Abstract
Privacy is not protected as a common law right, and neither as a right under the Australian constitution. Given this, the chapter discusses the courts views on the statutory definition of personal information and highlights the issues that are still to be addressed to better protect privacy—whether the various categories of big location data can be considered as personal information when data aggregation occurs, and the impact on privacy.
The major difference between how content and location information are treated, despite them both dealing with information that may be personal and sensitive, is not justifiable. The Agencies can collect personal information based on their sole judgment for reactive and proactive investigations and other uses that are remotely linked to other functions or activities of the Agencies, whereas for other types of personal information such as the contents of a voice call, a Judge’s prior approval is required. The investigatory powers are broad, and their limits are hard to determine.
After the discussion of the circumstances under which location information can be considered personal and sensitive information, the chapter critically discusses the use of aggregated location information ‘in connection with’ or ‘directly related’ to the activities of the Agencies. This analysis sketches the privacy and governance challenges posed using BD software to analyse and use location information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
The ICCPR was ratified on 08/13/1980.
- 4.
- 5.
The word ‘use’ is not defined in the TIA Act 1979 , nor in the Privacy Act 1988 .
- 6.
Data matching is defined as ‘… bringing together of at least two data sets that contain personal information, and that come from different sources, and the comparison of those data sets with the intention of producing a match.’ See: OAIC (2014).
- 7.
The ‘APP3.1 Reasonably Necessary or Directly Related Personal Information Test’ refers to ‘reasonable belief’. Similarly, the facts the AFP will use to issue the authorisation and notification under the CAC Determination 2018 need to be sufficient to persuade the AFP that the collection of the LI is ‘reasonably necessary’ or ‘directly related’ to its functions or activities. The assumption is that the AFP must still comply with the ‘reasonable belief’ standard when it issues an authorisation and notification under the CAC Determination 2018 to collect location information. To clarify this, the CAC Determination 2018 may need to make a cross-reference to APP 3.1.
References
3GPP (2017) 5G; Study on Scenarios and Requirements for Next Generation Access Technologies (3GPP TR 38.913 version 14.2.0 Release 14) 2017-05
5G PPP (undated) 5G Vision. https://5g-ppp.eu/wp-content/uploads/2015/02/2G-Vision-Brochure-v1.pdf. Accessed 27 Aug 2019
ACMA (2016). http://www.acma.gov.au/Industry/Spectrum/Radiocomms-licensing/Apparatuslicences/apparatus-licensing-arrangements-for-femtocells. Accessed 4 Aug 2017
ACMA (2018) Communications report 2017–18
Acts Interpretation Act 1901 (Cth)
Acts Interpretation Act 1901 (Cth) (AIA 1901)
AHRC (2018) Human Rights Explained: Fact sheet 7: Australia and Human Rights Treaties. https://www.humanrights.gov.au/human-rights-explained-fact-sheet-7australia-and-human-rightstreaties. Accessed 28 Aug 2019
ASIO (2014) Submission No 12.1 to the Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014
ASIO (2019a) Director General’s Review. https://www.asio.gov.au/AR2018-01.html. Accessed 18 Sept 2019
ASIO (2019b) Management and Accountability. https://www.asio.gov.au/AR2018-05.html. Accessed 18 Sept 2019
Attorney-General’s Department (2016) Attorney-General’s Guidelines in relation to the performance by the Australian Security Intelligence Organisation of its function of obtaining, correlating, evaluating and communicating intelligence relevant to security (including politically motivated violence) 2016’, 2016 (the Attorney-General’s [AG’s] Guidelines)
Attorney-General’s Department (AGD) (2015) Submission No 27 to the Parliamentary Joint Committee on Intelligence and Security, Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, 16 January 2015
Australia & New Zealand Bank v Ryan (1968) 88 WN (Pt l) (NSW) 368
Australian Broadcasting Corporation (ABC) v Lenah Game Meats Pty Ltd [2001] HCA 63
Australian Federal Police Act 1979 (Cth) (AFP Act 1979)
Australian Human Rights Commission (AHRC) (undated) What are human rights? https://www.humanrights.gov.au/about/what-are-human-rights. Accessed 28 Aug 2019
Australian Human Rights Commission Act 1986 (Cth) (AHRC Act 1986)
Australian Privacy Commissioner (APC) (2015) Submission No 92 to the Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, January 2015
Barbaschow A (2019, September 6) Terrorism, espionage, and cyber: ASIO’s omne trium perfectum. https://www.zdnet.com/article/terrorism-espionage-and-cyber-asios-omne-trium-perfectum/. Accessed 18 Sept 2019
Barclays Bank v Taylor [1989] 1 WLR 1066
Battersby L (2012, July 6) Telstra offers signal boost – at a price. The Sydney Morning Herald. http://www.smh.com.au/business/telstra-offers-signal-boost%2D%2Dat-a-price-20120706-21l5f.html. Accessed 29 Aug 2019
Bennett ML, de Koker L (2017) Open secrets: balancing operational secrecy and transparency in the collection and use of data for national security and law enforcement agencies. Melb Univ Law Rev 41(2):530. http://classic.austlii.edu.au/au/journals/MelbULawRw/2017/32.html
Boyd B, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological and scholarly phenomenon. Inf Commun Soc 15:662
Casanovas Romeu P, de Koker L, Mendelson D, Watts D (2017) Regulation of big data: perspectives on strategy, policy, law, and privacy. Health Technol:335–349
Chan J, Moses LB (2017) Making sense of big data for security. Br J Criminol 57(2):299–319
Christoj v Barclays Bank [2000] 1 WLR 937
Comcare v Banerji [2019] HCA 23 (7 August 2019) (the Comcare court case)
Commonwealth of Australia Constitution Act 1900 (Cth) (CACA 1900)
Commonwealth of Australian (2012) Australian Criminal Intelligence Management Strategy 2012–15. http://www.aph.gov.au/DocumentStore.ashx?id=1c12c52d-439c-492e-acc9-e90c4ba50ee3. Accessed 28 Aug 2019
Commonwealth of Australian (2017) Australian Criminal Intelligence Management Strategy 2017–20. https://www.afp.gov.au/sites/default/files/PDF/ACIM-strategy-2017-20.pdf. Accessed 28 Aug 2019
Commonwealth v Tasmania (Tasmanian Dam Case) (1983) 158 CLR 1
Communications Access Coordinator’s (CAC) Telecommunications (Interception and Access) (Requirements for Authorisations, Notifications and Revocations) Determination 2015 (Cth) (at 9 October 2015) (CAC Determination 2015)
D2D CRC (2018) Integrated Law Enforcement. https://www.d2dcrc.com.au/rd-programs/integratedlaw-enforcement/. Accessed 4 Jan 2018
de Koker L, Chan J, Mendelson D, Bennett Moses L, Maurushat A, Vaile D, Gaffney, Sadler G, Grierson P, Cater D (June 2018) Australia Report. Big Data Technology and National Security. Comparative International Perspectives on Strategy, Policy and Law. Law and Policy Program. Data to Decisions Cooperative Research Centre. https://uploads-ssl.webflow.com/5cd23e823ab9b1f01f815a54/5cff12f563db55c367e6c7ca_Big%20Data%20Technology%20and%20National%20Security%2C%20Comparative%20International%20Perspectives%20on%20Strategy%2C%20Policy%20and%20Law%20-%20AUSTRALIA%20REPORT.pdf
Department of Foreign Affairs and Trade (DFAT) (2018) Treaties Last Updated 08/30/2010. http://www.info.dfat.gov.au/Info/Treaties/Treaties.nsf/AllDocIDs/8B8C6AF11AFB4971CA256B6E0075FE1E. Accessed 28 Aug 2019
Drugs Misuse and Trafficking Act 1985 (NSW) (DMT)
European Telecommunications Standards Institute (ETSI) (2017a) Lawful Interception (LI); Retained Data; Requirements of Law Enforcement Agencies for handling Retained Data
European Telecommunications Standards Institute (ETSI) (2017b) LTE; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Stage 2 functional specification of User Equipment (UE) positioning in E-UTRAN (3GPP TS 36.305 version 14.2.0 Release 14)
European Telecommunications Standards Institute (ETSI) (2017c) LTE; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2
European Telecommunications Standards Institute (ETSI) (2017d) Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Network architecture’, 2017, (3GPP TS 23.002 version 14.1.0 Release 14) ETSI TS 123 002 V14.1.0 (2017-05)
Evidence to Parliamentary Joint Committee on Intelligence and Security (PJCIS), Parliament of Australia, Canberra, 29 January 2015, 38 (Vivienne Thom, Inspector-General of Intelligence and Security, Office of the Inspector-General of Intelligence and Security)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 19 (Kerri Hartland, Acting Director-General, ASIO)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 2 (Katherine Ellen Jones, Deputy Secretary, National Security and Criminal Justice Group, Attorney-General’s Department)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 29 January 2015, 46–47 (Timothy Pilgrim, Australian Privacy Commissioner, Office of the Australian Information Commissioner)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 30 January 2015, 65 (Lewis Duncan Edward, Director-General of Security, Australian Security Intelligence Organisation) cited in Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Advisory Report on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) 2015
Explanatory Memorandum, Privacy Bill 1988 (Cth) 7 [16]
Explanatory Memorandum, Privacy Amendment (Enhancing Privacy Protection) Bill 2012 (Cth)
Federal Commissioner of Taxation v Australia & New Zealand Banking Group (1979) 143 CLR 499
Gandomi A, Haider M (2015) Beyond the hype: big data concepts, methods, and analytics. Int J Inf Manage 35:137
George v. Rockett (1990) 170 CLR 104 20 June 1990 (the George case)
Germano G (2010) The Impact of Femtocells on Next Generation LTE Mobile Networks. PowerPoint Presentation at the FemtoForum, 2010, 1–30. ftp://www.3gpp.org/Information/presentations/presentations_2010/2010_05_Moscow/Femto_Forum_Germano.pdf. Accessed 28 Aug 2019
Goldenfein J (2017, January 19) Australia’s privacy laws gutted in court ruling on what is ‘personal information’. The Conversation. https://theconversation.com/australias-privacy-laws-gutted-incourt-ruling-on-what-is-personal-information-71486. Accessed 28 Aug 2019
Human & Constitutional Rights Resource Page (2018). http://www.hrcr.org/safrica/privacy/austr_law.html. Accessed 28 Aug 2019
Hutchinson S, Ferguson R, Urban R (2018, January 6) African Gangs Reign of Fear in Melbourne’s West. The Australian. https://www.theaustralian.com.au/nationalaffairs/state-politics/african-gangs-reign-of-fear-in-melbournes-west/newsstory/deb78713fb90f132c8df28b2b163fd24. Accessed 4 Apr 2018
iiNET (2015) Law enforcement agencies contact. https://www.iinet.net.au/about/legal/law.html. Accessed 8 July 2017
Inspector-General of Intelligence and Security (IGIS) (2019) Submission 36 to the Parliamentary Joint Committee on Intelligence and Security. Review of the mandatory data retention regime, July 2019
Johnston A (2017) Privacy law: data, metadata and personal information: a landmark ruling from the federal court. Law Soc NSW J (LSJ) 83. https://search.informit.com.au/documentSummary;dn=672220148307678;res=IELAPA. Accessed 28 Aug 2019
Keenan M (12 May 2014) Ministerial Direction Australian Federal Police. https://www.afp.gov.au/about-us/governance-and-accountability/ministerial-direction. Accessed 28 Aug 2019
Kioa v West (1985) 159 CLR 550
Koivisto A, Hakkarainen M, Costa M, Kela P, Leppanen K, Valkama M (2017) High-efficiency device positioning and location-aware communications in dense 5G networks. IEEE Commun Mag 55(8):188–195. https://doi.org/10.1109/MCOM.2017.1600655
La Trobe University (2019) Submission 10 to the PJCIS, Review of the mandatory data retention regime, July 2019
Laster (1989) Breaches of confidence and of privacy by misuse of confidential information. Otago Law Rev 7:31, 424
Loyd v Freshjeld (1826) 2 Car & P 325; 172 ER 147
Mapbox (2018) A Mapping Platform Powered by The Best Data in The World. https://www.mapbox.com/about/maps/. Accessed 28 Aug 2019
Maurushat A (2016) BD use by law enforcement and intelligence in the national security space: perceived benefits, risks and challenges. Media Arts Law Rev 21(3):1–27
Maurushat A, Benett-Moses L, Vaile D (2015) Using ‘Big’ Metadata for Criminal Intelligence: Understanding Limitations and Appropriate Safeguards. ICAIL ’15, Jun 08–12, 2015, San Diego, CA, USA. ACM 978-1-4503-3522-5/15/06. https://doi.org/10.1145/2746090.2746110
Mayer J, Mutchler P, Mitchell JC (2016) Evaluating the privacy properties of telephone metadata. Proc Natl Acad Sci U S A 113(20):5536–5541
Minister for Justice (Cth) (Media Release, 15 June 2016) Investing in innovation for our law enforcement elite
Munson JP, Gupta VK (2002) Location-based notification as a general-purpose service. (Paper presented at the Proceedings of the 2nd international workshop on Mobile commerce, Atlanta, Georgia, USA, 28 September 2002)
Namiot D (2013) GeoFence services. Int J Open Inf Technol 1(9):30–33
Next Generation Mobile Networks Ltd (NGMN) (2015) 5G white paper. https://www.ngmn.org/uploads/media/NGMN5GWhitePaperV10.pdf. Accessed 27 Aug 2019
Nohrborg M (2017) LTE 3GPP. http://www.3gpp.org/technologies/keywordsacronyms/98-lte. Accessed 28 Aug 2019
Ockenden W (2016, August 16) How your phone tracks your every move. ABC. http://www.abc.net.au/news/2015-08-16/metadata-retention-privacy-phone-willockenden/6694152. Accessed 28 Aug 2019
Office of the Attorney-General (2015) Report 1 of the Data Retention Implementation Working Group (IWG), 30–31. http://www.aph.gov.au/DocumentStore.ashx?id=f261eba5-534c-4627-906c-a1bdd142b394. Accessed 28 Aug 2019
Office of the Australian Information Commissioner (OAIC) (2013) Australian Privacy Principles and National Privacy Principles – Comparison Guide. https://apo.org.au/node/33783. Accessed 28 Aug 2019
Office of the Australian Information Commissioner (OAIC) (2014) Guidelines on Data Matching in Australian Government Administration. https://www.oaic.gov.au/privacy/guidance-and-advice/guidelines-on-data-matching-in-australian-government-administration/. Accessed 28 Aug 2019
Office of the Australian Information Commissioner (OAIC) (2015) Australian Privacy Principles Guidelines Chapter B: Key concepts, Version 1.2 ed., Vol. B
Parliament of Australia (2006) Was there an EM?: Explanatory Memoranda and Explanatory Statements in the Commonwealth Parliament. https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Browse_by_Topic/law/explanmem/wasthereanEM. Accessed 28 Aug 2019
Parliamentary Joint Committee on Intelligence and Security (PJCIS), Parliament of Australia, Advisory Report on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) 2015
PJCHR, Human rights scrutiny report Thirty-fifth report of the 44th Parliament (25 February 2016)
Privacy Act 1988 (Cth)
Privacy Commissioner v Telstra Corporation Limited [2017] FCAFC 4 (Privacy Commissioner court case)
R v Zhi Qiang Han [2011] NSWCCA 120 (the Zhi court case)
Revised Explanatory Memorandum, Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2015 (Cth), 2015
Robertson v Canadian Imperial Bank of Commerce [1994] 1 WLR 1493
Samsonidis v Commissioner, Australian Federal Police [2007] FCAFC 159 (5 October 2007) (the Samsonidis court case)
Sarkar N (2015) Using analytics and automation to create personalised customer journeys. Presentation at the SAS Forum, Sydney, Australia, May 7. https://www.sas.com/en_au/events/sasforum/2015/sas-executive-forum.html#speakers. Accessed 6 Feb 2016
SAS Institute Inc. (2017) SAS Master Data Management. https://www.sas.com/en_au/learn/software/customer-intelligence-360/tutorials/upload-data.html. Accessed 7 Aug 2017
SAS Institute Inc. (2018) What is big data? https://www.sas.com/en_au/insights/big-data/what-isbig-data.html. Accessed 7 Aug 2017
Smith GJD, Moses LB, Chan J (2017) The challenges of doing criminology in the big data era: towards a digital and data-driven approach. Br J Criminol 57(2):259–274
Stratton J (2013) Library Council of New South Wales, Hot Topics 85, Human Rights, Chapter 4c: Implementing treaties in Australian law. https://legalanswers.sl.nsw.gov.au/hot-topics-human-rights. Accessed 28 Aug 2019
Supplementary Explanatory Memorandum, Telecommunications (Interception and Access Amendment (Data Retention) Bill 2014
Taylor (2000) Why is there no common law right of privacy? Monash Univ Law Rev 26:240–241
Telecommunications (Interception and Access) Act 1979 (Cth) (TIA Act 1979)
Telecommunications (Interceptions and Access) (Requirements for Authorisations, Notifications and Revocations) Determination 2018 (Cth) (at 20 November 2018) (CAC Determination 2018)
Telstra (2015) Submission No 112 to the Parliamentary Joint Committee on Intelligence and Security, Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, January 2015
Telstra (2019) Privacy. https://www.telstra.com.au/privacy/customer-access. Accessed 20 Aug 2019
Telstra Corporation Limited and Privacy Commissioner [2015] AATA 991 (18 December 2015) (Telstra decision)
Tournier v National Provincial & Union Bank of England [1924] 1 KB 461
Victoria Park Racing and Recreation Grounds Co Ltd v Taylor (1937) 58 CLR 479
Watts D, Casanovas P (2019) Privacy and Data Protection in Australia: a critical overview. https://www.d2dcrc.com.au/article-content/privacy-and-data-protection-in-australia-a-critical-overview-extended-abstract
Winterton Constructions v Hambros (1992) 39 FCR 97, 114-15
WL v La Trobe University (General) [2005] VCAT 2592
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shanapinda, S. (2020). Location Information as Personal Information, to Better Protect Privacy. In: Advance Metadata Fair. Law, Governance and Technology Series, vol 44. Springer, Cham. https://doi.org/10.1007/978-3-030-50255-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-50255-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50254-6
Online ISBN: 978-3-030-50255-3
eBook Packages: Law and CriminologyLaw and Criminology (R0)