Commonwealth Consolidated Acts

[Index] [Table] [Search] [Search this Act] [Notes] [Noteup] [Previous] [Next] [Download] [Help]

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION ACT 1979 - SECT 25A

Computer access warrant

Issue of computer access warrant

  (1)   If the Director - General requests the Attorney - General to do so, and the Attorney - General is satisfied as mentioned in subsection   (2), the Attorney - General may issue a warrant in accordance with this section.

Test for issue of warrant

  (2)   The Attorney - General is only to issue the warrant if he or she is satisfied that there are reasonable grounds for believing that access by the Organisation to data held in a computer (the target computer ) will substantially assist the collection of intelligence in accordance with this Act in respect of a matter (the security matter ) that is important in relation to security.

Note:   See section   4 for the definition of computer .

  (3)   The target computer may be any one or more of the following:

  (a)   a particular computer;

  (b)   a computer on particular premises;

  (c)   a computer associated with, used by or likely to be used by, a person (whose identity may or may not be known).

Authorisation in warrant

  (3A)   The warrant must:

  (a)   be signed by the Attorney - General; and

  (b)   authorise the Organisation to do specified things, subject to any restrictions or conditions specified in the warrant, in relation to the target computer; and

  (c)   if the target computer is or includes a particular computer--specify the computer; and

  (d)   if the target computer is or includes a computer on particular premises--specify the premises; and

  (e)   if the target computer is or includes a computer associated with, used by or likely to be used by, a person--specify the person (whether by name or otherwise).

Things that may be authorised in warrant

  (4)   The things that may be specified are any of the following that the Attorney - General considers appropriate in the circumstances:

  (aa)   entering specified premises for the purposes of doing the things mentioned in this subsection;

  (aaa)   entering any premises for the purposes of gaining entry to or exiting the specified premises;

  (a)   using:

  (i)   the target computer; or

  (ii)   a telecommunications facility operated or provided by the Commonwealth or a carrier; or

  (iii)   any other electronic equipment; or

  (iv)   a data storage device;

    for the purpose of obtaining access to data (the relevant data ) that is relevant to the security matter and is held in the target computer at any time while the warrant is in force and, if necessary to achieve that purpose, adding, copying, deleting or altering other data in the target computer;

  (ab)   if, having regard to other methods (if any) of obtaining access to the relevant data which are likely to be as effective, it is reasonable in all the circumstances to do so:

  (i)   using any other computer or a communication in transit to access the relevant data; and

  (ii)   if necessary to achieve that purpose--adding, copying, deleting or altering other data in the computer or the communication in transit;

  (ac)   removing a computer or other thing from premises for the purposes of doing any thing specified in the warrant in accordance with this subsection, and returning the computer or other thing to the premises;

  (b)   copying any data to which access has been obtained, that appears to be relevant to the collection of intelligence by the Organisation in accordance with this Act;

  (ba)   intercepting a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing specified in the warrant in accordance with this subsection;

  (c)   any thing reasonably necessary to conceal the fact that any thing has been done under the warrant;

  (d)   any other thing reasonably incidental to any of the above.

Note:   As a result of the warrant, a person who, by means of a telecommunications facility, obtains access to data stored in a computer etc. will not commit an offence under Part   10 - 7 of the Criminal Code or equivalent State or Territory laws (provided that the person acts within the authority of the warrant).

  (4A)   If:

  (a)   the warrant authorises the removal of a computer or other thing from premises as mentioned in paragraph   (4)(ac); and

  (b)   a computer or thing is removed from the premises in accordance with the warrant;

the computer or thing must be returned to the premises:

  (c)   if returning the computer or thing would be prejudicial to security--when returning the computer or thing would no longer be prejudicial to security; or

  (d)   otherwise--within a reasonable period.

Certain acts not authorised

  (5)   Subsection   (4) does not authorise the addition, deletion or alteration of data, or the doing of any thing, that is likely to:

  (a)   materially interfere with, interrupt or obstruct a communication in transit or the lawful use by other persons of a computer unless the addition, deletion or alteration, or the doing of the thing, is necessary to do one or more of the things specified in the warrant; or

  (b)   cause any other material loss or damage to other persons lawfully using a computer.

Warrant must provide for certain matters

  (5A)   The warrant must:

  (a)   authorise the use of any force against persons and things that is necessary and reasonable to do the things specified in the warrant; and

  (b)   if the warrant authorises entering premises--state whether entry is authorised to be made at any time of the day or night or during stated hours of the day or night.

Duration of warrant

  (6)   The warrant must specify the period during which it is to remain in force. The period must not be more than 6 months, although the Attorney - General may revoke the warrant before the period has expired.

Issue of further warrants not prevented

  (7)   Subsection   (6) does not prevent the issue of any further warrant.

Concealment of access etc.

  (8)   If any thing has been done in relation to a computer under:

  (a)   the warrant; or

  (b)   this subsection;

the Organisation is authorised to do any of the following:

  (c)   any thing reasonably necessary to conceal the fact that any thing has been done under the warrant or under this subsection;

  (d)   enter any premises where the computer is reasonably believed to be, for the purposes of doing the things mentioned in paragraph   (c);

  (e)   enter any other premises for the purposes of gaining entry to or exiting the premises referred to in paragraph   (d);

  (f)   remove the computer or another thing from any place where it is situated for the purposes of doing the things mentioned in paragraph   (c), and returning the computer or other thing to that place;

  (g)   if, having regard to other methods (if any) of doing the things mentioned in paragraph   (c) which are likely to be as effective, it is reasonable in all the circumstances to do so:

  (i)   use any other computer or a communication in transit to do those things; and

  (ii)   if necessary to achieve that purpose--add, copy, delete or alter other data in the computer or the communication in transit;

  (h)   intercept a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing mentioned in this subsection;

  (i)   any other thing reasonably incidental to any of the above;

at the following time:

  (j)   at any time while the warrant is in force or within 28 days after it ceases to be in force;

  (k)   if none of the things mentioned in paragraph   (c) are done within the 28 - day period mentioned in paragraph   (j)--at the earliest time after that 28 - day period at which it is reasonably practicable to do the things mentioned in paragraph   (c).

  (9)   Subsection   (8) does not authorise the doing of a thing that is likely to:

  (a)   materially interfere with, interrupt or obstruct:

  (i)   a communication in transit; or

  (ii)   the lawful use by other persons of a computer;

    unless the doing of the thing is necessary to do one or more of the things specified in subsection   (8); or

  (b)   cause any other material loss or damage to other persons lawfully using a computer.

  (10)   If a computer or another thing is removed from a place in accordance with paragraph   (8)(f), the computer or thing must be returned to that place:

  (a)   if returning the computer or thing would be prejudicial to security--when returning the computer or thing would no longer be prejudicial to security; or

  (b)   otherwise--within a reasonable period.



AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback