Commonwealth Consolidated Acts

[Index] [Table] [Search] [Search this Act] [Notes] [Noteup] [Previous] [Next] [Download] [Help]

SURVEILLANCE DEVICES ACT 2004 - SECT 27A

Application for computer access warrant

Warrants sought for offence investigations

  (1)   A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if the law enforcement officer suspects on reasonable grounds that:

  (a)   one or more relevant offences have been, are being, are about to be, or are likely to be, committed; and

  (b)   an investigation into those offences is being, will be, or is likely to be, conducted; and

  (c)   access to data held in a computer (the target computer ) is necessary, in the course of that investigation, for the purpose of enabling evidence to be obtained of:

  (i)   the commission of those offences; or

  (ii)   the identity or location of the offenders.

  (2)   If the application is being made by or on behalf of a State or Territory law enforcement officer, the reference in subsection   (1) to a relevant offence does not include a reference to a State offence that has a federal aspect.

Warrants sought for recovery orders

  (3)   A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   a recovery order is in force; and

  (b)   the law enforcement officer suspects on reasonable grounds that access to data held in a computer (the target computer ) may assist in the location and safe recovery of the child to whom the recovery order relates.

Warrants sought for international assistance investigations

  (4)   A law enforcement officer (or a person on the officer's behalf) may apply for the issue of a computer access warrant if the officer:

  (a)   is authorised to do so under an international assistance authorisation; and

  (b)   suspects on reasonable grounds that access to data held in a computer (the target computer ) is necessary, in the course of the investigation or investigative proceeding to which the authorisation relates, for the purpose of enabling evidence to be obtained of:

  (i)   the commission of an offence to which the authorisation relates; or

  (ii)   the identity or location of the persons suspected of committing the offence.

Warrants sought for integrity operations

  (5)   A federal law enforcement officer (or another person on the federal law enforcement officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   an integrity authority is in effect authorising an integrity operation in relation to an offence that it is suspected has been, is being or is likely to be committed by a staff member of a target agency; and

  (b)   the federal law enforcement officer suspects on reasonable grounds that access to data held in a computer (the target computer ) will assist the conduct of the integrity operation by enabling evidence to be obtained relating to the integrity, location or identity of any staff member of the target agency.

Warrants sought for post - sentence order applications

  (5A)   A law enforcement officer (or another person on the officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   a person is a terrorist offender in relation to whom an application for a post - sentence order could be made; and

  (b)   the person is detained in custody in a prison; and

  (c)   the officer suspects on reasonable grounds that there is an appreciable risk of the person committing a serious Part   5.3 offence; and

  (d)   consideration is being given, will be given, or is likely to be given, by the AFP Minister (or a person on behalf of the AFP Minister), as to whether to apply for a post - sentence order in relation to the person; and

  (e)   the officer suspects on reasonable grounds that access to data held in a computer (the target computer ) would be likely to assist in determining whether to apply for the post - sentence order.

Warrants sought for Part   9.10 order applications

  (5B)   A law enforcement officer (or another person on the officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   a person is a serious offender in relation to whom an application for a Part   9.10 order could be made; and

  (b)   the officer suspects on reasonable grounds that there is an appreciable risk of the person committing a serious violent or sexual offence; and

  (c)   consideration is being given, will be given, or is likely to be given, by the Immigration Minister (or a person on behalf of the Immigration Minister), as to whether to apply for a Part   9.10 order in relation to the person; and

  (d)   the officer suspects on reasonable grounds that access to data held in a computer (the target computer ) would be likely to assist in determining whether to apply for the Part   9.10 order.

Warrants sought for Part   5.3 supervisory orders

  (6)   A law enforcement officer (or another person on the officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   a Part   5.3 supervisory order is in force in relation to a person; and

  (b)   the officer suspects on reasonable grounds that access to data held in a computer (the target computer ) to obtain information relating to the person would be likely to substantially assist in:

  (i)   achieving a Part   5.3 object; or

  (ii)   determining whether the Part   5.3 supervisory order, or any succeeding Part   5.3 supervisory order, has been, or is being, complied with.

Note:   For Part   5.3 supervisory orders that have been made but not come into force, see section   6C.

Warrants sought for community safety supervision orders

  (6A)   A law enforcement officer (or another person on the officer's behalf) may apply for the issue of a computer access warrant if:

  (a)   a community safety supervision order is in force in relation to a person; and

  (b)   the officer suspects on reasonable grounds that access to data held in a computer (the target computer ) to obtain information relating to the person would be likely to substantially assist in:

  (i)   achieving a Part   9.10 object; or

  (ii)   determining whether the community safety supervision order, or any succeeding community safety supervision order, has been, or is being, complied with.

Note:   For community safety supervision orders that have been made but not come into force, see section   6E.

Procedure for making applications

  (7)   An application under subsection   (1), (3), (4), (5), (5A), (5B), (6) or (6A) may be made to an eligible Judge or to a nominated ART member.

  (8)   An application:

  (a)   must specify:

  (i)   the name of the applicant; and

  (ii)   the nature and duration of the warrant sought; and

  (b)   subject to this section, must be supported by an affidavit setting out the grounds on which the warrant is sought.

Unsworn applications--warrants sought for offence investigations

  (9)   If a law enforcement officer believes that:

  (a)   immediate access to data held in the target computer referred to in subsection   (1) is necessary as described in paragraph   (1)(c); and

  (b)   it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection   (1) may be made before an affidavit is prepared or sworn.

  (10)   If subsection   (9) applies, the applicant must:

  (a)   provide as much information as the eligible Judge or nominated ART member considers is reasonably practicable in the circumstances; and

  (b)   not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated ART member, whether or not a warrant has been issued.

Unsworn applications--warrants sought for recovery orders

  (11)   If a law enforcement officer believes that:

  (a)   immediate access to data held in the target computer referred to in subsection   (3) may assist as described in paragraph   (3)(b); and

  (b)   it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection   (3) may be made before an affidavit is prepared or sworn.

  (12)   If subsection   (11) applies, the applicant must:

  (a)   provide as much information as the eligible Judge or nominated ART member considers is reasonably practicable in the circumstances; and

  (b)   not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated ART member, whether or not a warrant has been issued.

Unsworn applications--warrants sought for Part   5.3 supervisory orders

  (13)   If a law enforcement officer believes that:

  (a)   immediate access to data held in the target computer referred to in subsection   (6) would be likely to substantially assist as described in paragraph   (6)(b); and

  (b)   it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection   (6) may be made before an affidavit is prepared or sworn.

Unsworn applications--warrants sought for community safety supervision orders

  (13A)   If a law enforcement officer believes that:

  (a)   immediate access to data held in the target computer referred to in subsection   (6A) would be likely to substantially assist as described in paragraph   (6A)(b); and

  (b)   it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection   (6A) may be made before an affidavit is prepared or sworn.

Applicant must provide information

  (14)   If subsection   (13) or (13A) applies, the applicant must:

  (a)   provide as much information as the eligible Judge or nominated ART member considers is reasonably practicable in the circumstances; and

  (b)   not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated ART member, whether or not a warrant has been issued.

Target computer

  (15)   The target computer referred to in subsection   (1), (3), (4), (5), (5A), (5B), (6) or (6A) may be any one or more of the following:

  (a)   a particular computer;

  (b)   a computer on particular premises;

  (c)   a computer associated with, used by or likely to be used by, a person (whose identity may or may not be known).



AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback