RSS 1978, c P–24, s 2; Privacy
Act, RSBC 1996, c 373, s 1(1); Privacy Act,
used in the Civil Liability Act 2002 (NSW), which deals with actions in tort.344 RSM 1987, c P125, s 2(2); Privacy Act,
RSNL 1990, c P–22, s 3(1).
Injunctions 336 Law Reform Commission [Ireland], above
n 265 [7.28].
7.207 An injunction is a remedy that may have an important role to play in some
337 Australian Law Reform Commission,
invasion of privacy cases. We use the term ‘injunction’ broadly to mean any above n 2 rec 74–3(b); NSW Law Reform
order of a tribunal or court that compels specified conduct. In some instances, Commission, Invasion of Privacy, Report,
above n 185 [7.9].
an injunction may be sought to prevent the initial publication of material, while 338 NSW Law Reform Commission, above
in others it may be sought to prevent its ongoing publication in forums such as n 185 (2009) [7.11] citing Harold
Luntz, Assessment of Damages for
websites. Sometimes it may be appropriate to a direct a person to publish an Personal Injury and Death (4th ed) (2002)
apology in response to the wrongful publication of private information, or to [11.2.1]–[11.2.22].
339 Defamation Act 2005 (Cth) s 35(1).
apologise privately for an intrusion upon seclusion.
340 [2008] VSCA 236 [443]–[446].
7.208 An injunction may be sought to stop the threatened publication of private 341 [2007] VCC 281.
information. This step is particularly challenging in cases involving privacy interests 342 [2003] QDC 151.
because of the irreparable consequences of publication. Justice Eady suggested in 343 Mosley v News Group Newspapers
Limited [2008] EWHC 177 (QB) [231].
Mosley that ‘an infringement of privacy cannot ever be effectively compensated by a 344 NSW Law Reform Commission, Invasion
monetary award’,345 and observed that ‘once privacy has been infringed, the damage of Privacy, Report, above n 185 [7.13].
is done and the embarrassment is only augmented by pursuing a court action’.346 345 Mosley v News Group Newspapers
Limited [2008] EWHC 177 (QB) [231].
7.209 The British courts have issued injunctions to prevent the initial publication, or 346 Mosley v News Group Newspapers
Limited [2008] EWHC 177 (QB) [230]
continued publication, of material in some misuse of private information cases. 347 Venables v News Group Newspapers Ltd
Injunctions have prevented publication of the addresses of convicted murderers [2001] Fam 430.
when released from prison,347 the details of the extra-marital sex life of a football 348 A v B plc [2003] QB 195.
player,348 the private life of a musician,349 and the musings of Prince Charles in 349 McKennitt v Ash [2008] QB 73.
350 Associated Newspapers Ltd v HRH Prince
his diary.350 of Wales [2008] Ch 105.
161
7
Chapter 7 Statutory Causes of Action
7.210 Importantly, there have also been high profile cases in which the courts have
declined to restrain publication of material that may be invasive of privacy. In John
Terry v Persons Unknown, 351 Tugendhat J rejected an application for an injunction
against the media to prevent publication of information about an affair involving
the captain of the English football team. The judge was not satisfied that the
plaintiff was likely to succeed in defeating a defence that it would be in the public
interest for there to be publication.352
7.211 A number of law reform bodies have discussed the importance of injunctions as
a remedy for privacy invasion cases. For example, because the British Columbia
Privacy Act, unlike the other three Canadian Privacy Acts, does not deal with
remedies expressly, the British Columbia Law Institute recently recommended
that the Act be amended to confer power on the courts to grant remedies other
than damages. In particular, the Institute noted the importance of injunctions
‘to make civil privacy legislation useful in curbing a privacy violation of a
persistent nature’.353
7.212 Similarly, the Law Reform Commission of Ireland recommended an injunction, or
‘privacy order’, be a remedy for its proposed torts. The Commission has written
that injunctions are ‘a key feature in any strategy to enhance the protection of
privacy, as privacy is a highly perishable commodity’.354
7.213 Because injunctions impede media freedom, the common law has generally
disfavoured ‘prior restraint’ on publication.355 In the US, injunctions may not be
readily awarded in privacy invasion cases.356 In Hosking v Runting members of the
New Zealand Court of Appeal referred to the legitimate concerns of the media with
respect to injunctions and ‘prior restraint’.357 The justices in the majority suggest
that an injunction should not be granted to restrain publication unless there is
‘compelling evidence of most highly offensive intended publicising of private
information and there is little legitimate public concern in the information’.358
Declarations
7.214 A declaration is an order of a court or tribunal that contains a statement about
the legal rights and obligations of a party to a dispute. In some cases involving
misuse of private information or intrusion upon seclusion, the plaintiff may seek
little more than a public finding, by way of declaration, that he or she has been
wronged. For example, a court or tribunal could declare that the publication in
a newspaper of the naked image of an identifiable person, originally obtained
by the use of a wave scanner, was a wrongful use of private information. In
some instances a declaration of this nature may be sufficient solace for the
wronged person.
7.215 We received only one submission about the remedies that should be available
when there has been a serious invasion of privacy.
7.216 The LIV suggested there may be circumstances in which exemplary damages
would be appropriate.359 Specifically, the LIV would ‘prefer to leave it to the
adjudicator’s discretion as to whether exemplary damages should be awarded’.360
7.217 The commission is of the view the remedies for the two proposed causes of action
should be
• compensatory damages
• injunctions
• declarations.
162 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.218 We do not include exemplary damages. It is our view that the available damages 351 [2010] EWHC 119 (QB).
352 [2010] EWHC 119 (QB) [149].
should be compensatory only. Criminal proceedings and civil penalty proceedings
353 British Columbia Law Institute, above
should be the sole means of punitive action against any person for grossly offensive n 164, 41.
behaviour falling within either of the proposed statutory causes of action. 354 Law Reform Commission [Ireland], above
n 265 [7.31].
7.219 Further, in view of the modest sums likely to be awarded in cases of this nature, 355 NSW Law Reform Commission, above
the commission believes that a statutory cap on damages is unnecessary. It should n 185 citing William Blackstone,
Commentaries on the Laws of England
be possible for the plaintiff to be compensated for insult and humiliation without (1769) vol 4, 151–2; Australian
the need to prove injury or economic loss. Broadcasting Corporation v O’Neill (2006)
227 CLR 52, [260]–[268] (Heydon J
dissenting).
costs 356 Robert Gellman, ‘A General Survey of
7.220 The question of who should be responsible for paying the costs of any civil legal Video Surveillance in the United States’
in Sjaak Nouwt et al (eds) Reasonable
proceedings is often complicated. The usual costs rule in the courts—that the Expectations of Privacy? Eleven Country
losing party should be required to pay the costs of the winning party—can be a Reports on Camera Surveillance and
Workplace Privacy (2005), 7, 34.
strong disincentive to the vindication of legal rights when the sum of money that 357 Hosking v Runting [2005] 1 NZLR 1[151]
may be awarded in damages to a successful plaintiff is small. A simple risk:benefit (Gault P and Blanchard J).
analysis will often lead to the conclusion that it is not worth the risk of litigating, 358 Hosking v Runting [2005] 1 NZLR 1[158]
(Gault P and Blanchard J).
especially when an adverse legal costs order may be much greater than any award 359 Submission 27.
of damages. Only the wealthy can afford the risk in these circumstances. 360 Submission 27.
361 Campbell v MGN Ltd [2005] 2 AC 457.
7.221 Two leading English cases illustrate this point. Supermodel Naomi Campbell risked
362 ‘Mosley Wins £60,000 in Privacy Case’
over £1 million in costs for a damages award of £3500,361 while motor racing Metro, 24 July 2008 <www.metro.
impresario Max Mosley succeeded in gaining £60 000 in damages and £850 000 co.uk/news/article.html?in_article_
id=233683&in_page_id=34> at
in legal costs.362 Litigation of this nature is beyond the reach of ordinary members 19 November 2009.
of the community. 363 S 109 (1)–(3) Victorian Civil and
Administrative Tribunal Act 1998 (Vic).
7.222 The fairest way to deal with costs in cases of this nature is to start from the
position that each party should be responsible for their costs but to permit
departures from this presumption when it is fair to do so. This rule guards against
the abuse of legal process because the decision-maker can award costs against a
plaintiff who takes frivolous proceedings and against a defendant who seeks to
exhaust the resources of the plaintiff by unnecessarily prolonging the case.
7.223 Costs should be dealt with in accordance with section 109 of the Victorian Civil and
Administrative Tribunal Act 1998 (Vic) (VCAT Act). That section provides that each
party is to bear their own costs in the proceeding, unless the Tribunal orders one party
to pay all or a part of the costs of the other party, if that would be fair to do so.363
recommendation
29. The remedies for both causes of action should be:
a. compensatory damages
b. injunctions
c. declarations.
30. Costs should be dealt with in accordance with section 109 of the VCAT Act.
jurisdiction
7.224 It is necessary to consider which body should have jurisdiction to hear cases
involving the proposed new causes of action for misuse of private information
and intrusion upon seclusion.
163
7
Chapter 7 Statutory Causes of Action
7.225 A number of submissions in response to our Consultation Paper supported giving
jurisdiction to VCAT rather than to the courts.364 Among them, the LIV argued:
Giving powers to the Victorian Privacy Commissioner or the Victorian Civil
and Administrative Tribunal to adjudicate actions for privacy invasions
could make the action more accessible to people and therefore more
appropriate than actions in the courts.365
7.226 The commission agrees with this view. VCAT is designed to be more accessible
than the courts. It seeks to be a speedy, low-cost tribunal where legal costs do not
outweigh the issues at stake. The experience in other jurisdictions demonstrates
that any damages awards in cases of this nature are likely to be relatively
small. The sums of money involved do not justify the level of legal costs usually
associated with civil litigation in the courts. The costs associated with the high
profile UK cases involving Naomi Campbell and Max Mosley could be replicated in
Victoria if there were to be protracted litigation in the Supreme Court.
7.227 The likely nature of cases concerning the two proposed statutory causes of action
also supports the view that jurisdiction should be vested in VCAT rather than
the courts. Courts are well equipped to conduct civil litigation involving complex
issues of law or fact. Court rules concerning pleadings are designed to identify
contested questions of law and fact so that the parties and the court can direct
their attention to matters that require adjudication. Court rules concerning the
admissibility and use of evidence seek to ensure that contested issues of fact are
determined as fairly as possible.
7.228 Cases concerning the two proposed statutory causes of action are unlikely to
involve contested and complex issues of law or fact. They may involve judgment,
however, about contested issues of privacy and community standards. VCAT
is well placed to undertake these tasks because of its experience in exercising
jurisdiction under the Information Privacy Act 1999 (Vic) and because of the broad
range of members upon which it may draw to hear cases of this nature. There will
be some opportunity for input by the courts because the Supreme Court hears
appeals from VCAT on questions of law.366
recommendation
31. Jurisdiction to hear and determine the causes of action for serious invasion
of privacy by misuse of private information and by intrusion upon seclusion
should be vested exclusively in the Victorian Civil and Administrative Tribunal.
Corporations
7.230 Although the law has assigned many of the attributes of individuals to
corporations,367 it does not make all causes of action available to corporations,
and sometimes restricts the claims they can make.368 For example, while a
corporation could sue for defamation at common law, it could not claim injury
to feelings and was restricted to a claim for financial loss.369 Under section 9 of
the Defamation Act 2005 (Vic), corporations no longer have a cause of action for
defamation, unless they are small businesses or not-for-profit organisations.370
164 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.231 Some members of the High Court have suggested that any common law tort 364 Submissions 27, 40.
365 Submission 27.
of invasion of privacy should not be available to corporations. In Lenah Game
366 Victorian Civil and Administrative Tribunal
Meats,371 Gummow and Hayne JJ said that the plaintiff was an ‘artificial legal Act 1998, s 148.
person [which] lacks the sensibilities, offence and injury to which provide a staple 367 Harold Ford, R Austin, Ian Ramsay, Ford’s
Principles of Corporations Law (13th ed)
value for any developing law of privacy’.372 In the same case Gleeson CJ said that (2007) [4.050].
because the concept of privacy involves the protection of human dignity, it ‘may 368 Ibid.
be incongruous when applied to a corporation’.373 369 Ibid citing Lewis v Daily Telegraph Ltd
[1964] AC 234 at 262 per Lord Reid.
7.232 As the NSWLRC recently noted, jurisdictions with existing privacy causes of action 370 See also George, above n 270, 399.
typically allow only ‘natural persons’ (that is, human beings) to bring the action.374 371 Australian Broadcasting Corporation v
Lenah Game Meats Pty Limited (2001)
For example, the Restatements of US law states that, other than in actions for 208 CLR 199.
appropriation of one’s name or likeness, an action for invasion of privacy can only 372 Australian Broadcasting Corporation v
be brought by a living individual.375 The Privacy Act of the Canadian province of Lenah Game Meats Pty Limited (2001)
208 CLR 199, 256 [126].
Newfoundland and Labrador limits the cause of action to natural persons,376 and 373 Australian Broadcasting Corporation v
the British Columbia Law Institute has recently recommended that the British Lenah Game Meats Pty Limited (2001)
208 CLR 199, 226 [43].
Columbia Act be amended to make it clear that it does not confer a right of
374 NSW Law Reform Commission, above
action upon corporations for any violation of privacy.377 n 6, 180.
375 Restatement (Second) of Torts § 652l
7.233 Other law reform commissions have favoured limiting proposed privacy rights of (1977).
action to natural persons. The ALRC proposed cause of action for an invasion of 376 By referring only to the privacy of an
privacy is not available to corporations.378 The ALRC has reasoned that ‘extending individual, and defines an individual to
mean ‘natural person’ (ie, a human being.
the protection of a human right to an entity that is not human is inconsistent Privacy Act, RSNL 1990, c P–22, ss 2, 3(1).
with the fundamental approach of Australian privacy law’.379 The Law Reform 377 British Columbia Law Institute, above
n 164, rec 6.
Commission of Ireland has similarly observed that corporate bodies do not have
378 Australian Law Reform Commission,
personal space that can be invaded in the same way as individuals, and no human above n 2 [74.160] rec 74–3(a).
rights objectives, such as dignity or autonomy, compel the application of the 379 Ibid [74.160].
protections offered by their proposed torts to corporations.380 The NSWLRC draft 380 Law Reform Commission [Ireland], above
n 265 [7.33].
legislation for a cause of action for invasion of privacy also limits the action to 381 NSW Law Reform Commission, above
humans by using the term ‘individual’ when describing the right of action.381 n 185, 85.
382 British Columbia Law Institute, above
7.234 Corporations may have some privacy-related interests. The British Columbia n 164, 44.
Law Institute has observed that ‘corporations have their secrets and may suffer 383 Ibid 45.
economic damage from disclosure of certain kinds of information, such as the 384 NSW Law Reform Commission, above
n 185, 71, 89.
details of an unpatented process or competitively sensitive production cost data’.382 385 Australian Law Reform Commission,
However, according to the Institute, a right of action for invasion of privacy is best above n 2, rec 74–3(a).
restricted to natural persons, because corporations have other remedies available 386 Australian Law Reform Commission,
above n 2 [8.44].
to them, such as causes of action for breach of contract, breach of fiduciary duty, 387 George, above n 270, 174.
trespass, and nuisance by which they may enforce confidentiality agreements or
prevent physical or electronic intrusion onto their premises.383
Deceased persons
7.235 Both the NSWLRC and the ALRC have recommended that any causes of action for
invasion of privacy should be restricted to living persons. Clause 79 of the draft
legislation proposed by the NSWLRC for a statutory cause of action for invasion
of an individual’s privacy states that the action does not survive the death of the
individual.384 The ALRC’s proposed cause of action for a serious invasion of privacy
is limited to ‘natural persons’,385 and in the context of the Privacy Act 1988 (Cth),
the ALRC has written that the right to privacy ‘attaches to the individual and
should not survive the death of the individual’.386
7.236 Deceased persons have no right of action under defamation law. At common law, a
deceased person’s estate or family members have no right to sue for defamation on
that person’s behalf.387 Section 10(a) of the Defamation Act 2005 (Vic) prohibits a
person from asserting, continuing, or enforcing a cause of action for defamation in
relation to the publication of defamatory matter about a deceased person.
165
7
Chapter 7 Statutory Causes of Action
7.237 The rationale for excluding deceased persons from a right of action for defamation or
privacy is that deceased persons cannot suffer any insult to reputation or dignity and
cannot incur the injury to feelings and mental distress that flows from these insults.
7.238 It is arguable, however, that in some instances deceased persons may have an
interest in the privacy of their personal information past death. For example,
under the Law Reform Commission of Ireland’s proposed privacy torts, a right
of action is available to representatives of deceased persons, where the remedy
sought is a privacy order, rather than damages or an account of profits.388 The
former would allow the family or estate of a deceased person to seek delivery of
materials, such as private or confidential documents, from a defendant.389
7.239 Similarly, the ALRC has recommended amendments to the Privacy Act 1988
(Cth) to protect the personal information of persons who have been dead for
30 years or less where the information is held by an organisation.390 According
to the ALRC, the protections provided by the Privacy Act are analogous to the
protections offered by legal duties of confidentiality, which do survive the death
of an individual.391 The reforms they suggest aim to ensure that ‘living individuals
are confident to provide personal information, including sensitive information,
in the knowledge that the information will not be disclosed in inappropriate
circumstances after they die’.392
7.240 The commission is of the view that the causes of action for misuse of private
information and intrusion upon seclusion should be available to natural persons
only, and not to corporations or deceased people.
7.241 Limiting privacy rights of action to living human beings is consistent with other
jurisdictions, the views expressed by some High Court judges, defamation law,
and the recommendations of other law reform commissions. This approach is also
consistent with the Charter, which stipulates that human rights, such as the right
to privacy,393 are applicable to human beings only.394
7.242 Although there may be some legitimate reasons for protecting the privacy of
people’s personal information past death, these interests are best protected by
implementing the ALRC’s recommendations with respect to the Privacy Act 1988
(Cth) rather than conferring a right of action upon the estate of a deceased person.
recommendation
32. These causes of action should be restricted to natural persons. Corporations
and the estates of deceased persons should not have the capacity to take
proceedings for these causes of action.
limitation of action
7.243 A plaintiff in a defamation action has one year from the date of publication of the
defamatory matter to bring the action.395 A court can extend this limitation period
to up to three years if satisfied that it was not reasonable in the circumstances for
the plaintiff to have commenced the action within one year of publication.396
7.244 The NSWLRC’s proposal for a cause of action for invasion of privacy takes a
similar approach. There is a limitation period of one year, running from the date
of the defendant’s conduct,397 and an extension of the limitation period to up to
three years from the date of the defendant’s conduct if the court is satisfied it
was not reasonable in the circumstances for the plaintiff to have commenced the
action within the year.398
166 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
7.245 According to the NSWLRC, a one-year limitation period is generally appropriate 388 Law Reform Commission, above n 265,
142–3.
because ‘if the invasion is serious enough, the plaintiff will, and should, act 389 Ibid 142–143.
promptly to avoid any escalation in the impact of the injury’.399 Moreover, the 390 Australian Law Reform Commission,
court’s ability to extend the limitations period to up to three years allows for cases above n 2, rec 8–1.
391 Australian Law Reform Commission,
where, for example, a plaintiff was not aware of the defendant’s conduct during above n 2 [8.1]–[8.3].
that one year period.400 392 Ibid [8.3].
393 The right to privacy is recognised in
7.246 However, the NSWLRC did not favour a general rule that the cause of action section 13 of the Charter of Human
accrue from the time the plaintiff first became aware of the invasion of privacy. Rights and Responsibilities Act 2006 (Vic).
According to the NSWLRC: 394 Charter of Human Rights and
Responsibilities Act 2006 (Vic), s 6(1).
Such an approach would not cohere with the general approach to the law 395 Limitation of Actions Act 1958 (Vic) s 5
(1AAA).
of limitations in Australia and would, we believe, be difficult to achieve as
396 Limitation of Actions Act 1958 (Vic),
part of an exercise in uniformity of law in Australia.401 s 23B.
397 NSW Law Reform Commission, above
7.247 By contrast, the Law Reform Commission of Ireland recommended that under n 185 [9.1].
its proposed statutory torts, an action be barred after a period of three years 398 Ibid [9.1].
commencing from the date the plaintiff became aware (or ought reasonably to 399 Ibid [9.2].
have become aware) of the tort and of the identity of the defendant.402 400 Ibid [9.2].
401 Ibid [9.2].
7.248 The commission is of the view that a plaintiff should bring the action within three 402 Law Reform Commission [Ireland], above
years of the date the cause of action arose, that being the date of the defendant’s n 265 [7.37].
403 Limitation of Actions Act 1958 (Vic),
conduct. This step would ensure actual consistency with causes of action for s 5(1AA).
personal injuries,403 and practical consistency with causes of action for defamation 404 Limitation of Actions Act 1958 (Vic),
where the limitation period can be extended to up to three years if the reason for s 23B.
recommendation
33. Proceedings must be commenced within three years of the date upon which
the cause of action arose.
conclusion
7.249 We have recommended the introduction of two statutory causes of action in
response to serious invasions of privacy: the first dealing with misuse of private
information, the second with intrusion upon seclusion.
7.250 Although our focus has been to establish an appropriate legal response to the
misuse of surveillance in public places, these new causes of action would not be
limited to surveillance practices and conduct in public places. Rather, they would
apply to all instances of misuse of private information and intrusion upon seclusion.
7.251 Evidence from other jurisdictions with similar causes of action suggests that their
availability is unlikely to lead to a flood of litigation and increased expense for
users of public place surveillance.
167
168 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
Appendices CONTENTS
170 Appendix A: Submissions
172 Appendix B: Consultative
Committee, Community
Forums, Consultations and
Site Visits
174 Appendix C: Preliminary
Roundtable Consultations
169
Appendix A submissions
submissions
1 Pastor Richard D T Wilson
2 Anonymous
5 Liberty Victoria
11 Victoria Police
12 Youthlaw Inc
13 Anonymous
16 Suncorp-Metway Ltd
23 Confidential
31 Confidential
170 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
submissions
34 Fitzroy Legal Service
37 Anonymous
38 Anonymous
39 Anonymous
41 Biometrics Institute
44 Confidential
171
Appendix B Consultative committee, community forums,
consultations and site visits
consultative Committee
Louise Connor Secretary (Victoria), Media and Arts Alliance
Andy Frances Manager, Security and Venue Support, Melbourne Cricket Club
Leigh Gassner Former Assistant Commissioner, Region 1 (CBD), Victoria Police
Moira Paterson Associate Professor, Monash University Faculty of Law
Michael Pearce SC President, Liberty Victoria
Bill Penrose Vice President, Victorian Local Governance Association
Jen Rose Manager, Policy and Projects, Youth Affairs Council of Victoria
Helen Versey Victorian Privacy Commissioner
Dr Deane Wilson Senior Lecturer in Criminology, Monash University
community forums
1 Neighbourhood Justice Centre
2 Centre for Multicultural Youth
3 Youthlaw Inc and Youth Affairs Council of Victoria Inc
4 Homeless Persons’ Legal Clinic, Public Interest Law Clearing House
5 Ethnic Communities Council of Victoria
consultations
1 Shopping Centre Council of Australia and Westfield Shopping Australia
2 Transport Certification Australia Limited
3 Confidential
4 Keeper of Evidence, Department of Transport
5 Dr David Lindsay
6 Director of Liquor Licensing, Department of Justice
7 Service Station Association Ltd
8 Confidential
9 Nigel Waters
10 Melbourne City Council
11 Woolworths Limited
12 Broadcast media
13 Confidential
14 Print media
15 Office of Policy Integrity
16 Radio Frequency Identification Association of Australia
17 ART Security Pty Ltd
172 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
consultations
18 Australian Security Industry Association Limited
19 Victoria Police
20 Victoria Police
21 Victoria Police
22 Lilydale Centre Safe Committee Inc
23 Office of the Special Investigations Monitor
24 Confidential
25 Victoria Police
26 Confidential
27 Geelong City Council employees
28 Victorian Equal Opportunity and Human Rights Commission
29 Confidential
30 Confidential
31 Private investigators
32 Commissioner for Law Enforcement Data Security
Site Visits
1 VicRoads
2 Southern Cross Station
3 Federation Square
4 Connex
5 Melbourne City Council
6 Etihad Stadium
7 Connex Metro Train Control
8 Victorian Taxi Directorate
9 Citylink
10 Chasers Nightclub
11 State Library of Victoria
12 Melbourne Sports and Aquatic Centre
13 Crown Casino
14 Melbourne Cricket Ground
15 Westfield Shopping Centre, Airport West
16 Myer, Doncaster
17 L3 Communications
18 Department of Housing
173
Appendix C preliminary roundtable consultations
roundtables
Melbourne Magistrates Court; Director of Liquor Licensing,
Department of Justice; Office of Housing Department of
1 Policy I
Housing; Privacy Victoria; Policy Division, Department of
Justice
Tourism Victoria; Victorian WorkCover Authority; Office
for Youth, Department of Planning and Community
Development; Department of Sustainability and
2 Policy II
Environment; Department of Human Services; Office
of Small Business; Department of Education and Early
Childhood Development; Consumer Affairs Victoria
Department of Infrastructure; VicRoads; V/Line; Transport
3 Transport I
Accident Commission
Melbourne Exhibition Centre; Melbourne Cricket Ground
Sports and entertainment
4 Trust; National Gallery of Victoria; Museum Victoria;
(government)
Victorian Arts Centre Trust; Film Victoria; Parks Victoria
5 Victoria Police Victoria Police
Municipal Association of Victoria; City of Stonnington; City
6 Local government I of Port Phillip; City of Ballarat; City of Greater Geelong;
Lilydale Safe Centre Committee
City of Melbourne; Darebin City Council; City of Greater
7 Local government II
Dandenong
Local government and
8 Latrobe City Council; Victoria Police
Victoria Police
Victoria University; Ballarat University; Melbourne University;
9 Tertiary education Monash University; Swinburne University of Technology;
Royal Melbourne Institute of Technology; Deakin University
Department of Innovation, Industry and Regional
Sports, entertainment, Development; Victorian Taxi and Tow Truck Directorate;
10 education and transport Port of Melbourne Corporation; State Sport Centres Trust;
(government) Holmesglen Institute of TAFE; Box Hill Institute of TAFE;
Kangan Batman Institute of TAFE.
Racing (government and Office for Racing, Department of Justice; Greyhound Racing
11
private) Victoria; Racing Victoria Limited
Gaming and transport Department of Justice; Department of Infrastructure;
12
(government) Victorian Commission for Gambling Regulation
Sports and entertainment Federation Square; Telstra Dome; Clubs Victoria; Crown
13
(private) Casino; Marriner Theatres
Queen Victoria Market; Coles Group; Institute of Body
14 Retail I
Corporate Managers
Pharmacy Guild of Australia; Woolworths Limited; Myer;
15 Retail II Colonial First State Property Management; Australian
Retailers Association
Community Youthlaw Inc; Human Rights Law Resource Centre;
16 representatives and Homeless Persons’ Legal Clinic, Public Interest Law Clearing
private citizens I House
174 Victorian Law Reform Commission – Surveillance in Public Places: Final Report 18
roundtables
Community
Youth Affairs Council of Victoria Inc; Mental Health Legal
17 representatives and
Centre; Electronic Frontiers; Liberty Victoria
private citizens II
Community
Welfare Rights Unit; Victorian Council of Social Services;
18 representatives and
Islamic Council of Victoria; Australian Privacy Foundation
private citizens III
CityLink; Southern Cross Station; Bus Association of
19 Transport II Victoria; National Intelligent Transport Systems Centre;
Yarra Trams
Shopping Centre Council of Australia; Victorian Automobile
Transport, retail and
20 Chamber of Commerce; Victorian Authorised Newsagents
services (private)
Association; Fitness Victoria; RACV
Utilities and services Neighbourhood Watch Victoria; Crime Stoppers Victoria;
21
(government) Yarra Valley Water; South East Water
Youth Affairs Council of Victoria (Members); Youth
22 Young people Workers; Discussion, Action, Representation and Thought
(DART) Board
23 Transport (government) Connex
Inner Range; Australian Security Industry Association Ltd;
24 Private security industry Southern Health; Victorian Security Advisory Committee;
SMI Security Group, ADT Security; Siemens Security
Private investigation Victorian Detective Services; Maurice J Kerrigan and
25
industry Associates; Institute of Mercantile Agents
Herald and Weekly Times; Leader Newspapers; Australian
26 Print media Press Council; Australian Commercial and Media
Photographers; Australian Photographic Society
Holding Redlich; Corrs Chambers Westgarth; Minter
Ellison; Victorian College of the Arts; Film and Television
Electronic media and
27 School; ABC News and Current Affairs; Channel 10 News;
legal firms
Commercial Radio Australia; Communications Law Centre;
Australian Subscription Television and Radio Association
Indigenous community Regional Aboriginal Justice Advisory Committee; Indigenous
28
groups Issues Unit, Department of Justice
29 Insurance agencies ANZ Bank
30 Crime Stoppers Victoria Crime Stoppers Victoria
31 Property Councils Centro Properties Group; Property Council of Australia
175
Bibliography
Adams, Dan, ‘Climate Change and Human Rights’ (Paper Black, Julia, ‘Managing Discretion’ (Paper presented at the
presented at the ‘2008 Human Rights Oration’, Victorian Australian Law Reform Commission Conference, Penalties:
Equal Opportunity and Human Rights Commission, Policy, Principles and Practice in Government Regulation,
Melbourne, 10 December 2008) Sydney, 7 June 2001)
Alzheimer’s Australia, ‘Safer Walking for People with Black, Julia, Hopper, Martyn and Band, Christa, ‘Making
Dementia: Approaches and Technologies’, Update Sheet a Success of Principles Based Regulation’ (2007) 1(3) Law
No 16 (2009) and Financial Markets Review 191
Arjoon, Surendra, ‘Striking a Balance Between Rules and Braithwaite, John, ‘Rewards and Regulation’ (2002) 29(1)
Principle-Based Approaches for Effective Governance: A Journal of Law and Society 12
Risks-Based Approach’ (2006) 68(1) Journal of Business
Ethics 53 Briefing 15.12.09: National CCTV Oversight Body National
CCTV Strategy Board, Home Office <www.crimereduction.
Attorney-General’s Department, Australian Government, A homeoffice.gov.uk/cctv/cctv_oversight_body_b.pdf> at
Guide to Framing Commonwealth Offences, Civil Penalties 20 January 2010
and Enforcement Powers (2007)
British Columbia Law Institute, Report on the Privacy Act of
Australian Communications and Media Authority, Privacy British Columbia, BCLI Report No 49 (2008)
Guidelines for Broadcasters (2005)
Budde, Paul, Australia: Mobile Communications Subscriber
Australian Government, Enhancing National Privacy Statistics (2004) <www.budde.com.au/Research/Australia-
Protection: First Stage Response to the Australian Law Mobile-Communications-Subscriber-Statistics.html> at
Reform Commission Report 108: For Your Information: 5 March 2005
Australian Privacy Law and Practice (2009)
Burrows, John, ‘Privacy and the Courts’ (Paper presented
Australian Institute of Criminology, Considerations for at the Privacy Forum, Wellington, New Zealand,
Establishing a Public Space CCTV Network, Research in 27 August 2008)
Practice No 8 (2009)
Butler, Des, ‘A Tort of Invasion of Privacy in Australia’
Australian Law Reform Commission, For Your Information: (2005) 29 Melbourne University Law Review 339
Australian Privacy Law and Practice: Volume 1: Final Report
108 (2008) Callinan, Ian, ‘Privacy, Confidence, Celebrity and Spectacle’
(2007) 7 Oxford University Commonwealth Law Journal 1
Australian Law Reform Commission, For Your Information:
Australian Privacy Law and Practice: Volume 2: Final Report Cameron, Alex and Palmer, Mimi, ‘Invasion of Privacy as
108 (2008) a Common Law Tort in Canada’ (2009) 6(11) Canadian
Privacy Law Review 105
Australian Law Reform Commission, For Your Information:
Australian Privacy Law and Practice: Volume 3: Final Report Chester, Simon, Murphy, Jason and Robb, Eric, ‘Zapping
108 (2008) the Paparazzi: Is the Tort of Privacy Alive and Well?’ (2003)
27 Advocates’ Quarterly 357
Australian Law Reform Commission, Principled Regulation:
Federal Civil and Administrative Penalties in Australia, Clarke, Roger, ‘You Are Where You’ve Been: Location
Report No 95 (2002) Technologies’ Deep Privacy Impact’ (Paper presented at
the You Are Where You’ve Been: Technological Threats to
Australian Law Reform Commission, Privacy, Report Your Location Privacy Seminar, Sydney, 23 July 2008)
No 22 (1983)
Coleman, Clive and Norris, Clive, Introducing Criminology
Ayres, Ian and Braithwaite, John, Responsive Regulation: (Willan Publishing, 2000)
Transcending the Deregulation Debate (Oxford University
Press, 1992) College Bescherming Persoonsgevens, If You Record
People on Video Camera, Fact Sheet No 20A (2005)
Baldwin, Robert and Black, Julia, Really Responsive
Regulation, Law Society Economy Working Paper No College Bescherming Persoonsgevens, If You are Recorded
15/2007 (London School of Economics and Political by a Video Camera, Fact Sheet No 20B (2005)
Science, 2007)
176
Crime Prevention and Community Safety and Tasmania Fisse, Brent and Braithwaite, John, The Impact of Publicity
Police, Evaluation of the Devonport CCTV Scheme (2002) on Corporate Offenders (State University of New York
Press, 1983)
Crisci, Camrin, ‘All the World is Not a Stage: Finding a
Rights to Privacy in Existing and Proposed Legislation’ Fleming, John, The Law of Torts (9th ed) (LBC Information
(2002) 6 New York University Journal of Legislation and Services, 1998)
Public Policy 207
Ford, Harold, Austin, R P and Ramsay, Ian, Ford’s Principles
Dean, Robert, ‘Sex, Videotape and the Law’ (2009) 83(8) of Corporations Law (13th ed, LexisNexis Butterworths, 2007)
Law Institute Journal 52
Foucault, Michel, Discipline and Punish: The Birth of the
Department of Justice (Victoria), An Equality Act for a Fairer Prison (Random House, 1975)
Victoria: Equal Opportunity Review, Final Report (2008)
George, Patrick, Defamation Law in Australia (LexisNexis
Department of Justice (Victoria), Attorney-General’s Justice Butterworths, 2006)
Statement 2: The Next Chapter (2008)
Gill, Martin and Spriggs, Angela, Assessing the Impact of
Department of Sustainability and Environment, Victoria’s CCTV, Home Office Research Study 292 (Home Office, 2005)
Environmental Sustainability Framework: Our Environment
Our Future (2005) <www.dse.vic.gov.au/DSE/nrence.nsf/ Gilliom, John, Overseers of the Poor: Surveillance, Resistance,
LinkView/C50F9AEFF496CEA8CA256FE800232FE1E21767 and the Limits of Privacy (University of Chicago Press, 2001)
67455B21FFCA256E57007C82CF> at 8 December 2005
Goold, Benjamin, CCTV and Policing (Oxford University
Department of Treasury and Finance, Victorian Guide to Press, 2004)
Regulation incorporating: Guidelines made under the
‘Subordinate Legislation Act 1994’ and Guidelines for Goold, Benjamin, ‘Open to All? Regulating Open Street
the Measurement of Changes in Administrative Burden CCTV and the Case for “Symmetrical Surveillance”’ (2006)
(2nd ed, 2007) 25(1) Criminal Justice Ethics 3
Eady, Justice David, Speech delivered at the University of Gras, Marianne, ‘The Legal Regulation of CCTV in Europe’
Hertfordshire, 10 November 2009 <www.judiciary.gov.uk/ (2004) 2(2/3) Surveillance & Society 216
docs/speeches/justice-eady-univ-of-hertfordshire-101109.
pdf> at 20 April 2010 Greenleaf, Graham, ‘Global Protection of Privacy in
Cyberspace—Implications for the Asia–Pacific’ (Paper
Edmond, Gary et al, ‘Law’s Looking Glass: Expert presented at the Internet Law Symposium, Taiwan,
Identification Evidence Derived from Photographic and Video 23–24 June 1998)
Images’ (2009) 20 Current Issues in Criminal Justice 337
Haggerty, Kevin and Ericson, Richard, ‘The Surveillance
Electronic Privacy Information Centre and Privacy International, Assemblage’ (2000) 51(4) British Journal of Sociology 605
Privacy and Human Rights 2006: An International Survey of
Privacy Laws and Developments (2007) Hempel, Leon and Töpfer, Eric, CCTV in Europe: Final
Report (Urbaneye, 2004)
Equal Opportunity for Women in the Workplace Agency,
Annual Report 2008–2009 (2009) Home Office Police Department, Closed Circuit Television in
Public Places: Its Acceptability and Perceived Effectiveness,
European Parliament and the Council of the European Report 35 (1992)
Union, ‘Directive 95/46/EC of the European Parliament and
of the Council of 24 October 1995 on the Protection of Human Rights Committee, General Comment 16
Individuals with Regard to the Processing of Personal Data (Twenty-Third Session, 1988) Compilation of General
and on the Free Movement of Such Data’ (1995) No L 281 Comments and General Recommendations Adopted by
EN: Official Journal of the European Communities 31 Human Rights Treaty Bodies UN Doc HRI/GEN/Rev.6 at
142 (2003)
Federal Privacy Commissioner, Plain English Guidelines
to Information Privacy Principles 1–3: Advice to Agencies Human Rights Unit, Department of Justice (Victoria),
about Collecting Personal Information (1994) Charter of Human Rights and Responsibilities: Guidelines
Fenwick, Helen and Phillipson, Gavin, Media Freedom for Legislation and Policy Officers in Victoria (2008)
Under the Human Rights Act (Oxford University Press, 2006)
177
Bibliography
Information Commissioner’s Office (UK), CCTV Code of Metlink Melbourne, Victorian Fares and Ticketing Manual
Practice (revised ed, 2008) <www.ico.gov.uk/upload/ (Myki) (2009) <www.metlinkmelbourne.com.au/fares-
documents/library/data_protection/detailed_specialist_ tickets/victorian-fares-and-ticketing-manual-myki/> at
guides/ico_cctvfinal_2301.pdf> at 4 March 2009 23 November 2009
Joseph, Sarah, Schultz, Jenny and Castan, Melissa, The Michael, Katrina ,MacNamee, Andrew and Michael,
International Covenant on Civil and Political Rights: Cases, M G, ‘The Emerging Ethics of Humancentric GPS Tracking
Materials and Commentary (2nd ed, Oxford University Press, and Monitoring’ (Paper presented at the International
2004) Conference on Mobile Business: IEEE Computer Society,.
Copenhagen, Denmark, 25–27 July 2006) <ro.uow.edu.au/
Keeton, W Page et al (eds), Prosser and Keeton on the Law cgi/viewcontent.cgi?article=1384&context=infopapers> at
of Torts (5th ed, West Publishing, 1984) 21 May 2008
Kenyon, Andrew and Richardson, Megan (eds), New Moran, Eamonn, ‘Enforcement Mechanisms (including
Dimensions in Privacy Law: International and Comparative Alternatives to Criminal Penalties)’ (2009) 2 The Loophole 12
Perspectives (Cambridge University Press, 2006)
Moreham, Nicole, ‘Privacy in Public Places’ (2006) 65 (3)
Koskela, Hille, ‘“Cam Era”—The Contemporary Urban Cambridge Law Journal 606
Panopticon’ (2003) 1(3) Surveillance & Society 292
Morrison, David and Svennevig, Michael, ‘The Defence
Law Reform Commission (Ireland), Privacy: Surveillance and of Public Interest and the Intrusion of Privacy’ (2007) 8(1)
the Interception of Communications, LRC 57–1998 (1998) Journalism 44
Law Reform Commission of Hong Kong, Privacy: The Mulheron, Rachel, ‘Exemplary Damages and Tort: An
Regulation of Covert Surveillance, Report (2006) International Comparison’ (2000) 2 University of Notre
Dame Australia Law Review 17
Ludlow, Christa, ‘“The Gentlest of Predations”: Photography
and Privacy Law’ (2006) 10 Law Text Culture 135 Mullaly, Jennifer, ‘Privacy: Are the Media a Special Case?’
(1997) 16(1) Communication Law Bulletin 10
Lyon, David, Surveillance Society: Monitoring Everyday Life
(Open University Press, 2001) NSW Law Reform Commission, Surveillance: An Interim
Report, Report 98 (2001)
Lyon, David, Surveillance Studies: An Overview (Polity
Press, 2007) NSW Law Reform Commission, Surveillance: Final Report,
Report 108 (2005)
Mason, Anthony, ‘Legislative and Judicial Law-Making: Can
We Locate an Identifiable Boundary’ (2003) 24 Adelaide NSW Law Reform Commission, Invasion of Privacy,
Law Review 15 Consultation Paper 1 (2007)
McClurg, Andrew, ‘Bringing Privacy Law Out of the Closet: NSW Law Reform Commission, Invasion of Privacy,
A Tort Theory of Liability for Intrusions in Public Places’ Report 120 (2009)
(1995) 73 North Carolina Law Review 989
New Zealand Law Commission, Privacy: Concepts and
McNairn, Colin and Scott, Alexander, Privacy Law in Issues: Review of the Law of Privacy: Stage 1, Study Paper
Canada (Butterworths, 2001) 19 (2008)
Melbourne Centre for Criminological Research and New Zealand Law Commission, Invasion of Privacy: Penalties
Evaluation for Corrections Victoria, Department of Justice, and Remedies Review of the Law of Privacy: Stage 3, Issues
Home Detention in Victoria: Final Evaluation Report (2006) Paper 14 (2009)
Mendelson, Danuta, The New Law of Torts (Oxford New Zealand Law Commission, Invasion of Privacy:
University Press, 2007) Penalties and Remedies: Review of the Law of Privacy:
Stage 3, Report 113 (2010)
Mendelson, Danuta, ‘Illusionary Rights to Confidentiality
and Privacy in the 21st Century?’ (Paper presented at Norris, Clive and Armstrong, Gary, The Maximum
Deakin University, Melbourne, 26 August 2009) Surveillance Society: The Rise of CCTV (Berg, 1999)
178
Nouwt, Sjaak,Vries, de Berend and Prins, Corien (eds), Painter, Kate and Tilley, Nick (eds), Surveillance of Public
Reasonable Expectations of Privacy? Eleven Country Space: CCTV, Street Lighting and Crime Prevention
Reports on Camera Surveillance and Workplace Privacy (Criminal Justice Press, 1999)
(T·M·C·Asser Press, 2005)
Parker, Christine, ‘Reinventing Regulation within the
Office of the Data Protection Commissioner (Ireland), What Corporation: Compliance-Oriented Regulatory Innovation’
Issues Surround the Use of CCTV <www.dataprotection.ie/ (2000) 32(5) Administration and Society 529
viewdoc.asp?DocID=642> at 19 January 2009
Parliamentary Travelsafe Committee, Queensland
Offices of the Federal Privacy Commissioner and Human Parliament, Report on the Inquiry into Automatic Number
Rights and Equal Opportunity Commission, Covert Plate Recognition Technology, Report No 51 (2008)
Surveillance in Commonwealth Administration:
Guidelines (1992) Posner, Richard, ‘The Right of Privacy’ (1978) 12(3) Georgia
Law Review 393
Office of the Federal Privacy Commissioner, The Operation
of the Privacy Act Annual Report, 1 July 2008–30 June Privacy Commissioner (New Zealand), Privacy and CCTV:
2009 (2009) A Guide to the Privacy Act for Businesses, Agencies and
Organisations (2009) <www.privacy.org.nz/privacy-and-
Office of the Privacy Commissioner of Canada, OPC cctv-a-guide-to-the-privacy-act-for-businesses-agencies-
Guidelines for the Use of Video Surveillance of Public Places and-organisations/> at 26 October 2009
by Police and Law Enforcement Authorities (2006) <www.
privcom.gc.ca/information/guide/vs_060301_e.asp> at Privacy Commissioner (New Zealand), Privacy and CCTV:
4 March 2009 A Guide to the Privacy Act for Businesses, Agencies and
Organisations (2009) <www.privacy.org.nz/assets/Files/
Office of the Victorian Privacy Commissioner, Annual Brochures-and-pamphlets-and-pubs/Privacy-and-CCTV-A-
Report 2008–2009 (2009) guide-October-2009.pdf> at 26 October 2009
Office of the Victorian Privacy Commissioner, Images and Privacy Commissioner (New Zealand), ‘Tracking Technology
Privacy, Info Sheet 1.03 (2003) on the Move’ (2005) 54 Private Word 1
Office of the Victorian Privacy Commissioner, Jenny’s Case: Prosser, William, ‘Privacy’ (1960) 48(3) California Law
Report of an Investigation into the Office of Police Integrity Review 383
Pursuant to Part 6 of the Information Privacy Act 2000,
Report 01.06 (2006) Queensland Government Response to the Parliamentary
Select Committee on Travelsafe’s Report No 51: Report
Office of the Victorian Privacy Commissioner, Mobile on the Inquiry into Automatic Number Plate Recognition
Phones with Cameras, Info Sheet 05.03 (2003) Technology (2009) <http://www.parliament.qld.gov.
au/view/legislativeAssembly/tableOffice/documents/
Office of the Victorian Privacy Commissioner, Model TabledPapers/2009/5309T434.pdf> at 9 March 2010
Terms for Transborder Data Flows of Personal Information,
Guidelines Edition.01 (2006) Ricketson, Sam, ‘Public Interest and Breach of Confidence’
(1979) 12 Melbourne University Law Review 176
Office of the Victorian Privacy Commissioner, Mr C’s
Case: Report of an Investigation Pursuant to Part 6 of Riley, Tom et al, ‘Implementing Advanced Image Processing
the Information Privacy Act 2000 into Victoria Police and Technology in Sensor Systems for Security and Surveillance’
Department of Justice in Relation to the Security of Personal in Proceedings of SPIE—The International Society for
Information in the Law Enforcement Assistance Program Optical Engineering: Volume 6741, (2007)
(LEAP) and E* Justice Databases, Report 03.06 (2006)
Rizos, Chris, ‘Location Based Services and Issues such as
Office of the Victorian Privacy Commissioner, Privacy and Privacy’ (Paper presented at the You are Where You’ve
Global Positioning System Technology, Info Sheet 2.08 (2008) Been: Technological threats to Your Location Privacy
Seminar, Sydney, 23 July 2008)
Office of the Victorian Privacy Commissioner, Short Guide
to the Information Privacy Principles (2006) Rizos, Chris, ‘You are Where You’ve Been: Location
Technologies’ Deep Privacy Impact’ (Paper presented at the
Office of the Victorian Privacy Commissioner, Who’s Covered You are Where You’ve Been: Technological Threats to Your
by the Information Privacy Act? Info Sheet 01.06 (2006) Location Privacy Seminar, Sydney, 23 July 2008)
179
Bibliography
Scassa, Teresa et al, ‘Consumer Privacy and Radio Frequency Toulson, Roger, ‘Freedom of Expression and Privacy’ (2007)
Identification Technology’ (2005–06) 37 Ottowa Law 41 Law Teacher 139
Review 215
United Kingdom Government, Response to the House of
Select Committee on the Constitution, House of Lords, Lords Selection Committee on the Constitution’s Report:
Surveillance: Citizens and the State: Report, Volume 1: 2nd Surveillance: Citizens and the State (2009)
Report of Session 2008–09 (2009)
van den Hengel, Anton, Dick, Anthony and Hill, Rhys, Activity
Shearmur, Jeremy, ‘Free Speech, Offence and Religion’ Topology Estimation for Large Networks of Cameras
(2006) 22(2) Policy 21 Australian Centre for Visual Technologies <www.acvt.com.
au/research/surveillance/AVSS06.pdf> at 1 October 2009
Siebel, Walter and Wehrheim, Jan, ‘Security and the Urban
Public Sphere’ (2006) 3(1) German Policy Studies 19 Victoria Police, Inquiry into Automatic Number Plate
Recognition Technology (Submission) (2008) <www.
Slobogin, Christopher, ‘Public Privacy: Camera Surveillance parliament.qld.gov.au/tsafe/view/historical/documents/
of Public Places and the Right to Anonymity’ (2002) 72 committees/TSAFE/inquiry/ANPR%20technology/
Mississippi Law Journal 213 Submissions/14.pdf> at 14 January 2010
Solove, Daniel, ‘Conceptualizing Privacy’ (2002) 90 Victorian Law Reform Commission, Workplace Privacy:
California Law Review 1087 Final Report (2005)
Solove, Daniel, ‘A Taxonomy of Privacy’ (2006) 154(3) Victorian Law Reform Commission, Surveillance in Public
University of Pennsylvania Law Review 477 Places, Consultation Paper 7 (2009)
Solove, Daniel, ‘“I’ve Got Nothing to Hide” and Other Wakefield, Alison, ‘The Public Surveillance Functions of
Misunderstandings of Privacy’ (2007) 44 San Diego Law Private Security’ (2004) 2(4) Surveillance & Society 529
Review 745
Wallis Consulting Group, Community Attitudes to Privacy
Solove, Daniel, Understanding Privacy (Harvard University 2007: Prepared for Office of the Privacy Commissioner,
Press, 2008) Reference No WG3322 (2007)
Spigelman, James, ‘The Forgotten Freedom: Freedom from Ward, Matt, van Kranenburg, Rob and Backhouse,
Fear’ (Paper presented at the Sydney Law School, University Gaynor, RFID: Frequency, Standards, Adoption and
of Sydney 17 November 2009 and Australian Academy of Innovation (2006) JISC Technology and Standards, Watch
Law, Banco Court, Sydney, 18 November 2009) <www.jisc.ac.uk/whatwedo/services/techwatch/reports/
horizonscanning/hs0602.aspx> at 11 November 2008
Standing Committee of Attorneys-General, Unauthorised
Photographs on the Internet and Ancillary Privacy Issues, Warren, Samuel and Brandeis, Louis, ‘The Right to Privacy’
Discussion Paper (2005) (1890) 4(5) Harvard Law Review 194
Stapleton, Timothy, ‘The Electronic Communications Wells, Helene, Allard, Troy and Wilson, Paul, Crime and
Privacy Act and Cell Location Data Is the Whole More CCTV in Australia: Understanding the Relationship (Bond
than the Sum of its Parts?’ (2007) 73(1) Brooklyn Law University Press, 2006)
Review 383
Welsh, Brandon and Farrington, David, Crime Prevention
Surveillance Studies Network, A Report on the Surveillance Effects of Closed Circuit Television: A Systematic Review,
Society (2006) Home Office Research Study 252 (Home Office, 2002)
Sutton, Adam and Wilson, Dean, ‘Open-Street CCTV in ‘Who Knows Where You’ve Been? Privacy Concerns
Australia: The Politics of Resistance and Expansion’ (2004) Regarding the Use of Cellular Phones as Personal Locators’
2(2/3) Surveillance & Society 310 (2004) 18(1) Harvard Journal of Law & Technology 307
Thompson, Mike, ‘Biomentrics: The Good, the Bad and Wilson, Dean and Sutton, Adam, Open-Street CCTV in
the Ugly’ (Paper presented at the Privacy Victoria How Australia (Australian Institute of Criminology, 2003)
Do I Know Who You Are? Conference, Melbourne,
12 November 2008) Working Group on Privacy, Ireland, Report of the Working
Group on Privacy (2006)
180