Commonwealth Consolidated Acts

[Index] [Table] [Search] [Search this Act] [Notes] [Noteup] [Previous] [Next] [Download] [Help]

SURVEILLANCE DEVICES ACT 2004 - SECT 27KP

What a network activity warrant authorises

  (1)   A network activity warrant must authorise the doing of specified things (subject to any restrictions or conditions specified in the warrant) in relation to the relevant target computer.

  (2)   The things that may be specified are any of the following that the eligible Judge or nominated ART member considers appropriate in the circumstances:

  (a)   entering specified premises for the purposes of doing the things mentioned in this subsection;

  (b)   entering any premises for the purposes of gaining entry to, or exiting, the specified premises;

  (c)   using:

  (i)   the target computer; or

  (ii)   a telecommunications facility operated or provided by the Commonwealth or a carrier; or

  (iii)   any other electronic equipment; or

  (iv)   a data storage device;

    for the purpose of obtaining access to data (the relevant data ) that is held in the target computer at any time while the warrant is in force, in order to determine whether the relevant data is covered by the warrant;

  (d)   if necessary to achieve the purpose mentioned in paragraph   (c)--adding, copying, deleting or altering other data in the target computer;

  (e)   if, having regard to other methods (if any) of obtaining access to the relevant data which are likely to be as effective, it is reasonable in all the circumstances to do so:

  (i)   using any other computer or a communication in transit to access the relevant data; and

  (ii)   if necessary to achieve that purpose--adding, copying, deleting or altering other data in the computer or the communication in transit;

  (f)   removing a computer or other thing from premises for the purposes of doing any thing specified in the warrant in accordance with this subsection, and returning the computer or other thing to the premises;

  (g)   copying any data to which access has been obtained, and that:

  (i)   appears to be relevant for the purposes of determining whether the relevant data is covered by the warrant; or

  (ii)   is covered by the warrant;

  (h)   intercepting a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing specified in the warrant in accordance with this subsection;

  (i)   using a surveillance device for the purposes of doing any thing specified in the warrant in accordance with this subsection;

  (j)   any other thing reasonably incidental to any of the above.

Note:   As a result of the warrant, a person who, by means of a telecommunications facility, obtains access to data stored in a computer will not commit an offence under Part   10.7 of the Criminal Code or equivalent State or Territory laws (provided that the person acts within the authority of the warrant).

  (3)   If:

  (a)   a network activity warrant authorises the removal of a computer or other thing from premises as mentioned in paragraph   (2)(f); and

  (b)   a computer or thing is removed from the premises in accordance with the warrant;

the computer or thing must be returned to the premises as soon as is reasonably practicable to do so once the computer or thing is no longer required for the purposes of doing any thing authorised by the warrant.

  (4)   For the purposes of paragraph   (2)(g), if:

  (a)   access has been obtained to data; and

  (b)   the data is subject to a form of electronic protection;

the data is taken to be relevant for the purposes of determining whether the relevant data is covered by the warrant.

When data is covered by a warrant

  (5)   For the purposes of this section, data is covered by a warrant if access to the data will substantially assist as described in paragraph   27KK(1)(b). To avoid doubt, it is immaterial whether the composition of the group mentioned in that paragraph changes during the period when the warrant is in force.

Certain acts not authorised

  (6)   Subsection   (2) does not authorise the addition, deletion or alteration of data, or the doing of any thing, that is likely to:

  (a)   materially interfere with, interrupt or obstruct:

  (i)   a communication in transit; or

  (ii)   the lawful use by other persons of a computer;

    unless the addition, deletion or alteration, or the doing of the thing, is necessary to do one or more of the things specified in the warrant; or

  (b)   cause any other material loss or damage to other persons lawfully using a computer.

Warrant must provide for certain matters

  (7)   A network activity warrant must:

  (a)   authorise the use of any force against persons and things that is necessary and reasonable to do the things specified in the warrant; and

  (b)   if the warrant authorises entering premises--state whether entry is authorised to be made at any time of the day or night or during stated hours of the day or night.

Concealment of access etc.

  (8)   If any thing has been done in relation to a computer under:

  (a)   a network activity warrant; or

  (b)   this subsection;

then, in addition to the things specified in the warrant, the warrant authorises the doing of any of the following:

  (c)   any thing reasonably necessary to conceal the fact that any thing has been done under the warrant or under this subsection;

  (d)   entering any premises where the computer is reasonably believed to be, for the purposes of doing the things mentioned in paragraph   (c);

  (e)   entering any other premises for the purposes of gaining entry to or exiting the premises referred to in paragraph   (d);

  (f)   removing the computer or another thing from any place where it is situated for the purposes of doing the things mentioned in paragraph   (c), and returning the computer or other thing to that place;

  (g)   if, having regard to other methods (if any) of doing the things mentioned in paragraph   (c) which are likely to be as effective, it is reasonable in all the circumstances to do so:

  (i)   using any other computer or a communication in transit to do those things; and

  (ii)   if necessary to achieve that purpose--adding, copying, deleting or altering other data in the computer or the communication in transit;

  (h)   intercepting a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing mentioned in this subsection;

  (i)   using a surveillance device, if the use is for the purposes of doing any thing mentioned in this subsection;

  (j)   any other thing reasonably incidental to any of the above;

at the following time:

  (k)   at any time while the warrant is in force or within 28 days after it ceases to be in force;

  (l)   if none of the things mentioned in paragraph   (c) are done within the 28 - day period mentioned in paragraph   (k)--at the earliest time after that 28 - day period at which it is reasonably practicable to do the things mentioned in paragraph   (c).

  (9)   Subsection   (8) does not authorise the doing of a thing that is likely to:

  (a)   materially interfere with, interrupt or obstruct:

  (i)   a communication in transit; or

  (ii)   the lawful use by other persons of a computer;

    unless the doing of the thing is necessary to do one or more of the things specified in subsection   (8); or

  (b)   cause any other material loss or damage to other persons lawfully using a computer.

  (10)   If a computer or another thing is removed from a place in accordance with paragraph   (8)(f), the computer or thing must be returned to the place as soon as is reasonably practicable to do so once the computer or thing is no longer required for the purposes of doing any thing mentioned in paragraph   (8)(c).



AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback