Legal Services India - Law Articles is a Treasure House of Legal Knowledge and information, the law resources is an ever growing database of authentic legal information.

» Home
Thursday, April 25, 2024

Human Rights in the Modern Era: Privacy Rights: A Commonwealth Perspective

Posted in: Privacy Law
Thu, Mar 28, 19, 15:34, 5 Years ago
star star star star star
3 out of 5 with 1 ratings
comments: 0 - hits: 10152
The doyens of 20th century human rights declarations and conventions could never have envisaged a world so interconnected as ours, where information is shared globally and instantaneously, and many people live their lives online.

Introduction:
The doyens of 20th century human rights declarations and conventions could never have envisaged a world so interconnected as ours, where information is shared globally and instantaneously, and many people live their lives online. As the digital age expands into homes, between businesses and across borders, legislators are struggling to strike a balance between guaranteeing freedom of expression and protecting privacy, respecting the limits of international jurisdiction, and ensuring that citizens remain safe online. Achieving an effective balance will be one of the great human rights challenges of the 21st century. The use of bilateral and multilateral mutual legal assistance treaties (MLATs), with their inbuilt protections against violations of the right to privacy and freedom of speech, is an essential part of that process, but as international organised crime escalates and requests for assistance become more numerous and complex, these systems have become overburdened and other solutions are being sought.

The Commonwealth cybercrime and privacy framework:
On 20th April 2018, at their meeting in London, 53 Heads of Commonwealth Governments, including the Heads of 31 Small Commonwealth and island States, unanimously adopted a landmark Commonwealth Cyber Declaration committing themselves to:
# A cyberspace that supports economic and social development and rights online;

# Building the foundations of an effective national cyber security response; and

# Requiring cyber security frameworks to promote stability in cyberspace through international cooperation.

The Declaration, which has been described as “the world's largest and most geographically diverse inter-governmental commitment on cybersecurity cooperation“, followed immediately after the UK Governments announcement to pledge up to £15 million to help Commonwealth countries strengthen their cybersecurity capabilities. it was accompanied by an implementation Plan for the Period 2018-2020, in which the Heads of Governments agreed to examine and assess their cybersecurity frameworks and to determine their capacity needs.

Commonwealth countries have long recognized the importance of the right of the public to access information held by the government and the need to protect the privacy of individuals whose personal information is held by public or private organisations. Between 2002 and 2005, Law Ministers adopted three inter—related bills to assist Commonwealth member countries, which had yet to enact laws providing for access to information: The Model Privacy Bi/l (2002); The Model Freedom of Information Bill (2002); and The Model Bill on the Protection of Personal Information (2005). Each of them draws largely from the core principles set out in the OECD Privacy Guidelines 1980, updated in 2013.

The Commonwealth also has The Harare Scheme‘ an established framework of mutual legal assistance, updated in 201 1 to include presentation of computer data, interception of telecommunications and covert electronic surveillance.

The Scheme has clear built- in safeguards to protect the sovereignty of Commonwealth states and the privacy of Commonwealth citizens.

The Commonwealth also has in place the Commonwealth Network of Contact Persons, which provides investigators and prosecutors with practical and legal advice and enhances informal cooperation; the Commonwealth Cybercrime Initiative, a consortium of 85 international organisations including Interpol, the Council of Europe, UNODC, and the Commonwealth Telecommunications Organisation, which provides member countries with technical assistance on cybercrime and cyber security capacity building on request.

In 2011, Law Ministers adopted The Commonwealth Model Law on Computer and Computer Related Crime, which is currently being reviewed by a Commonwealth Expert Group, and provides a legislative framework of cyber related offences based upon the Council of Europe’s Convention on Cybercrime (The Budapest Convention)? the Preamble of which specifically recognises:
“...the right of everyone to hold opinions without interference, as well as the right to freedom of expression, including the freedom to seek, receive, and impart information and ideas of all kinds, regardless of frontiers, and the rights concerning the respect for privacy” and “the right to the protection of personal data..."

The Budapest Convention has been ratified or acceded to by 61 states. Eight Commonwealth countriess are Parties to it and others have introduced legislation based upon it. It sets out an MLA framework similar to the Harare Scheme, with provision for states to impose restrictions ensuring that data disclosed is not used for purposes other than those contained in the MLA request.

Mutual Legal Assistance: the need for change The Commonwealth privacy framework is comprehensive and like the Budapest Convention is subject to review, but as technology has advanced and requests for MLA assistance have soared, the bureaucracy involved in responding to requests has led to delays which are unacceptable if the destruction of incriminating data is to be avoided, and serious crime, particularly economic and international organised crime, is to be effectively investigated and prosecuted. in 201 3, a UN study found that the MLA process takes, on average, 1 60 days from request to response? In April 201 7, Google noted in its Transparency Report that it received 45,549 government requests for user data in the second half of 201 6 of which 31,OOO (approximately 70°/0) were from non—US governments. Not surprisingly it called for a more efficient legal process than the current MLA treaties.

The Commonwealth model bills on privacy and freedom of information are at least twelve years old and a Working Group is currently reviewing the Commonwealth Model Law on Computer and Computer Related Crime. Investigators and prosecutors are challenging the effectiveness of MLA treaties and seeking other solutions. The US has enacted and the UK is enacting legislation to make it easier for law enforcement agencies to obtain electronic evidence, including emails and documents stored on the Cloud, and they are negotiating an international cooperation agreement to give it effect. Similarly, a European Union instrument that would allow Member States to obtain data directly from companies in other Member States is making its way through the European Parliament, although the UK will need to forge fresh agreements with Member States post—Brexit.9 Two recent cases, one in the US and one in the UK, illustrate the difficulties which have arisen in resolving issues of territoriality in pre—lnternet age statutes and which demonstrate the need for legislative intervention.

The US Solution: The Microsoft Litigation and the CLOUD Act:
On 14 July 2016, in Microsoft v US 829 F3d (2d Cir. Q2016), the Court of Appeals for the Second Circuit in a majorityjudgment allowed an appeal by Microsoft against a decision of the United States District Court, which had held Microsoft in contempt for failing to comply with a warrant requiring it to produce the contents of a US customer’s email account stored in Ireland.

The warrant had been issued underthe Stored Communications Act, 18 USC 2701 (the SCA 1986); a pre- Internet age statute. The Court of Appeals accepted Microsoft’s argument that the issue of the warrant constituted an unlawful extraterritorial application of the SCA 1986, and held that in the absence of express contrary intention in the statute, warrants under the SCA could only apply within the jurisdiction.

The US Government obtained leave to appeal to the US Supreme Court, but on 523 March 201 8 the President signed the C/ariij/ing Lawful Overseas Use of Data Act (The CLOUD Act), which amended the SCA 1986 by expressly providing that the Act had extraterritorial application subject to certain conditions. The Government obtained a fresh warrant under the new law and the issue under appeal being no longer moot the Supreme Court declined 320 l The Parliamentarian | 2018; Issue Four to consider the original appeal.

The CLOUD Act created an alternative route to that provided by MLA treaties, empowering the President to make ‘executive agreements‘ with ‘qualifying’ foreign governments enabling them to obtain requested data of their citizens in a streamlined manner. Governments, which are parties to such agreements, can issue orders which are binding on US providers after the orders have been approved by their domestic judiciaries and without requiring judicial approval in the United States. The ‘executive agreements‘ are confined to ‘serious crime and terrorism’ and can only be made if the Attorney General and Secretary of State certify that among other things, the foreign government provides ‘robust substantive and procedural protections for privacy and civil liberties’ and that it has adopted procedures to ‘minimize the acquisition, retention, and dissemination of information concerning United States persons'.

The UK Solution: Overseas Production Orders
On 27 June 201 8 the UK Government introduced in the House of Lords the Crime (Overseas Production Orders) Bill (OPO), which, if enacted, will enable UK law enforcement agencies to apply to a domestic court for an order authorising them to obtain electronic data directly from service providers based outside the UK. As with the CLOUD Act, an order may only be made where an agreement, in this case called an ‘international agreement‘ is in place with the country where the provider is based.

The order is limited to indictable offences and terrorist investigations. It must specify the data that is being sought, and the judge must be satisfied that the data is likely to be of substantial value to the proceedings or the investigation, and that its production will be in the public interest. it may also include a requirement that no other person shall be informed of its existence. The Bill provides that the server ‘and any person affected by the order may apply to the domestic court for all or part of the order to be revoked, but makes no provision for the executing state to make any objection.

At the time of writing, the Bill has passed the Report Stage in the House of Lords and after a Third Reading, will be considered by the House of Commons. The Government has asserted that the Bill is compatible with the Human Rights Act 7998“, stating that although it overrides Articles 8 and 10 of the European Convention or Human Rights, “these intrusions into ECHR rights can be justified as necessary in a democratic society for the prevention of disorder and crime and in the interests of national security and public safety. and are proportionate in light of the requirements that must be met before a judge can make an overseas production order, and the other safeguards set out in the Bill ”

While the Bill includes safeguards; like the CLOUD Act, it has raised serious human rights concems. The Bill contains provisions protecting personal, confidential and joumalistic data, and the allows persons affected by the order to apply for it to be revoked or amended, but the process of review is one—sided and places considerable trust in the law enforcement agencies of the requesting state. Executing states have played avital role in safeguarding citizens’ rights in the application of existing MLATs, but will have no powerto scrutinise OPOs.

A Judicial Solution: KBR v SFO
On 6 September 201 8, while the OPO was progressing though Parliament, the UK High Court handed down its judgment in the case of KBR v SFO, holding that section 2(3) of the Criminal Justice Act 1987, a pre-Internet statute which grants the Serious Fraud Office (SFO) power to compel the production of documents, can have extraterritorial application. The case concerned the validity of a ‘section 2 notice’ issued by the SFO which required KBR lnc., the USA-based parent company of KBR Ltd, which was accused of making corrupt payments, to hand over documents held outside the UK. The notice had been served on a representative of KBR Inc whilst she was in the UK.

The court held that the SFO may compel the production of documents by an overseas company ‘t/r/hen there is a sufficient connection between the companyand the jurisdiction "(at [71 1) and that KBR lnc had sufficient connection simply by authorising payments made by its subsidiary, KBR Ltd, which had originated in the UK.

Although KBR argued that giving section 2 extraterritorial effect would improperly circumvent the statutory mutual legal assistance framework and the safeguards put in place to protect and respect international sovereignty, the court held that the section 2 powers could be used as an alternative to MLA and that this was in the public interest in order to combat cross—border crime in the internet age. As Gross LJ stated: “...The SFO's business is “top end, well-heeled’, well-lawyered crime..." By their nature, most such investigations will have an international dimension, very often involving multinational groups conducting their business in multiple jurisdictions... It follows that the documents relevant to the investigation of a UK subsidiary of such a group may well be spread between the UK and one or more overseas jurisdictions...there would be a very real risk that the purpose of section 2(8) would be frustrated...if, as a jurisdictional bar, the SFO was precluded from seeking documents he/d abroad from any foreign company... There is, accordingly, an extremely strong public interest in the extra territorial ambit of section 2(3)..."[68].

There remain difficult questions about the logistics of enforcing section 2 notices on persons abroad and the High Court decision may yet be appealed, but the prospect of the SFO issuing section 2 notices threatening overseas corporations or individuals with fines or imprisonment for non- compliance may be regarded as a drastic incursion into international comity and could lead to the erosion of states‘ goodwill.

As in the Microsoft Case, the ruling in the KBR Case demonstrates the difficult issues which can arise in the interpretation of pre-Internet statutes and which may only be definitively resolved by the legislature. The SFO’s section 2 powers are not subject to the MLA safeguards provided by the Budapest Convention and the Harare Scheme, which were carefully drafted to satisfy the need to balance law enforcement with respect for the sovereignty of foreign states. instead, a domestic law enforcement agency has been empowered unilaterally to act internationally, seizing overseas materials and threatening foreign corporations with criminal sanctions without seeking the consent of the relevant state.

Conclusion
There is no question that legislative changes are needed to bring prosecutorial powers up to date with new technology and to supplement the current system of mutual legal assistance. However, the risks to privacy and sovereignty in creating alternative frameworks are apparent and there are no easy answers.

The OPO Bill and the CLOUD Act, together with the proposed European Production Order, are important steps towards creating an effective international information—sharing scheme, but they are limited and lack the global response that is required. The pool of participating states is rightly restricted to those countries which are able to satisfy the respective governments that they are suitable treaty partners by demonstrating their compliance with the safeguards provided by MLATs and international agreements such as the Budapest Convention. However, as the UN warned in 201 8, these emerging networks of selected countries are limited in scope and are not always well suited to the global nature of cybercrime.“

Small and developing Commonwealth countries may struggle to persuade the US, the UK, and the European Union to agree to their participation in agreements of the types proposed, in which case they must continue to use the current system of MLA, move towards the creation of regional networks to expedite information—sharing, or be tempted to launch challenges similar to those in the Microsoft and KBR cases.

A timely review of the relevant Commonwealth Model Laws, together with other Commonwealth schemes, may help to provide a solution to one of the most pressing human rights problems of the 21 S‘ century — the protection of citizens online and of their online rights.

Written by: 
1. Colin Nicholls,

QC is a barrister at 3 Raymond Buildings Chambers, Gray's lnn in London, UK. He is Honorary Life President of the Commonwealth Lawyers Association and Chair of the Commonwealth Expert Group to Review the Commonwealth Model Law on Computer and Computer Related Crime.
2. Genevieve WOOCIS is a barrister at 3 Raymond Buildings Chambers, Gray's lnn.

Comments

There are no comments for this article.
Only authorized users can leave comments. Please sign in first, or register a free account.
Share
Sponsor
About Author
Adv.T Choudhury
Member since May 1, 2018
Location: India
Following
User not following anyone yet.
You might also like
Privacy per se is an undisputed right of an individual comprehensively bonded with his/her life. Privacy becomes matter of controversy when it is mishandled/intruded illegitimately by erroneous individuals.
S. Nambi Narayanan v Siby Mathews Reputation of an individual is an insegregable facet of his right to life with dignity, and fundamental right of the scientist under Article 21 has been gravely affected.
in order to protect the national interest, effective enforcement of Indian Law, protection from external vulnerabilities, preventing foreign surveillance and facilitation of law enforcement access, the committee has recommended some data localization in the bill.
As the digital age expands into homes, between businesses and across borders, legislators are struggling to strike a balance between guaranteeing freedom of expression and protecting privacy, respecting the limits of international jurisdiction, and ensuring that citizens remain safe online.
Rahmu @ Rahmuddin vs State of UP in Criminal Misc. Bail Application No. 34008 of 2020 expressed its most serious concerns over frequent misuse of the provisions of Uttar Pradesh Prevention of Cow Slaughter Act, 1955, for implicating innocent persons.
Ban on chinese apps is the most important step taken by Indian government towards the pricacy of nation.Which also helped country's enterpreneur to enhance themselves alot
Offering namaz on road is a big crime for me which I will never commit under any circumstances
Cryptocurrency is a type of digital currency secured by cryptography and is a decentralised network based on blockchain technology.
Individuals and institutions make use of this technology which gives them quicker access to financial services. Such access is also very cost-effective. However, there have been concerns regarding the rise of money laundering cases due to the use of cryptocurrency.
The cryptocurrency market has been a hot topic since the first time it was recorded in India. Since then, this highly volatile market has grown manyfold.
Today, digital evolution must no longer be a customer compromise between privacy and security. Privacy is not a product to be sold, it is a valuable asset to be protected.
The Conceptual meaning of Net Neutrality and its essential features
Joginder Singh vs Punjab that inmates are not to be unnecessarily subjected to cruel or degrading treatment.
Top