![]() |
Home
| Databases
| WorldLII
| Search
| Feedback
Privacy Law and Policy Reporter |
![]() |
Examples of ITS applications include:
The concept of privacy incorporates notions of personal autonomy and freedom from intrusion. Individuals have the reasonable expectation that they can choose to conduct themselves with some degree of anonymity in their day to day lives, and can do so free from surveillance and routine monitoring. Some ITS applications have the potential to intrude upon these privacy expectations where the driving habits and journey patterns of private citizens may be subject to routine scrutiny by outside interests such as government or private organisations. There should be strong social justification for any ITS applications which involves any degree of monitoring of individuals' movements. ITS developers should recognise individual's rights to anonymity in travelling on public roads and consideration should be given to whether it is necessary to the purpose of the ITS application that individuals and their vehicles be identified. Any proposal to develop an ITS application should take as its starting point the individual's right to voluntary informed participation in that scheme.
The most obvious way in which ITS applications may result in privacy intrusion is through the recording of information about vehicle movements and the actual or potential linkage of this information to individual owners and drivers. Notions of privacy also incorporate the individual's interest in controlling or participating in decisions about the use of their own personal information.
The development of new technologies to support ITS applications, give rise to the greater capacity to collect, store and aggregate large amounts of personal information which may be used to monitor individuals as they go about their lawful day to day activities. It is important that, as a starting point, ITS developers consider whether collecting identifying personal information is necessary to the efficient and effective functioning of the application.
The principles are intended to provide guidance only as to the minimum privacy standards that should be adopted for any ITS application which involves the collection of identifying information about individuals. Compliance with and implementation of these principles would require the development of codes of practice or memoranda of understanding between parties.
It is noted that the ITS Privacy Principles will have to be compatible with the national privacy regime which is currently under discussion at the federal level. That regime is likely to require compliance with standards set out in the Commonwealth Privacy Act 1988, which is based on the OECD Guidelines.
Collection limitation (Principle 1)
Only minimal amounts of personal information sufficient for the needs of a particular ITS application should be collected by ITS operators. Any such information should be obtained by lawful, fair and non-intrusive means and with the knowledge or consent of the individual concerned.
Personal information collected by ITS operators should be relevant to the purposes for which it is to be used and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
Purpose specification (Principle 3)
The purposes for which personal information is collected by ITS operators should be specified at the time of collection and the subsequent use limited to the fulfilment of those purposes or other directly related purposes. Personal information collected by ITS operators should be destroyed once it is no longer necessary for the purposes for which the information was originally collected.
Personal information collected by ITS operators should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with the purpose specification principle except:
(a) with the informed consent of the individual concerned;
(b) by the authority of law; or
(c) in situations involving serious imminent threat to the life or health of the individual concerned or another person.
Personal information collected by ITS operators should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.
ITS operators should have a general policy of openness about developments, practices and policies with respect to personal data. ITS operators should establish means of telling people(where possible before collection):
(a) what terms of personal information are collected;
(b) the main purposes for which their personal information will be used;
(c) whether the collection is authorised by law;
(d) details of any person to whom the information is usually disclosed;
(e) how to gain access to the data and correct it if necessary; and
(f) how to make a complaint if the principles are breached.
Individual participation (Principle 7)
An individual should have the right to have access to personal information held by ITS operators about him or herself. A person should be able to have incorrect personal information held by ITS operators corrected.
Wherever possible, ITS operators should give people the option of entering into transactions which do not require them to identify themselves.
ITS operators should be accountable for complying with measures which give effect to the principles stated above.
AustLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.austlii.edu.au/au/journals/PrivLawPRpr/1996/72.html