ࡱ> %` Wbjbj"x"x G@@D >WWWTXxXXXX|||8$}}XUP~(x~~(~~fhhhhhh$/hXXX~~H`ʋʋʋX~X~fʋfʋʋgXX~D~ K/|8*<TUPz.pXֻT^ʋL,"UXXdZ$mdXXdZmXXXXXXXXX Our Ref: HRU 18 March 2009 The Hon John Hatzistergos MP Attorney-General Parliament House, Macquarie Street, Sydney NSW 2000 And by email:  HYPERLINK "mailto:office@hatzistergos.minister.nsw.gov.au" office@hatzistergos.minister.nsw.gov.au The Hon Mr Greg Smith MP Shadow Attorney-General Suite 303, Level 3, 51 Rawson Street, EPPING NSW 2121 And by email:  HYPERLINK "mailto:epping@parliament.nsw.gov.au" epping@parliament.nsw.gov.au Dear Sirs, Covert Search Warrants I write to express the 鱨վs concern with the Law Enforcement (Powers and Responsibilities) Amendment (Search Powers) Bill 2009 (NSW) (the Bill). The Bill, if enacted, would significantly extend the power of police to conduct covert searches. The Commission understands that the Bill is before the Legislative Council next week. The Commission has not had time to prepare detailed submissions on the Bill but wishes to provide you with the following summary submissions. The Commission recommends against the passing of this Bill. The Commission believes that the Bill fails properly to balance the legitimate interests of the state in preventing crime and the human rights of people in NSW to be free from arbitrary interferences with their privacy and home. Alternatively, if the Bill is to be passed, the Commission urges Parliament to give consideration to amending the Bill to reflect the concerns set out below. The Commission has 4 major concerns with the Bill: It is not clear that there is sufficient evidence to justify these extraordinary additional powers. The delayed notification scheme disproportionately impacts a persons right to privacy and home. The grounds for applying and granting covert search warrants have been drafted so broadly as to give rise to the potential for arbitrary interference with privacy and home. The safeguards contained within the Bill are insufficient and in particular may diminish the capacity for appropriate judicial oversight. Background The Bill seeks to authorise the issuing of entry and search warrants that are intended to be executed without the occupiers knowledge (covert search warrants). A covert search warrant will authorise the entry and search of a premises, using such force as is necessary, to seize, substitute, copy, photograph and record things. Covert search warrants will also authorise the impersonation of another person, as well as the doing of anything reasonable for the purposes of concealment. Under proposed s 75A (1)(c), computers and similar devices may be removed for up to 7 working days, or longer on application, for examination. The covert search warrants will be available to investigate indictable crimes carrying a sentence of 7 years imprisonment or more that involve certain offences such as the destruction of property, violence causing grievous bodily harm, organised theft, or the possession, manufacture or cultivation of drugs or prohibited plants such as cannabis. The right to privacy and home Article 17 of the ICCPR prohibits both unlawful and arbitrary interferences with (amongst other things) a persons privacy and home. Every invasion of the home that occurs without the consent of the individual affected represents interference. Home includes the place where a person resides or carries out his or her usual occupation regardless of legal title. Covert search warrants that authorise the entry and search of peoples homes without their knowledge necessarily interfere with the right to privacy and home. The Commission agrees that the investigation and detection of serious crime is a legitimate purpose for which an individuals right to privacy and home might be impinged upon. However, it is necessary that any interference is justified and proportionate to avoid arbitrariness. For example, in the case of Rojas Garc`a v Colombia, the UN Human Rights Committee found that an intrusion with the right to the home under Article 17 of the ICCPR was arbitrary even if it was in accordance with domestic law where the need for the intrusion into privacy was not justified. Lack of evidence justifying the need for covert search warrants The Commission is concerned that extraordinary police powers, so far existing only under the Terrorism (Police Powers) Act 2002 (NSW) (NSW Terrorism Act), are being extended into the investigation of other types of crime without a solid evidentiary basis being demonstrated. The Commission calls upon Parliament to consider whether the additional powers contained within the Bill are necessary and whether there are less restrictive means for achieving the same benefits to the investigation of crime. It is unclear what evidence the government has relied upon in justifying the need for extending the powers available for search warrants under the Law Enforcement (Powers and Responsibilities) Act 2002 (NSW). In the Agreement in Principle Speech by the Member for Miranda, the risk of premature notification spoiling investigations was cited as the chief reason for introducing covert search warrants. No examples of concrete cases where the existing scheme had led to such failures were provided; only one hypothetical example was used. Further, certain offences giving rise to the issue of covert search warrants are not likely to involve lengthy organisation or preparatory processes. It is therefore unclear why covert warrants would be necessary for the investigation and prosecution of such offences. Examples include violence causing grievous bodily harm and acts of sexual assault. The definition of serious offences should be amended to ensure there is also an element of organisation, long-term planning or lengthy preparation or manufacturing involved in the commission of the crime. Although the proposed powers are said to be based on existing Commonwealth provisions, the Commonwealth has not enacted a similar scheme. The powers proposed by the Bill go far beyond the powers available to the police under the Crimes Act 1914. The search warrants scheme under the Crimes Act 1914 (Cth) includes specific rights for occupiers subject to entry and search warrants. These include the right to be given details of the warrant, the right to be present, and the right to receipts for things seized. While a lapsed Commonwealth Bill contained a scheme for delayed notification warrants in relation to offences punishable by 10 years imprisonment, that Bill was not enacted. Significantly, the safeguards available in that scheme were superior to those contained within this Bill. These are discussed further below. Search of homes without the occupiers knowledge The European Court of Human Rights has stressed the importance of ensuring that people are given enough information about searches of their homes to enable them to identify, prevent and challenge any abuse. Denial of the ability to challenge abuse may lead to a finding of disproportionality between the legitimate aims pursued by the searches and the means deployed to achieve that aim. Under proposed section 67A, notice of execution of the warrant on the occupier may be postponed for a potential total period of up to 3 years if the issuing judge is satisfied that there are reasonable grounds for the postponement. There must be exceptional grounds to justify a postponement of notice longer than 18 months. Covert search warrants will also authorise the covert entry into adjoining premises and notice to the occupier of the adjoining premises may be dispensed with altogether by the eligible judge issuing the covert search warrant. The Commission is concerned that the delayed notification will mean individuals whose houses have been searched will not be able to challenge searches that are unreasonable, not based on proper grounds, or are excessive because, in some cases, they will not know that a search has occurred for 3 years. This is particularly important given some or all of the individuals residing in the premises may not be involved in any criminal activity. Should the Bill proceed through Parliament, the Commission recommends that notice be given to the occupier of the subject premises within 6 months, unless there are exceptional grounds for justifying a postponement for a longer period, up to a total of 12 months. The Commission is also concerned that schedule 2 of the Bill proposes to dispense with the need to keep receipts of thing seized in the case of covert search warrants. In the case of delayed notice, it is even more important than in other cases that detailed records are kept and made available to individuals so that they can monitor the scope of the search when they eventually learn of it. The Commission notes that the model proposed by the lapsed Commonwealth Bill expressly required the occupiers notice to include a description of all things seized. The Commission recommends that similar amendments be made to the present Bill should it proceed through Parliament. Broad grounds for applying for and granting covert search warrants Covert searches will not be a proportionate interference with the right to privacy and home if the information that is sought could reasonably be obtained by less intrusive means. Should Parliament proceed with the Bill, the Commission recommends that the Bill be amended to ensure the powers are available only where: there is a legitimate purpose; and there are no other less restrictive means of achieving the same end. Under proposed s 62(1)(b), the application must address particulars of the grounds on which the application is being based, including (without limitation) the nature of the searchable offence or other offence involved. The Commission considers that s62(1)(b) should be amended so that applications specifically include the reasons why a search must be carried out covertly. This should include canvassing other less restrictive means and why these would not be suitable in the particular circumstances of the case. Further, under proposed s63(1A), it will be an offence knowingly to give false and misleading information when making an application. However, this threshold is quite high given the low evidentiary burden required to ground an application. The Commission supports the Legislation Review Committees recommendation that a penalty for being reckless or negligent regarding the truthfulness or accuracy of the information given be included in the scheme. Under the provisions of the Bill, to apply for a covert search warrant an applicant need only: suspect on reasonable grounds that there, or within 10 days will be, in or on the premises a thing of a kind connected with the offence. Consider that it is necessary for the entry and search of those premises to be conducted without the knowledge of any occupier of the premises. Given the extraordinary nature of the powers, the Commission considers these criteria should be tightened so that an officer must not merely suspect but must have a reasonable belief that there will be a thing of the kind connected with the offence in or on the premises. Further, the following additional criteria should be included: evidence that one or more relevant offences have been, are being, are about to be or are likely to be committed; that the sight or retrieval of the thing should substantially assist the investigation of the crime. These additional criteria were used in the model proposed by the lapsed Commonwealth Bill. Under proposed s62(4), the issuing judge must consider a range of matters when determining whether there are reasonable grounds to issue a covert search warrant. These include: the extent to which it is necessary for the entry and search of those premises to be conducted without the knowledge of any occupier of the premises; the nature and gravity of the searchable offence in respect of which the application is made; and the extent to which the privacy of a person who is not believed to be knowingly concerned in the commission of the searchable offence is likely to be affected if the warrant is issued. If Parliament proceeds with the Bill, the Commission strongly urges that proposed s62 be amended to ensure that an issuing judge: is satisfied that the information could not be obtained through alternative less restrictive means. is satisfied that the exercise of the powers under the warrant will assist the prevention of, or investigation into, the relevant offences to which the application for the warrant relates. is satisfied that there is no practicable way to enter the subject premises or conceal the investigation without entering the adjoining premises. considers the outcome of any previous application for a covert search warrant in respect of the subject premises. is satisfied that there is likely to be a thing of the kind connected with the offence in or at the subject premises Except for the criteria in relation to adjoining premises, additional criteria similar to these were used in the model proposed by the lapsed Commonwealth Bill. Further under the proposed Commonwealth scheme, eligible judges must record in the warrant that he or she is satisfied as to the matters to be made out in the application and has had regard to the matters that must be considered when determining whether to grant the warrant. A similar requirement should be included in this Bill should it proceed. Oversight of the scheme If Parliament does enact the Bill, it is essential that the safeguards in place are effective in limiting intrusions on a persons right to privacy and the home. The Commission notes that the Bill provides some safeguards, including: reporting to the issuing officer within 10 days after the execution of the warrant or the expiry of the warrant; annual reporting by the Ombudsman and the relevant agencies on the operation of the Act and exercise of the powers respectively; and limiting the ability to apply for a covert search warrant to authorised police officers with the rank of Superintendent or above or authorised personnel from the Police Integrity Commission or the New South Wales Commission. In relation to these safeguards, the Commission notes that the model proposed by the Commonwealth Bill included the additional safeguard of keeping a register of delayed notification warrants. The Commission recommends that such a register be kept under the scheme proposed by the Bill. Similar to the scheme proposed by the Commonwealth Bill, this register could be inspected by the Ombudsman required to report on compliance with the provisions every 6 months. A key plank of the safeguards offered by the Bill is the oversight by the judiciary, including that an issuing judge must consider the privacy of innocent persons when determining whether to grant or refuse the covert search warrant. In relation to this safeguard, the Commission believes that the scheme proposed by the Bill may undermine the capacity for independent oversight by the judiciary in at least three ways. First, proposed s 65(1A) requires issuing judges to record instances when he or she refuses to issue covert search warrants, including all relevant particulars of the grounds the eligible issuing officer has relied on to justify the refusal to issue the warrant (emphasis added). The Commission is concerned that the wording of this provision suggests that warrants should be granted unless circumstances exist which justify refusal. This is not consistent with the scheme of the Bill which requires judges to be satisfied that reasonable grounds exist for issuing a covert warrant. Second, proposed s 46B(6) expressly permits the Attorney-General to amend or revoke a declaration that a Supreme Court judge is an eligible judge for the purposes of issuing covert search warrants. The Commission believes that revocation of a declaration should only be possible where a Judge has withdrawn his or her consent under s 46B as there would otherwise be potential for interference with the independence of the judiciary in its role of overseeing the exercise of these extraordinary powers. Third, under proposed s 62(6), an applicant is not required to disclose the identity of a person from whom information was obtained if the applicant is satisfied that to do so might jeopardize the safety of the person. This may make it difficult for Judges to assess the reliability of the information. Given that the information will only be disclosed to an eligible judge in private hearings, the need for this precaution is unclear. Together these provisions may diminish the capacity of Judges effectively to oversee the scheme and weaken the level of oversight offered by the Bill. This heightens the potential for arbitrary interference with the right to privacy and home. Conclusion The Commission is concerned that there does not appear to be sufficient evidence to justify the expansion of police powers as provided for by the Bill. It is also concerned that the safeguards included in the Bill are inadequate and may prove ineffective to guard against arbitrary interferences with the right to privacy and home. For these reasons, the Commission strongly urges the Parliament to reconsider the merits of this Bill. Should the Bill proceed, the Commission recommends significantly strengthening the safeguards it contains to ensure any interference with the right to the home and privacy is justified and proportionate. Please do not hesitate to contact me or my office should you require further information or assistance. Yours sincerely, Catherine Branson QC President  Section 70 of the principal Act.  Proposed s 49(2).  Proposed s 47A(2).  Proposed s 46A.  M Nowak, U.N Covenant on Civil and Political Rights CCPR Commentary (2nd ed, 2005), p382, [12].  Ibid, p 400, [43].  No 687/1996, [2.1] and [10.3.].  See the proposed definition of serious offence in proposed s 46A(2).  Crimes Act 1914 (Cth), s3H.  Crimes Act 1914 (Cth), s3P.  Crimes Act 1914 (Cth), s3Q.  Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006.  Van Rossem v Belgium Application no. 41872/98. See English version of registry summary on  HYPERLINK "http://www.echr.coe.int/Eng/Press/2004/Dec/ChamberjudgmentVanRossemvBelgium91204.htm#_ftn2" http://www.echr.coe.int/Eng/Press/2004/Dec/ChamberjudgmentVanRossemvBelgium91204.htm#_ftn2 (viewed 18 March 2009).  See proposed s 67A(3).  Proposed s 47A(2)(b).  Proposed s 67B(4).  Trimbole v Onley 56 FLR 321.  Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006, proposed s3sQ.  See the United Kingdom Governments human rights analysis of covert surveillance legislation on  HYPERLINK "http://security.honmeoffice.gov.uk/ripa/legislation/protecting-human-rights/" http://security.honmeoffice.gov.uk/ripa/legislation/protecting-human-rights/ (viewed 16 March 2009).  Legislative Review Committees Digest, No 2 10 March 2009, 40.  Proposed s 46C(2) provides that this is the basis for the authorisation to apply for a covert search warrant. Proposed s 47 (3)(a) provides that this is the basis for the application to the eligible Judge for the issue of a covert search warrant.  See proposed s 3SE(1) of the Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006.  See proposed s 3SJ of the Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006.  Proposed s 74A.  Amended s 242 of the Principal Act provides for the Ombudsman to monitor the operation of provisions of the Act relating to covert search warrants and to make a yearly report to the Attorney General and the Minister for Police. Proposed s 242A requires the Commissioner of Police, the Commissioner for the New South Wales Crime Commission and the Commissioner for the Police Integrity Commission to each report annually on the exercise of the covert search warrant powers.  Proposed ss 46C and 47(3).  See proposed s3SW of the Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006.  See proposed s3SZF of the Crimes Legislation Amendment (National Investigative Powers and Witness Protection) Bill 2006.  Proposed s 76B.      PAGE \* MERGEFORMAT 8          )58IJ   ( ^ l m ǽ鹋reh?h0J$B*phjh?hUjh?hU h?hhMFh?hh>*B*ph hhjhhUhhB*^JphhwB*^Jphh,6B*^Jphh xB*^Jphhh,6hwhqhX h+\hq'9 ( 3 N ^ N$$XC$EƀGfgd $$gd $$gdMFhhgd8hgdRLQWW s u   L N \  ' 0 M P )    <ʾʺʲhr hq5h xh x5h&1h_h]h8oh xhh$hwh/hhcfh,6hGx hq5 hX5hqhB 4BI & FEƀf.gd xgd x dd[$\$gd0NddC$Eƀɓf[$\$gdTh dd[$\$gdThgdi4Bk!I & FEƀf.gd xI & FEƀf.gd xI & FEƀf.gd xO7RL! "#{gdRD3gd}BSGC$Eƀfgd gd gdUgd&1gd|j?gd xgdgd4gdqaq|NO1<HMNbd 67N\冂~h%dh&1hUh-h ?hAjh-0J:UhByh|j?hs(h*h%Eh4h45 h&15 h45hRjhq0J:Uhjh6^Xhr0J:Uh,6 h6^Xhrhrjhr0J:U]1 !"QRPc4KLA[]ehi.=\owr̸̼hGjh|f0J:Uh*h|fhnG hUJ6hUJh h&1h kh$ h0hS hS6hSh xh 5h xh5h|j?hUmH sH jhU0J:6U hU6hU7!B}Q R j k l n /!0!1!@!B![!!!!!!!!! """"""""ûjh$v0J:UhRD3 hRD3hRD3 hRD3h h}BS h}BS5 hPE5h\hs2h$h khMh6mhh'uhhq0jhnG0J:UhPEhnGhnG6hh+)6 hh+)h+)hnG1""2#3#### $$($/$0$1$$$$$$$$$$$-%.%%%%%%%%%&&&&&&&'"'|'}''''((ǺǺ||hX}thD h$] hA] hgU] h]jhxh 0J:U] h] h ] hx]hPEjh6^Xh$v0J:U h6^Xh$vh7jhX}t0J:Uh[h#jh2h hRD3mH sH hRD3h$vh\&0#$%}'()+*+++n+$,,,I & FEƀf)gdD gdD gd xgdxgd|4gd$vgdq0 (:(T(z((((g){)*(*C*J*m*n*******+'+(+)+++m+n+~++++++!,",$,%,Q,p,,,,,,, -------W.边 hqL] h|x]hqLh}BSh|xjh%W0J:UhD h}BSh}BS5 h}BS5 hlP5 hT] h, ]jhD0J:U] hD] h>] hWp] h] h6^XhX}thhX}th>5,-/0D11\I & FEƀfgdogdogd|xgdqLI & FEƀf)gdD W.X..._/b/00011+1.19111_2`2b222t3}333)444444444444455545555-6.66666F7G7H77پԘԘhgmH sH h>]] h A]h6^Xho]h6^Xh>]]jhG0J:U] h\Q] h|V]jho0J:U] he|] ho] hD ]jho0J:Uh$h|x h|x] hG]61b23$4fI & FEƀfgdGgdoI & FEƀfgdo$4445-6fI & FEƀfgd>]gdoI & FEƀfgdG-66H77kfgdoI & FEƀfgd>]I & FEƀfgd>]77777777777778-8.8/8@8A8o8r8888889 9G9T9b9e9~999999999::e::::::ཱུͭ譥譝؝؊zzhlPmH sH h}BSmH sH h`gjh`gjmH sH h?mH sH h\QmH sH hxmH sH hkmH sH hkmH sH h|mH sH h6^XmH sH h`gjh#jmH sH h`gjmH sH hQAmH sH h#jmH sH hgmH sH hmH sH 07/88~9k!I & FEƀfgdkI & FEƀfgd?I & FEƀfgdQA~99e:d<}<g=kf_Zgd7gd xgdQAI & FEƀfgd?I & FEƀfgdQA::::; ;5;f;s;};;;;;;;;<<<c<d<e<g<n<|<}<<<<<===9=g=m=p==========Y>Z>[>\>Žh_Uh$hGjh70J:UhTE~hBEh7hWphth|xh xh5h xh 5h xh05 h/5hbmH sH jhA!0J:UmH sH hYHmH sH hA!mH sH hQAmH sH h\QmH sH 2g==`>D?k!I & FEƀfgdtI & FEƀfgdtI & FEƀfgdt\>_>`>>>@?A?B?C?D?@@@d@@@@AAAAOA|AAAAAAAAB-B6BRB[BiBBBBBBBBBBC CC-C5CnCoCCCCCCCC۽߹۵h+)h+)h|6hh|h-I0h8oh>=hgh fh |ehmh$h|Vh/jhG0J:UhhQjh0J:U] h]hBEh7hG:D?ABCEFHIIJgK3LLLLL $gdXgdREFEƀ'fgd0gd0gd xgdmgd0gd fgdmCC8DWDXD]DDDDDDDEEEE0EmE{EEEEE9FCFWFtFFFFGGGG H2H7HLH^HHHHHHHHIOIPIIIIJJ-J=JJJJɼɴ԰hRh#h2eh|Vh|V5 h|V5h$$h|Vh2h"ljhiJh-I00J:U hiJh-I0hh-I0h}BSh`h fhjh>=hWph+)h,6h8oh|:JJJK!K*K.K/K4K>KLKXK[KfKgKnKrKvK~KKKKKKKKKKKKLL1L2L3LLLLLLLLLLLLLLLLMMMM0M1M;MuMxMzMMMĿĿհhEHh+H*hEHh+6h+jh+0J:U h+5 hR5hXhX5 hRE5h8 h+\hqhREhRhBhhht1hh2eh#=LLLLMM0MMMMN0NNNlNN P"P;gd$vgd[;gd-;;gdrK$hEƀ(fgdR $gdXMMMMMMMMNNN$N0N1N2NBNMNNNONPN`NkNlNmNnNNNNNNN)O*O6OOOOOOO P P"P#P:P;POPPPQPbPhPnPoPpPqPPPPBQCQQİ hxh+hxh+6hz4h+0J$jh+Ujh+U hMh+ hnGh+hnGh+6h[h+CJaJjh+0J:U h+6h+<"P:POPoPPRIRCSSʰϰհհ°۰ܰհ$$*峾;;7;;$QQQQQ䳧ٳSSSTMTOTPT*V+VHVIVcVVVVVW>W?WPWQWRWTWUWWWXWZW[W]W^WuWvWwWxWyWzW{WûûûûðߒhVvh+5@CJ ^Jh+mHnHu h_h+jh_h+Ujh Uh hTE~h+ hnGh+jh+0J:Uh+h,h+0J$jh+Uj h+U4zW{W|W}W~WWWW^RP   d8gdjf]zkd$$IflC\xvR t44 layt; T$Ifgd; $Ifgd; NJ$Ifgd;{WWWWWWWWWWWк㶯 h+\hqh hjf]h+hVvh+CJ^JmH sH $hVvh+CJ^J_H aJmH sH h+hjf]h+5@CJ(hVvh+5@CJ( WWWWWWWWWWWss hd $1$7$8$9DH$If]hgd; "d $1$7$8$9DH$If]"gd; d $1$7$8$9DH$If]gd; d $1$7$8$9DH$If]gd; d$1$7$8$9DH$If]gd; WWWWWqljjgdjf]kdZ$$Iflr&_  t44 layt;WWK$hEƀ(fgdRE 0PP&P 1h:pg BP. A!"#n$% DyK epping@parliament.nsw.gov.auyK `mailto:epping@parliament.nsw.gov.auyX;H,]ą'cDyK [http://www.echr.coe.int/Eng/Press/2004/Dec/ChamberjudgmentVanRossemvBelgium91204.htm#_ftn2yK http://www.echr.coe.int/Eng/Press/2004/Dec/ChamberjudgmentVanRossemvBelgium91204.htmyX;H,]ą'c_ftn2DyK Mhttp://security.honmeoffice.gov.uk/ripa/legislation/protecting-human-rights/yK http://security.honmeoffice.gov.uk/ripa/legislation/protecting-human-rights/yX;H,]ą'c$$If!vh555R5#v#v#vR#v:V lC t555R5yt;$$If!vh55_55 5#v#v_#v#v #v:V l t55_55 5yt;xxxp0  0 P@P /Normal  CJOJQJ_HaJmH sH tH P@P C Heading 1$$ & Fh@&5CJ\aJL@L C Heading 2  & F@&6B*\aJphL@!L o^ Heading 3  & F@&5B*CJ\phB@1B o^ Heading 4  & F@& 6\]TT o^ Heading 5$$ & F@&B*OJQJph$?`ZZ o^ Heading 6$$ & F@&6B*OJQJ]ph$?`ZZ o^ Heading 7$$ & F@&6B*OJQJ]ph@@@\\ o^ Heading 8$$ & F@&B*CJOJQJaJph@@@b b o^ Heading 9 $$ & F@&6B*CJOJQJ]aJph@@@DA@D Default Paragraph FontRi@R 0 Table Normal4 l4a (k@( 0No List dOd CHeading 1 Char Char&5CJOJQJ\_HaJmH sH tH nOn CHeading 2 Char Char/56B*CJOJQJ_HaJmH phsH tH dOd o^Heading 3 Char Char&6CJOJQJ\_HaJmH sH tH bO!b o^Heading 4 Char Char#CJOJQJ]_HaJmH sH tH *W1* ] Strong5\XAX o^ Char Char7)B*CJOJQJ_HaJmH ph$?`sH tH ^Q^ o^ Char Char6/6B*CJOJQJ]_HaJmH ph$?`sH tH ^a^ o^ Char Char5/6B*CJOJQJ]_HaJmH ph@@@sH tH PqP o^ Char Char4!B*OJQJ_HmH ph@@@sH tH VV  o^ Char Char3'6B*OJQJ]_HmH ph@@@sH tH F@F s.Header$ B#a$CJNON s. Char Char2 CJOJQJ_HaJmH sH tH < @< w0Footer B#CJNON w0 Char Char1 CJOJQJ_HaJmH sH tH \\ ?pTOC 3" d# 0^`06PJ^JmHnHuBB 4]0Placeholder Text B*phFGF _List Continue 4lx^l<m<TY1 / 1.1 / 1.1.1 F PP ?pTOC 1! d# 0^`05mHnHuXX ?pTOC 2"" d# 0^`056mHnHuVVKypTOC 4%# d# 0^`0 mHnHu6U@A6 ~U$0 Hyperlink >*B*phVV Q+p TOC Heading %h5B*CJmH phsH tH D+bD '| Endnote Text &CJaJDOqD &| Char CharOJQJ_HmH sH tH J*J [Endnote ReferenceCJH*OJQJ0l0TY 1 / a / i) F @n@TYArticle / Section* FDTD TY Block Text+x]^2B@2 TY Body Text,x<P< TY Body Text 2 -dx>Q> TY Body Text 3.xCJaJPMP TYBody Text First Indent /`HCH TYBody Text Indent0x^TNT TYBody Text First Indent 2 1`RR"R TYBody Text Indent 22dx^TS2T TYBody Text Indent 33x^CJaJ2?B2 TYClosing 4^$L$ TYDate5<[b< TYE-mail Signature6.Xq. TYEmphasis6]h$h 6pEnvelope Address)8@ &+D/^@ ^JF%F TYEnvelope Return9 CJ^JaJL&@L [Footnote ReferenceCJH*OJQJF@F | Footnote Text ;CJaJ0_0 TY HTML Acronym:`: TY HTML Address=6]0a0 TY HTML Cite6]>b> TY HTML CodeCJOJQJ^JaJ<c< TYHTML Definition6]FdF TY HTML KeyboardCJOJQJ^JaJRe"R TYHTML PreformattedBCJOJQJ^JaJ:f1: TY HTML Sample OJQJ^JJgAJ TYHTML TypewriterCJOJQJ^JaJ8hQ8 TY HTML Variable6].(a. TY Line Number4/r4 TYListG^`828 TYList 2H6^6`838 TYList 3IQ^Q`848 TYList 4Jl^l`858 TYList 5K^`:0: TY List Bullet L & F>6> TY List Bullet 2 M & F>7> TY List Bullet 3 N & F>8> TY List Bullet 4 O & F>9> TY List Bullet 5 P & FBDB TY List ContinueQx^FE"F TYList Continue 2R6x^6FF2F TYList Continue 3SQx^QFHBF TYList Continue 5Tx^:1R: TY List Number U & F>:b> TY List Number 2 V & F >;r> TY List Number 3 W & F ><> TY List Number 4 X & F>=> TY List Number 5 Y & F I TYMessage HeadergZn$d%d&d'd-DM NOPQ^n`^J<^< TY Normal (Web)[OJQJ>> TY Normal Indent \^4O4 TY Note Heading].). TY Page NumberDZD TY Plain Text_CJOJQJ^JaJ0K0 TY Salutation`6@6 TY Signature a^>J"> TYSubtitleb$<@&a$^J3 TYTable 3D effects 1m:Vcj#j#j#j#j.j.j.j. c55\5B* \`J phB* `J ph:C: TYTable 3D effects 2:Vdj.@j#j9jj 4d5\5\xSx TYTable 3D effects 3:Vej.@j j j#j9jj44e:B*`Jph B*`Jph5\5\frcf TYTable Classic 1:Vf0  j#j#j#jj f9B*`Jph6]5\56\]ss TYTable Classic 2#:Vg0  j% j#j0 jjj%  g:5\B*`JphB* `J ph5\XtX TYTable Classic 3:Vh0    jj0  j0  hQB* ph5B*\`JphB* `J ph56B*\]`Jphu TYTable Classic 4:Vi0  jj0 j0 jj iX5\B* `J ph56B*\]`JphB* `J ph5\VvV TYTable Colorful 1:Vj0    j% j% jj%  j<B*ph56\]56\]56\]XwX TYTable Colorful 2:Vk0 j% jj0  j k@56\]56B*\]`Jph56\]8x8 TYTable Colorful 3:Vl0j;$ j0 j%  l5B*\`Jphy TYTable Columns 1 :Vm0    j j jjjj#jj4ml5\B*`Jph B*`Jph5\5\5\5\5\5\z TYTable Columns 2:Vnj j jjjj% jj4n5\B*`Jph B*`Jph5\5B*\`Jph5\B*`Jph5\5\{ TYTable Columns 3:Vo0j j jjj#j% j4oh5\B*`Jph B*`Jph5\5\5\B*`Jph5\| TYTable Columns 4:Vpj j jjj% 4pLB*`Jph B*`Jph5\5\B*`Jphd}d TYTable Columns 5:Vq0    j jjj#j#4qVB*`Jph B*`Jph5\5\5\56\]4#4 TYTable Contemporary:Vr0j%@ j% j% 4r<@B*`JphB*`Jph5B*\`Jph3 TY Table Elegant_:Vs0j s;B*`JphnCn TY Table Grid7:Vt0t~S TY Table Grid 1z:Vu0jj u6]6]"c" TY Table Grid 2:Vv0jjj#j v,5\5\5\5\s TY Table Grid 3:Vw0  jjj0  w5\5\BB TY Table Grid 4:Vx0  jj0 j0  xB5B*\`Jph5B*\`JphB*`Jph   TY Table Grid 5:Vy0    jjj# j y5\5\(( TY Table Grid 6:Vz0    jj#j#j z(5\B*`Jph5\NN TY Table Grid 7:V{0    jjj#j# j {25\5\5\5\5\$$ TY Table Grid 8:V|0jjj%  |H5B*\`Jph5B*\`Jph5B*\`Jphzz TY Table List 1:V}0  j%@ jj#j0 j4}M@B*`JphB*`Jph56B* \]`J ph5\tt TY Table List 2:V~0 j%@ jj#j0 j4~G@B*`JphB*`Jph5B*\`Jph5\ TY Table List 3:V0  j# j# j 05B* \`J ph6B* ]`J ph TY Table List 4w:V0    j0   5B*\`Jph TY Table List 5:V0jj#  5\5\ #  TY Table List 6:V0j%@ j# j#  45\5\3 TY Table List 7:V0  j%@ j% jjj# j0  4>@B*`Jph5\5\5\5\C TY Table List 8:V0j%@ j% jjj#j0 4D@B*`Jph5\5\5\56\]S TYTable Professionall:V0j%  5B*\`Jphoc TYTable Simple 1:V0  j#j# vpsv TYTable Simple 2:Vj#j# j#j# j#j#O5\5\5B*\`Jph5\5\5\q TYTable Simple 3l:V0    j%  5B*\`Jphtt TYTable Subtle 1 :Vj0@ j# j# j0  j. jj45\5\tt TYTable Subtle 2:V0j0  j0  j# j# jj5\5\pp TY Table Theme7:V0 TY Table Web 1h:V03j B*`Jph TY Table Web 2h:V03j B*`Jph TY Table Web 3h:V03j B*`JphN>N TYTitle$<@&a$5CJ KH\^JaJ FV F TYFollowedHyperlink >*B* phZ Z q Address Block$$gd+\^J_H mH sH " qContact detailsM$$ & 6m I %\d.1$7$8$H$gdPCJOJQJ^J_H mH sH JO2 J qOur Ref:gdq^J_H mH sH HOB H q Name Insert gd!34 _H mH sH LR L qDash) & F h^`ROb R qHeader & Footerd8gdPCJ^J~r ~ q Logo Type9 B#NJd&dPgd+\5@B*CJ ^JphF F r@Endnote Text Char OJQJ_HTO T 0msolistparagraph^PJ^JT T ;|j?Footnote Text CharOJQJ_HmH sH tH B' B 7Comment ReferenceCJaJ< < 7 Comment TextCJaJ@j @ 7Comment Subject5\H H 7 Balloon TextCJOJ QJ ^J aJ !Qk-"!$(_*,45Z6@789@O $8NaCa:Sk7ztm[ y o O 4BO@0@0@0@0@0@0@0 0 0 0@09(3N^4BO 7 RL } )#*#+#n#$$$$%'(D))b*+$,,,--..H///00~11e2d4}4g55`6D79:;=>@AABgC3DDDDDDDDEE0EEEEF0FNFlFF H"H:HOHoHHJIJCKKOPOQOSOTOVOWOYOZO\O]OyOzO{O|O}O~OOOOOOOOOOOOOOOOOO0@0@0@0@0@0@0@0@0@0@0@0@0@0@00@0@0@0@0 0 0 0 0@00@0@00@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 0 0@0@00 0 0@0 0 0@0@0 0 0 0@0 0 0 0 0 0@0@0@0 0 0 0@0@0@0@00@0@0@0@0@0@0@0@0@0@0@00@;0@;0@;0@;0@;0@;0@0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;000 @0X00@0X00@0X00@0X00@0@0@0 @0 @0 @0 @0 @0@0@0@0 @0@0 @0@0 @0@0 @0@0 @0 @0@0X00(3N^4BO 7 RL } )#*#+#n#$$$$%'(D))b*+$,,,--..H///00~11e2d4}4g55`6D79:;=>@AABgC3DDDDDDEE0EEEEF0FNFlFF H"H:HOHoHHJIJCKKOPOQO~OOOOO@0@0@0@0@0@0@0@0@0@0@0@0@00@00@00@00@00@0@ 0@ 0@ 0@ 00@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0@ 0@00@00@0@ 0@ 0@0@ 0@ 0@0@0@ 0@ 0@ 0@0@ 0@ 0@ 0@ 0@ 00@00@00@0@ 0@ 0@ 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0@;0 00 Z00a{u@x0yz{|}X00a{@0 00= )0=@ "(W.7:\>CJMQ{WW,/34568:>ACEFHJL 4#,1$4-67~9g=D?L"PzWWWWW-01279;<=?@BDGIKMNOW.lOXX $&@!Zs XXT  # @H 0(  0(  B S  ? dd$\\n((<<FFOltt-1LLFFO8*urn:schemas-microsoft-com:office:smarttagsCity:*urn:schemas-microsoft-com:office:smarttagsStreet; *urn:schemas-microsoft-com:office:smarttagsaddress9*urn:schemas-microsoft-com:office:smarttagsplaceB*urn:schemas-microsoft-com:office:smarttagscountry-region  ʯ   )5 2D{E}E%F(FCFFFaFdFFFQHYH\HaH5N7NQOQOSOSOTOTOVOWOYOZO\O]OOOZ[""$$.%0%&&6':'E)L)$,(,..///01000`6h6wC~CDDDDEEE{E}EEE FFnFFHH/H3HGHKHqHHEJGJVJZJJJTKXK>LML,NFN@OOOQOQOSOSOTOTOVOWOYOZO\O]OOO33333333333333333333333333333333 5I 'LN\CCMP  | M N N \ Pc@B(/"VVg!{!U'U'_'b'+)+)--//-0.0445588|99::::; ;n;o;;;W<W<X<]<<<<<9>C>W>t>??@@@ADDDDPOQOQOSOSOTOTOVOWOYOZO\O]OxOzOOO 5I 'LN\CCMP  | M N N \ Pc@B(/"VVg!{!U'U'_'b'+)+)--//-0.0445588|99::::; ;n;o;;;W<W<X<]<<<<<9>C>W>t>??@@@ADDDDPOQOQOSOSOTOTOVOWOYOZO\O]OOO|0NY}Z6oX~XUWV1P2OVVN򆜯MULHla 2uQҮGʴ`!# 4k)Ёm;8 ] szIW"O "CN q|O u['<0a#j^`.^`.^`.^`. ^`OJQJo( ^`OJQJo( ^`OJQJo( ^`OJQJo(hh^h`. hh^h`OJQJo(*h  ^ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh| | ^| `OJQJo(hHhLL^L`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hH ^`hH Article . ^`hH Section . P^`PhH() `p`^``phH() P^`PhH) P^`PhH) ^`hH) P^`PhH. 0p0^0`phH.h  ^ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh| | ^| `OJQJo(hHhLL^L`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh ^`o(hH.h^`OJQJo(hHhpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hH^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. hh^h`hH) ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH. SS^S`o(hH SS^S`o(hH. SS^S`o(hH() SS^S`o(hH() ^`o(hH .... ^`o(hH ..... ^`o(hH ......  `^``o(hH.......  0^0`o(hH........ hh^h`hH. P^`PhH.. ^`hH... xp^`xhH....  ^`hH .....  X ^ `XhH ......  ^ `hH.......  8^`8hH........  `^``hH.........h  ^ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh| | ^| `OJQJo(hHhLL^L`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.szI}|~"CN/>!]<4k)Ga 2q|OszIszI<0a`n@s^`sCJOJQJo(-                                                                                         i5"CEn%%+i9s`&iv05z=t> ? ? ?N>?|j?r@ AQABIXBC|DDBEPEREc@GHIUJiJqL>PM{NlP@5Q\Q S}BS#TgUKWW%W6^X[k\4]>]jf]^^^o^C_.__%d2e |ek}fm*[n@VZ^ki/T|V\U;_R R0q7qGs(KSWpByDwMFVg f~X-& +R4]w3Q_{,zo9[ R(pwnX $EHx c''KBSZr1*%E"xQ+/|\s. bAv\=es/D5hM/F/Rb]'0h;OTYM_Up>g8w,6?V+>`B>A xGmLvXaTi G40iDnG )ADEoHqHHH*NHNNOQOzO{O|O}O~OOOOOOOOOOQJ~ @DDC0DDO@UnknownBronwyn ByrnesJonathon Hunyorhunjo Gz Times New Roman5Symbol3& z ArialCMArialMTArialuMHelveticaNeue-LightHelvetica 45 Light7K@CambriaG5  hMS Mincho-3 fg?5 z Courier New7&{ @Calibri5& zaTahoma;Wingdings"1h ӆ ӆifE :#|E :#|!nx4dDD 2qHX X2.G:\Templates\Commission\Printed Letterhead.dot!Our Ref: [Insert File Reference] Bronwyn ByrnesBronwyn Byrnesp          *   )     Oh+'0 ,8 X d p |$Our Ref: [Insert File Reference] Bronwyn ByrnesPrinted Letterhead.dotBronwyn Byrnes2Microsoft Office Word@F#@@I/@I/E :՜.+,D՜.+,` hp  Human Rights Commission|#D' "Our Ref: [Insert File Reference] Title@(X`4 _PID_HLINKS_NewReviewCycleAnM$mailto:epping@parliament.nsw.gov.au}/mailto:office@hatzistergos.minister.nsw.gov.au[HMhttp://security.honmeoffice.gov.uk/ripa/legislation/protecting-human-rights/'CUhttp://www.echr.coe.int/Eng/Press/2004/Dec/ChamberjudgmentVanRossemvBelgium91204.htm_ftn2  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPRSTUVWXZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F*K/Data Q1TableYWordDocumentGSummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q