PRIVACY IMPACT ASSESSMENT FOR NATIONAL CODE OF PRACTICE FOR CHEMICALS OF SECURITY CONCERN For: Attorney-General’s Department MAY 2013 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY ........................................................................................................... 3 1.1 1.2 1.3 2 INTRODUCTION...................................................................................................................... 9 2.1 2.2 2.3 2.4 2.5 3 BACKGROUND .............................................................................................................................. 3 SCOPE OF THE PIA AND METHODOLOGY ........................................................................................... 3 FINDINGS AND RECOMMENDATIONS ................................................................................................ 4 1.3.1 Overall Finding ................................................................................................................. 4 1.3.2 Recommendations ........................................................................................................... 5 BACKGROUND .............................................................................................................................. 9 PURPOSE AND SCOPE OF PIA .......................................................................................................... 9 ASSUMPTIONS AND QUALIFICATIONS APPLIED TO THE PIA.................................................................... 9 METHODOLOGY .......................................................................................................................... 10 GLOSSARY.................................................................................................................................. 10 DESCRIPTION OF THE DRAFT CODE ....................................................................................... 11 3.1 3.2 BACKGROUND TO THE DRAFT CODE ............................................................................................... 11 DECISION REGULATION IMPACT STATEMENT ................................................................................... 12 3.2.1 Policy context ................................................................................................................. 12 3.2.2 International developments........................................................................................... 13 3.2.3 Cost-benefit analysis ...................................................................................................... 14 3.2.4 Evaluation of the Draft Code .......................................................................................... 15 3.3 CONTENT OF THE DRAFT CODE ...................................................................................................... 16 3.4 PRIVACY IMPLICATIONS OF THE DRAFT CODE ................................................................................... 17 3.4.1 Key issues ....................................................................................................................... 17 3.4.2 Scope .............................................................................................................................. 18 4 ISSUES RAISED IN STAKEHOLDERS CONSULTATIONS UNDERTAKEN FOR THE PIA .................... 20 5 POSSIBLE PRIVACY RISKS IDENTIFIED .................................................................................... 22 6 FINDINGS ON KEY PRIVACY RISKS AND RECOMMENDATIONS ................................................ 27 6.1 6.2 OVERALL FINDING ....................................................................................................................... 27 COLLECTION OF PERSONAL INFORMATION ....................................................................................... 28 6.2.1 At point of sale – Authority for collection ...................................................................... 28 6.2.2 Collection of copies of photo ID ..................................................................................... 29 6.2.3 Avoid excessive collection of personal information – company CD .............................. 30 6.2.4 Targeting collection of CD to higher risk circumstances ................................................ 30 6.2.5 Fair collection – Voluntary nature of code and basis for CD collection ......................... 32 6.2.6 Employee and contractor checking ................................................................................ 33 6.3 NOTICE AND TRANSPARENCY ......................................................................................................... 34 6.4 USE OF PERSONAL INFORMATION FOR FURTHER UNRELATED PURPOSES ................................................ 35 6.5 DISCLOSURE TO LENSAS .............................................................................................................. 35 6.6 SECURITY OF FORMS STORED BY BUSINESSES .................................................................................... 36 6.7 SAFETY MECHANISMS .................................................................................................................. 36 6.8 EXPANSION OF DRAFT CODE TO FURTHER CHEMICALS AND MONITORING AND REVIEW ........................... 38 7 APPENDIX ONE .................................................................................................................... 39 7.1 7.2 MATERIALS REVIEWED ................................................................................................................. 39 ORGANISATIONS CONSULTED IN THE COURSE OF THE PIA .................................................................. 40 EXECUTIVE SUMMARY 1.1 BACKGROUND The Attorney‐General’s Department (AGD) engaged Information Integrity Solutions Pty Ltd (IIS) to carry out a Privacy Impact Assessment (PIA) of the privacy issues that could arise in the context of the draft National Code of Practice for Chemicals of Security Concern (the Draft Code). The objectives of the Draft Code are to promote effective chemical security management practices throughout the chemical supply and use chain, and in particular to: Protect against the diversion of chemicals for terrorist or criminal purposes Encourage cooperation between businesses and organisations that handle chemicals and law enforcement agencies on chemical security matters and Educate and train staff to be alert to warning signs and report suspicious behaviours. The Draft Code encourages businesses to self‐assess their individual level of risk and suggests action that can be taken to reduce risk. The suggested actions include employee and contractor checking, reporting suspicious behaviour to the National Security Hotline and seeking identity information from purchasers in some circumstances. These actions will necessarily involve the collection and possibly storage of personal information and therefore raise issues of compliance with privacy law as well as other privacy issues. 1.2 SCOPE OF THE PIA AND METHODOLOGY The scope of work for the PIA required the exploration of privacy issues including the areas of potential concern highlighted in the AGD’s consultations, taking account of the Privacy Act 1988 and recent privacy reforms, and the development of recommendations about ways to address identified privacy issues, including through changes to the Draft Code or development of specific guidance materials. In conducting the PIA IIS: Consulted with AGD and finalised the work plan Gathered information Analysed the information and prepared a draft report with AGD Held consultation based on the draft PIA report with some stakeholders including privacy and civil liberties advocates, industry representative bodies and government agencies Finalised the report, including amending draft recommendations where needed, taking account of feedback received from AGD and other stakeholders. 1.3 FINDINGS AND RECOMMENDATIONS 1.3.1 OVERALL FINDING This PIA was undertaken on an initiative to protect community safety where there is a low likelihood of an event but where the impact could be high. IIS recognises how difficult it is to make a judgement about proportionality of a measure in such circumstances. In this instance the Draft Code is a result of considerable government process over a number of years. In the course of that process the rationale for the Draft Code has been debated extensively. Although to date there has been limited consideration of privacy issues, debate has been detailed, relatively transparent and has balanced the interests of a range of stakeholders. Given this background, IIS has focussed its analysis on where privacy impacts might fall rather than whether the code should proceed. IIS recognises that there are legitimate law enforcement and national security interests in collecting personal information for the purposes of the Draft Code. At the same time, IIS considers that there are some real concerns in relation to privacy risks that need to be addressed. These include: The range of circumstances in which a customer might be asked to complete a customer declaration The collection of the photocopy of photo ID that could, amongst other things, add to risks of identity theft or fraud The potential harm to individuals including harm to reputation, discrimination, or the potentially significant impacts of being included on a national security database without due cause The potential for personal information obtained via a customer declaration and held by a participating business to be lost, subject to unauthorised access or other misuse The fact that a sizeable proportion of the approximately 5,000 businesses that could be offering chemical precursors for sale would be considered ‘small businesses’ that are exempt from application of the Privacy Act. IIS recognises that at this point there is no clear indication of the impact of the Draft Code in terms of the number of customer declarations that might be collected; if businesses tend to focus on suspicious transactions the numbers could be quite low. Nevertheless, it is vital that the personal information of individuals is protected no matter the extent of collection or which business they frequent. While the AGD may be able to provide guidance on matters such as the proper collection and storage of personal information, IIS considers that the most pressing issue that needs to be addressed if the Draft Code proceeds, is providing mechanism(s) for individuals to receive help and redress if something goes wrong. 1.3.2 RECOMMENDATIONS Recommendation 1 – Authority to collect personal information IIS recommends that AGD consider obtaining legal advice on the application of NPP 1 to the requirement to obtain customer declarations. IIS also recommends that the proposed evaluation of the Code after 3 years of operation consider if there is a need for it to be backed by a legislative provision authorising the collection and storage of specified personal information. The evaluation should assess the extent to which the Code provisions for customer declarations have been taken up and also customer, as well business, experience of the collection process and of the handling of personal information once collected. Recommendation 2 – Remove the requirement to collect a copy of photographic identification IIS recommends that the AGD remove the advice in the Draft Code, including on the customer declaration form, to attach a photocopy of the customer’s photo ID. Recommendation 3 – Remove the requirement to obtain a customer declaration for company purchases for known account customers IIS recommends that the AGD remove the advice in the Draft Code, including on the customer declarations, to collect a customer declaration for an employee who is making a purchase on behalf of a known company account customer. Recommendation 4 – Customer Declaration only for non-traceable transactions at the business’ discretion IIS recommends that the AGD amend the Draft Code so that its focus is on customer transactions where the customer is not otherwise traceable. A qualification should be provided that in the interests of flexibility, participating businesses do not have to seek customer declarations for every such transaction, for example with repeat customers or customers that the sales person knows well. IIS notes this recommendation is limited to ‘bricks and mortar’ sales. There is insufficient information at this point to extend it to mail order or online sales. Recommendation 5 – Change the compulsory wording of the customer declarations IIS recommends that the current wording of the customer declaration, which provides that declaration ‘must’ be completed be amended to remove any impression that collection of personal information is legally mandated. Recommendation 6 – Code Title to accurately reflect its ‘voluntary’ status IIS recommends that the AGD rename the Draft Code as ‘Guidance’, or if this is not accepted that it amend the Draft Code’s name to the ‘National Voluntary Code of Practice for Chemicals of Security Concern’ or take other measures to dispel ambiguity as to its legal binding status. If this recommendation is not adopted, IIS recommends that the voluntary nature be fully explained in all other engagement material including documents, forms, signage and education material. Recommendation 7 – Draft Code to advise on appropriate targeting and management of employee background and criminal checking IIS recommends that the AGD amend the Draft Code so that the responsibility is assigned for developing the organisation’s policy on background and criminal history checks and so that the current security measure for ‘Employee and Contractor checking’ is limited to circumstances where there is a clear risk related to the inherent requirements of the position. Recommendation 8 – Transparency about information handling in relation to the customer declarations IIS recommends that the privacy statement AGD has undertaken to develop for the customer declaration form for the Code provides information about: The purpose of collection, for example that the personal information provided will be kept by the participating business to facilitate the effective provision of information for law enforcement and national security purposes The period for which the information will be retained, for example that the customer declaration will be kept securely for two years and then securely disposed of The consequences of not providing the information, for example, that if the individual does not provide the information, the participating business may refuse to sell him or her the product How to contact the participating business including its name and a contact number within the organisation for complaints and/or queries in relation to the operation of the Code. Recommendation 9 – Develop guidance on assessing and responding to a LENSA request IIS recommends that the AGD provide guidance on how participating businesses should assess a LENSA’s request for information and respond to it in an appropriate and privacy-respecting manner. Recommendation 10 – Code to specifically address protection and security of personal information IIS recommends that AGD amend the Draft Code to include a requirement for businesses to ‘Assign responsibility’ for ensuring that personal information gathered on customer declarations is protected from loss and unauthorised access, use and disclosure and that it is disposed of securely within the specified period, which should be the minimum necessary to achieve the objectives of the Code. Recommendation 11 – Monitor security practices IIS recommends that AGD, or another appropriate body, should monitor the handling of personal information collected in the context of the Code, keep a record of incidents and take further action as needed to ensure appropriate privacy and security practices are maintained. Recommendation 12 – Draft Code should not be implemented without effective redress mechanism(s) for individuals IIS recommends that the Draft Code should not proceed without effective redress mechanisms in the event of interferences with individuals’ privacy. Recommendation 13 – Options for redress in the event of an interference with privacy IIS recommends that the AGD identify and implement effective mechanisms for individual redress in the event of interferences with privacy by participating businesses that are not subject to the Privacy Act. Mechanism might involve: Establishing a single point of contact for individuals if they have a complaint or query. The number would need to be prominently displayed in the Code, the CD and on AGD websites. Outcomes of calls can also serve as an important record for monitoring and review or Engaging with the Privacy Commissioner to explore options for the Commissioner to take on an advocacy/brokering role to assist individuals including in relation to dealings with organisations not otherwise covered by the Privacy Act or Engaging with industry to explore options for establishment/appointment of an industry body to take on an advocacy/brokering role to assist individuals or Using regulation to bring exempted participating businesses under the coverage of the Privacy Act when handling personal information in the context of the Code; this option should be pursued in the absence of other workable solutions. Recommendation 14 – Apply the Code to other chemicals of security concern only after any privacy issues in the review have been addressed IIS recommends that neither the Code nor AGD’s Chemicals of Security Concern website encourage organisations to apply the Code to chemicals other than the 11 chemical precursor of home made explosives until a RIS process, which considers privacy risks to community members in its cost benefit analysis has been completed. IIS recommends that the RIS consider evidence on the handling of personal information in the context of the Code and the impact of an increase in the span of chemicals on the extent of collection of personal information under the Code. Recommendation 15 – Conduct review of the Code, including privacy impacts, within three years of operation IIS recommends that following implementation, the AGD or an appropriate body continue to monitor the Code and provide a formal, written report on its operation within three years. This report would be a significant input to the three-year review. Privacy benchmarks to monitor include: Number of complaints made to the Privacy Commissioner relating to the Code Number of complaints made to the special contact number and other relevant bodies Number of customer declarations collected by participating businesses Number of reported data breaches/incidents concerning customer declarations Comments and feedback from participating businesses regarding use of customer declarations and their security measures Comments and feedback from relevant industry groups Comments and feedback from privacy, civil liberties and community interest groups. INTRODUCTION 1.4 BACKGROUND The Attorney‐General’s Department (AGD) has asked Information Integrity Solutions Pty Ltd (IIS) to carry out a Privacy Impact Assessment (PIA) that explores the potential privacy issues that could arise through businesses implementing any aspect of the draft National Code of Practice for Chemicals of Security Concern (the Draft Code). The objectives of the Draft Code are to promote effective chemical security management practices throughout the chemical supply and use chain, and in particular to: Protect against the diversion of chemicals for terrorist or criminal purposes Encourage cooperation between businesses and organisations that handle chemicals and law enforcement agencies on chemical security matters and Educate and train staff to be alert to warning signs and report suspicious behaviours. The Draft Code encourages businesses to self‐assess their individual level of risk and suggests action that can be taken to reduce risk. The suggested actions include employee and contractor checking, reporting suspicious behaviour to the National Security Hotline and seeking identity information from purchasers in some circumstances. These actions will necessarily involve the collection and possibly storage of personal information and therefore raise issues of compliance with privacy law as well as other privacy issues. 1.5 PURPOSE AND SCOPE OF PIA In accordance with the AGD’s requirements, the scope of work for the PIA included: Exploring privacy issues arising from the Draft Code including the areas of potential concern highlighted in the AGD’s consultations Considering issues in light of the current Privacy Act 1988 (the Privacy Act) and recent privacy reforms in the Privacy Amendment (Enhancing Privacy Protection) Act 2012 (the Amendment Act) Undertaking some consultation with privacy, community and civil liberties representatives and other stakeholders and Making recommendations to the AGD about ways to address any potential privacy issues (including through changes to the Draft Code or release of specific guidance materials). 1.6 ASSUMPTIONS AND QUALIFICATIONS APPLIED TO THE PIA IIS applied the following assumptions and qualifications to the PIA: That all systems and policies were up-to-date at the point when IIS examined them Those reading the PIA are familiar with the project The PIA provides general policy advice – it is not intended to be and should not be relied upon as legal advice. 1.7 METHODOLOGY In conducting this PIA IIS worked closely with the relevant AGD staff. The approach applied is based on the OAIC’s Privacy Impact Assessment Guide. 1 IIS also drew on other current PIA best practice in Australia and internationally, as well as its own framework for analysis and solution identification. In undertaking this PIA, IIS took the following steps: Gathered information about the Draft Code – a list of the material reviewed is at Appendix 1 Read and analysed the data, considering the issues from the perspective of the various participants – the PIA used the National Privacy Principles (NPPs) in the Privacy Act as the analytical framework because the organisations applying the Draft Code will be private sector organisations. The analysis also drew on the Australian Privacy Principles (APPs) in the Amendment Act, and also wider privacy challenges including the fair allocation of risks between organisations and individuals Prepared a draft report and recommendations that were provided to AGD Held consultations with some stakeholders including privacy and civil liberties advocates, industry representative bodies and government agencies as listed at Appendix 1. The consultation process involved: o Contacting stakeholders in April 2013 alerting them to the consultation on the PIA and canvassing interest o Circulating the draft PIA and inviting written or oral submissions o Conducting a series of meetings in the period 14 May to 22 May 2013 Finalised the report, including amending draft recommendations where needed, taking account of feedback received from AGD and other stakeholders. 1.8 GLOSSARY Term Description APPs Australian Privacy Principles CD Customer declaration Chemical precursor Any of the 11 chemicals that are precursors to homemade explosives to which the Draft Code applies Decision RIS Decision Regulation Impact Statement Draft Code Draft National Code of Practice for Chemicals of Security Concern 1 Office of the Australian Information Commissioner, Privacy Impact Assessment Guide, May 2010. Available at <http://www.oaic.gov.au/publications/guidelines/Privacy_Impact_Assessment_Guide.html>. Term Description LENSA Law enforcement or national security agency NPPs National Privacy Principles Participating business A business that is voluntarily adhering to the Draft Code The Privacy Act The Privacy Act 1988 DESCRIPTION OF THE DRAFT CODE 1.9 BACKGROUND TO THE DRAFT CODE In December 2002, the Council of Australian Governments (COAG) agreed to a national review of the regulation, reporting and security surrounding the storage, sale and handling of hazardous materials. The review was primarily a response to the Bali bombings of 12 October 2002. The aim of the review was to assist counter-terrorism efforts by limiting opportunities for, and enhancing the detection of, the illegal or unauthorised use of hazardous materials. As part of the review, there was a Report on the Control of Chemicals of Security Concern. On 26 March 2008, COAG agreed to its recommendations, which included: A set of six overarching principles to guide the development of strategies to manage chemicals of security concern The establishment of a Chemical Security Management Framework (‘the Framework’) The development of a methodology to assess the risks of chemicals of security concern The prioritised application of this risk assessment methodology to chemicals of concern that are precursors to homemade explosives (‘chemical precursors’) The identification of 96 chemical of security concern that should be prioritised for assessment, with an initial focus on 11 key chemical precursors. In October 2008, the Commonwealth and State and Territory governments signed the Intergovernmental Agreement on Australia’s National Arrangements for the Management of Security Risks Associated with Chemicals (‘the IGA’). The objective of the IGA was to establish an effective, coordinated and collaborative national approach to the management of chemical security. The key governance and coordination arrangements established under the IGA include: A Chemical Security Coordination Unit (CSCU) – set up within the AGD to coordinate the national implementation of the Framework A Chemical Security Risk Assessment Unit (CSRAU) – set up within the AGD to develop the risk assessment methodology and conduct risk assessments A National Government Advisory Group on Chemical Security (NGAG) – the main decisionmaking body comprising officials from the Commonwealth, State and Territory governments, including appropriate representation from jurisdictional police A National Industry Reference Group on Chemical Security (NIRG) – an advisory body comprising representatives from relevant industry sectors. The CSRAU applied a specially developed risk assessment to all of the chemical precursors. Following completion of the risk assessments, the CSCU, in consultation with industry and government representatives, drafted a range of risk treatment measures to address the identified vulnerabilities that were agreed in mid-2011. Four broad approaches that governments could use to encourage industry to adopt the risk treatment measures were canvassed, in ascending order of prescription: Targeted awareness campaign – treatment measures form the basis of an educational campaign directed at businesses about what constitutes ‘best practice’ security management Series of industry-developed codes of practice – seven industry led/developed codes of practice that cover the representative groupings of businesses, informing them about ‘best practice’ security management. The codes would be voluntary and non-binding Single government code of practice – similar to the above, except the AGD would develop a single code of practice in collaboration with governments and industry groups Regulation – the AGD would develop a model amendment for each jurisdiction’s criminal code that would create a new criminal offence relating to the negligent possession or supply of chemical precursors. Furthermore, the proposed treatment measures would comprise an enforceable code of practice. Following stakeholder consultations and detailed analysis, the Decision Regulation Impact Statement (‘the Decision RIS’) identified Option 3 – government code of practice – as the preferred option. Based on this determination, the AGD has drafted the Draft Code that forms the basis of this PIA. 1.10 DECISION REGULATION IMPACT STATEMENT The AGD commissioned PricewaterhouseCoopers to undertake the Decision RIS, which was delivered in August 2012. 1.10.1 POLICY CONTEXT The chemical industry in Australia is extensive, with an estimated 40,000 chemicals approved for use in Australia which are formulated into over 400,000 trademarked products.2 There are approximately 25,000 businesses that use, handle or sell at least one of the chemical precursors in Australia. While these chemicals have a wide range of legitimate and productive uses, they can also be misused in ways that threaten the health and safety of the public. Australia has a system of occupational health and safety, public health and transport safety regulation designed in part to prevent and mitigate the consequences of accidental and negligent misuse of chemicals. In the wake of the 2002 Bali bombings, there has been increasing government concern about the intentional misuse of chemicals. 2 COAG, Report on the Control of Chemicals of Security Concern, 2008. The available evidence suggests that individuals and groups have an ongoing interest in using homemade explosives for criminal purposes, in particular terrorism and organised crime. High profile international terrorist attacks involving the use of homemade explosives include: The 2005 London bombings The attempted Christmas Day bombing in 2009 involving Northwest Airlines Flight 253 The Oslo car bomb in the 2011 Norway attacks. Several people have been convicted over the past decade in Australia for known or alleged involvement in terrorism through the use of homemade explosives made by chemical precursors.3 There has also been a broader interest in using homemade explosives driven by financial gain (such as bombing automatic teller machines), retaliation and other psychological factors.4 The material reviewed for the PIA indicates that the majority of international and domestic perpetrators have acquired, or sought to acquire chemical precursors legitimately through the supply chain, particularly by retail purchase. The Decision RIS has identified two primary gaps in the current capacity of businesses to manage the security risks associated with chemical precursors that should be addressed by government intervention: Ability of businesses to deter, prevent and detect the theft and diversion of chemical precursors Ability of businesses to facilitate law enforcement through effective information provision. 1.10.2 INTERNATIONAL DEVELOPMENTS Many overseas jurisdictions similar to Australia have adopted security measures in order to address the potential use of chemicals for criminal purposes, albeit with different regulatory approaches. On one end of the spectrum, the United Kingdom has adopted a non-regulatory approach. The aim is to improve how legitimate users and handlers of chemicals manage security risks through public awareness campaigns. The United States employ a set of federal security regulations known as the Chemical Facility AntiTerrorism Standards that focus on high-risk chemical facilities. The Department of Homeland Security requires all chemical facilities that possess ‘chemicals of interest’ (approximately 300) at prescribed threshold levels to prepare a Security Vulnerability Assessment, and those deemed to be high risk to develop and implement a Site Security Plan. 3 See, eg, Gary Hughes, ‘Lies, bombs and jihad’, The Australian (online), 18 September 2008 <http://www.theaustralian.com.au/news/features/lies-bombs-and-jihad/story-e6frg6z6-1111117491538>; Lisa Davies, ‘What home raids found’, The Daily Telegraph, 15 November 2005, p 2. 4 See, eg, David Braithwate, ‘Big dreams but alleged bomb gang nervous about explosives’, The Sydney Morning Herald (online), 30 August 2007 <http://www.smh.com.au/news/national/alleged-bomb-gangnervous-about-explosives/2007/08/29/1188067191570.html>; Michael Vincent, ‘Homemade bomb found outside top bikie’s house’, ABC Online, 31 March 2009 <http://www.abc.net.au/news/2009-03-31/homemadebomb-found-outside-top-bikies-house/1636908>; Anthony Dowsley, ‘Alleged bomb-maker’s home still unsafe as bail application adjourned’, Herald Sun (online), 26 July 2011 <http://www.heraldsun.com.au/news/morenews/heavily-armed-police-arrest-accused-would-be-bomb-maker-in-castlemaine/story-fn7x8me21226101958518>. Under the Restricted Components Regulations 2008 (made under the Explosives Act 1985), Canada has made a number of regulatory requirements pertaining to the security of ‘restricted components’ (that is, chemicals that can be components of an explosive). These requirements include: registration of sellers; restricted physical and personnel access; ongoing stock management; restricted sales; adequate record-keeping; and the provision of information about suspicious activity to relevant authorities. Since 2008, the member states of the European Union have been implementing a number of crosscollaboration, prevention, detection and response measures contained in the EU Action Plan on Enhancing the Security of Explosives. In January 2013 – after publication of the Decision RIS – a new EU Regulation concerning the marketing and use of explosives precursors (No 98/2013) came into force.5 The Regulation requires member states to establish a licensing regime for members of the public with a legitimate interest to acquire, introduce, possess or use 15 restricted explosives precursors. Member states may establish a register to collect an individual’s name, address, identity document number and details of the transaction. Any processing of personal data that is carried out must be in accordance with the Data Protection Directive (95/46/EC). 1.10.3 COST-BENEFIT ANALYSIS As noted above, the Decision RIS considered four options for businesses to adopt the risk treatment measures, ranging from least to most prescriptive: Option 1 – Targeted awareness campaign Option 2 – Series of industry-developed codes of practice Option 3 – Single government code of practice Option 4 – Regulation. The Decision RIS based its cost-benefit analysis on the increased likelihood of uptake and the cost of implementation (for both government and businesses). Due to the lack of publicly available data about the current risk posed by individuals and groups using homemade explosives, the Decision RIS was unable to reliably quantify or qualify the difference in reduction of risk between the options. Instead, it used a break-even analysis to estimate the number of terrorist attacks each option would need to prevent over the decade between 2012 and 2021 to cover the costs associated with the measures. Total costs (Net Present Value over 10 years, $ millions) No. of terrorist attacks that would need to be prevented % of annual gross household income Awareness campaign $67.59 0.03-0.09 0.01% Industry-developed codes $68.86 0.03-0.09 0.01% 5 Regulation (EU) No 98/2013 of the European Parliament and of the Council of 15 January 2013 on the marketing and use of explosives precursors. Total costs (Net Present Value over 10 years, $ millions) Government code of practice Regulation No. of terrorist attacks that would need to be prevented % of annual gross household income $78.04 0.03-0.10 0.01% $5,126.65 2.20-6.77 0.70% Summary of total benefits, Options 1-4 (Decision Regulation Impact Assessment, Table 3, p 13) Overall, the Decision RIS identified Option 3 – government code of practice – as the preferred option based on five factors: Under Option 1, it is questionable how sustainable the impacts of the targeted awareness campaign will be in the medium-to-long term compared to the other options Option 3 is more practical and manageable than Option 2 because only one body would be responsible for developing and promulgating a code of practice, and is also likely to have higher uptake due to the difficulty in Option 2 of encouraging non-member businesses to adopt the measures of a different industry body It would be easier under Option 3 for law enforcement and intelligence agencies to ensure the code of practice is adaptive to emerging risks It is more appropriate for governments to develop a code of practice, given its role in relation to national security and its capacity to coordinate across stakeholder groups Option 3 received support from the greatest number of submissions during stakeholder consultations. 1.10.4 EVALUATION OF THE DRAFT CODE The Decision RIS foresees that the effects of the proposal will be monitored and evaluated within three years after the end of the implementation period. Core indicators relating to impact include: Enhanced business capacity to prevent, detect and deter illegitimate and legitimate access to chemical precursors by individuals and groups wanting to formulate homemade explosives for criminal purposes Increased business and community contribution to intelligence and law enforcement efforts to prevent the use of homemade explosives for criminal purposes Increased harmonisation and uniformity of outcomes across the Commonwealth, state and territories. Core indicators relating to outcomes include: Increased number of suspicious transactions identified and reported Increased number of incidents involving homemade explosives detected and prevented Increased number of terrorists and other criminals apprehended. 1.11 CONTENT OF THE DRAFT CODE The stated objectives of the Draft Code are to promote effective chemical security management practices throughout the chemical supply and use chain, and in particular to: Protect against the diversion of chemicals for terrorist or criminal purposes Encourage cooperation between businesses and organisations that handle chemicals and law enforcement agencies on chemical security matters Educate and train staff to be alert to warning signs and report suspicious behaviours. The Draft Code identifies 96 chemicals of security concern but the initial focus of actions is on 11 chemical precursors to homemade explosives that have been assessed to be of primary concern. The Draft Code will be voluntary; it will be up to each business to decide if and how it will be implemented. Businesses are also encouraged to adopt the Draft Code in relation to any of the other 85 chemicals they may handle. The Draft Code encourages businesses to adopt security risk management as part of its business culture. It makes recommendations in three areas: Assess and treat the security risk Assign responsibility Investigate and report security breaches and suspicious behaviour. Next, the Draft Code features a table with suggested actions in relation to security measures. The contents of the table reflect the proposed risk treatment measures that were developed by the CSCU. The measures cover 10 areas of concern within the chemical precursor business lifecycle: Employee and contractor checking – limit terrorist access to chemicals of security concern by acquisition through a trusted insider Personnel security awareness – reinforce efficacy of other proposed measures by ensuring that personnel are appropriately aware of the security risk profile of the business in relation to chemicals of security concern Inventory control measures – determine whether chemicals of security concern have been stolen, misplaced or otherwise diverted Receipt of chemical – detect if chemicals of security concern have been stolen or otherwise diverted prior to receiving the product, and, if so, report to a relevant authority as soon as possible Theft and diversion procedures – consider the individual risk of chemicals of security concern being stolen or otherwise diverted and plan steps to reduce the likelihood of these events occurring Physical access – restrict physical access to chemicals of security concern commensurate with the risk profile of the business Personnel access – limit access to chemicals of security concern only to persons who have a legitimate need to access the chemicals Point of sale procedures – adopt responsible practices designed to limit the capacity of terrorists or their associates to acquire chemicals of security concern through direct purchase from the business Sales and distribution procedures – ensure that delivery of orders will be made to persons who have legitimately purchased the chemical in order to reduce the likelihood of the chemical being diverted to terrorists or their associates Transporting chemicals of security concern procedure – institute effective physical security and inventory control processes to reduce the likelihood of chemicals of security concern being accidentally or deliberately delivered to or stolen by terrorists or their associates during transport. Appendix C of the Draft Code contains sample customer declarations (CDs) to assist businesses in keeping records of transactions involving chemicals of security concern. There are two CDs, one for companies and one for individuals. The completion of CDs is a suggested action for the point of sale risk treatment measure. The Draft Code states that CDs are not intended to be used for all transactions, but they could be used: On a per-transaction basis On a per customer basis (particularly for new and cash customers) When the sales person feels that suspicious indicators are present. Appendices E, F and G of the Draft Code contain respective guides for detecting suspicious behaviour for retailers, wholesalers and transporters. 1.12 PRIVACY IMPLICATIONS OF THE DRAFT CODE 1.12.1 KEY ISSUES The Privacy Act protects personal information, which includes information about an individual whose identity is apparent, or can reasonably be ascertained, from the information. The Draft Code has privacy implications because it entails the potential collection and storage of personal information about individuals. The collection of personal information is a suggested action at the point of sale. The example CD for companies instructs the company representative and the end-user distributor/supplier to provide their full name and photographic identification (‘photo ID’) number. A photocopy of the photo ID must also be collected. The example CD for individuals has similar requirements, with the addition of collecting the person’s residential address. For employee and contractor checking, suggested actions include basic background checking prior to and during employment, and conducting a criminal history check. In both cases, businesses may collect and use personal information in ways that may have adverse impacts on individuals. During the consultation process for the Draft Code, stakeholders raised the following privacy concerns: Completed CDs may not always be securely stored The CDs should not have to require collection of photocopy of photo ID The CD for companies should not contain an individual’s personal information; signature of senior representative and stamp of the company seal should be enough Customers may resist and/or ask why personal details need to be provided for the purchase of a non-regulated chemical A privacy notice should be included on the CD to notify individuals about prescribed matters in the Privacy Act Background checks undertaken during employment may create industrial relations and consent issues. 1.12.2 SCOPE One important consideration in the discussion of privacy is the size and composition of the overall market of businesses that use or handle chemical precursors. The Decision RIS contains an estimate of the total number of businesses in the Australian market for the different nodes in the chemical precursor supply chain: Introducer – first point in the supply chain and either import or manufacture the chemical Processor – reformulate or package the chemical and on sell to wholesalers, retailers or end users Wholesaler – sell primarily to businesses and institutions and do not repackage or reformulate Retailer – sell primarily to individuals and do not repackage or reformulate the chemical End-user (business) – consumer the chemical in their business/institutional processes Transport/logistics – multiple points in the supply and chain and includes transport and storage of chemicals. NSW VIC QLD WA SA TAS ACT NT TOTAL Introducer 22 19 14 8 4 1 0 0 68 Processor 126 112 81 47 24 5 1 2 398 6 14 3 5 6 0 0 0 33 Wholesaler NSW VIC Retailer 1,635 1,198 928 496 436 123 58 31 4,906 End-user (business) 4,206 5,452 2,896 1,682 2,065 632 235 100 17,268 646 505 405 342 165 33 23 16 2,135 6,641 7,301 4,326 2,580 2,700 794 317 150 24,809 Transport / Logistics TOTAL QLD WA SA TAS ACT NT TOTAL Total population of businesses that use or handle chemical precursors, by State and Territory (Decision Regulation Impact Assessment, Table 61, p 182) Privacy issues relating to background/criminal history checks will be relevant to all businesses in the supply chain. Privacy issues relating to the use of CDs will only apply to wholesalers and retailers. According to the Decision RIS, wholesalers and retailers of chemical precursors encompass a diverse range of businesses: Supermarkets – most sell personal and household products containing hydrogen peroxide, such as bleach and cleaning agents Pharmacies – most sell health and beauty products containing hydrogen peroxide Pool and spa shops – an estimated 70 per cent sell cleaning products containing hydrogen peroxide Hairdressers/salons – an estimated 3 per cent sell bleaching products containing hydrogen peroxide at the prescribed concentrations Hobby stores – most sell nitromethane, a fuel component used in radio-controlled models Cleaning suppliers – an estimated 5 per cent sell cleaning products containing nitric acid Industrial and agricultural suppliers – an estimated 33 per cent sell potassium nitrate, most commonly used as a fertiliser.6 Gaining an overall picture of the market is important because the Privacy Act exempts from its application small businesses with an annual turnover of $3 million or less.7 Based on the above estimates, a considerable number of businesses that choose to adopt the voluntary Draft Code (‘participating businesses’) may not be subject to the Privacy Act. As IIS outlines below, the AGD may need to take further steps to ensure that in such cases individuals will receive adequate privacy protection. 6 Decision Regulation Impact Assessment, Table 60, p 174-175 Retailer node, notes columns 7 Privacy Act 1988 (Cth) ss 6C(1) and 6D. ISSUES RAISED IN STAKEHOLDERS CONSULTATIONS UNDERTAKEN FOR THE PIA The issues raised by stakeholders in the consultation conducted as part of this PIA are noted here and have also been taken into account in the PIA Findings and Recommendations at section 6 below. Some issues raised might not have a direct impact on privacy, for example, the regulatory approach for the Draft Code and concern about Code changes at this point. However, they could affect the way the Draft Code is implemented and so are relevant considerations. The stakeholders who provided comments in the PIA consultation process raised issues similar to those raised in earlier consultations or submissions as summarised at section 3.4.1 above. Some additional issues emerged, in particular: The fact that the early stages of the development of the Draft Code did not include specific attempts to obtain privacy input meaning that privacy issues were not necessarily considered in the risk assessments and RIS processes The difficulty in assessing proportionality given lack of detailed evidence on the nature and extent of terrorism or criminal activity The possible efficacy of the Draft Code measures and, in the absence of confidence here, further questioning the proportionality of the Draft Code measures The range and nature of organisations that may be involved in handling or sale of the chemicals of security concern adds to the possible privacy risks in the handling of personal information, including because many of these could be small businesses and therefore not subject to the Privacy Act The lack of any specific requirements in the Draft Code with respect to privacy, for example in relation to limits on use, security measures, retention and disclosures for law enforcement purposes Possibility of the Draft Code being backed by law The fact that complying organisation are likely to apply all Code provisions as ‘best practice’ emphasising the need for provisions to be as clear and specific as possible Similarly, the fact that organisations are asked to ‘self assess’ their risk profile may lead to more, or indeed fewer measures than may be needed Potential for significant changes to the Draft Code at this late stage to affect its effective implementation The fact that the chemicals industry is already highly regulated and the approach in the Draft Code varies from, for example, the regime for chemicals classified as drug precursors that is backed by State/Territory law. POSSIBLE PRIVACY RISKS IDENTIFIED This table identifies possible privacy risks that might arise in the context of the measures proposed in the Draft Code. It uses the NPPs in the Privacy Act as the framework for analysis and also takes account of broader privacy issues, including those identified in the consultation process. PRIVACY PRINCIPLE POSSIBLE RISK COMMENTS Overall proportionality and efficacy of the measure The Draft Code proposes measures that are not proportionate in their impact on privacy compared to their effectiveness in protecting against possible terrorist or criminal activity This is a difficult issue to assess; recommendations therefore focus on specific privacy risks. Collection limitation, including anonymity Risk that participating businesses’ collection of personal information in the context of the Draft Code is not (reasonably) necessary for their functions or activities. Risk arises particularly as the Draft Code is voluntary and is not backed by law or regulation requiring the collection. Risk that more information than necessary is collected at the point of sale for law enforcement purposes. Submissions to AGD raise the question of the collection of photocopy of photo ID and whether the CD for companies should require additional information about the employee making the purchase. NPPs 1.1 & 8; APP 2 & 3 IIS also considers that the Draft Code advice that businesses might seek a CD on a per-transaction, per customer or ‘suspicious indicators’ basis is very broad and could lead to unnecessary collection. Risk that participating businesses collect more information than necessary in the context of expansive background and/or criminal history checks and in a way that is not targeted to the The likelihood of the risk is small but the consequences are large, including embarrassment, discrimination and unfair dismissal. This risk is exacerbated by the employee records exemption in the PRIVACY PRINCIPLE Fair, lawful and not unreasonably intrusive means of collection NPP 1.2; APP 3.5 Consent to collect sensitive information NPP 10; APP 3.3 Notice and transparency NPPs 1.3 & 5; APPs 1.3, 1.4 & 5.2 Use and disclosure POSSIBLE RISK COMMENTS inherent requirements of the position. Privacy Act, which exempts records of pre-employment checks from the Act’s protection once an employment relationship exists. Risk that the collection is carried out by unfair means or in an unreasonably intrusive way. For example, the manner of the request or the inferences drawn by sales staff or other customers may lead to embarrassment, abuse or discrimination. Collection that is known to target ‘suspicious’ transactions raise privacy issues as well as potentially leading to awkward real-life scenarios and/or confrontations. Risk that individuals are given the misleading impression that collection of their personal information at point of sale is legally required. This risk arises from the wording of the CDs and the name of the Draft Code. Risk that individuals will be asked to consent to a criminal history check that is more expansive than needed and which could lead to employment difficulties if it is revealed, for example, past drug offences and previous runins with the legal system as a result of mental illness. The likelihood of the risk is small but the consequences are large, including embarrassment, discrimination and unfair dismissal. Risk that individuals are not fully informed or are misled about why their personal information is being collected. IIS understands that the CD will include a privacy statement but has not been provided a draft at this point. Risk that as a result of the Draft Code IIS recognises that the National Security Hotline is intended to cast This risk is exacerbated by the employee records exemption in the Privacy Act, which exempts records of pre-employment checks from the Act’s protection once an employment relationship exists. AGD is preparing guidance to assist organisations apply the Draft Code; it will include information to assist with background and criminal history checking. PRIVACY PRINCIPLE POSSIBLE RISK COMMENTS NPP 2; APP 6 & 7 businesses make more and/or unjustified reports to the National Security Hotline. a wide net but there are privacy and civil liberty risks for individuals reported. IIS also recognises that the Draft Code does not introduce new circumstances in which reports are encouraged and that the guides to suspicious indicators contained in Appendices E, F and G of the Draft Code provide reasonable advice and information. Risk that participating businesses use or disclose the personal information collected by the CD for a purpose other than what is stated on the form (for example, for private security or for marketing). This seems likely to be a low risk but as noted by privacy and civil liberties advocates the risk might be exacerbated by the fact that many businesses may not be aware of the obligation. This risk can be mitigated by a change to the Draft Code as well as proper monitoring and review to ensure that participating businesses are not taking advantage of the personal information in any way. Risk that participating businesses disclose information to a law enforcement or national security agency (LENSA) inconsistently with the Privacy Act. Risk arises because employees of participating businesses may not know how to assess and/or respond to a LENSA’s request for information. Risk that the personal information participating businesses collect and store is not accurate, complete or up-to-date. This is a low risk as individuals are providing the information themselves and it should only be used for the very specific purpose for which it was collected. Risk that CDs are not securely kept on the premises. The Draft Code calls for the collection of paper based records. Such systems are inefficient and are currently a problem in relation to other legislatively mandated collections by businesses. Data quality NPP 3; APP 10 Data security NPP 4.1; APP 11.1 Consequences of security breach include embarrassment, reputation loss and potential for identity theft or fraud. The risk is exacerbated by the fact that individuals will have no avenues of redress in the event of mishandling or misuse if the PRIVACY PRINCIPLE POSSIBLE RISK COMMENTS participating business is not subject to the Privacy Act8. Destruction or de-identification of data when no longer needed Risk that CDs are not destroyed after the suggested storage period. NPP 4.2; APP 11.2 Access and correction NPP 6; APPs 12 & 13 The longer the period that the CDs are held by a participating business, the greater the likelihood that something will go wrong. This is an area that requires appropriate monitoring and review. Risk that individuals are not able to see what information is held about them by the business, or correct the information if it is wrong. This is a low risk as individuals are providing the information themselves, so they know what information is held about them and the context in which it is held. Furthermore, under NPPs 6.1(i)-(j) and APPs 12.3(h)-(i), an organisation is not required to provide access to personal information if doing so would be likely to prejudice any action relating to suspected unlawful activity or prejudice a law enforcement related activity. Restriction on use of government identifiers Risk that Commonwealth identifiers are inappropriately collected, used or disclosed. This is not a risk as the CD does not involve collection of Commonwealth identifiers. Risk that individuals will lose control of their information if it travels outside Australia or is stored offshore. This is not a risk as the CD does not involve transferring or disclosing information outside of Australia. NPP 7; APP 9 Transborder data flows / crossborder disclosures NPP 9; APP 8 OTHER PRIVACY RISKS 8 The Privacy Act provides an exception for small businesses with an annual turnover of $3M or less unless they are subject to the Privacy Act because another provision, for example relating to the handling of health information, applies. See http://www.austlii.edu.au/au/legis/cth/consol_act/pa1988108/s6d.html. PRIVACY PRINCIPLE POSSIBLE RISK COMMENTS Safety-net for individuals Risk that individuals will not receive timely and adequate redress if something goes wrong. This risk is especially acute in relation to participating businesses that are not subject to the Privacy Act because of the small business exemption. In such cases the individual will have no avenues of redress if they suffer harm including from loss or misuse of their personal information, unless additional mechanisms are introduced to protect them. Monitoring and review Risk that systemic privacy issues associated with adhering to the Draft Code are not discovered and addressed in an appropriate fashion. The AGD has committed to monitoring and reviewing implementation of the Draft Code and whether it is meeting certain targets. Risk that Organisations will apply the Draft Code to all 96 chemicals without information to assist them ‘self assess’ risks, and further RIS processes find this is not necessary or appropriate. The Draft Code and the Chemicals of Security Concern website (http://www.chemicalsecurity.gov.au/Pages/default.aspx), encourage organisations to apply the measures to all 96 chemicals without reference to coming risk assessment or RIS processes. FINDINGS ON KEY PRIVACY RISKS AND RECOMMENDATIONS This section of the report sets out IIS’s findings and recommendations in relation to the privacy impact of the Draft Code. It discusses the key privacy risks identified in the table at section 5 and makes a series of recommendations to address the issues raised. The findings and recommendations are based on the proposals as set out in the Draft Code as well as other briefing material provided and input from privacy and civil liberty advocates and industry and other stakeholders. 1.13 OVERALL FINDING A privacy impact assessment needs to take account of the circumstances of a proposal, including alternatives considered, and in the case of privacy intrusive measures whether these are ‘proportionate’ to the potential harm that a proposal is seeking to address. As noted by some consultees it is difficult to assess the proportionality of the measures in the Draft Code. The supporting material mentions some anecdotal evidence but detailed analysis of the likelihood of a terrorist incident involving the 11 chemical precursors or the other 84 chemicals of security concern is not available. IIS recognises how difficult it is to make a judgement about proportionality where there is a low likelihood of an event but where the impact could be high. In this instance the Draft Code, as described in section 3 is a result of considerable government process over a number of years. In the course of that process the rationale for the Draft Code has been debated extensively. Although to date there has been limited consideration of privacy issues, debate has been detailed, relatively transparent and has balanced the interests of a range of stakeholders. Given this background, IIS has focussed its analysis on where privacy impacts might fall rather than whether the code should proceed. IIS recognises that there are legitimate law enforcement and national security interests in collecting personal information for the purposes of the Draft Code. At the same time, IIS considers that there are some real concerns in relation to privacy risks that need to be addressed. These include: The range of circumstances in which a customer might be asked to complete an CD The collection of the photocopy of photo ID that could, amongst other things, add to risks of identity theft or fraud The potential harm to individuals including harm to reputation, discrimination, or the potentially significant impacts of being included on a national security database without due cause The potential for personal information obtained via a CD and held by a participating business to be lost, subject to unauthorised access or other misuse. Assessment of privacy risks is complicated by the fact that a sizeable proportion of the approximately 5,000 businesses that could be offering chemical precursors for sale would be considered ‘small businesses’ that are exempt from application of the Privacy Act. IIS recognises that at this point there is no indication of the impact of the Draft Code in terms of the number of CDs that might be collected; if businesses tend to focus on suspicious transactions the numbers could be quite low. Nevertheless, it is vital that the personal information of individuals is protected no matter the extent of collection or which business they frequent. While the AGD may be able to provide guidance on matters such as the proper collection and storage of personal information, IIS considers that the most pressing issue that needs to be addressed if the Draft Code proceeds, is providing mechanism(s) for individuals to receive help and redress if and when something goes wrong. 1.14 COLLECTION OF PERSONAL INFORMATION The threshold requirement for collection of personal information is where it is ‘necessary’ (NPP 1.1) or ‘reasonably necessary’ (APP 3.2) for an organisation’s functions or activities. IIS considers that the current advice in the Draft Code might lead to collection that is excessive or possibly not authorised and therefore might not meet the necessary (or reasonably necessary) test. The issues identified are as follows: 1.14.1 AT POINT OF SALE – AUTHORITY FOR COLLECTION The purpose of the collection in the context of the Draft Code is to facilitate the effective provision of information for law enforcement and national security purposes by keeping records of transactions involving chemical precursors. This is a purpose not intrinsically linked to the businesses functions or activities. Complying with a legal requirement to collect information would clearly be ‘necessary’. The key question from a privacy perspective is whether, in the absence of a legal authority, the collection can be considered ‘necessary’. While the Draft Code is not mandatory, it is meeting a community interest, established via a formal and thought-out process, in the context of intergovernmental and industry concurrence. One on view, these factors might be sufficient for the collection to be considered ‘necessary’. In addition, compulsory law may not be the perfect vehicle for defining the scope of collection. Sometimes a ‘softer’ approach will be more flexible and responsive and possibly less likely to lead to excessive collection. The advantage of a non-binding Draft Code is that it can address and adapt to a problem without imposing excessive requirements. On the other hand, from a general privacy perspective, as well as the question of compliance with NPP 1.1, where a collection required for an external purpose such as law enforcement or national security it is often considered preferable that the collection is authorised by law. This allows the process to be open, understandable and subject to Parliamentary scrutiny. Both perspectives were reflected in the comments from privacy and civil liberties advocates. Industry comments on the whole tended to be wary about the prospect of a legal framework for the Code being introduced at this late point Code development process. It was considered likely to affect the efficacy of the Draft Code, making it more onerous and less likely that industry bodies would recommend it to their members and in turn that their members would be less willing to comply. As a voluntary code that represents good practice was considered more likely to garner support. Both industry and government stakeholders raised questions about the appropriate legislative vehicle; no immediate State/Territory/Federal legislation was identified. The timeframe for legislation was also raised as an issue. On balance IIS considers that a case could be made for the collection of personal information by the CDs to be considered ‘necessary’ in terms of NPP 1.1. However, IIS also considers that AGD may wish to seek legal advice on this issue and in any event it should be reconsidered in the context of the proposed evaluation of the Code after 3 years operation. Recommendation 1 – Authority to collect personal information IIS recommends that AGD consider obtaining legal advice on the application of NPP 1 to the requirement to obtain customer declarations. IIS also recommends that the proposed evaluation of the Code after 3 years of operation consider if there is a need for it to be backed by a legislative provision authorising the collection and storage of specified personal information. The evaluation should assess the extent to which the Code provisions for customer declarations have been taken up and also customer, as well business, experience of the collection process and of the handling of personal information once collected. 1.14.2 COLLECTION OF COPIES OF PHOTO ID The challenge for the Draft Code from a privacy perspective is to collect only the information necessary to keep an adequate record of transactions involving chemical precursors while intruding to a minimum extent on the privacy of individuals. In its comments on the Draft Code, the Office of the Australian Information Commissioner (OAIC) questioned whether it is necessary for a photocopy of a customer’s photo ID to be collected. The OAIC suggested that it might be sufficient for the businesses to view the photo ID at the point of sale and to store only the CD, which includes a record of the photo ID number.9 The utility of collecting the photocopy is that it may be helpful to LENSAs to have a photo of potential suspects, especially if he or she is using a fake photo ID and the ID number does not match the suspect in the ID database. However, this must be counterbalanced against the inherent intrusiveness of collecting and storing an individual’s formal ID document, combined with the risk that it may contain unnecessary information such as medical conditions and that it may be improperly accessed or used. There is also no guarantee that the myriad small businesses involved in the sale of chemical precursors will have sound security measures in place. IIS notes that in the context of prepaid mobile services – in which identity verification is required by law – there is no requirement for wholesalers and retailers to store a photocopy of the customer’s photo ID. Rather, it understands that the requirement is that no details of any identity documents used to verify identity will be recorded – only the type of identity information used and transaction information – for example, Medicare card, birth certificate. IIS understands that prepaid mobiles pose at least comparable risks in terms of their use in criminal or national security contexts. It suggests that it would be worth investigating the prepaid mobile regime to gain insights for Draft Code approach. In any event, in light of the potentially risky 9 Office of the Australian Information Commissioner, Submission to Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, 1 March 2013, p 2. collection and storage environment and in the absence of clear evidence that a photocopy of the photo ID is especially beneficial for LENSA investigations, IIS agrees with the OAIC that participating businesses should not collect the photocopy of photo ID. Privacy and civil liberties advocates supported this view. Industry stakeholders were also generally in favour of removing the requirement; amongst other points it was noted that not all outlets would have a photocopier or the capacity to store the material securely. Recommendation 2 – Remove the requirement to collect a copy of photographic identification IIS recommends that the AGD remove the advice in the Draft Code, including on the customer declaration form, to attach a photocopy of the customer’s photo ID. 1.14.3 AVOID EXCESSIVE COLLECTION OF PERSONAL INFORMATION – COMPANY CD As noted earlier, submissions to AGD on the earlier consultation draft of the code argued that the CD for companies should not contain an individual’s personal information. It was suggested that the signature of a senior representative and stamp of the company seal should be enough. In the absence of clear evidence that a CD in these circumstances is especially beneficial for LENSA investigations, IIS tended to agree with this advice. However, the industry/ government consultation discussions suggested a more nuanced approach would be preferable. Issues included that a blanket approach might not address the risk for new customers with unknown reputation or where a bogus company has been established simply for the purpose of obtaining chemicals. Recommendation 3 – Remove the requirement to obtain a customer declaration for company purchases for known account customers IIS recommends that the AGD remove the advice in the Draft Code, including on the customer declarations, to collect a customer declaration for an employee who is making a purchase on behalf of a known company account customer. 1.14.4 TARGETING COLLECTION OF CD TO HIGHER RISK CIRCUMSTANCES The Draft Code starts with a table that summarises the suggested security measures. The Point of Sale advice is as follows: Point of sale procedures Adopt practices that limit opportunities for the acquisition of chemicals for terrorist or criminal use through direct purchase from the business. Only sell to customers with known identity and verified legitimate use Only sell by credit card or on account Record a form of customer identification (e.g. via enduser declaration or similar system – see template declarations at Appendix C) and retain for 2 years Report suspicious transactions (including unusual or different sales to account customers). See Appendices E, F and G for guides to detecting suspicious behaviour Manufacturer, Importer, Processor, Wholesaler, Retailer In addition, in its discussion of measures the current Draft Code states that ‘end user declarations are not intended to be used for all transactions, and they could be used: On a per-transaction basis On a per customer basis (particularly for new and cash customers) or When the sales person feels that suspicious indicators are present’10 IIS considers that together this advice suggests the possibly of requiring a CD for all or most transactions could lead to excessive and therefore ‘unnecessary’ collection of personal information. On the other hand IIS also notes the privacy risks arising from sales people requiring customers to fill out the CD only based on their subjective determination of suspicion. There is clear potential for certain individuals to be unfairly targeted due to stereotypes and profiling. Also, if the Code is clearly targeted to suspicious transactions such a request may cause awkwardness and lead to confrontations if a customer is made to fill out the CD but others around him or her are not. A factor worth considering is that in the prepaid mobile regime it is sufficient for customers to verify their identity through the successful use of credit card or EFTPOS to purchase a prepaid mobile. Lawmakers seem to consider the record of the credit card transaction to be sufficient, even in light of the potential for criminal activity through the use of prepaid mobiles. Arguably the same basis should apply for wholesalers and retailers of chemical precursors. The criterion for collecting information about the transaction could then be more targeted and more objective. One option is to use traceability as the criterion – that is, only collect information from customers who pay with cash, whose identity would not otherwise be apparent. For customers using credit card, direct bank deposit or cheque, there is already a transaction record that shows what they have bought and that allows them to be tracked down. A qualification should be provided that participating businesses do not have to seek CDs for every cash transaction. This is to provide flexibility, for example with repeat customers or customers that the sales person knows well. IIS notes that the above discussion does not preclude the consideration of suspicious indicators for making calls to the National Security Hotline. Such cases do not require the knowledge or involvement of the suspected individual, and so while privacy risks are present, they do not raise the same issues associated with collection from individuals via a CD. IIS also notes that while most industry stakeholders, including some privacy and civil liberties advocates supported this approach, there was some views that it limited individuals’ choices, possibly forcing them into a credit purchase; in this case the preferred approach was to have the collection specified and authorised by law. A number of stakeholders raised the issue of Internet transaction querying, if the draft recommendation limiting CDs to untraceable transactions addressed the risks in an online environment. AGD advised that the draft Code is intended to apply to Internet sales but also that CDs would be less relevant here. It was noted that overall the measures in the Draft Code are 10 Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, v 2, 15 March 2013 (‘Draft Code’), p 16 [Emphasis added]. relevant in that they focus on ‘know your customer’ and in any event that many businesses will not sell in these circumstances without setting up an account. However, the discussion concluded more information was needed before extending the recommendation to mail order or Internet sales. Recommendation 4 – Customer Declaration only for non-traceable transactions at the business’ discretion IIS recommends that the AGD amend the Draft Code so that its focus is on customer transactions where the customer is not otherwise traceable. A qualification should be provided that in the interests of flexibility, participating businesses do not have to seek customer declarations for every such transaction, for example with repeat customers or customers that the sales person knows well. IIS notes this recommendation is limited to ‘bricks and mortar’ sales. There is insufficient information at this point to extend it to mail order or online sales. 1.14.5 FAIR COLLECTION – VOLUNTARY NATURE OF CODE AND BASIS FOR CD COLLECTION The Privacy Commissioner interprets the ‘fair’ collection of information to mean without intimidation or deception.11 IIS considers there is a risk that the current wording of the CDs may result in participating businesses unintentionally misleading customers. There are two potential problems. Firstly, the name of the Draft Code – the National Code of Practice for Chemicals of Security Concern – carries with it a sense of legal or at least quasi-legal status. This may mislead businesses and customers into thinking they have no choice but to comply with the Draft Code. IIS acknowledges that the body of the Draft Code does make it clear that its adoption is voluntary. However, as the advice in the Draft Code is intended to be advisory, IIS considers that it will be vitally important that the Code is correctly positioned in the minds of the public not just industry. As we understand, the intention is that companies adopt the Code as best practice and it will be important that this status is conveyed in signage, document, forms etc. IIS considers this should start with accurate naming – by including ‘voluntary’ in title, or re-titling the Code as guidance or advice – however if this part of the recommendation is not adopted, other engagement pieces including education and documentation, will have to work harder. The need for greater reliance on such mechanisms to accurately convey the Code’s status may be challenging. Secondly, the CDs as currently worded are misleading. They state that a ‘signed end-user declaration must be provided.’12 This gives the impression of legal imprimatur where none exists, since the use of the CD is an action suggested by a voluntary code of practice. Customers who provide their personal information may be mistakenly submitting to this apparent authority. Where a participating business adopts CDs for the sale of chemical precursors, the CD should make clear that the collection is to meet the suggested action of the Draft Code to which the business subscribes, as opposed to being a legal requirement. For example, the wording could be changed 11 Office of the Federal Privacy Commissioner, Guidelines to the National Privacy Principles, September 2001, p 27. 12 Attorney-General’s Department, Draft Code, p 17 (for companies) & p 18 (for private individuals) [Emphasis added]. from ‘must be provided’ to ‘in accordance with the National Code that this company has adopted as best practice, it is company policy that the form is provided’. Privacy and Civil Liberties advocates supported this view. Industry stakeholders did not object to the issue but both industry and government stakeholders were wary about a name change. This was on the grounds that it is late in the piece, that the voluntary nature of the Code is very clear in the content, and that the term ‘Code’ was considered to have some status and therefore ‘encourage’ its adoption. Recommendation 5 – Change the compulsory wording of the customer declarations IIS recommends that the current wording of the customer declaration, which provides that declaration ‘must’ be completed be amended to remove any impression that collection of personal information is legally mandated. Recommendation 6 – Code Title to accurately reflect its ‘voluntary’ status IIS recommends that the AGD rename the Draft Code as ‘Guidance’, or if this is not accepted that it amend the Draft Code’s name to the ‘National Voluntary Code of Practice for Chemicals of Security Concern’ or take other measures to dispel ambiguity as to its legal binding status. If this recommendation is not adopted, IIS recommends that the voluntary nature be fully explained in all other engagement material including documents, forms, signage and education material. 1.14.6 EMPLOYEE AND CONTRACTOR CHECKING The Draft Code suggests that basic background checking should occur prior to and during employment as part of the risk treatment measure of limiting terrorist access to chemical precursors through a trusted insider. In the Draft Proposed Risk Treatment Measures (Draft Options), the security objective of employee and contractor checking is for the responsible person in the participating business to satisfy him or herself that the employee who has access to chemical precursors: Has provided their true and correct identity Is trustworthy to employ in the business or organisation. IIS considers there is a risk that, absent of guidance, employers may conduct background checks where it is not necessary to do so or conduct checking in a way that goes beyond what is required. The results of such checks may cause embarrassment and distress to the applicant or employee. The results may also impact on job prospect/tenure by generating an unfavourable opinion within the responsible person. The Draft Options have useful commentary that could be incorporated into the guidance material. For example, in determining whether a person is trustworthy to employ in the business, the employer is not required to determine that the prospective employee has a predisposition towards violence or extremist views. IIS acknowledges that AGD is proposing to develop guidance material. However, it also notes that the issue of background and criminal history check was a matter of concern for both industry representatives and privacy and civil liberties advocates. Both were concerned that the provisions in the Draft Code would lead to excessive checking or to inappropriate or discriminatory decision- making. IIS considers that, in addition to the proposed guidance, the Draft Code should flag that such checking should only be undertaken where there is a clear risk and where it is related to an inherent requirement of the employee’s position. It also considers that an organisation should have a clear policy, setting out how and when background and criminal history checks will be made and how the results will be managed, before undertaking such checks. Recommendation 7 – Draft Code to advise on appropriate targeting and management of employee background and criminal checking IIS recommends that the AGD amend the Draft Code so that the responsibility is assigned for developing the organisation’s policy on background and criminal history checks and so that the current security measure for ‘Employee and Contractor checking’ is limited to circumstances where there is a clear risk related to the inherent requirements of the position. 1.15 NOTICE AND TRANSPARENCY Where practicable, an organisation should provide information about certain prescribed matters before or at the time of collection of personal information (NPP 1.3 and APP 5). The current draft of the code indicates a privacy statement will be included but at this point the CDs lack such a statement. The makeup of wholesalers and retailers is likely to include a sizeable proportion of small businesses that are not subject to the Privacy Act. In Recommendation 12 and 13 below, IIS identifies the issues of effective redress for individuals and suggests that in the absence of other measures, this this can be achieved by regulation specifying that businesses that adopt the Code, unless otherwise covered, are subject to the Privacy Act. Even if this recommendation is not adopted, IIS considers that it is good privacy practice for the CDs to carry the minimum privacy notice requirements under the Privacy Act. IIS understands that AGD will proceed to develop a privacy notice, and that it will consider the points raised in the draft recommendation (and in the final recommendation below which reflects some small clarifications suggested by stakeholders). Recommendation 8 – Transparency about information handling in relation to the customer declarations IIS recommends that the privacy statement AGD has undertaken to develop for the customer declaration form for the Code provides information about: The purpose of collection, for example that the personal information provided will be kept by the participating business to facilitate the effective provision of information for law enforcement and national security purposes The period for which the information will be retained, for example that the customer declaration will be kept securely for two years and then securely disposed of The consequences of not providing the information, for example, that if the individual does not provide the information, the participating business may refuse to sell him or her the product How to contact the participating business including its name and a contact number within the organisation for complaints and/or queries in relation to the operation of the Code.13 1.16 USE OF PERSONAL INFORMATION FOR FURTHER UNRELATED PURPOSES A key element of the privacy protections in the Privacy Act is limiting the use of personal information to the purposes for which it was collected unless a specified exception applies (NPP 2, APPs 6 and 7). IIS identified a risk that participating businesses might use or disclose the personal information collected on CDs for purposes other than to achieve the objectives of the Draft Code (for example, for private security purposes or for marketing). This risk was also raised as a concern in the consultation process by privacy and civil liberties advocates. The lack of any requirements in the Draft Code on any further use of personal information, or otherwise protecting it, as well as the fact that smaller businesses might not be aware of such requirements, was considered likely to exacerbate the risk. IIS considers that it would be preferable for the Code to include requirements to protect personal information – Recommendation 10 below addresses this issue. The monitoring and review proposed in Recommendation 11 would also mitigate this risk. 1.17 DISCLOSURE TO LENSAS There are two types of LENSA disclosures that are envisaged by the Draft Code. Firstly, a member of a participating business is encouraged to call the National Security Hotline if they witness any unusual behaviour regarding the sale and/or use of chemicals of security concern. Secondly – and this is the primary reason for suggesting use of CDs at point of sale – the CDs may be disclosed to LENSAs to assist with their investigations. IIS considers that the disclosure to a LENSA would be consistent with the purpose for which the information was collected under the Code and, where the Privacy Act applies, would also be consistent with one of the provisions of NPP 2 (or APP 6). Good privacy practice would require the business concerned to be satisfied that the LENSA request is required by law, authorised by law or is reasonably necessary; for example the request might involve a warrant or be in writing from a suitably senior officer. NPP 2.2 also suggests that where an organisation discloses personal information under the law enforcement exception in NPP 2.1(h), it should make a note of the disclosure. The risk is that employees at participating businesses may be overawed and disclose personal information too readily in circumstances where it did not have to be disclosed. No additional issues were raised in the consultation process on the draft recommendation for LENSA disclosures. Recommendation 9 – Develop guidance on assessing and responding to a LENSA request IIS recommends that the AGD provide guidance on how participating businesses should assess a LENSA’s request for information and respond to it in an appropriate and privacy-respecting manner. 13 See below ‘5.5 Processes for handling failure and complaints’. 1.18 SECURITY OF FORMS STORED BY BUSINESSES The privacy principles require that organisations take reasonable steps to protect personal information from loss and unauthorised access, use and disclosure (NPP 4.1 and APP 11.1). During the consultations for the Draft Code prior to this PIA and its associated consultation, several stakeholders raised concerns over the security of paper-based forms. The Australian SelfMedication Industry – the peak body representing companies in the manufacture and distribution of consumer healthcare products – noted that members’ experience with the use of CDs for illicit drugs was that the completed CDs are not routinely filed in a secure fashion, with some being stored in unlocked filing cabinets in general office areas. IIS is aware of anecdotal evidence about the practices of retailers who are required to collect personal information about purchasers of prepaid mobiles or SIMs; it seems similarly lax security arrangements occur. The risks that could arise from participating businesses’ storage of CDs include loss or misuse of personal information leading to embarrassment, reputation loss and potentially identity theft or fraud. These risks can be managed to some extent by guidance and training on proper security procedures; AGD indicated that is it preparing such guidance referencing OAIC guidelines on appropriate security measures. However, it must be recognised that many participating businesses might be unaware of the need for, or be unwilling to implement, appropriate measures, and that unless Recommendations 11 and 12 below are adopted individuals might have no recourse in the event of problems. Privacy and civil liberties advocates as well as industry representatives reaffirmed security practices as a strong concern in the course of the PIA consultation process. Again, the lack of any requirements in the Draft Code for participating business to store CDs securely and to dispose of them securely after a specified period was considered likely to exacerbate the risk. IIS suggested in its draft recommendation that in all the circumstances it would be important for AGD to monitor the overall environment, keep a record of incidents and to take further action as needed to ensure appropriate security is maintained. AGD advised that it would need to refer this issue to the NGAG, as it was not currently part of its work program under the IGA. Recommendation 10 – Code to specifically address protection and security of personal information IIS recommends that AGD amend the Draft Code to include a requirement for businesses to ‘Assign responsibility’ for ensuring that personal information gathered on customer declarations is protected from loss and unauthorised access, use and disclosure and that it is disposed of securely within the specified period, which should be the minimum necessary to achieve the objectives of the Code. Recommendation 11 – Monitor security practices IIS recommends that AGD, or another appropriate body, should monitor the handling of personal information collected in the context of the Code, keep a record of incidents and take further action as needed to ensure appropriate privacy and security practices are maintained. 1.19 SAFETY MECHANISMS While the above discussion has focused on what the AGD and participating businesses should do to address key privacy risks, attention must also be paid to what happens when something goes wrong. Given the number and size of participating businesses, the likelihood of this happening is potentially high. The Draft Code features a number of risk treatment measures that may assist in the prevention and investigation of criminal and terrorist attacks involving chemical precursors. At the same time, some of the suggested actions – in particular the collection of CDs at the point of sale – introduce privacy risks that are likely to occur, some with potentially large consequences for individuals. In some cases, the consequence of loss or misuse of the CDs may be minor, such as embarrassment. In other cases, the personal information contained on the CDs may be misused for identity theft or fraud, causing significant financial damage. Strong mechanisms need to be in place to protect individuals when something goes wrong. This is particularly the case because a sizeable proportion of participating businesses are not subject to the Privacy Act, meaning that if no action were taken, some individuals would not have access to any redress at all. There could be a range of ways to provide redress; examples are listed in the recommendation below including the option of using regulation to bring exempted participating businesses back into the Privacy Act. There are precedents for this; for example small businesses are subject to the Privacy Act for acts or practices relating to the collection, maintenance and disclosure of personal information on a residential tenancy database.14 Privacy and civil liberties advocates supported IIS’s draft recommendations addressing this issue. However, for industry representatives the question at this point became whether together the PIA recommendations were making the process too complicated and bigger than necessary. This led to a discussion about whether the requirement for CDs be removed from the Draft Code. Points raised included that: Many businesses already take customer details upfront as standard practice; CDs are perhaps only needed as a back up when customer behaviour is suspicious, the Draft Code would give a bit of strength when customers are reluctant to provide information Many retailers only sell to account customers and therefore will only use CDs as a back up perhaps not often at all. AGD indicated it pursue the question of the value of CDs as well as possible avenues for redress. Recommendation 12 – Draft Code should not be implemented without effective redress mechanism(s) for individuals IIS recommends that the Draft Code should not proceed without effective redress mechanisms in the event of interferences with individuals’ privacy. Recommendation 13 – Options for redress in the event of an interference with privacy IIS recommends that the AGD identify and implement effective mechanisms for individual redress in the event of interferences with privacy by participating businesses that are not subject to the Privacy Act. Mechanism might involve: 14 Privacy (Private Sector) Amendment Regulations 2007 (No. 3). Establishing a single point of contact for individuals if they have a complaint or query. The number would need to be prominently displayed in the Code, the CD and on AGD websites. Outcomes of calls can also serve as an important record for monitoring and review or Engaging with the Privacy Commissioner to explore options for the Commissioner to take on an advocacy/brokering role to assist individuals including in relation to dealings with organisations not otherwise covered by the Privacy Act or Engaging with industry to explore options for establishment/appointment of an industry body to take on an advocacy/brokering role to assist individuals or Using regulation to bring exempted participating businesses under the coverage of the Privacy Act when handling personal information in the context of the Code; this option should be pursued in the absence of other workable solutions. 1.20 EXPANSION OF DRAFT CODE TO FURTHER CHEMICALS AND MONITORING AND REVIEW While the Draft Code applies specifically to 11 chemical precursors to homemade explosives that have been identified as top priority it also encourages businesses to adopt the Draft Code in relation to any of the listed remaining 84 listed chemicals of security concern. The recently launched AGD website for chemicals of security concern also encourages organisations to apply the Code to all the listed chemicals. IIS considers there are significant privacy risks in this approach without further assessment of the risks associated with the additional chemicals. Some of the privacy and civil liberties advocates participating in the consultation process also raised this as a particular concern, querying the ability of organisation to ‘self assess’ the risks of particular chemicals without further guidance. IIS understands that there will be an ongoing risk assessment and RIS process considering the remaining 84 chemicals. It points out that in considering risk in a RIS the impact on privacy is one of the risks that needs to be assessed. The issues raised in this PIA, and how they are playing out as the Code is implemented will be one consideration. IIS also considers that the most likely impact on privacy as the number of chemicals to which the Code is specifically applied increases is that a CD is likely to be required for a greater number of people or for a greater number of times for any one person. In other words, expansion of the number of chemicals may not introduce new risks but could increase the risk likelihood. A moderate increase, say a doubling in numbers, might not call for specific action but any significant increase, say a tenfold increase, would be a cause of concern and require deeper consideration. More broadly, due to the uncertainty in quantifying the benefits of implementing the Draft Code, it is imperative that the tangible effects of the Draft Code are measured and assessed, including in regard to the privacy impact. The Decision RIS foresees that the impacts and outcomes of the Draft Code will be evaluated within three years after implementation of the code. AGD has indicated that an evaluation framework is to be developed over the next 6 months. Before the AGD amends the Draft Code to apply to other chemicals of security concern (in particular the use of CDs at point of sale), IIS considers that the AGD should first review the Draft Code’s operation in relation to the 11 current chemical precursors and be satisfied that: There have in fact been benefits from its application to the initial 11 chemical precursors All privacy issues arising from implementation of suggested actions have been or will be addressed No additional privacy risks will arise. For example, if it is found that there are significant problems with the security and storage of CDs, then the AGD should be slow to introduce a regime that would expand the number of chemical precursors for which a CD should be sought at point of sale. Recommendation 14 – Apply the Code to other chemicals of security concern only after any privacy issues in the review have been addressed IIS recommends that neither the Code nor AGD’s Chemicals of Security Concern website encourage organisations to apply the Code to chemicals other than the 11 chemical precursor of home made explosives until a RIS process, which considers privacy risks to community members in its cost benefit analysis has been completed. IIS recommends that the RIS consider evidence on the handling of personal information in the context of the Code and the impact of an increase in the span of chemicals on the extent of collection of personal information under the Code. Recommendation 15 – Conduct review of the Code, including privacy impacts, within three years of operation IIS recommends that following implementation, the AGD or an appropriate body continue to monitor the Code and provide a formal, written report on its operation within three years. This report would be a significant input to the three-year review. Privacy benchmarks to monitor include: Number of complaints made to the Privacy Commissioner relating to the Code Number of complaints made to the special contact number and other relevant bodies Number of customer declarations collected by participating businesses Number of reported data breaches/incidents concerning customer declarations Comments and feedback from participating businesses regarding use of customer declarations and their security measures Comments and feedback from relevant industry groups Comments and feedback from privacy, civil liberties and community interest groups. APPENDIX ONE 1.21 MATERIALS REVIEWED Attorney-General’s Department, Draft Proposed Risk Treatment Measures for Precursor Chemicals to Homemade Explosives, v 2.0 Attorney-General’s Department, Chemicals of Security Concern website at http://www.chemicalsecurity.gov.au/Pages/default.aspx Attorney-General’s Department, Decision Regulation Impact Statement, Chemical Security: Precursors to homemade explosives, August 2012. Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, v 2, 15 March 2013. Australian Self-Medication Industry Inc, Submission to Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, 4 March 2013. COAG, Intergovernmental Agreement on Australia’s National Arrangements for the Management of Security Risks Associated with Chemicals, 2 October 2008. Graincorp, Submission to Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, 2013. Office of the Australian Information Commissioner, Submission to Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, 1 March 2013. Plastics and Chemicals Industries Association, Submission to Attorney-General’s Department, Draft National Code of Practice for Chemicals of Security Concern, 6 March 2013. 1.22 ORGANISATIONS CONSULTED IN THE COURSE OF THE PIA Privacy and Civil Liberties groups The Australian Privacy Foundation Liberty Victoria NSW Council of Civil Liberties Industry Bodies ACCORD Australasia Ltd Australian Chamber Of Commerce And Industry Australian Retailers Association Department of Mines and Petroleum National Farmers Federation National Retail Association Pharmacy Guild Plastics and Chemical Industry Association (PACIA) Pool & Spa Poppits Science Industry Australia & Australasian Laboratory Managers Association (ALMA) Swimming Pool and Spa Alliance (SPASA) Universities Aust. Government Bodies Department of Environment and Primary Industry Fair & Safe Work QLD Innovation NSW Ministry for Police and Emergency Services NSW Police