Footnotes

Footnotes

Chapter 1 - Introduction

[1]        See, for example, Scrutiny of Bills Committee, Eighth Report of 1988: Appropriate Basis for Penalty Provisions in Legislation Comparable to the Productivity Commission Bill 1996; Sixth Report of 2002: Application of Absolute and Strict Liability Offences in Commonwealth Legislation.

[2]        Journals of the Senate, No. 15, 10 December 1998, p. 374.

[3]        Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation.

[4]        Submission No. 15, p. 2.

[5]        Submissions Nos. 1 and 12.

Chapter 2 - Government responses

[1]        Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation.

[2]        A copy of the Government response is provided at Appendix III to this report.

[3]        Available at http://www.ag.gov.au/www/agd/agd.nsf/page/Publications      

[4]        Government response, p. 2.

[5]        Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, pp. 49–54. Appendix II to this report contains a list of those principles.

[6]        Government response, pp. 4-5.

[7]        The Guide, pp. 75-6.

[8]        The Ombudsman Act 1976, the Administrative Decisions (Judicial Review) Act 1977, the Privacy Act 1988 and the Freedom of Information Act 1982.

[9]        Government response, p. 7.

[10]      Submission No. 16, p. 3.

[11]      Submission No. 16, p. 3.

 

[12]      (CBFCA) Submission No.3, p. 1.

[13]      Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, pp. 132-140.

[14]      Government response, p. 17.

[15]      Government response, p. 17.

[16]      Submission No. 1, p. 1.

[17]      Submission No. 1, p. 2.

[18]      Submission No. 12, p. 1.

[19]      Submission No. 12, p. 1.

[20]      Submission No. 14, p. 1.

Chapter 3 - Legislative developments

[1]        Scrutiny of Bills Committee, Twelfth Report of 2002, p. 411.

[2]        Scrutiny of Bills Committee, Twelfth Report of 2002, p. 411.

[3]        Scrutiny of Bills Committee, Twelfth Report of 2002, p. 413.

[4]        The Guide, p. 90.

[5]        Scrutiny of Bills Committee, Ninth Report of 2004, p. 170.           

[6]        Scrutiny of Bills Committee, Ninth Report of 2004, p. 172.

[7]        Scrutiny of Bills Committee, Eighteenth Report of 1999, pp. 434–443.

[8]        Scrutiny of Bills Committee, Fourth Report of 2005, pp. 69–80.

[9]        Scrutiny of Bills Committee, Alert Digest No. 12 of 2006, pp. 7–19.

[10]      Senate Hansard, 18 October 2006, p. 69.

[11]      Scrutiny of Bills Committee, Eleventh Report of 2006, p. ??

[12]      Government response, p.10.

[13]      For example, Schedule 1 of the Environment and Heritage Legislation Amendment Bill 2006.

[14]      A Guide to Framing Commonwealth Offences, Civil Penalties and Enforcement Powers, 2004, Minister for Justice and Customs, p. 73.

[15]      Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation.

[16]      Government Response, p. 7.

[17]      Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, p. 128.

[18]      Submission No. 3, p. 1.

[19]      Government response, p. 13.

[20]      Submission No. 5, p. 3.

[21]      Submission No. 10.

[22]      Scrutiny of Bills Committee, Tenth Report of 2006, pp. 171-172.

[23]      These provisions were set out in Schedule 2 to the Families, Community Services and Indigenous Affairs and Veterans' Affairs Legislation Amendment (2006 Budget Measures) Bill 2006. The Committee notes that the Senate amended this bill on 28 November 2006 to remove Schedule 2 from the bill in its entirety.

[24]      Principled Regulation, p. 258.

[25]      Committee Hansard, SSSB 10.

[26]      Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, p. 128.

[27]      Government response, p. 16.

[28]      Committee Hansard, p. SSSB 10.

[29]      Committee Hansard, p. SSSB 28.

[30]      Committee Hansard, p. SSSB 30–31.

[31]      ALRC Report No. 95, Principled Regulation, pp. 26-27.

[32]      Migration Act 1958, Direction Under Section 499, Journal of the Senate, No. 1-12 February 2002, p. 47.

[33]      Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, pp. 91-108.

[34]      Submission No. 8, p.3.

Chapter 4 - Provisions authorising seizure

[1]        Government response, p. 6.

[2]        Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, p. 53.

[3]        Senate Committee of Privileges, 125th Report, p. 3.

[4]        Submission No. 2, p. 1.

[5]        Submission No. 2, p. 2.

[6]        Journals of the Senate, p. 451.

[7]        Submission No. 2, p. 3.

[8]        Submission No. 2, p. 4.

[9]        Submission No.2, p. 2.

[10]      Senate Committee of Privileges, 125th Report, p.36.

[11]      Scrutiny of Bills, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation, paragraph 4.28.

[12]      The Committee notes that the Government response to the original report suggests that the Committee 'recommended that a warrant be struck down as invalid where it goes beyond the requirements of the occasion in the authority to search'. The Committee merely identified principles relevant to judicial officers in the issue of warrants (as set out in Tillett's case) including that 'a warrant may be struck down for going beyond the requirements of the occasion in the authority to search'.[12][emphasis added].

[13]      Submission No. 5, pp. 29-30.

[14]      Committee Hansard, p. SSSB 13.

[15]      Committee Hansard, pp. SSSB 13-14.

[16]      National Crime Authority Report: The Law Enforcement Implications of New Technology. Preface, pp. xvii – xviii.

[17]      The Law Enforcement Implications of New Technology, p. 9

[18]      The Law Enforcement Implications of New Technology, a summary of recommendations, p. xi.

[19]      Simon Bronitt and Miriam Gani, 'Shifting boundaries of cybercrime: from computer hacking to cyber-terrorism', (2003) 27 Criminal Law Journal, pp. 303-34 at p.315.

[20]      Simon Bronitt and James Stellios, 'Regulating Telecommunications Interception and Access in the Twenty-first Century: Technological Evolution or Legal Revolution?' (2006), Promethius, Vol. 24, no. 4, December 2006, p. 415, forthcoming.

[21]      Submission No. 13, p. 12

[22]      Legal and Constitutional Legislation Committee, Provisions of the Telecommunications (Interception) Bill 2006, p. 17.

[23]      Committee Hansard, SSSB 32.

[24]      Submission No. 15, p. 3.

[25]      Submission No. 8, pp. 10-11.

[26]      Submission No. 13, p. 2-3.

[27]      Submission No. 5, p. 32.

[28]      Submission No. 5, p. 32 and Submission No. 11, p. 8.

[29]      Submission No. 9, p. 6.

Chapter 5 - Conclusions and recommendations

[1]        Scrutiny of Bills Committee, Ten Years of Scrutiny, pp. 4-7.

Appendixies

[1]               Extract from Scrutiny of Bills Committee, Fourth Report of 2000: Entry and Search Provisions in Commonwealth Legislation.