Are We Protected? Are We Protected? The Adequacy of Existing Legal - - PowerPoint PPT Presentation

are we protected are we protected
SMART_READER_LITE
LIVE PREVIEW

Are We Protected? Are We Protected? The Adequacy of Existing Legal - - PowerPoint PPT Presentation

Are We Protected? Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age t e o et c ge Tim Parker Barrister at Law Barrister-at-Law Denis Chang S.C.s Chambers Teaching Consultant U i


slide-1
SLIDE 1

Are We Protected? Are We Protected?

The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age t e

  • et c ge

Tim Parker

Barrister at Law Barrister-at-Law Denis Chang S.C.’s Chambers Teaching Consultant U i i f H K University of Hong Kong

slide-2
SLIDE 2

2

Overview Overview

  • The

law

  • f

privacy: Article 17

  • f

the

  • The

law

  • f

privacy: Article 17

  • f

the International Covenant on Civil and Political Rights (1966) Rights (1966)

  • Privacy impact of biometric data usage
  • Privacy impact of biometric data usage

Bi t i i H K SAR d M i l d

  • Biometrics in Hong Kong SAR and Mainland

China

slide-3
SLIDE 3

3

Article 17 ICCPR Article 17 ICCPR

1 No one shall be subjected to arbitrary or

  • 1. No one shall be subjected to arbitrary or

unlawful interference with his privacy, family,

  • r correspondence nor to unlawful attacks on
  • r correspondence, nor to unlawful attacks on

his honour and reputation.

  • 2. Everyone has the right to the protection of the

law against such interference or attacks law against such interference or attacks.

slide-4
SLIDE 4

4

Article 17 ICCPR Article 17 ICCPR

  • The right to privacy is neither:
  • The right to privacy is neither:

▫ Absolute; nor ▫ Non-derogable ▫ Non-derogable.

  • However strict conditions for limitation:
  • However, strict conditions for limitation:

▫ “In law” (i.e. legislation); and ▫ “Not arbitrary” ▫ Not arbitrary

slide-5
SLIDE 5

5

Article 17 ICCPR Article 17 ICCPR

  • “Arbitrary” synonymous with “unreasonable”
  • Arbitrary synonymous with unreasonable

(per UNHRC):

▫ Rational connection to a legitimate purpose ▫ Restriction on the right must be no more than is necessary to accomplish the legitimate purpose necessary to accomplish the legitimate purpose P ti lit ▫ Proportionality

slide-6
SLIDE 6

6

Article 17 ICCPR - Sources Article 17 ICCPR - Sources

  • UN Human Rights Committee General

UN Human Rights Committee General Comment No. 16 (Right to Privacy) 1988

  • Toonen v Australia [1994] IHLR 27 (UNHRC

Communication No. 488/1992)

  • Leung Kwok Hung & Anor. v Chief Executive
  • f the HKSAR (Unreported, 9 February 2006,

HCAL107/2005)(Affirmed by the Court of Final A l i [2006] 3 HKLRD 455) Appeal in [2006] 3 HKLRD 455)

slide-7
SLIDE 7

7

Biometrics and privacy Biometrics and privacy

  • Characteristics intrinsic to biometric data
  • Characteristics intrinsic to biometric data
  • Collateral impact of employing biometrics:
  • Collateral impact of employing biometrics:

Secondary data functions ▫ Secondary data functions ▫ Trend towards centralisation/collation ‘F ti ( ifi ti ) ’ ▫ ‘Function (or specification) creep’

slide-8
SLIDE 8

8

Biometric Hong Kong ID Cards Biometric Hong Kong ID Cards

  • Mandatory to possess and carry at all times
  • Mandatory to possess and carry at all times

(Registration of Persons Ordinance)

  • Introduced “temporarily” for 1949 mass-

migration: law and order food distribution etc migration: law and order, food distribution, etc. N t b h k d ith t b bl

  • Now smart, may be checked without probable

cause (including fingerprint scanner match) with ili f ti auxiliary functions

slide-9
SLIDE 9

9

Data privacy in the PRC Data privacy in the PRC

  • No unified data protection law
  • No unified data protection law
  • Some piecemeal developments:
  • Some piecemeal developments:

▫ Amended PRC Criminal Law Amended Tort Law ▫ Amended Tort Law

P di i d l lik l b bj

  • Prediction: developments likely to be subject to

wide State security exceptions