University of New South Wales - Faculty of Law - LAWS4610 Information Technology Law
This article was published in Privacy Law & Policy Reporter (Prospect Publishing), 3 PLPR 148, December1996.
Most of the world's privacy laws are based around sets of (variously named) privacy principles which formally derive largely from two sources: the OECD privacy Guidelines (1980) and the Council of Europe privacy Convention. There has been a lot of enthusiasm lately for the latest progeny of this legislative line, the European Union privacy Directive of 1995, and the legislation it has influenced (before and after birth) in Québec, New Zealand, Taiwan, Hong Kong and elsewherehttp://shum.huji.ac.il/jcmc/vol2/issue1/index.html]. Australia's Privacy Act 1988 was one of the most important early embodiments of this approach outside Europe, and the current proposals to extend the Act to the private sector (see 3 PLPR 81) do not involve significant changes to the principles.
In most respects, these developments are consolidations of the privacy instruments of the 1980s (and thinking of the 1970s). Such legislation is highly desirable, even if the principles have always contained deficiencies, but may no longer provide adequate protection against new surveillance technologies and administrative practices.
This paper takes a critical look at the content of the privacy principles of the 1980s, and at how three `1990s' instruments both reflect and go beyond the limitations of the 1980s model: The Canadian Standards Association's Model Code for the Protection of Personal Information (1995); the Australian Privacy Charter (1994); and the EU privacy Directive (1995).
Privacy Principles, and privacy legislation generally, have within them (to greater or lesser degrees) two capacities: a capacity to prevent forms of surveillance occurring at all; and a capacity to make it operate more openly and fairly. I believe this is the starting point for an understanding of Privacy Principles.
One of the best and earliest formulations of this approach was by James Rule and colleagues in The Politics of Privacy (1980), who described the development of `the efficiency criterion' in the development of US and other privacy laws:
By this [`efficiency'] criterion, surveillance is considered acceptable provided that four conditions are met: first, that personal data are kept accurate, complete, and up to date; second, that openly promulgated rules of `due process' govern the workings of data systems, including the decision-making based on the data; third, that organisations collect and use personal data only as necessary to obtain `legitimate' organisational goals; fourth, that the persons described in the data files have the right to attest adherence to these principles.
As Rule et al conclude, this is a most opportune definition of `privacy protection' if you are an organisation interested in surveillance:
By these criteria, organisations can claim to protect the privacy of those with whom they deal, even as they demand more and more data from them, and accumulate ever more power over their lives.
This emphasis on making surveillance systems operate more justly and openly - `efficiently' - obscures the broader issues of the extent of surveillance that a democratic society should accept. What degree of surveillance is too intrusive, unforgiving or dangerous, irrespective of how fairly and openly it is done?
My argument, and Rule's, is that, while not discounting the value of the `efficiency' elements of Privacy Principles, the more important criteria against which any Privacy Principles or laws should be measured are that of the capacity they have to place limits on the extent of surveillance carried out, and, where appropriate, to stop proposed surveillance altogether.
This `limiting' or `critical' capacity of Privacy Principles (there isn't even an accepted term for it) is crucial because, if absent, any proposed surveillance scheme, no matter how broad in scope or intense in its intrusiveness, can be carried out fairly and openly. Under these circumstances the objective function of Privacy Principles, laws, and Commissioners will be, very often, to give legitimacy to surveillance schemes which they would otherwise lack, by pronouncing that such schemes do in fact comply with all the Privacy Principles. `The Privacy Commissioner will be kept fully informed' is the refrain often heard when politicians want to blunt public disquiet about some proposed surveillance measure - if they know there is nothing the Commissioner can do to stop it.
So the question we need to ask about Privacy Principles, both those now in existence, and those proposed for the 21st Century, is `to what extent do they act as smokescreens for surveillance?'.
In OECD Guidelines terms, we would describe the four `efficiency' conditions of Rule et al as encompassing the Principles of `Collection limitation', `Data quality', `Purpose specification', `Openness', `Individual participation' and `Accountability' - and parts of `Use limitation'. The only missing OECD principle is `Security safeguards', which could certainly be regarded as part of `efficiency'. However, the OECD Guidelines, and all subsequent international agreements, and most national laws, have added one other vitally important ingredient that goes beyond `efficiency'. This is the requirement in the OECD's `Use limitation' principle that organisations only use or disclose the personal information they collect for the purpose for which they collected it, with defined exceptions (of very varying breadth in different laws and agreements). This `finality' limitation, as it is sometimes called, goes beyond `efficiency': if enforced it means that organisations cannot change their minds about the uses they (or others) wish to make of personal information, after the event of collection. This is a significant limitation on the surveillance capacity of organisations. However, it is only of much significance if organisations are required to narrowly define the purpose of collection in the first place. Otherwise, by planning ahead, they can avoid problems that `finality' may otherwise cause.
The Canadian Standards Association's Model Code for the Protection of Personal Information (see 2 PLPR 134 for a summary) is one of the most significant recent initiatives that derives from the `1980s model'. The CSA Code is close to the perfect example of a set of privacy principles that only implements the `efficiency' criterion. It is only `close' because it, like other laws and agreements, adds the important `finality' element (principle 5).
According to the CSA's 10 principles, the organisation concerned is the only party that has a role in identifying the purposes for which personal information is collected (principle 2). Once an organisation has determined its purposes, everything flows from this: collection is limited to those purposes (principle 4); use, disclosure and retention are limited by those purposes (principle 5); and `data quality' (accuracy, completeness and currency) are to be appropriate to those purposes.
The Code has nothing to say about any limitations on how broad or multi-purpose these purposes may be, or how inherently intrusive a purpose may be. One strength of the Code is that the only exceptions to use and disclosure that it allows are `with the consent of the individual or as required by law'. However, it is noticeable that there is no similar requirement of compliance with law explicitly stated in relation to the determination of the purposes of collection of information - the assumption seems to be that this will normally be unconstrained.
The CSA Code adds the classic `efficiency' criteria of accountability (principle 1), security safeguards (principle 7), openness (principle 8), individual access (principle 9) and rights to challenge compliance (principle 10). Other than `finality' (principle 5), the Code does not impose any limitations on surveillance which go beyond the `efficiency criterion', with two possible exceptions.
There is a requirement of individual `knowledge and consent' (principle 3) to collection, use or disclosure of information, but both knowledge and consent are conditioned by the words `except where appropriate'. The Code indicates that the organisation concerned is to determine `appropriateness', but the Notes to principle 3 give examples of where consent might not be necessary. The openness of `appropriateness' is at least a point here at which it could be argued that individuals or third parties such as governments should have some say - it is a potentially `limiting' or `critical' element in the Code, but one whose significance is not clear.
The consent principle also includes the valuable commentary that an organisation should not, as a condition of the supply of a product or service, `require an individual to consent to the collection, use or disclosure of information beyond that required to fulfil the explicitly specified, and legitimate purposes'.
The Code also includes the requirement of organisational `openness' about its personal data practices (principle 8), familiar since the OECD Guidelines. Openness is always two-faced: it is no formal limit on an organisation's surveillance practices to disclose what it does (if anyone asks), and it mutes opposition to say that there is nothing secret going on; but on the other hand information about practices is usually a pre-condition to effectively opposing them by political means, so `openness' has a critical edge.
In summary, there is relatively little in the CSA Model Code that goes beyond Rule's `efficiency criterion', other than the `finality' principle, and perhaps greater disclosure requirements. By itself, the Code may serve a valuable role in sanitising surveillance, but is less likely to serve to limit its growth and extent.
A rejoinder to this argument is that the CSA Code is not intended to operate in a vacuum, and that there may well be other external constraints, such as legislation, which limit the purposes for which information may be collected under principle 4. The commentary in the Code does mention that any applicable legislation must be considered in implementing it, and it does say that it is only a set of minimum requirements. Discussions of the relationship between the Code and legislation that I have seen don't usually seem to mention the need for such legislation to extend the principles in the Code, or stress the partial nature of what it covers. Something that claims to be a `Model Code' should at least within the wording of its ten Principles recognise and indicate the source of other constraints that are crucial to its subject matter. It is at best a Model Code for part of `the Protection of Personal Information' - arguably the less important part - and it should make this clear.
Is it a good idea to call for the immediate legislative implementation of the CSA Code? This is `the pragvocates dilemma': is it better to have a valuable set of protections to ensure that surveillance will work more fairly when it occurs, even if by doing so you increase the likelihood that it will occur by providing a device which could legitimate it but which has little capacity to limit it? I suspect that it is a good idea, because fairness, openness and finality are so valuable in themselves, but this needs to be coupled with an energetic effort to obtain the other, more political, controls that are needed.
The Australian Privacy Charter makes an interesting comparison to other Codes and legislation because of its attempt to address issues beyond the `efficiency criterion' and also to address some of the emerging issues which were not obvious in the 1980s.
The Charter does not have the same pedigree as the CSA Model Code's genesis in hard negotiations between a wide variety of industry representatives and privacy advocates. There are superficial similarities: the Charter came out of a process which involved participation by some industry representatives, and credit reporting and telecommunications industry representatives were involved throughout. However, with these exceptions, the Charter drafting group consisted mainly of Australian privacy advocates and experts, including senior staff of privacy agencies. It is best described as a `privacy advocates Charter'. As a `log of claims' by privacy advocates, it is valuable for that reason alone, as I will mention later.
The Charter contains all the `efficiency' and `finality' principles found in the OECD Guidelines and the Australian Privacy Act 1988, but its 18 Privacy Principles go further.
The Charter addresses the question of defining the acceptable purposes of surveillance at the outset, but obliquely, by stating that potentially privacy-invasive systems should not be introduced `unless the public interest in so doing outweighs any consequent dangers to privacy'.
Principle 1 - Justification & exceptions
Technologies, administrative systems, commercial services or individual activities with potential to interfere with privacy should not be used or introduced unless the public interest in so doing outweighs any consequent dangers to privacy.
Exceptions to the Principles should be clearly stated, made in accordance with law, proportional to the necessities giving rise to the exception, and compatible with the requirements of a democratic society.
It also requires a `precise' purpose for collection to be specified (Principle 11), though how `precise' remains undefined.
The Charter also rejects `consent' as the sole touchstone of legitimacy:
Principle 2 - Consent
Individual consent justifies exceptions to some Privacy Principles. However, 'consent' is meaningless if people are not given full information or have no option but to consent in order to obtain a benefit or service. People have the right to withdraw their consent. In exceptional situations the use or establishment of a technology or personal data system may be against the public interest even if it is with the consent of the individuals concerned.
The self-defined purposes of the organisation are clearly not the determining factor in these Principles. The Charter does not attempt to address how the Principles are to be implemented, so it doesn't prescribe a process for determining the public interest considerations.
It is also significant that the Charter requires the legitimacy of administrative systems and commercial services to be justified at the `system' level. In contrast, `purposes of collection' in the CSA Code and similar approaches focuses only on the collection of information and obscures the fact that it is the purposes of establishing whole surveillance systems that needs justification, not just collection.
Three other Principles in the Charter go beyond the usual formulations from the 1980s, and were considered to deserve separate statement, though it could be argued that some or all of them are implied by other Principles.
Principle 10 - Anonymous transactions People should have the option of not identifying themselves when entering transactions.
Principle 17 - Public registers Where personal information is collected under legislation and public access is allowed, these Principles still apply except to the extent required for the purpose for which public access is allowed.
Principle 18 - No disadvantage People should not have to pay in order to exercise their rights of privacy described in this Charter (subject to any justifiable exceptions), nor be denied goods or services or offered them on a less preferential basis. The provision of reasonable facilities for the exercise of privacy rights should be a normal operating cost.
In the two years since it was launched, the Charter has had some influence in Australia. It is referred to in reports by regulatory bodies, and in speeches by the Australian Privacy Commissioner. It was recognised as a major source of inspiration and content for a privacy Bill introduced into the Australian Parliament by the Australian Democrats shortly before the 1996 Australian election. It has been adopted as an `in house' code by a few private sector organisations.
Despite these encouraging signs, the Charter will almost certainly have less impact and widespread implementation than the CSA Code, for many reasons. However, one of the reason is that it does call into question the surveillance interests and practices of any organisation, in a way that the CSA Code does not.
The Australian Charter and even the Canadian Code are small beer compared with the European Union's privacy Directive (see 2 PLPR 81). The Directive is very valuable to those outside Europe who do not have comprehensive privacy laws because of its threat to ban the exports of personal data to such places (see 2 PLPR 105). Its `scare value' outside Europe has been invaluable for awakening politicians and the media to the reality of, and need for, information privacy laws.
However, the success of the Directive's extra-jurisdictional scare value also poses a problem for those of us outside Europe, as local legislators may accept the Directive as the definitive world standard of what is needed to protect privacy. For example, the New South Wales Attorney-General announced his intention to introduce privacy legislation on the basis that it would make New South Wales `the first state to meet the all-important [EU Directive], making NSW a magnet for business ventures'. The Directive's wording has also had a direct influence on which personal data exports from Australia are to be allowed, not just on the acceptance of the need for restrictions on the export of personal data.
Therefore, while accepting the legal and political value of the Directive within and outside Europe, we must still ask `to what extent does it embody a set of privacy principles which are adequate for the 21st century?'. This paper's contribution to this debate is simply to ask whether the Directive requires laws which go beyond `efficiency' considerations.
The key provision in the Directive in relation to the purposes for which surveillance systems may be established is Article 7 which defines legitimate `processing of personal data', which includes legitimate collection of personal data, as well as its storage, use and disclosure (Article 2(b)). Processing is only legitimate if it comes within one of the conditions in Article 7, so there is no assumption that organisations can simply make internal decisions about the purposes of collection. Legitimacy can be founded on the consent of the data subject, to protect the vital interests of the data subject, on the legal obligations of the system controller, or where necessary in the public interest.
However, where it is only the interests of the operator of the surveillance system that provides the justification, legitimacy is limited to where it is `necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject ...'. Article 7 does not elaborate on how this balancing is to be achieved, but the preamble says that Member States remain free to determine the appropriate balance in relation to use of information for 'legitimate ordinary business activities' and conditions of disclosure for marketing purposes. Many of the most contentious privacy decisions are therefore still left to the Member States to make, but the important thing is that the Directive explicitly includes `the interests or fundamental rights and freedoms of the data subject', and other public interests, as factors determining the legitimate `purposes' of surveillance systems.
Is this EU requirement `export quality'? Could a jurisdiction whose privacy protection was based on principles that left what the legitimate purposes of collection (and, therefore, `processing') solely to the self-assessment of the surveillance organisation be considered to have `adequate' privacy protection in EU terms? Let's hope not.
There are some other aspects of the Directive's substantive content which go beyond `efficiency' or define principles beyond the models of the 1980s. Those worth noting include:
Many of these elements do, of course, derive from national privacy laws of particular EU member States, but in that form little attention was paid to them outside Europe except by privacy aficionados. Their `percolation up' into the EU Directive has the valuable effect that, properly handled, they can gain the attention of legislators in places like Australia and Canada - and perhaps, one day, even in the USA!
Moderate consumption of Australian bubbly (we can't call it `Champagne' because of other EU initiatives and litigation) is an appropriate response to the principles of the EU Directive. They may be riddled with exceptions and weakened by unenthusiastic national implementations, and they don't address many of the emerging `21st century issues', but they do go a good distance beyond a mere concern with surveillance `efficiency'.
 Organisation for Economic Cooperation and Development's Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD, Paris, 1981)
 Convention for the Protection of Individuals with Regard to the Automatic Processing of Personal Data (Convention No 108), in force since 1985
 See details in Greenleaf G `A privacy code for Pacific cyberlaw' Journal of Computer Mediated Communications, (Special Issue on Emerging Law on the Electronic Frontier') Vol 2 No 1 (1996), located at
 See the article by John Gauding in this issue for comments on the history of the OECD developments.
 I use `surveillance' in a neutral or non-pejorative sense, `to indicate monitoring for all sorts of purposes, both helpful and coercive' , following Rule et al, op cit, (below) p47
 James Rule, Douglas McAdam, Linda Stearns and David Uglow The Politics of Privacy, Mentor Books, 1980
 National Standard of Canada CAN/CSA-Q830-96; see also Colin Bennett `PLUS 8830 - Implementing Privacy Codes of Practice', Canadian Standards Association, 1995; see also Colin Bennett `Privacy codes, privacy standards and privacy laws: The instruments for data protection and what they can achieve' Visions for Privacy in the 21st Century: A Search for Solutions, Laurel Point Inn, Victoria, British Columbia, May 9-11, 1996
 See below concerning the general statement which appears in the Code's commentary.
 See `1. Scope' - Canadian Standards Association Model Code for the Protection of Personal Privacy, 1995
 See for example, Bennett 1996 op cit Part III `The Value-added of Data Protection Law'
 Such calls have been made by the Canadian Direct Marketing Association (CDMA): see Bennett 1996 op cit p11
 `pragmatic advocate', coined by Simon Davies
 See (1995) 2 PLPR 44 for the full text of the Charter
 See Bennett 1996op cit
 See Tim Dixon `Privacy Charter sets new benchmark in privacy protection' (1995) 2 PLPR 41
 Including the writer
 see (1995) 2 PLPR 162
 Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data , Directive 95/46/EC of 24 October 1995
 see G Greenleaf ` "Revolutionary" NSW Bill to set the agenda' (1996) 3 PLPR 17
 See Commonweatlh Attorney-General's Department Discussion Paper - Privacy Protection in the Private Sector, 1996, p20
 For a discussion of the meaning of the `adequacy' on non-EU privacy laws, see G Greenleaf `A privacy code for Asia-Pacific cyber-law' (1996) Journal of Computer-Mediated Communication, V2 No1, 'Emerging Law on the Electronic Frontier', http://www.usc.edu/dept/annenberg/vol2/issue1/ , and more briefly in G Greenleaf `European privacy Directive and data exports' (1995) 2 PLPR 105
 National laws can provide either for objection after the data subject has been informed that the data is to be used for direct marketing, or merely at the data subject's request.
 The 1990 draft was limited to decisions `involving an assessment of conduct', and referred to `personality or profile'. The Parliament recommended that this only apply to assessments of `character', that there should be an exception where there is consent, but that there would be a right to be informed of and to challenge any such automated processing. The 1992 draft referred to processing defining a personality profile.
 The authority must be notified of such proposed operations by the controller or the data protection official (A20(2)).
 Subject to numerous exceptions: A8(2)-(4).
 These can
only be kept under official authority: A8(5).