Schedule 1[1]
(Article 1)
Code of practice on
interception of communications
CONTENTS
CHAPTER 1 GENERAL
CHAPTER 2 GENERAL
RULES ON INTERCEPTION WITH A WARRANT
CHAPTER 3 SPECIAL
RULES ON INTERCEPTION WITH A WARRANT
CHAPTER 4 INTERCEPTION
WARRANTS (ARTICLE 12(1))
CHAPTER 5 INTERCEPTION
WARRANTS (ARTICLE 12(4))
CHAPTER 6 SAFEGUARDS
CHAPTER 7 DISCLOSURE
TO ENSURE FAIRNESS IN CRIMINAL PROCEEDINGS
CHAPTER 8 OVERSIGHT
CHAPTER 9 COMPLAINTS
CHAPTER 10 INTERCEPTION WITHOUT A
WARRANT
1 GENERAL
1.1 This
code of practice relates to the powers and duties conferred or imposed under
Chapter 1 of Part 1 of the Regulation
of Investigatory Powers (Jersey) Law 2005 (the “Law”).
It provides guidance on the procedures that must be followed before
interception of communications can take place under those provisions. It is
primarily intended for use by those public authorities listed in Article 11
of the Law. It will also prove useful to postal and telecommunication operators
and other interested bodies to acquaint themselves with the procedures to be
followed by those public authorities.
1.2 The
Law provides that all codes of practice relating to the Law are admissible as
evidence in criminal and civil proceedings. If any provision of this code
appears relevant before any court or tribunal considering any such proceedings,
or to the Tribunal established under the Law, or to the Commissioner
responsible for overseeing the powers conferred by the Law, it must be taken
into account.
2 GENERAL RULES ON
INTERCEPTION WITH A WARRANT
2.1 There
are a limited number of persons by whom, or on behalf of whom, applications for
interception warrants may be made. These persons are:
· Chief
Officer, States of Jersey Police;
· Agent
of the Impôts;
· Chief
Inspector of Immigration;
· Director-General
of the Security Services;
· Chief
of the Secret Intelligence Services;
· Director
of GCHQ;
· Chief
of the Defence Intelligence Services;
· A
person who, for the purposes of any international mutual assistance agreement,
is the competent authority of a country or territory outside Jersey.
2.2 All
interception warrants are issued by the Attorney General.
2.3 Before
issuing an interception warrant, the Attorney General must believe that what
the action seeks to achieve is necessary for one of the following Article 10(3)
purposes:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime;
· for
the purpose of safeguarding the economic well-being of Jersey; or
· for
the purpose of giving effect to any international mutual assistance treaty;
and that the conduct authorized
by the warrant is proportionate to what is sought to be achieved by that conduct.
Necessity
and Proportionality
2.4 Obtaining
a warrant under the Law will only ensure that the interception authorized is a
justifiable interference with an individual’s rights under Article 8
of the European Convention of Human Rights (the right to privacy) if it is
necessary and proportionate for the interception to take place. The Law
recognises this by first requiring that the Attorney General believes that the authorization
is necessary on one or more of the statutory grounds set out in Article 10(3)
of the Law. This requires the Attorney General to believe that it is necessary
to undertake the interception which is to be authorized for a particular
purpose falling within the relevant statutory ground.
2.5 Then,
if the interception is necessary, the Attorney General must also believe that
it is proportionate to what is sought to be achieved by carrying it out. This
involves balancing the intrusiveness of the interference, against the need for
it in operational terms. Interception of communications will not be
proportionate if it is excessive in the circumstances of the case or if the
information which is sought could reasonably be obtained by other means. Further,
all interception should be carefully managed to meet the objective in question
and must not be arbitrary or unfair.
Implementation
of Warrants
2.6 After
a warrant has been issued it will be forwarded to the person to whom it is
addressed, in practice the intercepting agency which submitted the application.
The Law (Article 15) then permits the intercepting agency to carry out the
interception, or to require the assistance of other persons in giving effect to
the warrant. Warrants cannot be served on those outside Jersey.
Provision
of Reasonable Assistance
2.7 Any
postal or telecommunications operator (referred to as communications service
providers) in Jersey may be required to provide assistance in giving effect to
an interception. The Law places a requirement on postal and telecommunications
operators to take all such steps for giving effect to the warrant as are
notified to them (Article 15(4) of the Law). But the steps which may be
required are limited to those which it is reasonably practicable to take (Article 15(5)).
What is reasonably practicable should be agreed after consultation between the
postal or telecommunications operator and the Attorney General. If no agreement
can be reached it will be for the Attorney General to decide whether to press
forward with civil proceedings or whether criminal proceedings may also be
instituted.
2.8 Where
the intercepting agency requires the assistance of a communications service
provider in order to implement a warrant, they should provide the following to
the communications service provider:
· A
copy of the warrant instrument signed and dated by the Attorney General;
· The
relevant schedule for that service provider setting out the numbers, addresses
or other factors identifying the communications to be intercepted;
· A
covering document from the intercepting agency requiring the assistance of the
communications service provider and specifying any other details regarding the
means of interception and delivery as may be necessary. Contact details with
respect to the intercepting agency will either be provided in this covering
document or will be available in the handbook provided to all postal and
telecommunications operators who maintain an intercept capability.
Provision
of Intercept Capability
2.9 Whilst
all persons who provide a postal or telecommunications service are obliged to
provide assistance in giving effect to an interception, persons who provide a
public postal or telecommunications service, or plan to do so, may also be
required to provide a reasonable intercept capability (Article 16). The
obligations the Minister for Justice and Home Affairs
considers reasonable to impose on such persons to ensure they have such a
capability will be set out in an order made by the Minister. The Minister may
then serve a notice upon a communications service provider setting out the
steps they must take to ensure they can meet these obligations. A notice will
not be served without consultation over the content of the notice between the Minister
and the service provider having previously taken place. When served with such a
notice, a communications service provider, if the provider feels it
unreasonable, will be able to refer that notice to the Technical Advisory Board
(TAB) on the reasonableness of the technical requirements and capabilities that
are being sought. Details of how to submit a notice to the TAB will be provided
either before or at the time the notice is served.
2.10 Any communications service provider obliged to maintain
a reasonable intercept capability may be provided with written guidance, or a
handbook, which will contain the basic information the provider requires to
respond to requests for reasonable assistance for the interception of
communications.
Duration
of Interception Warrants
2.11 All interception warrants are valid for an initial
period of 3 months. Upon renewal, warrants issued on serious crime grounds are
valid for a further period of 3 months. Warrants renewed on national
security/economic well-being grounds are valid for a further period of 6
months.
2.12 Where a change in circumstance prior to the set expiry
date leads the intercepting agency to consider it no longer necessary or
practicable for the warrant to be in force, it should be cancelled with
immediate effect.
Stored
Communications
2.13 Article 2(6) of the Law defines a communication in
the course of its transmission as also encompassing any time when the
communication is being stored on the communication system in such a way as to
enable the intended recipient to have access to it. This means that a warrant
can be used to obtain both communications that are in the process of
transmission and those that are being stored on the transmission system.
2.14 Stored communications may also be accessed by means
other than a warrant. If a communication has been stored on a communication
system it may be obtained with lawful authority by means of an existing
statutory power such as a production order (under the Police
Procedures and Criminal Evidence (Jersey) Law 2003) or a search
warrant.
3 SPECIAL RULES ON
INTERCEPTION WITH A WARRANT
Collateral
Intrusion
3.1 Consideration
should be given to any infringement of the privacy of individuals who are not
the subject of the intended interception, especially where communications
relating to religious, medical, journalistic or legally privileged material may
be involved. An application for an interception warrant should draw attention
to any circumstances which give rise to an unusual degree of collateral
infringement of privacy, and this will be taken into account by the Attorney
General when considering a warrant application. Should an interception
operation reach the point where individuals other than the subject of the authorization
are identified a directly relevant to the operation, consideration should be
given to applying for separate warrants covering those individuals.
Confidential Information
3.2 Particular
consideration should also be given in cases where the subject of the
interception might reasonably assume a high degree of privacy, or where
confidential information is involved. Confidential information consists of
matters subject to legal privilege, confidential personal information or
confidential journalistic material (see paragraphs 3.9 ‑ 3.11).
For example, extra consideration should be given where interception might
involve communications between a minister of religion and an individual
relating to the latter’s spiritual welfare, or where matters of medical
or journalistic confidentiality or legal privilege may be involved.
Communications
Subject to Legal Privilege
3.3 Article 5
of the Police
Procedures and Criminal Evidence (Jersey) Law 2003 describes
those matters that are subject to legal privilege.
3.4 Legal
privilege does not apply to communications made with the intention of
furthering a criminal purpose (whether the lawyer is acting unwittingly or
culpably). Legally privileged communications will lose their protection if
there are grounds to believe, for example, that the professional legal advisor
is intending to hold or use the information for a criminal purpose. But
privilege is not lost if a professional legal advisor is properly advising a
person who is suspected of having committed a criminal offence. The concept of
legal privilege applies to the provision of professional legal advice by any
individual, agency or organisation qualified to do so.
3.5 The
Law does not provide any special protection for legally privileged
communications. Nevertheless, intercepting such communications is particularly
sensitive and is therefore subject to additional safeguards under this Code. The
guidance set out below may in part depend on whether matters subject to legal
privilege have been obtained intentionally or incidentally to some other
material which has been sought.
3.6 In
general, any application for a warrant which is likely to result in the
interception of legally privileged communications should include, in addition
to the reasons why it is considered necessary for the interception to take
place, an assessment of how likely it is that communications which are subject
to legal privilege will be intercepted. In addition, it should state whether
the purpose (or one of the purposes) of the interception is to obtain
privileged communications. This assessment will be taken into account by the
Attorney General in deciding whether an interception is necessary under Article 10(3)
of the Law and whether it is proportionate. In such circumstances, the Attorney
General will be able to impose additional conditions such as regular reporting
arrangements so as to be able to exercise his or her discretion on whether a
warrant should continue to be authorized. In those cases where communications
which include legally privileged communications have been intercepted and
retained, the matter should be reported to the Commissioner during the
Commissioner’s inspections and the material be made available to the
Commissioner if requested.
3.7 Where
an Advocate or Solicitor or other professional legal adviser is the subject of
an interception, it is possible that a substantial proportion of the
communications which will be intercepted will be between the lawyer and his or
her client(s) and will be subject to legal privilege. Any case where a lawyer
is the subject of an investigation should be notified to the Commissioner
during the Commissioner’s inspections and any material which has been
retained should be made available to the Commissioner if requested.
3.8 In
addition to safeguards governing the handling and retention of intercept
material as provided for in Article 19 of the Law, investigators who
examine intercepted communications should be alert to any intercept material
which may be subject to legal privilege. Where there is doubt as to whether the
communications are subject to legal privilege, advice should be sought from the
Law Officers’ Department. Advice should also be sought where there is
doubt over whether communications are not subject to legal privilege due to the
“in furtherance of a criminal purpose” exception.
Communications
involving Confidential Personal Information and Confidential Journalistic
Material
3.9 Similar
consideration to that given to legally privileged communications must also be
given to the interception of communications that involve confidential personal
information and confidential journalistic material. Confidential personal
information is information held in confidence concerning an individual (whether
living or dead) who can be identified from it, and the material in question
relates to the individual’s physical or mental health or to spiritual
counselling. Such information can include both oral and written communications.
Such information as described above is held in confidence if it is held subject
to an express or implied undertaking to hold it in confidence or it is subject
to a restriction on disclosure or an obligation of confidentiality contained in
existing legislation. For example, confidential personal information might
include consultations between a health professional and a patient, or
information from a patient’s medical records.
3.10 Spiritual counselling is defined as conversations
between an individual and a Minister of Religion acting in his or her official
capacity, and where the individual being counselled is seeking or the Minister
is imparting forgiveness, absolution or the resolution of conscience with the
authority of the Divine Being(s) of their faith.
3.11 Confidential journalistic material includes material
acquired or created for the purposes of journalism and held subject to an
undertaking to hold it in confidence, as well as communications resulting in
information being acquired for the purposes of journalism and held subject to
such an undertaking.
4 INTERCEPTION WARRANTS
(ARTICLE 12(1))
4.1 This
chapter applies to the interception of communications by means of a warrant
complying with Article 12(1) of the Law. This type of warrant may be
issued in respect of the interception of communications carried on any postal
service or telecommunications system as defined in Article 2 of the Law
(including a private telecommunications system). Responsibility for the issuing
of interception warrants rests with the Attorney General.
Application
for an Article 12(1) Warrant
4.2 An
application for a warrant is made to the Attorney General. Interception
warrants, when issued, are addressed to the person who submitted the
application. This person may then serve a copy upon any person who may be able
to provide assistance in giving effect to that warrant. Each application, a
copy of which must be retained by the applicant, should contain the following
information:
· Background
to the operation in question.
· Person
or premises to which the application relates (and how the person or premises
feature in the operation).
· Description
of the communications to be intercepted, details of the communications service
provider(s) and an assessment of the feasibility of the interception operation
where this is relevant.
· Description
of the conduct to be authorized as considered necessary in order to carry out
the interception, where appropriate.
· An
explanation of why the interception is considered to be necessary under the
provisions of Article 10(3).
· A
consideration of why the conduct to be authorized by the warrant is
proportionate to what is sought to be achieved by that conduct.
· A
consideration of any unusual degree of collateral intrusion and why that
intrusion is justified in the circumstances. In particular, where the
communications in question might affect religious, medical or journalistic
confidentiality or legal privilege, this must be specified in the application.
· Where
an application is urgent, supporting justification should be provided.
· An
assurance that all material intercepted will be handled in accordance with the
safeguards required by Article 19 of the Law.
Authorization
of an Article 12(1) Warrant
4.3 Before
issuing a warrant under Article 12(1), the Attorney General must believe
the warrant is necessary:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime; or
· for
the purpose of safeguarding the economic well-being of the United Kingdom.
· For
the purpose of giving effect to the provisions of any international mutual assistance
treaty.
4.4 In
exercising the Attorney General’s power to issue an interception warrant
for the purpose of safeguarding the economic well-being of Jersey (as provided
for by Article 10(3)(c) of the Law), the Attorney General will consider
whether the economic well-being of Jersey which is to be safeguarded is, on the
facts of each case, directly related to national security. The Attorney General
will not issue a warrant on Article 10(3)(c) grounds if this direct link
between the economic well-being of Jersey and national security is not
established. Any application for a warrant on Article 10(3)(c) grounds
should therefore explain how, in the applicant's view, the economic well-being
of Jersey which is to be safeguarded is directly related to national security
on the facts of the case.
4.5 The
Attorney General must also consider that the conduct authorized by the warrant
is proportionate to what it seeks to achieve (Article 10(2)(b)). In
considering necessity and proportionality, the Attorney General must take into
account whether the information sought could reasonably be obtained by other
means (Article 10(4)).
Format
of an Article 12(1) Warrant
4.6 Each
warrant comprises 2 sections, a warrant instrument signed by the Attorney
General listing the subject of the interception or set of premises, a copy of
which each communications service provider will receive, and a schedule or set
of schedules listing the communications to be intercepted. Only the schedule
relevant to the communications that can be intercepted by the specified
communications service provider will be provided to that service provider.
4.7 The
warrant instrument should include:
· The
name or description of the interception subject or of a set of premises in
relation to which the interception is to take place.
· A
warrant reference number.
· The
persons who may subsequently modify the scheduled part of the warrant in an
urgent case (if authorized in accordance Article 14(5) of the Law).
4.8 The
scheduled part of the warrant will comprise one or more schedules. Each
schedule should contain:
· The
name of the communication service provider, or the other person who is to take
action.
· A
warrant reference number
· A
means of identifying the communications to be intercepted.
Modification
of Article 12(1) warrant
4.9 Interception
warrants may be modified under the provisions of Article 14 of the Law. The
unscheduled part of a warrant may only be modified by the Attorney General. The
modification will expire on the expiry date of the warrant.
4.10 Scheduled parts of a warrant may be modified by the
Attorney General in which case the modification expires on the expiry date of
the warrant. A modification to the scheduled part of the warrant may include
the addition of a new schedule relating to a communication service provider or
when a copy of the warrant has not been previously served. In an urgent case,
where the warrant specifically authorizes it, scheduled parts of a warrant may
be modified by the person to whom the warrant is addressed (the person who
submitted the application) or a subordinate (where the subordinate is
identified in the warrant). Modifications of this kind are valid for 5 working
days following the day of issue unless the modification instrument is endorsed
by the Attorney General. Where the modification is endorsed in this way, the
modification expires upon the expiry date of the warrant.
4.11 There is a duty to modify a warrant by deleting a
communications identifier if it is no longer relevant. When a modification is
sought to delete a number or other communication identified, the relevant
communication service provider must be advised and the interception suspended
before the modification is made.
Renewal
of Article 12(1) Warrant
4.12 The Attorney General may renew a warrant at any point
before its expiry date. Applications for renewals must be made to the Attorney
General and should contain an update of the matters outlined in paragraph 4.2
above. In particular, the applicant should give an assessment of the value of
interception to the operation to date and explain why the applicant considers
that interception continues to be necessary for one or more of the purposes in Article 10(3).
4.13 Where the Attorney General is satisfied that the
interception continues to meet the requirements of the Law the Attorney General
may renew the warrant. Where the warrant is issued on serious crime grounds,
the renewed warrant is valid for a further 3 months. Where it is issued on
national security/economic well-being grounds, the renewed warrant is valid for
6 months. These dates run from the date of signature on the renewal instrument.
4.14 A copy of the warrant renewal instrument will be
forwarded by the intercepting agency to all relevant communications service
providers on whom a copy of the original warrant instrument and a schedule have
been served, providing they are still actively assisting. A warrant renewal
instrument will include the reference number of the warrant and description of
the person or premises described in the warrant.
Warrant
Cancellation
4.15 The Attorney General is under a duty to cancel an
interception warrant if, at any time before its expiry date, the Attorney
General is satisfied that the warrant is no longer necessary on grounds falling
within Article 10(3) of the Law. Intercepting agencies will therefore need
to keep their warrants under continuous review.
4.16 The cancellation instrument should be addressed to the
person to whom the warrant was issued (the intercepting agency) and should
include the reference number of the warrant and the description of the person
or premises specified in the warrant. A copy of the cancellation instrument
should be sent to those communications service providers who have held a copy
of the warrant instrument and accompanying schedule during the preceding 12
months.
Records
4.17 The independent scrutiny régime
allows the Commissioner appointed under the Law to inspect the warrant
application on which the Attorney General based his or her decision and the
applicant may be required to justify the content. Each intercepting agency
should keep the following to be made available for scrutiny by the Commissioner
as the Commissioner may require:
· all
applications made for warrants complying with Article 12(1) and
applications made for the renewal of such warrants.
· all
warrants, and renewals and copies of schedule modifications (if any).
· where
any application is refused, the grounds for refusal as given by the Attorney
General.
· the
dates on which interception is started and stopped.
4.18 Records shall also be kept of the arrangements by which
the requirements of Article 19(2) (minimisation of copying and destruction
of intercepted material) and Article 19(3) (destruction of intercepted
material) are to be met. For further details see chapter on
“Safeguards”.
4.19 The term “intercepted material” is used
throughout to embrace copies, extracts or summaries made from the intercepted
material as well as the intercept material itself.
5 INTERCEPTION WARRANTS
(ARTICLE 12(4))
5.1 This
chapter applies to the interception of external communications by means of a
warrant complying with Article 12(4) of the Law. External communications
are those which are sent or received outside Jersey. They include those which
are both sent and received outside Jersey, whether or not they pass through Jersey
in course of their transit. They do not include communications both sent and
received in Jersey, even if they pass outside Jersey en route. Responsibility
for the issuing of such interception warrants rests with the Attorney General.
Application
for an Article 12(4) Warrant
5.2 An
application for a warrant is made to the Attorney General. Interception
warrants, when issued, are addressed to the person who submitted the
application. This person may then serve a copy upon any person who may be able
to provide assistance in giving effect to that warrant. Each application, a
copy of which must be retained by the applicant, should contain the following
information:
· Background
to the operation in question.
· Description
of the communications to be intercepted, details of the communications service
provider(s) and an assessment of the feasibility of the operation where this is
relevant.
· Description
of the conduct to be authorized, which must be restricted to the interception
of external communications, or to conduct necessary in order to intercept those
external communications, where appropriate.
· The
certificate that will regulate examination of intercepted material.
· An
explanation of why the interception is considered to be necessary for one or
more of the Article 10(3) purposes.
· A
consideration of why the conduct to be authorized by the warrant is
proportionate to what is sought to be achieved by that conduct.
· A
consideration of any unusual degree of collateral intrusion, and why that
intrusion is justified in the circumstances. In particular, where the
communications in question might affect religious, medical or journalistic
confidentiality or legal privilege, this must be specified in the application.
· Where
an application is urgent, supporting justification should be provided.
· An
assurance that intercepted material will be read, looked at or listened to only
so far as it is certified, and it meets the conditions of Articles 20(2) -
(6) of the Law.
· An
assurance that all material intercepted will be handled in accordance with the
safeguards required by Articles 19 and 20 of the Law.
Authorization
of an Article 12(4) warrant
5.3 Before
issuing a warrant under Article 12(4), the Attorney General must believe
that the warrant is necessary:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime; or
· for
the purpose of safeguarding the economic well-being of Jersey;
5.4 In
exercising the Attorney General’s power to issue an interception warrant
for the purpose of safeguarding the economic well-being of Jersey (as provided
for by Article 10(3)(c) of the Law), the Attorney General will consider
whether the economic well-being of Jersey which is to be safeguarded is, on the
facts of each case, directly related to national security. The Attorney General
will not issue a warrant on Article 10(3)(c) grounds if this direct link
between the economic well-being of Jersey and national security is not
established. Any application for a warrant on Article 10(3)(c) grounds
should therefore explain how, in the applicant's view, the economic well-being
of Jersey which is to be safeguarded is directly related to national security
on the facts of the case.
5.5 The
Attorney General must also consider that the conduct authorized by the warrant
is proportionate to what it seeks to achieve (Article 10(2)(b)). In
considering necessity and proportionality, the Attorney General must take into
account whether the information sought could reasonably be obtained by other
means (Article 10(4)).
5.6 When
the Attorney General issues a warrant of this kind, it must be accompanied by a
certificate in which the Attorney General certifies that he or she considers
examination of the intercepted material to be necessary for one or more of the Article 10(3)
purposes. The Attorney General has a duty to ensure that arrangements are in
force for securing that only that material which has been certified as
necessary for examination for an Article 10(3) purpose, and which meets
the conditions set out in Article 20(2) to (6) is, in fact, read, looked
at or listened to. The Commissioner is under a duty to review the adequacy of
those arrangements.
Format
of an Article 12(4) Warrant
5.7 Each
warrant is addressed to the person who submitted the application. This person
may then serve a copy upon such providers of communications services as the
person believes will be able to assist in implementing the interception. Communications
service providers will not receive a copy of the certificate.
· The
warrant should include the following:
· A
description of the communications to be intercepted
· The
warrant reference number
· The
persons who may subsequently modify the scheduled part of the warrant in an
urgent case (if authorized in accordance with Article 14(5) of the Law).
Modification
of an Article 12(4) warrant
5.8 Interception
warrants may be modified by the Attorney General under the provisions of Article 14.
The modification will expire at the same time as the warrant.
5.9 The
certificate may be modified by the Attorney General. The modification expires
on the expiry of the warrant.
Renewal
of an Article 12(4) Warrant
5.10 The Attorney General may renew a warrant at any point
before its expiry date. Applications for renewals are made to the Attorney
General and contain an update of the matters outlined in paragraph 5.2
above. In particular, the applicant must give an assessment of the value of
interception to the operation to date and explain why the applicant considers
that interception continues to be necessary for one or more of purposes in Article 10(3).
5.11 Where the Attorney General is satisfied that the
interception continues to meet the requirements of the Law the Attorney General
may renew the warrant. Where the warrant is issued on serious crime grounds,
the renewed warrant is valid for a further 3 months. Where it is issued on
national security/ economic well-being grounds the renewed warrant is valid for
6 months. These dates run from the date of signature on the renewal instrument.
5.12 In those circumstances where the assistance of
communications service providers has been sought, a copy of the warrant renewal
instrument will be forwarded by the intercepting agency to all those on whom a
copy of the original warrant instrument has been served, providing they are
still actively assisting. A warrant renewal instrument will include the
reference number of the warrant and description of the communications to be
intercepted.
Warrant Cancellation
5.13 The Attorney General shall cancel an interception
warrant if, at any time before its expiry date, the Attorney General is
satisfied that the warrant is no longer necessary on grounds falling within Article 10(3)
of the Law.
5.14 The cancellation instrument will be addressed to the
person to whom the warrant was issued (the intercepting agency). A copy of the
cancellation instrument should be sent to those communications service
providers, if any, who have given effect to the warrant during the preceding 12
months.
Records
5.15 The independent scrutiny régime
allows the Commissioner to inspect the warrant application upon which the
Attorney General based his or her decision, and the applicant may be required
to justify the content. Each intercepting agency should keep, so to be made
available for scrutiny by the Commissioner, the following:
· all
applications made for warrants complying with Article 12(4), and
applications made for the renewal of such warrants.
· all
warrants and certificates, and copies of renewal and modification instruments
(if any).
· where
any application is refused, the grounds for refusal as given by the Attorney
General.
· the
dates on which interception is started and stopped.
Records shall also be kept
of the arrangements in force for securing that only material which has been
certified for examination for a purpose under Article 10(3) and which
meets the conditions set out in Article 20(2) to (6) of the Law in
accordance with Article 19 of the Law. Records shall be kept of the
arrangements by which the requirements of Article 19(2) (minimisation of
copying and distribution of intercepted material) and Article 19(3)
(destruction of intercepted material) are to be met. For further details see
chapter on “Safeguards”.
6 SAFEGUARDS
6.1 All
material (including related communications data) intercepted under the
authority of a warrant complying with Article 12(1) or Article 12(4)
of the Law must be handled in accordance with safeguards which the Attorney
General has approved in conformity with the duty imposed upon the Attorney
General by the Law. These safeguards are made available to the Commissioner,
and they must meet the requirements of Article 19 of the Law which are set
out below. In addition, the safeguards in Article 20 of the Law apply to
warrants complying with Article 12(4). Any breach of these safeguards must
be reported to the Commissioner.
6.2 Article 19
of the Law requires that disclosure, copying and retention of intercept
material be limited to the minimum necessary for the authorized purposes. The authorized
purposes defined in Article 19(4) of the Law include:
· if
the material continues to be, or is likely to become, necessary for any of the
purposes set out in Article 10(3) - namely, in the interests of national
security, for the purpose of preventing or detecting serious crime, for the
purpose of safeguarding the economic well-being of Jersey.
· if
the material is necessary for facilitating the carrying out of the functions of
the Attorney General under Chapter 1 of Part 2 of the Law.
· if
the material is necessary for facilitating the carrying out of any functions of
the Commissioner or the Tribunal.
· if
the material is necessary to ensure that a person conducting a criminal
prosecution has the information he or she needs to determine what is required
of the person by his or her duty to secure the fairness of the prosecution.
6.3 Article 20
provides for additional safeguards in relation to material gathered under Article 12(4)
warrants, requiring that the safeguards:
· ensure
that intercepted material is read, looked at or listened to by any person only
to the extent that the material is certified.
· regulate
the use of selection factors that refer to individuals known to be for the time
being in Jersey.
The Attorney General must
ensure that the safeguards are in force before any interception under warrants
complying with Article 12(4) can begin. The Commissioner is under a duty
to review the adequacy of the safeguards.
Dissemination
of Intercepted Material
6.4 The
number of persons to whom any of the material is disclosed, and the extent of
disclosure, must be limited to the minimum that is necessary for the authorized
purposes set out in Article 19(4) of the Law. This obligation applies
equally to disclosure to additional persons within an agency, and to disclosure
outside the agency. It is enforced by prohibiting disclosure to persons who do
not hold the required security clearance, and also by the need-to-know
principle: intercepted material must not be disclosed to any person unless that
person’s duties, which must relate to one of the authorized purposes, are
such that the person needs to know about the material to carry out those
duties. In the same way only so much of the material may be disclosed as the
recipient needs; for example if a summary of the material will suffice, no more
than that should be disclosed.
6.5 The
obligations apply not just to the original interceptor, but also to anyone to
whom the material is subsequently disclosed. In some cases this will be
achieved by requiring the latter to obtain the originator’s permission
before disclosing the material further. In others, explicit safeguards are
applied to secondary recipients.
Copying
6.6 Intercepted
material may only be copied to the extent necessary for the authorized purposes
set out in Article 19(4) of the Law. Copies include not only direct copies
of the whole of the material, but also extracts and summaries which identify
themselves as the product of an interception, and any record referring to an
interception which is a record of the identities of the persons to or by whom
the intercepted material was sent. The restrictions are implemented by
requiring special treatment of such copies, extracts and summaries that are
made by recording their making, distribution and destruction.
Storage
6.7 Intercepted
material, and all copies, extracts and summaries of it, must be handled and
stored securely, so as to minimise the risk of loss or theft. It must be held
so as to be inaccessible to persons without the required level of security
clearance. This requirement to store intercept product securely applies to all
those who are responsible for the handling of this material, including
communications service providers. The details of what such a requirement will
mean in practice for communications service providers will be set out in the
discussions they will be having with the law enforcement agency before an Article 16
Notice is served (see paragraph 2.9).
Destruction
6.8 Intercepted
material, and all copies, extracts and summaries which can be identified as the
product of an interception, must be securely destroyed as soon as it is no
longer needed for any of the authorized purposes. If such material is retained,
it should be reviewed at appropriate intervals to confirm that the
justification for its retention is still valid under Article 19(3) of the
Law.
Personnel
security
6.9 Each
intercepting agency maintains a distribution list of persons who may have
access to intercepted material or need to see any reporting in relation to it. All
such persons must be appropriately vetted. Any person no longer needing access
to perform his or her duties should be removed from any such list. Where it is
necessary for an officer of one agency to disclose material to another, it is
the former’s responsibility to ensure that the recipient has the
necessary clearance.
7 DISCLOSURE TO ENSURE FAIRNESS IN
CRIMINAL PROCEEDINGS
7.1 Article 19(3)
of the Law states the general rule that intercepted material must be destroyed
as soon as its retention is no longer necessary for a purpose authorized under
the Law. Article 19(4) specifies the authorized purposes for which
retention is necessary.
7.2 This
part of the Code applies to the handling of intercepted material in the context
of criminal proceedings where the material has been retained for one of the
purposes authorized in Article 19(4) of the Law. For those who would
ordinarily have had responsibility to provide disclosure in criminal
proceedings, this includes those rare situations where destruction of
intercepted material has not taken place in accordance with Article 19(3)
and where that material is still in existence after the commencement of a
criminal prosecution, retention having been considered necessary to ensure that
a person conducting a criminal prosecution has the information he or she needs
to discharge his or her duty of ensuring its fairness (Article 19(4)(d)).
Exclusion
of Matters from Legal Proceedings
7.3 The
general rule is that neither the possibility of interception nor intercepted
material itself plays any part in legal proceedings. This rule is set out in Article 21
of the Law, which excludes evidence, questioning, assertion or disclosure in
legal proceedings likely to reveal the existence (or the absence) of a warrant
issued under this Law (or the Interception of Communications (Jersey)
Law 1993). This rule means that the intercepted material cannot be used
either by the prosecution or the defence. This preserves “equality of
arms” which is a requirement under Article 6 of the European
Convention on Human Rights.
7.4 Article 22
contains a number of tightly-drawn exceptions to this rule. This part of the
Code deals only with the exceptions in paragraphs (7) to (10).
Disclosure
to a Prosecutor
7.5 Article 22(7)(a)
provides that intercepted material obtained by means of a warrant and which
continues to be available, may, for a strictly limited purpose, be disclosed to
a person conducting a criminal prosecution.
7.6 This
may only be done for the purpose of enabling the prosecutor to determine what
is required of the prosecutor by his or her duty to secure the fairness of the
prosecution. The prosecutor may not use intercepted material to which he or she
is given access under Article 22(7)(a) to mount a cross-examination, or to
do anything other than ensure the fairness of the proceedings.
7.7 The
exception does not mean that intercepted material should be retained against a
remote possibility that it might be relevant to future proceedings. The normal
expectation is, still, for the intercepted material to be destroyed in
accordance with the general safeguards provided by Article 19. The
exceptions only come into play if such material has, in fact, been retained for
an authorized purpose. Because the authorized purpose given in Article 10(3)(b)
(“for the purpose of preventing or detecting
serious crime”) does not extend to gathering evidence for the
purpose of a prosecution, material intercepted for this purpose may not have
survived to the prosecution stage, as it will have been destroyed in accordance
with the Article 19(3) safeguards. There is, in these circumstances, no
need to consider disclosure to a prosecutor if, in fact, no intercepted
material remains in existence.
7.8 Be
that as it may, Article 22(7)(a) recognises the duty on prosecutors, to
review all available material to make sure that the prosecution is not
proceeding unfairly. ‘Available material’ will only ever include
intercepted material at this stage if the conscious decision has been made to
retain it for an authorized purpose.
7.9 If
intercepted material does continue to be available at the prosecution stage,
once this information has come to the attention of the holder of this material
the prosecutor should be informed that a warrant has been issued under Article 10
and that material of possible relevance to the case has been intercepted.
7.10 Having had access to the material, the prosecutor may
conclude that the material affects the fairness of the proceedings. In these circumstances,
the prosecutor will decide how the prosecution, if it
proceeds, should be presented.
Disclosure
to the Bailiff
7.11 Article 22(7)(b) recognises that there may be cases
where the prosecutor, having seen intercepted material under paragraph (7)(a),
will need to consult the judge presiding at the trial. Accordingly, it provides
for the Bailiff to be given access to intercepted material, where there are
exceptional circumstances making that disclosure essential in the interests of
justice.
7.12 This access will be achieved by the prosecutor inviting
the Bailiff to make an order for disclosure to the Bailiff alone, under this
paragraph. This is an exceptional procedure; normally, the prosecutor’s
functions under paragraph (7)(a) will not fall to be reviewed by the
Bailiff. To comply with Article 21(1), any consideration given to, or
exercise of, this power must be carried out without notice to the defence. The
purpose of this power is to ensure that the trial is conducted fairly.
7.13 The Bailiff may, having considered the intercepted
material disclosed to the Bailiff, direct the prosecution to make an admission
of fact. The admission will be abstracted from the interception; but, in
accordance with the requirements of Article 21(1), it must not reveal the
fact of interception. This is likely to be a very unusual step. The Law only
allows it where the Bailiff considers it essential in the interests of justice.
7.14 Nothing in these provisions allows intercepted material,
or the fact of interception, to be disclosed to the defence.
8 OVERSIGHT
8.1 The
Law provides for a Commissioner whose remit is to provide independent oversight
of the use of the powers contained within the warranted interception régime under Chapter 1 of Part 2 of the Law.
8.2 This
Code does not cover the exercise of the Commissioner’s functions. However,
it will be the duty of any person who uses the above powers to comply with any
request made by the Commissioner to provide any information as the Commissioner
requires for the purpose of enabling the Commissioner to discharge his or her
functions.
9 COMPLAINTS
9.1 The
Law establishes an independent Tribunal. This Tribunal will be made up of a
judge of the Court of Appeal and 2 Jurats and is independent of the States. The
Tribunal has full powers to investigate and decide any case within its
jurisdiction.
9.2 This
code does not cover the exercise of the Tribunal’s functions. Details of
the relevant complaints procedure can be obtained
from:
The Judicial Greffier
Morier House
St Helier
Jersey
JE1 1DD
10 INTERCEPTION WITHOUT A WARRANT
10.1 Article 8(4) of the Law permits interception
without a warrant in the following circumstances:
· where
it is authorized by or under Article 8 or 9 of the Law (see below);
· where
it is in exercise, in relation to any stored communication, of some other
statutory power exercised for the purpose of obtaining information or of taking
possession of any document or other property, for example, the obtaining of a
production order under Schedule 1 to the Police
Procedures and Criminal Evidence (Jersey) Law 2003 for stored data to be produced.
Interception in accordance
with a warrant under Article 10 of the Law is dealt with under Chapters 2,
3, 4 and 5 of this Code.
10.2 For lawful interception which takes place without a
warrant, pursuant to Articles 8 or 9 of the Law or pursuant to some other
statutory power, there is no prohibition in the Law on the evidential use of
any material that is obtained as a result. The matter may still, however, be
regulated by the exclusionary rules of evidence to be found in the customary
law, Article 76 of the Police
Procedures and Criminal Evidence (Jersey) Law 2003, and/or
pursuant to the Human
Rights (Jersey) Law 2000.
Interception
with the Consent of both Parties
10.3 Article 8(1) of the Law authorizes the interception
of a communication if both the person sending the communication and the
intended recipient(s) have consented to its interception, or where the person
conducting the interception has reasonable grounds for believing that all
parties have consented to the interception.
Interception
with the Consent of one Party
10.4 Article 8(2) of the Law authorizes the interception
of a communication if either the sender or intended recipient of the
communication has consented to its interception, and directed surveillance by
means of that interception has been authorized under Part 3 of the Law. Further
details can be found in Chapter 4 of the Covert Surveillance Code of Practice
and in Chapter 2 of the Covert Human Intelligence Sources Code of Practice.
Interception for the Purposes of a
Communication Service Provider
10.5 Article 8(3) of the Law
permits a communication service provider or a person acting upon a
provider’s behalf to carry out interception for purposes connected with
the operation of that service or for purposes connected with the enforcement of
any enactment relating to the use of the communication service.
Lawful
Business Practice
10.6 Article 9(2) of the Law enables the Minister for
Justice and Home Affairs to make an Order setting out those circumstances where
it is lawful to intercept communications for the purpose of carrying on a
business. This Order applies equally to public authorities.
Schedule 2[2]
(Article 2)
Code of practice on
interception of communications – Postal
CONTENTS
CHAPTER 1 GENERAL
CHAPTER 2 GENERAL
RULES ON INTERCEPTION WITH A WARRANT
CHAPTER 3 SPECIAL
RULES ON INTERCEPTION WITH A WARRANT
CHAPTER 4 INTERCEPTION
WARRANTS (CHAPTER 7(1))
CHAPTER 5 SAFEGUARDS
CHAPTER 6 DISCLOSURE
TO ENSURE FAIRNESS IN CRIMINAL PROCEEDINGS
CHAPTER 7 INDEPENDENT
SCRUTINY
CHAPTER 8 COMPLAINTS
CHAPTER 9 INTERCEPTION
WITHOUT A WARRANT
1 GENERAL
1.1 This
Code of Practice relates to the powers and duties conferred or imposed under
Chapter 1 of Part 3 of the Regulation
of Investigatory Powers (Jersey) Law 2005 (the “Law”).
It provides guidance on the procedures that must be followed before
interception of postal communications can take place under those provisions. It
is primarily intended for use by those public authorities listed in Article 11(1)
of the Law. It will also prove useful to postal operators and other interested
bodies to acquaint themselves with the procedures to be followed by those
public authorities.
1.2 The
Law provides that all Codes of Practice relating to the Law are admissible as
evidence in criminal and civil proceedings. If any provision of this Code
appears relevant before any court or tribunal considering any such proceedings,
or to the Tribunal established under the Law, or to the Commissioner
responsible for overseeing the powers conferred by the Law, it must be taken
into account.
2 GENERAL RULES ON
INTERCEPTION WITH A WARRANT
2.1 There
are a limited number of persons by whom, or on behalf of whom, applications for
interception warrants may be made. These persons are:
· The
Chief Officer of the States Police;
· The Agent
of the Impôts;
· The
Chief Immigration Officer;
· The
Intelligence Services;
· A
person who, for the purposes of any international mutual assistance agreement,
is the competent authority of a country or territory outside Jersey.
2.2 All
interception warrants are issued by the Attorney General. Before issuing an
interception warrant, the Attorney General must believe that what the action
seeks to achieve is necessary for one of the following Article 10
purposes:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime; or
· for
the purpose of safeguarding the economic well-being of Jersey;
and that the conduct authorized
by the warrant is proportionate to what is sought to be achieved by that
conduct.
Necessity
and Proportionality
2.3 Obtaining
a warrant under the Law will only ensure that the interception authorized is a
justifiable interference with an individual’s rights under Article 8
of the European Convention of Human Rights (the right to privacy) if it is
necessary and proportionate for the interception to take place. The Law
recognises this by first requiring that the Attorney General believes that the authorization
is necessary on one or more of the statutory grounds set out in Article 10
of the Law. This requires the Attorney General to believe that it is necessary
to undertake the interception which is to be authorized for a particular
purpose falling within the relevant statutory ground.
2.4 Then,
if the interception is necessary, the Attorney General must also believe that
it is proportionate to what is sought to be achieved by carrying it out. This
involves balancing the intrusiveness of the interference, against the need for
it in operational terms. Interception of communications will not be
proportionate if it is excessive in the circumstances of the case or if the
information which is sought could reasonably be obtained by other means. Further,
all interception should be carefully managed to meet the objective in question
and must not be arbitrary or unfair.
Implementation
of Warrants
2.5 After
a warrant has been issued it will be forwarded to the person to whom it is
addressed, which in practice will be the person or agency that submitted the
application. The Law (Article 15) then permits the intercepting agency to
carry out the interception, or to require the assistance of other persons in
giving effect to the warrant. Warrants cannot be served on those outside Jersey.
Provision
of Reasonable Assistance
2.6 Any
public postal operator in Jersey may be required to provide assistance in
giving effect to an interception. The Law places a requirement on postal
operators to take all such steps for giving effect to the warrant as are
notified to them (Article 15(4) of the Law). But the steps that may be
required are limited to those which it is reasonably practicable to take (Article 15(5)).
If there is disagreement about what is reasonably practicable, it will be for the
Attorney General to decide whether to press forward with civil proceedings or
whether to institute criminal proceedings.
2.7 Where
the intercepting agency requires the assistance of a postal operator in order
to implement a warrant, the agency should provide the following to the postal
operator:
· A
copy of the warrant instrument signed and dated by the Attorney General;
· The
relevant schedule for that service provider setting out the addresses or other
factors identifying the communications to be intercepted;
· A
covering document from the intercepting agency requiring the assistance of the
postal operator and specifying any other details regarding the means of
interception and delivery as may be necessary. Contact details with respect to
the intercepting agency will either be provided in this covering document or
will be available in the handbook provided to all postal operators who maintain
an intercept capability.
Provision
of Intercept Capability
2.8 Whilst
all persons who provide a postal service are obliged to provide assistance in
giving effect to an interception, persons who provide a public postal service,
or plan to do so, may also be required to provide a reasonable intercept
capability. The obligations that the Minister for Justice and Home Affairs
considers reasonable to impose on such persons to ensure they have such a
capability will be set out in an Order made by the Minister for Justice and
Home Affairs following wider consultation. A notice may be served upon a postal
operator setting out the steps they must take to ensure they can meet these
obligations. A notice will not be served without consultation over the content
of the notice between the law enforcement agencies and the postal service
provider having previously taken place. When served with such a notice, a
postal operator, if the operator feels it unreasonable, will be able to refer
that notice to the Technical Advisory Board on the reasonableness of the
technical requirements and capabilities that are being sought. Details of how
to submit a notice to the Board will be provided either before or at the time
the notice is served.
2.9 Any
postal operator obliged to maintain a reasonable intercept capability will be
provided with instructions or a handbook which will contain the basic
information they require to respond to requests for reasonable assistance for
the interception of communications.
Duration
of Interception Warrants
2.10 All interception warrants are valid for an initial
period of 3 months. Upon
renewal, warrants issued on serious crime grounds are valid for a further
period of 3 months. Warrants
renewed on national security/economic well-being grounds are valid for a
further period of 6 months.
2.11 Where a change in circumstance prior to the set expiry
date leads the intercepting agency to consider it no longer necessary or
practicable for the warrant to be in force, it should be cancelled with
immediate effect.
Stored
Communications
2.12 Article 2(7) of the Law defines a communication in
the course of its transmission as also encompassing any time when the
communication is being stored in the communication system.
2.13 Stored communications may also be accessed by means
other than a warrant. If a communication has been stored within a transit
system it may be obtained with lawful authority by means of an existing
statutory power such as a production order (e.g.
under the Police Procedures and Criminal Evidence (Jersey) Law, 2003) or a
search warrant.
3 SPECIAL RULES ON
INTERCEPTION WITH A WARRANT
Collateral
Intrusion
3.1 Consideration
should be given to any infringement of the privacy of individuals who are not
the subject of the intended interception, especially where communications
relating to religious, medical, journalistic or legally privileged material may
be involved. An application for an interception warrant should draw attention
to any circumstances which give rise to an unusual degree of collateral
infringement of privacy, and this will be taken into account by the Attorney
General when considering a warrant application. Should an interception
operation reach the point where individuals other than the subject of the authorization
are identified as directly relevant to the operation, consideration should be
given to applying for separate warrants covering those individuals.
Confidential
Information
3.2 Particular
consideration should also be given in cases where the subject of the interception
might reasonably assume a high degree of privacy, or where confidential
information is involved. Confidential information consists of matters subject
to legal privilege, confidential personal information or confidential
journalistic material (see paragraphs 3.9-3.11). For example, extra
consideration should be given where interception might involve communications
between a minister of religion and an individual relating to the latter’s
spiritual welfare, or where matters of medical or journalistic confidentiality
or legal privilege may be involved.
Communications Subject to Legal Privilege
3.3 Article 5
of the Police
Procedures and Criminal Evidence (Jersey) Law 2003 describes
those matters that are usually regarded as subject to legal privilege. Legal
privilege does not apply to communications made with the intention of
furthering a criminal purpose (whether the lawyer is acting unwittingly or
culpably). Legally privileged communications will lose their protection if
there are grounds to believe, for example, that the lawyer is intending to hold
or use the information for a criminal purpose. But privilege is not lost if a
lawyer is properly advising a person who is suspected of having committed a
criminal offence. The concept of legal privilege applies to the provision of
professional legal advice by any individual, agency or organisation qualified
to do so.
3.4 The
Law does not provide any special protection for legally privileged
communications. Nevertheless, intercepting such communications is particularly
sensitive and is therefore subject to additional safeguards under this Code. The
guidance set out below may in part depend on whether matters subject to legal
privilege have been obtained intentionally or incidentally to some other
material which has been sought.
3.5 In
general, any application for a warrant which is likely to result in the
interception of legally privileged communications should include, in addition
to the reasons why it is considered necessary for the interception to take
place, an assessment of how likely it is that communications which are subject
to legal privilege will be intercepted. In addition, it should state whether
the purpose (or one of the purposes) of the interception is to obtain
privileged communications. This assessment will be taken into account by the
Attorney General in deciding whether an interception is necessary under Article 10
of the Law and whether it is proportionate. In such circumstances, the Attorney
General will be able to impose additional conditions such as regular reporting
arrangements so as to be able to exercise his or her discretion on whether a
warrant should continue to be authorized. In those cases where communications
which include legally privileged communications have been intercepted, the
matter should be reported to the Commissioner during his or her inspections and
the material be made available to the Commissioner if requested.
3.6 Where
an Advocate or Solicitor or other professional legal adviser is the subject of
an interception, it is possible that a substantial proportion of the
communications which will be intercepted will be between the lawyer and his or
her client(s) and will be subject to legal privilege. Any case where a lawyer
is the subject of an investigation should be notified to the Commissioner
during the Commissioner’s inspections and any material which has been
retained should be made available to the Commissioner if requested.
3.7 In
addition to the safeguards governing the handling and retention of intercept
material as provided for in Article 19 of the Law, persons who examine
intercepted communications should be alert to any intercept material which may
be subject to legal privilege. Where there is doubt as to whether the
communications are subject to legal privilege, advice should be sought from the
Law Officers Department. Similarly, advice should also be sought where there is
doubt over whether communications are not subject to legal privilege due to the
“in furtherance of a criminal purpose” exception.
Communications
involving Confidential Personal Information and Confidential Journalistic
Material
3.8 Similar
consideration to that given to legally privileged communications must also be
given to the interception of communications that involve confidential personal
information and confidential journalistic material. Confidential personal
information is information held in confidence concerning an individual (whether
living or dead) who can be identified from it, and the material in question
relates to his physical or mental health or to spiritual counselling. Such
information can include both oral and written communications. Such information
as described above is held in confidence if it is held subject to an express or
implied undertaking to hold it in confidence or it is subject to a restriction
on disclosure or an obligation of confidentiality contained in existing
legislation. For example, confidential personal information might include
consultations between a health professional and a patient, or information from
a patient’s medical records.
3.9 Spiritual
counselling is defined as conversations between an individual and a Minister of
Religion acting in his or her official capacity, and where the individual being
counselled is seeking or the Minister is imparting forgiveness, absolution or
the resolution of conscience with the authority of the Divine Being(s) of their
particular faith.
3.10 Confidential journalistic material includes material
acquired or created for the purposes of journalism and held subject to an
undertaking to hold it in confidence, as well as communications resulting in
information being acquired for the purposes of journalism and held subject to
such an undertaking.
4 INTERCEPTION WARRANTS (ARTICLE
12(1))
4.1 This
Chapter applies to the interception of communications by means of a warrant
complying with Article 12(1) of the Law. This type of warrant may be
issued in respect of the interception of communications carried on any postal
service as defined in Article 1(1) of the Law. Responsibility for the
issuing of interception warrants rests with the Attorney General.
Application
for an Article 12(1) Warrant
4.2 An
application for a warrant is made to the Attorney General. Interception
warrants, when issued, are addressed to the person who submitted the
application. This person may then serve a copy upon any person who may be able
to provide assistance in giving effect to that warrant. Each application, a
copy of which must be retained by the applicant, should contain the following
information:
· Background
to the operation in question.
· Person
or premises to which the application relates (and how the person or premises
feature in the operation).
· Description
of the communications to be intercepted, details of the postal operator(s) and
an assessment of the feasibility of the interception operation where this is
relevant.
· Description
of the conduct to be authorized as considered necessary in order to carry out
the interception, where appropriate.
· An
explanation of why the interception is considered to be necessary under the
provisions of Article 10.
· A
consideration of why the conduct to be authorized by the warrant is
proportionate to what is sought to be achieved by that conduct.
· A
consideration of any unusual degree of collateral intrusion and why that
intrusion is justified in the circumstances. In particular, where the
communications in question might affect religious, medical or journalistic
confidentiality or legal privilege, this must be specified in the application.
· Where
an application is urgent, supporting justification should be provided.
· An
assurance that all material intercepted will be handled in accordance with the
safeguards required by Article 19 of the Law.
Authorization
of an Article 12(1) Warrant
4.3 Before
issuing a warrant under Article 12(1), The Attorney General must believe
the warrant is necessary:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime; or
· for
the purpose of safeguarding the economic well-being of Jersey.
4.4 In
exercising his or her power to issue an interception warrant for the purpose of
safeguarding the economic well-being of Jersey (as provided for by Article 10
of the Law), the Attorney General will consider whether the economic well-being
of Jersey which is to be safeguarded is, on the facts of each case, directly
related to national security. The Attorney General will not issue a warrant on Article 10
grounds if this direct link between the economic well-being of Jersey and
national security is not established. Any application for a warrant on Article 5(3)(c)
grounds should therefore explain how, in the applicant's view, the economic
well-being of Jersey which is to be safeguarded is directly related to national
security on the facts of the case.
4.5 The
Attorney General must also consider that the conduct authorized by the warrant
is proportionate to what it seeks to achieve (Article 10). In considering
necessity and proportionality, the Attorney General must take into account
whether the information sought could reasonably be obtained by other means (Article 10).
Format
of an Article 12 Warrant
4.6 Each
warrant comprises 2 sections, a warrant instrument signed by the Attorney
General listing the subject of the interception or the set of premises, a copy
of which each postal operator will receive, and a schedule or set of schedules
listing the communications to be intercepted. Only the schedule relevant to the
communications that can be intercepted by the specified postal operator will be
provided to that service provider.
4.7 The
warrant instrument should include:
· The
name or description of the interception subject or of a set of premises in
relation to which the interception is to take place;
· A
warrant reference number.
4.8 The
scheduled part of the warrant will comprise one or more schedules. Each
schedule should contain:
· The
name of the postal operator, or the other person who is to take action;
· A
warrant reference number;
· A
means of identifying the communications to be intercepted.
Modification
of Article 7(1) warrant
4.9 Interception
warrants may be modified under the provisions of Article 14 of the Law. The
unscheduled part of a warrant may only be modified by the Attorney General. The
modification will expire on the expiry date of the warrant.
4.10 Scheduled parts of a warrant may be modified by the
Attorney General in which case the modification expires on the expiry date of
the warrant. A modification to the scheduled part of the warrant may include
the addition of a new schedule relating to a communication service provider or
when a copy of the warrant has not been previously served. In an urgent case,
where the warrant specifically authorizes it, scheduled parts of a warrant may
be modified by the person to whom the warrant is addressed (the person who
submitted the application) or a subordinate (where the subordinate is
identified in the warrant). Modifications of this kind are valid for 5 working
days following the day of issue unless the modification instrument is endorsed
by the Attorney General. Where the modification is endorsed in this way, the
modification expires upon the expiry date of the warrant.
4.11 There is a duty to modify a warrant by deleting a
communications identifier if it is no longer relevant. When a modification is
sought to delete a number or other communication identified, the relevant
communication service provider must be advised and the interception suspended
before the modification is made.
Renewal
of Article 12(1) Warrant
4.12 The Attorney General may renew a warrant at any point
before its expiry date. Applications for renewals must be made to the Attorney
General and should contain an update of the matters outlined in paragraph 4.2.
In particular, the applicant should give an assessment of the value of interception
to the operation to date and explain why he considers that interception
continues to be necessary for one or more of the purposes in Article 10(3).
4.13 Where the Attorney General is satisfied that the
interception continues to meet the requirements of the Law the Attorney General
may renew the warrant. Where the warrant is issued on serious crime grounds,
the renewed warrant is valid for a further 3 months. Where it is issued on
national security/economic well-being grounds, the renewed warrant is valid for
6 months. These dates run from the date of signature on the renewal instrument.
4.14 A copy of the warrant renewal instrument will be
forwarded by the intercepting agency to all relevant communications service
providers on whom a copy of the original warrant instrument and a schedule have
been served, providing they are still actively assisting. A warrant renewal
instrument will include the reference number of the warrant and description of
the person or premises described in the warrant.
Warrant
Cancellation
4.15 The Attorney General is under a duty to cancel an
interception warrant if, at any time before its expiry date, he or she is
satisfied that the warrant is no longer necessary on grounds falling within Article 10(3)
of the Law. Intercepting agencies will therefore need to keep their warrants
under continuous review.
4.16 The cancellation instrument should be addressed to the
person to whom the warrant was issued (the intercepting agency) and should
include the reference number of the warrant and the description of the person
or premises specified in the warrant. A copy of the cancellation instrument
should be sent to those communications service providers who have held a copy
of the warrant instrument and accompanying schedule during the preceding 12
months.
Records
4.17 The independent scrutiny régime
allows the Commissioner appointed under the Law to inspect the warrant
application on which the Attorney General based his or her decision and the
applicant may be required to justify the content. Each intercepting agency
should keep the following to be made available for scrutiny by the Commissioner
as he may require:
· all
applications made for warrants complying with Article 12(1) and
applications made for the renewal of such warrants.
· all
warrants, and renewals and copies of schedule modifications (if any).
· where
any application is refused, the grounds for refusal as given by the Attorney
General.
· the
dates on which interception is started and stopped.
4.18 Records shall also be kept of the arrangements by which
the requirements of Article 19(2) (minimisation of copying and destruction
of intercepted material) and Article 19(3) (destruction of intercepted
material) are to be met. For further details see chapter on
“Safeguards”.
4.19 The term “intercepted material” is used
throughout to embrace copies, extracts or summaries made from the intercepted
material as well as the intercept material itself.
5 SAFEGUARDS
5.1 All
material (including related communications data) intercepted under the
authority of a warrant complying with Article 12(1) of the Law must be
handled in accordance with safeguards which the Attorney General has approved
in conformity with the duty imposed upon the Attorney General by the Law. These
safeguards are made available to the Commissioner, and they must meet the
requirements of Article 19 of the Law which are set out below. Any breach
of these safeguards must be reported to the Commissioner.
5.2 Article 19
of the Law requires that disclosure, copying and retention of intercept
material be limited to the minimum necessary for the authorized purposes. The authorized
purposes defined in Article 19(4) of the Law include:
· if
the material continues to be, or is likely to become, necessary for any of the
purposes set out in Article 10(3) - namely, in the interests of national
security, for the purpose of preventing or detecting serious crime, for the
purpose of safeguarding the economic well-being of Jersey.
· if
the material is necessary for facilitating the carrying out of the functions of
the Attorney General under Chapter I of Part 2 of the Law.
· if
the material is necessary for facilitating the carrying out of any functions of
the Commissioner or the Tribunal.
· if
the material is necessary to ensure that a person conducting a criminal
prosecution has the information he or she needs to determine what is required
of the person by his or her duty to secure the fairness of the prosecution.
Dissemination
of Intercepted Material
5.3 The
number of persons to whom any of the material is disclosed, and the extent of
disclosure, must be limited to the minimum that is necessary for the authorized
purposes set out in Article 19(4) of the Law. This obligation applies
equally to disclosure to additional persons within an agency, and to disclosure
outside the agency. It is enforced by prohibiting disclosure to persons who do
not hold the required security clearance, and also by the need-to-know
principle: intercepted material must not be disclosed to any person unless that
person’s duties, which must relate to one of the authorized purposes, are
such that he or she needs to know about the material to carry out those duties.
In the same way only so much of the material may be disclosed as the recipient
needs; for example if a summary of the material will suffice, no more than that
should be disclosed.
5.4 The
obligations apply not just to the original interceptor, but also to anyone to
whom the material is subsequently disclosed. In some cases this will be
achieved by requiring the latter to obtain the originator’s permission
before disclosing the material further. In others, explicit safeguards are
applied to secondary recipients.
Copying
5.5 Intercepted material
may only be copied to the extent necessary for the authorized purposes set out
in Article 19(4) of the Law. Copies include not only direct copies of the
whole of the material, but also extracts and summaries which identify
themselves as the product of an interception, and any record referring to an
interception which is a record of the identities of the persons to or by whom
the intercepted material was sent. The restrictions are implemented by
requiring special treatment of such copies, extracts and summaries that are
made by recording their making, distribution and destruction.
Storage
5.6 Intercepted
material, and all copies, extracts and summaries of it, must be handled and
stored securely, so as to minimise the risk of loss or theft. It must be held
so as to be inaccessible to persons without the required level of security
clearance. This requirement to store intercept product securely applies to all
those who are responsible for the handling of this material, including
communications service providers. The details of what such a requirement will
mean in practice for communications service providers will be set out in the
discussions they will be having with the law enforcement agency before an Article 16
Notice is served (see paragraph 2.9).
Destruction
5.7 Intercepted
material, and all copies, extracts and summaries which can be identified as the
product of an interception, must be securely destroyed as soon as it is no
longer needed for any of the authorized purposes. If such material is retained,
it should be reviewed at appropriate intervals to confirm that the
justification for its retention is still valid under Article 19(3) of the
Law.
Personnel
security
5.8 Each
intercepting agency maintains a distribution list of persons who may have
access to intercepted material or need to see any reporting in relation to it. All
such persons must be appropriately vetted. Any person no longer needing access
to perform his or her duties should be removed from any such list. Where it is
necessary for an officer of one agency to disclose material to another, it is
the former’s responsibility to ensure that the recipient has the
necessary clearance.
6 DISCLOSURE TO ENSURE FAIRNESS IN
CRIMINAL PROCEEDINGS
6.1 Article 19(3)
of the Law states the general rule that intercepted material must be destroyed
as soon as its retention is no longer necessary for a purpose authorized under
the Law. Article 19(4) specifies the authorized purposes for which
retention is necessary.
6.2 This
part of the Code applies to the handling of intercepted material in the context
of criminal proceedings where the material has been retained for one of the
purposes authorized in Article 19(4) of the Law. For those who would
ordinarily have had responsibility to provide disclosure in criminal proceedings,
this includes those rare situations where destruction of intercepted material
has not taken place in accordance with Article 19(3) and where that
material is still in existence after the commencement of a criminal
prosecution, retention having been considered necessary to ensure that a person
conducting a criminal prosecution has the information he or she needs to
discharge his duty of ensuring its fairness (Article 19(4)(d)).
Exclusion
of Matters from Legal Proceedings
6.3 The
general rule is that neither the possibility of interception nor intercepted
material itself plays any part in legal proceedings. This rule is set out in Article 21
of the Law, which excludes evidence, questioning, assertion or disclosure in
legal proceedings likely to reveal the existence (or the absence) of a warrant
issued under this Law (or the Interception of Communications (Jersey)
Law 1993). This rule means that the intercepted material cannot be used
either by the prosecution or the defence. This preserves “equality of
arms” which is a requirement under Article 6 of the European
Convention on Human Rights.
6.4 Article 22
contains a number of tightly-drawn exceptions to this rule. This part of the
Code deals only with the exceptions in paragraphs (7) to (10).
Disclosure
to a Prosecutor
6.5 Article 22(7)(a)
provides that intercepted material obtained by means of a warrant and which
continues to be available, may, for a strictly limited purpose, be disclosed to
a person conducting a criminal prosecution.
6.6 This
may only be done for the purpose of enabling the prosecutor to determine what
is required of the prosecutor by his or her duty to secure the fairness of the
prosecution. The prosecutor may not use intercepted material to which he or she
is given access under Article 22(7)(a) to mount a cross-examination, or to
do anything other than ensure the fairness of the proceedings.
6.7 The
exception does not mean that intercepted material should be retained against a
remote possibility that it might be relevant to future proceedings. The normal
expectation is, still, for the intercepted material to be destroyed in
accordance with the general safeguards provided by Article 19. The
exceptions only come into play if such material has, in fact, been retained for
an authorized purpose. Because the authorized purpose given in Article 10(3)(b)
(“for the purpose of preventing or detecting
serious crime”) does not extend to gathering evidence for the
purpose of a prosecution, material intercepted for this purpose may not have
survived to the prosecution stage, as it will have been destroyed in accordance
with the Article 19(3) safeguards. There is, in these circumstances, no
need to consider disclosure to a prosecutor if, in fact, no intercepted
material remains in existence.
6.8 Be
that as it may, Article 22(7)(a) recognises the duty on prosecutors, to
review all available material to make sure that the prosecution is not
proceeding unfairly. ‘Available material’ will only ever include
intercepted material at this stage if the conscious decision has been made to
retain it for an authorized purpose.
6.9 If
intercepted material does continue to be available at the prosecution stage,
once this information has come to the attention of the holder of this material
the prosecutor should be informed that a warrant has been issued under Article 10
and that material of possible relevance to the case has been intercepted.
6.10 Having had access to the material, the prosecutor may
conclude that the material affects the fairness of the proceedings. In these
circumstances, the prosecutor will decide how the prosecution,
if it proceeds, should be presented.
Disclosure
to the Bailiff
6.11 Article 22(7)(b) recognises that there may be cases
where the prosecutor, having seen intercepted material under paragraph (7)(a),
will need to consult the judge presiding at the trial. Accordingly, it provides
for the Bailiff to be given access to intercepted material, where there are
exceptional circumstances making that disclosure essential in the interests of
justice.
6.12 This access will be achieved by the prosecutor inviting
the Bailiff to make an order for disclosure to the Bailiff alone, under this
paragraph. This is an exceptional procedure; normally, the prosecutor’s
functions under paragraph (7)(a) will not fall to be reviewed by the
Bailiff. To comply with Article 21(1), any consideration given to, or
exercise of, this power must be carried out without notice to the defence. The
purpose of this power is to ensure that the trial is conducted fairly.
6.13 The Bailiff may, having considered the intercepted
material disclosed to the Bailiff, direct the prosecution to make an admission
of fact. The admission will be abstracted from the interception; but, in
accordance with the requirements of Article 21(1), it must not reveal the
fact of interception. This is likely to be a very unusual step. The Law only
allows it where the Bailiff considers it essential in the interests of justice.
6.14 Nothing in these provisions allows intercepted material,
or the fact of interception, to be disclosed to the defence.
7 OVERSIGHT
7.1 The
Law provides for a Commissioner whose remit is to provide independent oversight
of the use of the powers contained within the warranted interception régime under Chapter I of Part 2 of the Law.
7.2 This
Code does not cover the exercise of the Commissioner’s functions. However,
it will be the duty of any person who uses the above powers to comply with any
request made by the Commissioner to provide any information as he or she
requires for the purpose of enabling the prosecutor to discharge his or her
functions.
8 COMPLAINTS
8.1 The
Law establishes an independent Tribunal. This Tribunal will be made up of a
judge of the Court of Appeal and 2 Jurats and is independent of the States. The
Tribunal has full powers to investigate and decide any case within its
jurisdiction.
8.2 This
code does not cover the exercise of the Tribunal’s functions. Details of
the relevant complaints procedure can be obtained
from:
The Judicial Greffier
Morier House
St Helier
Jersey
JE1 1DD
9 INTERCEPTION WITHOUT A WARRANT
9.1 Article 7
of the Law permits interception without a warrant in the following
circumstances:
· where
it is authorized by or under Articles 8 or 9 of the Law (see below);
· where
it is in exercise, in relation to any stored communication, of some other
statutory power exercised for the purpose of obtaining information or of taking
possession of any document or other property, for example, the obtaining of a production
order under Schedule 2 to the Police
Procedures and Criminal Evidence (Jersey) Law 2003 for stored data to be produced.
Interception in accordance
with a warrant under Article 10 of the Law is dealt with under Chapters 2,
3 and 4 of this Code.
9.2 For
lawful interception which takes place without a warrant, pursuant to Article 7
of the Law or pursuant to some other statutory power, there is no prohibition
in the Law on the evidential use of any material that is obtained as a result. The
matter may still, however, be regulated by the exclusionary rules of evidence
to be found in the common law, in section 76 of the Police
Procedures and Criminal Evidence (Jersey) Law 2003, and/or
pursuant to the Human
Rights (Jersey) Law 2000.
Interception
with the consent of both parties
9.3 Article 8
of the Law authorizes the interception of a communication if both the person
sending the communication and the intended recipient(s) have consented to its
interception, or where the person conducting the interception has reasonable
grounds for believing that all parties have consented to the interception.
Interception
with the consent of one party
9.4 Article 8
of the Law authorizes the interception of a communication if either the sender
or intended recipient of the communication has consented to its interception,
and directed surveillance by means of that interception has been authorized
under Part 2 of the Law. [Further details can be found in Chapter 4 of the
Covert Surveillance Code of Practice and in Chapter 2 of the Covert Human
Intelligence Sources Code of Practice].
Interception
for the purposes of a postal operator
9.5 Article 8
of the Law permits a postal operator or a person acting upon their behalf to
carry out interception for purposes connected with the operation of that
service or for purposes connected with the enforcement of any enactment
relating to the use of the postal service.
Schedule 3[3]
(Article 3)
Code of practice on
aCCessing communications data
CONTENTS
CHAPTER 1 INTRODUCTION
CHAPTER 2 GENERAL
CHAPTER 3 DESIGNATED
PERSONS WITHIN RELEVANT PUBLIC AUTHORITIES PERMITTED TO ACCESS COMMUNICATIONS
DATA UNDER THE LAW
CHAPTER 4 PURPOSES
FOR WHICH COMMUNICATIONS DATA MAY BE SOUGHT
CHAPTER 5 AUTHORIZATIONS
AND NOTICES
CHAPTER 6 VALIDITY
OF AUTHORIZATIONS AND NOTICES
CHAPTER 7 RETENTION
OF RECORDS BY PUBLIC AUTHORITIES
CHAPTER 8 OVERSIGHT
CHAPTER 9 COMPLAINTS
ANNEX A SPECIMEN
ARTICLE 22(4) NOTICE
1 INTRODUCTION
1.1 This
Code of practice relates to the powers and duties conferred or imposed under
Chapter 2 of Part 2 of the Regulation
of Investigatory Powers (Jersey) Law 2005 (the
“Law”). It provides guidance on the procedures that must be
followed before access to communications data can take place under those
provisions.
1.2 The
Code should be readily available to any members of a public authority who are
involved in operations to access communications data.
1.3 The
Law provides that the Code is admissible in evidence in criminal and civil
proceedings. If any provision of the Code appears relevant to a question before
any court or tribunal hearing any such proceedings, or to the Tribunal
established under the Law, or to the Commissioner responsible for overseeing
the powers conferred by the Law, it must be taken into account.
1.4 This
Code applies to relevant public authorities as described in Chapter 2 of Part 2
of the Law (see paragraph 3.1).
1.5 This
Code does not cover conduct consisting in the
interception of communications (contents of a communication).
2 GENERAL
2.1 The
Code covers any conduct in relation to a postal service or telecommunication
system for obtaining communications data and the disclosure to any person of
such data. For these purposes, communications data includes information
relating to the use of a postal service or telecommunication system but does not include the contents of the communication
itself, contents of emails or interactions with websites. In this Code
“data”, in relation to a postal item, means anything written on the
outside of the item.
2.2 A
person who engages in such conduct must be properly authorized and must act in
accordance with that authority.
2.3 A
test of necessity (see paragraphs 4.1 ‑ 4.3)
must be met before any communications data is obtained. The assessment of
necessity is one made by a designated person. (This is a person designated for
the purposes of Chapter 2 of Part 2 of the Law (see paragraph 3.2). A
designated person has a number of obligations within the provisions of the Law
which must be met before communications data is obtained. These are also laid
out in this Code). A designated person must not only consider it necessary to
obtain the communications data but must also consider the conduct involved in
obtaining the communications data to be proportionate
(see paragraph 4.4 below) to what it is sought to achieve.
3 DESIGNATED PERSONS WITHIN
RELEVANT PUBLIC AUTHORITIES PERMITTED TO ACCESS COMMUNICATIONS DATA UNDER THE
LAW
3.1 Designated
persons within the following “relevant public
authorities” are permitted under the Law to grant authorizations or serve
notices, the 2 routes by which the Law allows communications data to be
accessed (see further paragraph 5.1):
· The
States of Jersey Police Force;
· Immigration
and Nationality Department;
· Customs
and Excise;
· Income
Tax Department;
· Any
of the Parishes;
· Any
of the Intelligence Services;
3.2 The
Designated persons in respect of these bodies within each public authority for
granting authorizations or giving notices will be as follows:
·
|
The States of
Jersey Police
|
: Chief Officer
|
·
|
Immigration and
Nationality Department
|
: Chief
Inspector
|
·
|
Customs and
Excise
|
: Agent of the
Impôts
|
·
|
All others
|
: the Attorney
General
|
Relevant public
authorities authorized to access communications data from the list in Chapter 2
of Part 2 of the Law may be removed, if deemed appropriate, by
Regulations.
4 PURPOSES FOR WHICH
COMMUNICATIONS DATA MAY BE SOUGHT
4.1 Under
Article 26(2) of the Law, communications data may be sought if a
designated person believes it is necessary for one or more of the following
purposes:
· in
the interests of national security;
· for
the purpose of preventing or detecting crime or of preventing disorder;
· in
the interests of the economic well-being of Jersey (see paragraph 4.2
below);
· in
the interests of public safety;
· for
the purpose of protecting public health;
· for
the purpose of assessing or collecting any tax, duty, levy or other imposition,
contribution or charge payable to the States;
· for
the purpose, in an emergency, of preventing death or injury or any damage to a
person’s physical or mental health, or of mitigating any injury or damage
to a person’s physical or mental health.
4.2 In
exercising his or her power to grant an authorization or give a notice in the
interests of the economic well-being of Jersey (as provided for by Article 26(2)(c))
of the Law, a designated person will consider whether the economic well-being
of Jersey which it is in the interests of is, on the facts of each case,
related to “national security”. A designated person will not grant
an authorization or give a notice on Article 26(2)(c) grounds if this link
is not established. Any application for an authorization or a notice on Article 26(2)(c)
grounds should therefore explain how, in the applicant’s view, the
economic well-being of Jersey which it is in the interests of is related to national
security on the facts of the case.
4.3 For
an action to be necessary in a democratic society the access to communications
data must pursue a legitimate aim as listed in paragraph 4.1; fulfil a
pressing social need and be proportionate to that aim.
4.4 Under
Article 26(5) of the Law, a designated person must also consider the
conduct involved in obtaining the communications data to be proportionate. Proportionality
is a crucial concept. In both the Law and this Code reference is made to the
conduct being proportionate. This means that even if a particular case which
interferes with a Convention right is aimed at pursuing a legitimate aim (as listed in paragraph 4.1
above) this will not justify the interference if the means used to achieve the
aim are excessive in the circumstances. Any interference with a Convention
right should be carefully designed to meet the objective in question and must
not be arbitrary or unfair. Even taking all these considerations into account,
in a particular case an interference may still not be justified because the
impact on the individual or group is too severe.
5 AUTHORIZATIONS AND NOTICES
5.1 The
Law provides 2 different ways of authorizing access to communications data;
through an authorization under Article 26(3) and by a notice under Article 26(4).
An authorization would allow the relevant public authority to collect or
retrieve the data itself. A notice is given to a postal or telecommunications
operator and requires that operator to collect or retrieve the data and provide
it to the public authority which served the notice. A designated person decides
whether or not an authorization should be granted or a notice given.
5.2 In
order to illustrate, an Article 26(3) authorization may be appropriate
where:
· the
postal or telecommunications operator is not capable of collecting or
retrieving the communications data;
· it is
believed the investigation may be prejudiced if the postal or
telecommunications operator is asked to collect the data itself;
· there
is a prior agreement in place between the relevant public authority and the
postal or telecommunications operator as to the appropriate mechanisms for the
disclosure of communications data.
5.3 Except
where the Attorney General is the designated person, applications for
communications data may only be made by persons in the same public authority as
a designated person.
(a) Single
points of contact within relevant public authorities
5.4 Notices
(and where appropriate authorizations) for communications data should be
channelled through single points of contact within each public authority
(unless the exemption in paragraph 5.13 applies). This will provide for an
efficient regime, since the single points of contact
will deal with the postal or telecommunications operator on a regular basis. It
will also help the public authority to regulate itself. This will assist in
reducing the burden on the postal or telecommunications operator by such
requests. Single points of contact will be able to advise a designated person
on whether an authorization or a notice is appropriate.
5.5 The
single point of contact should be in a position to:
· where
appropriate, assess whether access to communications data is reasonably
practical for the postal or telecommunications operator;
· advise
applicants and designated persons on the practicalities of accessing different
types of communications data from different postal or telecommunications
operators;
· advise
applicants and designated persons on whether communications data falls under Article 24(a),
(b) or (c) of the Law;
· provide
safeguards for authentication;
· assess
any cost and resource implications to both the public authority and the postal
or telecommunications operator.
(b) Applications
to obtain communications data under the Law
5.6 The
application form is subject to inspection by the Commissioner and both the
applicant and the designated person may be required to justify their decisions.
Applications to obtain communications data under the Law should be made on a
standard form (paper or electronic) which must be retained by the public
authority (see Chapter 7 of this Code) and which should contain the following
minimum information:
· the
name (or designation) of the officer requesting the communications data;
· the
operation and person (if known) to which the requested data relates;
· a
description, in as much detail as possible, of the communications data
requested (there will also be a need to identify whether it is communications
data under Article 24(a), (b) or (c) of the Law);
· the
reason why obtaining the requested data is considered to be necessary for one
or more of the purposes in paragraph 4.1 above (the relevant purpose also
needs to be identified);
· an
explanation of why obtaining the data constitutes conduct proportionate to what
it seeks to achieve;
· where
appropriate, a consideration of collateral intrusion, the extent to which the
privacy of others may be affected and why that intrusion is justified; and
· the
timescale within which the communications data is required. Where the timescale
within which the material is required is any greater than routine, the
reasoning for this to be included.
5.7 The
application form should subsequently record whether access to communications
data was approved or denied, by whom and the date. Alternatively, the
application form can be marked with a cross-reference to the relevant authorization
or notice.
(c) Considerations
for designated person
5.8 A
designated person must take account of the following points, so that he or she
is in a position to justify decisions made:
· whether
the case justifies the accessing of communications data for one or more of the
purposes listed in paragraph 4.1, and why obtaining the data is necessary
for that purpose;
· whether
obtaining access to the data by the conduct authorized by the authorization, or
required of the postal or telecommunications operator in the case of a notice,
is proportionate to what is sought to be achieved. (A designated person needs
to have in mind the conduct which he or she is authorizing or requiring in each
case. In making a judgement as to proportionality, a designated person needs to
have in mind whether he or she is granting an authorization or issuing a
notice, and also what the scope of the conduct is. For example, where the
conduct covers the provision of ongoing communications data);
· where
appropriate, where accessing the communications data is likely to result in
collateral intrusion, whether the circumstances of the case still justify that
access; and
· whether
any urgent timescale is justified.
(d) Content
of an authorization
5.9 An
authorization itself can only authorize conduct to which Chapter 2 of Part 2
of the Law applies. A designated person will make a decision whether to grant
an authorization based upon the application which is made. The application form
and the authorization itself is not served upon the holder of communications
data. The authorization should be in a standard format (written or electronic)
which must be retained by the public authority (see Chapter 7 of this Code) and
must contain the following information:
· a
description of the conduct to which Chapter 2 of Part 2 of the Law applies
that is authorized;
· a
description of the required communications data;
· for
which of the purposes in paragraph 4.1 above the data is required; and
· the
name (or designation) or office of the designated person.
5.10 The authorization should also contain:
· a unique
reference number.
(e) Content
of a notice
5.11 A designated person will make a decision whether to
issue a notice based upon the application which is made. The application form
is not served upon the holder of communications data. The notice that they receive
contains only enough information to allow them to fulfil their duties under the
Law. The notice served upon the holder of the communications data should be in
a standard format (written or electronic) which must be retained by the public
authority (see Chapter 7 of this Code) and must contain the following
information:
· a
description of the required communications data;
· for
which of the purposes in paragraph 4.1 above the data is required;
· the
name (or designation) and office of the designated person; and
· the
manner in which the data should be disclosed.
5.12 The notice should also contain:
· a
unique reference number;
· where
appropriate, an indication of any urgency;
· a
statement stating that data is sought under the provisions of Chapter 2 of Part 2
of the Law, i.e. an explanation that compliance with this notice is a legal
requirement; and
· contact
details so that the veracity of the notice may be checked.
[A specimen copy of a
notice can be found at Annex A to this Code].
(f) Oral
authority (urgent cases)
5.13 An application for communications data may only be made
and approved orally, on an urgent basis, where it is necessary to obtain
communications data for the purpose set out in Article 26(2)(g) of the Law.
5.14 The fact of an oral application and approval must be
reached by the applicant and designated person at the time or as soon as
possible afterwards. In these circumstances, an authorization under Article 26(3)
of the Law must be completed (in written or electronic format) as soon as
practicable thereafter. In the case of a notice under Article 26(4) of the
Law, a designated person may make an oral request to a postal or
telecommunications operator to disclose communications data urgently, which
must be followed by a written or electronic notice to the postal or
telecommunications operator very shortly thereafter. In those urgent
situations, an Article 26(4) notice may be issued directly to the postal
or telecommunications operator, therefore relaxing the need to do so via a single
point of contact.
(g) Disclosure
of data
5.15 Notices under Article 26(4) of the Law will only
require the disclosure of data to:
· the
person giving the notice i.e. the designated person; or
· to
another specified person who must be from the same relevant public authority. In
practice, this is likely to be the single points of contact.
6 VALIDITY OF AUTHORIZATIONS AND
NOTICES
(a) Duration
6.1 Authorizations
and notices will only be valid for one month. This period will begin when the authorization
is granted or the notice given. A designated person should specify a shorter
period if that is satisfied by the request, since this may go to the
proportionality requirements. For ‘future’ communications data
disclosure may only be required of data obtained by the postal or
telecommunications operator within this period i.e. up to one month. For ‘historical’
communications data disclosure may only be required of data in the possession
of the postal or telecommunications operator. A postal or telecommunications
operator should comply with an Article 26(4) notice as soon as is
reasonably practicable. Furthermore, they will not be required to supply data
unless it is reasonably practicable to do so.
(b) Renewal
6.2 An
authorization or notice may be renewed at any time during the month it is
valid, by following the same procedure as in obtaining a fresh authorization or
notice.
6.3 A
renewed authorization or notice takes effect at the point at which the authorization
or notice it is renewing expires.
(c) Cancellation
6.4 A
designated person shall cancel a notice given under Article 26(4) of the
Law as soon as it is no longer necessary, or
the conduct is no longer proportionate to
what is sought to be achieved. The duty to cancel a notice falls on the designated
person who issued it.
6.5 The
appropriate level of official within each public authority who may cancel a
notice in the event of the designated person no longer being able to perform
this duty is to be prescribed by the Minister for Justice and Home Affairs by
Order.
6.6 As
a matter of good practice, authorizations should also be cancelled in
accordance with the procedure above.
6.7 In
the case of an Article 26(4) notice, the relevant postal or
telecommunications operator will be informed of the cancellation.
7 RETENTION OF RECORDS BY PUBLIC
AUTHORITIES
7.1 Applications,
authorizations and notices for communications data must be retained by the
relevant public authority until it has been audited by the Commissioner. The
public authority should also keep a record of the dates on which the authorization
or notice is started and cancelled.
(a) Errors
7.2 Where
any errors have occurred in the granting of authorizations or the giving of
notices, a record should be kept, and a report and explanation sent to the
Commissioner as soon as is appropriate.
7.3 Applications
must also be retained to allow for the complaints Tribunal, under Part 5
of the Law, to carry out its functions.
7.4 This
Code does not affect any other legal obligations placed on public authorities
to retain data under any other enactment.
(b) Data
protection safeguards
7.5 Communications
data, and all copies, extracts and summaries of it, must be handled and stored
securely. In addition, the requirements of the Data
Protection (Jersey) Law 2018 and its data protection principles
should be adhered to.
8 OVERSIGHT
8.1 The
Law provides for the Investigatory Powers Commissioner whose remit is to
provide independent oversight of the use of the powers contained within Part 1.
8.2 This
Code does not cover the exercise of the Commissioner’s functions. However,
it will be the duty of any person who uses the powers conferred by Chapter 2 of
Part 2 to comply with any request made by the Commissioner to provide any
information the Commissioner requires for the purposes of enabling him or her
to discharge his functions.
9 COMPLAINTS
9.1 The
Law establishes an independent Investigatory Powers Tribunal, which is made up
of a Court of Appeal Judge and 2 Jurats and is independent of the States. The
Tribunal has full powers to investigate and decide any case within its
jurisdiction.
9.2 This
Code does not cover the exercise of the Tribunal’s functions. However,
details of the relevant complaints procedure should be
readily available, for reference purposes, at public offices of those public
authorities permitted to access communications data under the provisions of
Chapter 2 of Part 2 of the Law. Where this is not possible, copies should
be made available by post or email.
ANNEX A TO DRAFT CODE OF PRACTICE
Unique reference number: [to be completed by the public authority]
[an
indication of any urgency]
NOTICE UNDER ARTICLE 26(4) OF THE
REGULATION
OF INVESTIGATORY POWERS (JERSEY) LAW 2005
REQUIRING
COMMUNICATIONS DATA
TO
BE OBTAINED AND DISCLOSED
To: [NAME
OF POSTAL OR TELECOMMUNICATIONS OPERATOR and address].
In accordance with Article 26(4)
of the Regulation of Investigatory Powers (Jersey) Law 200-, I hereby
require you –
*(a) if
not already in possession of the data to which this notice relates, to obtain
it; and {for use in those cases where you are
actually asking for data to be captured for the duration of the notice - this
should be omitted where you are only requiring the disclosure of historical
data}.
(b) to
disclose all communications data to which this notice relates, whether in your
possession or subsequently obtained by you.
Description
of communications data to which this notice relates:
[enter
details of the communications data required {distinguish here between data (a)
to be obtained if not already in the possession of the operator (omitting if
not relevant) and (b) to be disclosed - each should be described separately}].
*(a) [communications data to be obtained];
(b) [communications data to be disclosed].
This notice is valid from [start date – issue date of this notice] to [end date]. This must be no more than one month from
the date of this notice, or earlier if cancelled under Article 23(8)). This
notice may be renewed at any time before the end of the period of one month
starting with [issue date] by the giving of a
further notice.
I believe that it is necessary for
this communications data to be obtained:
[List
the purpose(s) that the communications data is required for (from Article 22(2))
- follow the statutory language exactly)].
In reaching this conclusion I have
satisfied myself that obtaining this data by the conduct required by this
notice is proportionate to what is sought to be achieved by so obtaining the
data.
You
are required to produce the said communications data to [specify the person (a name or designation must be
specified), office, rank or position to whom the data is to be disclosed]
of [public authority] for him to take away as
specified below:
[Specify the manner in which the data is to be disclosed].
Date
………………………
Designated
Person
This notice may be verified by
contacting the following:
[enter contact details i.e. of the Single Point of Contact]
*Omit
as appropriate
Schedule 4[4]
(Article 4)
Code of practice on covert
surveillance
CONTENTS
CHAPTER 1 BACKGROUND
CHAPTER 2 GENERAL
RULES ON AUTHORIZATIONS
CHAPTER 3 SPECIAL
RULES ON AUTHORIZATIONS
CHAPTER 4 AUTHORIZATION
PROCEDURES FOR DIRECTED SURVEILLANCE
CHAPTER 5 AUTHORIZATION
PROCEDURES FOR INTRUSIVE SURVEILLANCE
CHAPTER 6 AUTHORIZATION
PROCEDURES FOR ENTRY ON OR INTERFERENCE WITH PROPERTY OR WITH WIRELESS
TELEGRAPHY
CHAPTER 7 OVERSIGHT
CHAPTER 8 COMPLAINTS
Commencement
This code applies to
every authorization of covert surveillance or of entry on or interference with
property or with wireless telegraphy carried out under Part 11 of the Police
Procedures and Criminal Evidence (Jersey) Law 2003 or Part 3 of the Regulation
of Investigatory Powers (Jersey) Law 2005 by public authorities which begins on or after the day on which
this code comes into effect.
1 BACKGROUND
1.1 In
this code –
· “ECHR”
means the European Convention on Human Rights;
· “PPCE” means the Police
Procedures and Criminal Evidence (Jersey) Law 2003;
· “RIPL” means the Regulation
of Investigatory Powers (Jersey) Law 2005.
1.2 This
code of practice provides guidance on the use of covert surveillance by public
authorities under Part 3 of RIPL and on entry
on, or interference with, property (or with wireless telegraphy) under Part 11
of PPCE.
1.3 General
observation forms part of the duties of many law enforcement officers and other
public authorities and is not usually regulated by RIPL.
For example, police officers while on patrol to prevent and detect crime,
maintain public safety and prevent disorder may observe some suspicious activity
or trading standards officers may covertly observe and visit a shop to verify
the supply or level of supply of goods or services that may be liable to a
restriction. Such observation may involve the use of equipment to merely
reinforce normal sensory perception, such as binoculars, or the use of cameras,
where this does not involve systematic surveillance of an individual.
1.4 Although,
the provisions of RIPL or of this code of practice do
not normally cover the use of overt CCTV surveillance systems, since members of
the public are aware that such systems are in use, there may be occasions when
public authorities use overt CCTV systems for the purposes of a specific
investigation or operation. In such cases, authorization for intrusive or
directed surveillance may be necessary.
1.5 RIPL provides that all codes of practice relating to the
Law are admissible as evidence in criminal and civil proceedings. If any
provision of the code appears relevant to any court or tribunal considering any
such proceedings, or to the Tribunal established under the RIPL,
or to the Commissioner responsible for overseeing the powers conferred by RIPL, it must be taken into account.
General
extent of powers
1.6 Authorizations
under RIPL can be given for surveillance both inside
and outside Jersey. Authorizations for actions outside Jersey can only validate
them for the purposes of proceedings in Jersey. An authorization under Part 2
of RIPL does not take into account the requirements
of the country outside Jersey in which the investigation or operation is taking
place.
Use
of material in evidence
1.7 Material
obtained through covert surveillance may be used as evidence in criminal
proceedings. The proper authorization of surveillance should ensure the
admissibility of such evidence under the customary law, Article 76 of PPCE and the Human
Rights (Jersey) Law 2000. Furthermore, the product of the
surveillance described in this code is subject to the ordinary rules for
retention and disclosure of relevant unused material.
Directed
surveillance, intrusive surveillance and entry on or interference with property
or with wireless telegraphy
1.8 Directed
surveillance is defined in Article 32(2) of RIPL
as surveillance which is covert, but not intrusive, and undertaken:
(a) for the purposes of a specific investigation
or specific operation;
(b) in
such a manner as is likely to result in the obtaining of private information
about a person (whether or not one specifically identified for the purposes of
the investigation or operation); and
(c) otherwise
than by way of an immediate response to events or circumstances the nature of
which is such that it would not be reasonably practicable for an authorization
under Part 3 of RIPL to be sought for the
carrying out of the surveillance.
1.9 Directed
surveillance investigations or operations can only be carried out by those
public authorities who are listed in or added to Part 1 and Part 2 of
Schedule 2 to RIPL.
1.10 Intrusive surveillance is defined in Article 32(2)
of RIPL as covert surveillance that:
(a) is
carried out in relation to anything taking place on any residential premises or
in any private vehicle; and
(b) involves
the presence of an individual on the premises or in the vehicle or is carried
out by means of a surveillance device.
1.11 Applications to carry out intrusive surveillance can
only be granted by the Attorney General, an application made by one of the
officers listed in Article 37(1) of RIPL or by a
member or official to whom Article 37(7) of RIPL
applies.
1.12 Applications to enter on or interfere with property or
with wireless telegraphy can only be made to and granted by the Attorney
General on an application by an official listed in Article 101(1A) of PPCE.
2 GENERAL RULES ON
AUTHORIZATIONS
2.1 An
authorization under Part 3 of RIPL will provide
lawful authority for a public authority to carry out surveillance.
Responsibility for authorizing surveillance investigations or operations will
vary, depending on whether the authorization is for intrusive surveillance or
directed surveillance, and which public authority is involved. For the purposes
of Chapters 2 and 3 of this code the authorizing officer or the person who
makes an application to the Attorney General will be referred to as an
‘authorizing officer’.
2.2 Part 3
of RIPL does not impose a requirement on public
authorities to seek or obtain an authorization where, under RIPL,
one is available (see Article 57 of RIPL).
Nevertheless, where there is an interference by a public authority with the
right to respect for private and family life guaranteed under Article 8 of
the ECHR, and where there is no other source of lawful authority, the
consequence of not obtaining an authorization under RIPL
may be that the action is unlawful by virtue of the Human
Rights (Jersey) Law 2000.
2.3 Public
authorities are therefore strongly recommended to seek an authorization where
the surveillance is likely to interfere with a person’s Article 8
rights to privacy by obtaining private information about that person, whether
or not that person is the subject of the investigation or operation. Obtaining
an authorization will ensure that the action is carried out in accordance with
law and subject to stringent safeguards against abuse.
Necessity
and Proportionality
2.4 Obtaining
an authorization under RIPL or PPCE
will only ensure that there is a justifiable interference with an individual's
Article 8 rights if it is necessary and proportionate for these activities
to take place. RIPL first requires that the person
granting an authorization believe that the authorization is necessary in the
circumstances of the particular case for one or more of the statutory grounds
in Article 34(3) of RIPL for directed
surveillance and in Article 37(3) of RIPL for
intrusive surveillance.
2.5 Then,
if the activities are necessary, the person granting the authorization must
believe that they are proportionate to what is sought to be achieved by
carrying them out. This involves balancing the intrusiveness of the activity on
the target and others who might be affected by it against the need for the
activity in operational terms. The activity will not be proportionate if it is
excessive in the circumstances of the case or if the information which is
sought could reasonably be obtained by other less intrusive means. All such
activity should be carefully managed to meet the objective in question and must
not be arbitrary or unfair.
Collateral
Intrusion
2.6 Before
authorizing surveillance the authorizing officer should also take into account
the risk of intrusion into the privacy of persons other than those who are
directly the subjects of the investigation or operation (collateral intrusion).
Measures should be taken, wherever practicable, to avoid or minimise
unnecessary intrusion into the lives of those not directly connected with the
investigation or operation.
2.7 An
application for an authorization should include an assessment of the risk of
any collateral intrusion. The authorizing officer should take this into
account, when considering the proportionality of the surveillance.
2.8 Those
carrying out the surveillance should inform the authorizing officer if the
investigation or operation unexpectedly interferes with the privacy of
individuals who are not covered by the authorization. When the original
authorization may not be sufficient, consideration should be given to whether
the authorization needs to be amended and reauthorized or a new authorization
is required.
2.9 Any
person granting or applying for an authorization or warrant will also need to
be aware of particular sensitivities in the local community where the
surveillance is taking place and of similar activities being undertaken by
other public authorities which could impact on the deployment of surveillance.
Where the authorizing officer is the Agent of the Impôts or the Chief
Inspector of Immigration, he or she should consult a senior officer within the
States of Jersey police.
2.10 The matters in paragraphs 2.1 ‑ 2.9
must also be taken into account when applying for authorizations or warrants
for entry on or interference with property or with wireless telegraphy. In
particular they must be necessary in the circumstances of the particular case
for one of the statutory ground listed Article 101(2)(a) of PPCE, proportionate and when exercised steps should be
taken to minimise collateral intrusion.
Combined
authorizations
2.11 A single authorization may combine:
· 2 or
more different authorizations under Part 3 of RIPL;
· an
authorization under Part 3 of RIPL and an
authorization under Part 11 of PPCE.
2.12 For example, a single authorization may combine
authorizations for directed and intrusive surveillance. The provisions
applicable in the case of each of the authorizations must be considered
separately. Thus, the Chief Officer of the States of Jersey Police can
authorize the directed surveillance but the intrusive surveillance needs the
separate authorization of the Attorney General. Where an authorization for
directed surveillance or the use or conduct of a covert human intelligence
source is combined with an Attorney General’s authorization for intrusive
surveillance, the combined authorization must be issued by the Attorney
General. However, this does not preclude obtaining separate authorizations.
2.13 In cases where one agency is acting on behalf of
another, it is usually for the tasking agency to obtain or provide the
authorization. For example, where surveillance is carried out by the States
Police on behalf of Customs or a Parish authority, authorizations would be
sought by the police and granted by the Chief Officer. In a case where the
Security Service is acting in support of the police or other law enforcement
agency, in the field of serious crime, the Security Service would normally seek
authorizations.
Central
Record of all authorizations
2.14 A centrally retrievable record of all authorizations
should be held by each public authority and regularly updated whenever an
authorization is granted, renewed or cancelled. The record should be made
available to the Commissioner upon request. These records should be retained
for a period of at least 3 years from the ending of the authorization and
should contain the following information:
· the
type of authorization;
· the
date the authorization was given;
· who
gave the authorization;
· the
unique reference number (URN) of the investigation or operation;
· the
title of the investigation or operation, including a brief description and
names of subjects, if known;
· whether
the urgency provisions were used, and if so why.
· if
the authorization is renewed, when it was renewed and who authorized the
renewal, including the name and rank/grade of the authorizing officer;
· whether
the investigation or operation is likely to result in obtaining confidential
information as defined in this code of practice;
· the
date the authorization was cancelled.
2.15 In all cases, the relevant authority should maintain the
following documentation which need not form part of the centrally retrievable
record:
· a
copy of the application and a copy of the authorization together with any
supplementary documentation and notification of the approval given by the
authorizing officer;
· a
record of the period over which the surveillance has taken place;
· the
frequency of reviews prescribed by the authorizing officer;
· a
record of the result of each review of the authorization;
· a
copy of any renewal of an authorization, together with the supporting
documentation submitted when the renewal was requested;
· the
date and time when any instruction was given by the authorizing officer.
Retention
and destruction of the product
2.16 Where the product of surveillance could be relevant to
pending or future criminal or civil proceedings, it should be retained in
accordance with established disclosure requirements for a suitable further
period, commensurate to any subsequent review.
2.17 In the case of the law enforcement agencies particular
attention is drawn to the requirements of customary law and the disclosures
procedures in criminal proceedings. This requires that material which is
obtained in the course of a criminal investigation and which may be relevant to
the investigation must be recorded and retained.
2.18 There is nothing in RIPL which
prevents material obtained from properly authorized surveillance from being
used in other investigations. Each public authority must ensure that
arrangements are in place for the handling, storage and destruction of material
obtained through the use of covert surveillance. Authorizing officers must
ensure compliance with the appropriate data protection requirements and any
relevant codes of practice produced by individual authorities relating to the
handling and storage of material.
The
Intelligence Services, MOD and HM Forces
2.19 The heads of these agencies are responsible for ensuring
that arrangements exist for securing that no information is stored by the
authorities, except as necessary for the proper discharge of their functions.
They are also responsible for arrangements to control onward disclosure.
3 SPECIAL RULES ON
AUTHORIZATIONS
3.1 RIPL does not provide any special protection for
‘confidential information’. Nevertheless, particular care should be
taken in cases where the subject of the investigation or operation might reasonably
expect a high degree of privacy, or where confidential information is involved.
Confidential information consists of matters subject to legal privilege,
confidential personal information or confidential journalistic material. So,
for example, extra care should be given where, through the use of surveillance,
it would be possible to acquire knowledge of discussions between a minister of
religion and an individual relating to the latter’s spiritual welfare, or
where matters of medical or journalistic confidentiality or legal privilege may
be involved.
3.2 In
cases where it is thought that through the use of surveillance, it is likely
that confidential information will be acquired, it is recommended that advice
is sought from the Law Officers’ Department.
Communications
Subject to Legal Privilege
3.3 Article 5
of PPCE describes those matters that are subject to
legal privilege.
3.4 Legal
privilege does not apply to communications made with the intention of
furthering a criminal purpose (whether the lawyer is acting unwittingly or
culpably). Legally privileged communications will lose their protection if
there are grounds to believe, for example, that the professional legal adviser
is intending to hold or use them for a criminal purpose. But privilege is not lost
if a professional legal adviser is properly advising a person who is suspected
of having committed a criminal offence. The concept of legal privilege applies
to the provision of professional legal advice by any individual, agency or
organisation qualified to do so.
3.5 RIPL does not provide any special protection for legally
privileged information. Nevertheless, such information is particularly
sensitive and surveillance which acquires such material may engage Article 6
of the ECHR (right to a fair trial) as well as Article 8. Legally
privileged information obtained by surveillance is extremely unlikely ever to
be admissible as evidence in criminal proceedings. Moreover, the mere fact that
such surveillance has taken place may lead to any related criminal proceedings
being stayed as an abuse of process. Accordingly, action which may lead to such
information being acquired is subject to additional safeguards under this code.
3.6 In
general, an application for surveillance which is likely to result in the acquisition
of legally privileged information should only be made in exceptional and
compelling circumstances. Full regard should be had to the particular
proportionality issues such surveillance raises. The application should
include, in addition to the reasons why it is considered necessary for the
surveillance to take place, an assessment of how likely it is that information
subject to legal privilege will be acquired. In addition, the application
should clearly state whether the purpose (or one of the purposes) of the
surveillance is to obtain legally privileged information.
3.7 This
assessment will be taken into account by the authorizing officer in deciding
whether the proposed surveillance is necessary and proportionate under Article 34
of RIPL for directed surveillance and under Article 35
for intrusive surveillance. The authorizing officer may require regular
reporting so as to be able to decide whether the authorization should continue.
In those cases where legally privileged information has been acquired and
retained, the matter should be reported to the Law Officers’ Department
and to the Commissioner during his or her next inspection and the material be
made available to the Commissioner if requested.
3.8 A
substantial proportion of the communications between a lawyer and his or her
client(s) may be subject to legal privilege. Therefore, any case where a lawyer
is the subject of an investigation or operation should be notified to the
Commissioner and any material which has been retained should be made available
to the Commissioner if requested.
3.9 Where
there is any doubt as to the handling and dissemination of information which
may be subject to legal privilege, advice should be sought from a legal adviser
within the relevant public authority before any further dissemination of the
material takes place. Similar advice should also be sought where there is doubt
over whether information is not subject to legal privilege due to the “in
furtherance of a criminal purpose” exception. The retention of legally
privileged information, or its dissemination to an outside body, should be
accompanied by a clear warning that it is subject to legal privilege. It should
be safeguarded by taking reasonable steps to ensure there is no possibility of
it becoming available, or its contents becoming known, to any person whose
possession of it might prejudice any criminal or civil proceedings related to
the information. Any dissemination of legally privileged material to an outside
body should be notified to the Law Officers’ Department and to the
Commissioner during his or her next inspection.
Communications
involving Confidential Personal Information and Confidential Journalistic
Material
3.10 Similar consideration must also be given to
authorizations that involve confidential personal information and confidential
journalistic material. In those cases where confidential personal information
and confidential journalistic material has been acquired and retained, the
matter should be reported to the Law Officers’ Department and to the
Commissioner during his or her next inspection and the material be made
available to the Commissioner if requested.
3.11 Confidential personal information is information held in
confidence relating to the physical or mental health or spiritual counselling
concerning an individual (whether living or dead) who can be identified from
it. Such information, which can include both oral and written communications,
is held in confidence if it is held subject to an express or implied
undertaking to hold it in confidence or it is subject to a restriction on
disclosure or an obligation of confidentiality contained in existing
legislation. Examples might include consultations between a health professional
and a patient, or information from a patient’s medical records.
3.12 Spiritual counselling means conversations between an
individual and a Minister of Religion acting in his or her official capacity,
where the individual being counselled is seeking or the Minister is imparting
forgiveness, absolution or the resolution of conscience with the authority of
the Divine Being(s) of their faith.
3.13 Confidential journalistic material includes material
acquired or created for the purposes of journalism and held subject to an
undertaking to hold it in confidence, as well as communications resulting in
information being acquired for the purposes of journalism and held subject to
such an undertaking.
4 AUTHORIZATION PROCEDURES
FOR DIRECTED SURVEILLANCE
4.1 Directed
surveillance is defined in Article 32(1) of RIPL
as surveillance which is covert, but not intrusive, and undertaken:
(a) for
the purposes of a specific investigation or specific operation;
(b) in
such a manner as is likely to result in the obtaining of private information
about a person (whether or not one specifically identified for the purposes of
the investigation or operation); and
(c) otherwise
than by way of an immediate response to events or circumstances the nature of
which is such that it would not be reasonably practicable for an authorization
under Part 3 of RIPL to be sought for the
carrying out of the surveillance.
4.2 Covert
surveillance is defined in Article 32(8)(a) of RIPL
as any surveillance which is carried out in a manner calculated to ensure that
the persons subject to the surveillance are unaware that it is or may be taking
place.
4.3 Private
information is defined in Article 32(9) of RIPL
as including any information relating to a person’s private or family
life. The concept of private information should be broadly interpreted to
include an individual’s private or personal relationship with others.
Family life should be treated as extending beyond the formal relationships
created by marriage.
4.4 Directed
surveillance does not include covert surveillance carried out by way of an
immediate response to events or circumstances which, by their very nature,
could not have been foreseen. For example, a police officer would not require
an authorization to conceal himself or herself and observe a suspicious person
that the officer came across in the course of a patrol.
4.5 By
virtue of Article 31(3) of RIPL, surveillance
includes the interception of postal and telephone communications where the
sender or recipient consents to the reading of or listening to or recording of
the communication (as the case may be). For further details see
paragraphs 4.30 ‑ 4.32 of this code.
4.6 Surveillance
in residential premises or in private vehicles is defined as intrusive
surveillance in Article 32(2) of RIPL and is
dealt with in Chapter 5 of this code. However, where surveillance is carried
out by a device designed or adapted principally for the purpose of providing
information about the location of a vehicle, the activity is directed
surveillance and should be authorized accordingly.
4.7 Directed
surveillance does not include entry on or interference with property or with
wireless telegraphy. These activities are subject to a separate regime of
authorization or warranty, as set out in Chapter 6 of this code.
4.8 Directed
surveillance includes covert surveillance within office premises, (as defined
in paragraph 6.31 of this code). Authorizing officers are reminded that
confidential information should be afforded an enhanced level of protection.
Authorization Procedures
4.9 Under Article 34(3)
of RIPL an authorization for directed surveillance
may be granted by a “designated person” (the authorizing officer)
where he or she believes that the authorization is necessary in the
circumstances of the particular case:
· in
the interests of national security,;
· for
the purpose of preventing and detecting crime or of preventing disorder;
· in
the interests of the economic well-being of Jersey;
· in
the interests of public safety;
· for
the purpose of protecting public health;
· for
the purpose of assessing or collecting any tax, duty, levy or other imposition,
contribution or charge payable to a government department; or
· for
any other purpose prescribed by an Order made by the Minister for Justice and
Home Affairs.
4.10 The authorizing officer must also believe that the surveillance
is proportionate to what it seeks to achieve.
4.11 The public authorities entitled to apply for and the
authorizing officers entitled to authorize directed surveillance are listed in
Schedule 2 to RIPL. Responsibility for
authorizing the carrying out of directed surveillance rests with the
authorizing officer and requires the personal authority of the authorizing
officer. Where an authorization for directed surveillance is combined with an
Attorney General’s authorization for intrusive surveillance, the combined
authorization must be issued by the Attorney General.
4.12 The authorizing officer must give authorizations in
writing, except that in urgent cases, they may be given orally by the
authorizing officer. In such cases, a statement that the authorizing officer
has expressly authorized the action should be recorded in writing by the
applicant as soon as is reasonably practicable.
4.13 A case is not normally to be regarded as urgent unless
the time that would elapse before the authorizing officer was available to
grant the authorization would, in the judgement of the person giving the
authorization, be likely to endanger life or jeopardise the investigation or
operation for which the authorization was being given. An authorization is not
to be regarded as urgent where the need for an authorization has been neglected
or the urgency is of the authorizing officer’s own making.
4.14 Authorizing officers should not be responsible for
authorizing investigations or operations in which they are directly involved,
although it is recognized that this may sometimes be unavoidable, especially in
the case of small organizations. Where an authorizing officer authorizes such
an investigation or operation the central record of authorizations (see
paragraphs 2.14 -2.15) should highlight this and the attention of the
Commissioner should be invited to it.
4.15 Authorizing officers within the Police, Customs and
Immigration may only grant authorizations on application by a member of the
force or their Department as the case may be.
Information
to be provided in applications for authorization
4.16 A written application for authorization for directed
surveillance should describe any conduct to be authorized and the purpose of
the investigation or operation. The application should also include:
· the
reasons why the authorization is necessary in the particular case and on the
grounds (e.g. for the purpose of preventing or detecting crime) listed in Article 34(3)
of RIPL;
· the
reasons why the surveillance is considered proportionate to what it seeks to
achieve;
· the
nature of the surveillance;
· the
identities, where known, of those to be the subject of the surveillance;
· an
explanation of the information which it is desired to obtain as a result of the
surveillance;
· the
details of any potential collateral intrusion and why the intrusion is
justified;
· the
details of any confidential information that is likely to be obtained as a
consequence of the surveillance.
· the
level of authority required (or recommended where that is different) for the
surveillance; and
· a
subsequent record of whether authority was given or refused, by whom and the
time and date.
4.17 Additionally, in urgent cases, the authorization should
record (as the case may be) the reasons why it was not reasonably practicable
for the application to be considered by the authorizing officer and the reasons
why the authorizing officer or the officer entitled to act in urgent cases
considered the case so urgent that an oral instead of a written authorization
was given; and/or
4.18 Where the authorization is oral, the detail referred to
above should be recorded in writing by the applicant as soon as reasonably
practicable.
Duration of authorizations
4.19 A written authorization granted by an authorizing officer
will cease to have effect (unless renewed) at the end of a period of 3 months
beginning with the day on which it took effect.
4.20 Urgent oral authorizations or written authorizations
granted by a person who is entitled to act only in urgent cases will, unless
renewed, cease to have effect after 72 hours, beginning with the time when the
authorization was granted or renewed.
Reviews
4.21 Regular reviews of authorizations should be undertaken
to assess the need for the surveillance to continue. The results of a review
should be recorded on the central record of authorizations (see
paragraphs 2.14 - 2.15). Particular attention is drawn to the need to
review authorizations frequently where the surveillance provides access to
confidential information or involves collateral intrusion.
4.22 In each case the authorizing officer within each public
authority should determine how often a review should take place. This should be
as frequently as is considered necessary and practicable.
Renewals
4.23 If at any time before an authorization would cease to
have effect, the authorizing officer considers it necessary for the
authorization to continue for the purpose for which it was given, he may renew
it in writing for a further period of 3 months. Renewals may also be granted
orally in urgent cases and last for a period of 72 hours.
4.24 A renewal takes effect at the time at which, or day on
which the authorization would have ceased to have effect but for the renewal.
An application for renewal should not be made until shortly before the
authorization period is drawing to an end. Any person who would be entitled to
grant a new authorization can renew an authorization. Authorizations may be
renewed more than once, provided they continue to meet the criteria for
authorization.
4.25 All applications for the renewal of an authorization for
directed surveillance should record:
· whether
this is the first renewal or every occasion on which the authorization has been
renewed previously;
· any
significant changes to the information in paragraph 4.16;
· the
reasons why it is necessary to continue with the directed surveillance;
· the
content and value to the investigation or operation of the information so far
obtained by the surveillance;
· the
results of regular reviews of the investigation or operation.
4.26 Authorizations may be renewed more than once, if
necessary, and the renewal should be kept/recorded as part of the central
record of authorizations (see paragraphs 2.14 - 2.15).
Cancellations
4.27 The authorizing officer who granted
or last renewed the authorization (or his or her deputy) must cancel it if the
officer is satisfied that the directed surveillance no longer meets the
criteria upon which it was authorized. Where the authorizing officer is no
longer available, this duty will fall on the person who is acting as
authorizing officer or has taken over the rôle
of authorizing officer.
Ceasing
of surveillance activity
4.28 As soon as the decision is taken that directed
surveillance should be discontinued, the instruction must be given to those
involved to stop all surveillance of the subject(s). The date and time when
such an instruction was given should be recorded in the central record of
authorizations (see paragraphs 2.14 - 2.15) and the notification of cancellation
where relevant.
ADDITIONAL
RULES
Recording
of telephone conversations
4.29 Subject to paragraph 4.30, the interception of
communications sent by post or by means of public telecommunications systems or
private telecommunications systems attached to the public network may be
authorized only by the Attorney General, in accordance with the terms of Part 1
of RIPL. Nothing in this code should be taken as
granting dispensation from the requirements of that Part of RIPL.
4.30 Part 2 of RIPL provides
certain exceptions to the rule that interception of telephone conversations
must be warranted under that Part. This includes the situation in which one
party to the communication consents to the interception, it may be authorized
in accordance with Article 31(3) of RIPL
provided that there is no interception warrant authorizing the interception. In
such cases, the interception is treated as directed surveillance.
4.31 The use of a surveillance device should not be ruled out
simply because it may incidentally pick up one or both ends of a telephone
conversation, and any such product can be treated as having been lawfully
obtained. However, its use would not be appropriate where the sole purpose is
to overhear speech which, at the time of monitoring, is being transmitted by a
telecommunications system. In such cases an application should be made for an
interception of communication warrant under Article 10 of RIPL.
5 AUTHORIZATION PROCEDURES
FOR INTRUSIVE SURVEILLANCE
5.1 Intrusive
surveillance is defined in Article 32(2) of RIPL
as covert surveillance that:
(a) is
carried out in relation to anything taking place on any residential premises or
in any private vehicle; and
(b) involves
the presence of an individual on the premises or in the vehicle or is carried
out by means of a surveillance device.
5.2 Covert
surveillance is defined in Article 32(9)(a) of RIPL
as any surveillance which is carried out in a manner calculated to ensure that
the persons subject to the surveillance are unaware that it is or may be taking
place.
5.3 Where
surveillance is carried out in relation to anything taking place on any
residential premises or in any private vehicle by means of a device, without
that device being present on the premises, or in the vehicle, it is not
intrusive unless the device consistently provides information of the same
quality and detail as might be expected to be obtained from a device actually
present on the premises or in the vehicle. Thus, an observation post outside
premises, which provides a limited view and no sound of what is happening
inside the premises would not be considered as intrusive surveillance.
5.4 Residential
premises are defined in Article 30(1) of RIPL.
The definition includes hotel rooms, bedrooms in barracks, and police and
prison cells but not any common area to which a person is allowed access in
connection with his or her occupation of such accommodation e.g. a hotel lounge.
5.5 A
private vehicle is defined in Article 30(1) of RIPL
as any vehicle which is used primarily for the private purposes of the person
who owns it or of a person otherwise having the right to use it. A person does
not have a right to use a motor vehicle if his or her right to use it derives
only from the person’s having paid, or undertaken to pay, for the use of
the vehicle and its driver for a particular journey.
5.6 In
many cases, a surveillance investigation or operation may involve both
intrusive surveillance and entry on or interference with property or with
wireless telegraphy. In such cases, both activities need authorization. This
can be done as a combined authorization (see paragraph 2.11).
5.7 An
authorization for intrusive surveillance may be issued by the Attorney General.
5.8 All
authorizations require the personal authority of the Attorney General. Any
members or officials of the intelligence services, the Ministry of Defence and
HM Forces can apply to the Attorney General for an intrusive surveillance
warrant. Under Article 37(2) of RIPL the Attorney
General may not authorize intrusive surveillance unless he or she
believes –
(a) that
the authorization is necessary in the circumstances of the particular case on
the grounds that it is:
· in
the interests of national security;
· for
the purpose of preventing or detecting serious crime; or
· in
the interests of the economic well-being of Jersey;
and
(b) that
the surveillance is proportionate to what it seeks to achieve.
5.9 A
factor which must be taken into account in deciding whether an authorization is
necessary and proportionate is whether the information which it is thought
necessary to obtain by means of the intrusive surveillance could reasonably be
obtained by other less intrusive means.
Authorizations
Procedures for Police, Customs and Excise and Immigration
5.10 The Attorney General will generally give authorizations
in writing. However, in urgent cases, they may be given orally. In an urgent
oral case, a statement that the Attorney General has expressly authorized the
conduct should be recorded in writing by the applicant as soon as is reasonably
practicable.
5.11 A case is not normally to be regarded as urgent unless
the time that would elapse before the Attorney General was available to grant
the authorization would, in the judgement of the person giving the
authorization, be likely to endanger life or jeopardise the investigation or
operation for which the authorization was being given. An authorization is not
to be regarded as urgent where the need for an authorization has been neglected
or the urgency is of the authorizing officer’s own making.
5.12 Applications should be in writing and describe the
conduct to be authorized and the purpose of the investigation or operation. The
application should specify:
· the
reasons why the authorization is necessary in the particular case and on the
grounds (e.g. for the purpose of preventing or detecting serious crime) listed in
Article 37(3) of RIPL;
· the
reasons why the surveillance is considered proportionate to what it seeks to
achieve;
· the
nature of the surveillance;
· the
residential premises or private vehicle in relation to which the surveillance
will take place;
· the
identities, where known, of those to be the subject of the surveillance;
· an
explanation of the information which it is desired to obtain as a result of the
surveillance;
· details
of any potential collateral intrusion and why the intrusion is justified;
· details
of any confidential information that is likely to be obtained as a consequence
of the surveillance.
· a
subsequent record should be made of whether authority was given or refused, and
the time and date.
5.13 Additionally, in urgent cases, the authorization should
record the reasons why the Attorney General considered the case so urgent that
an oral instead of a written authorization was given.
5.14 Where the application is oral, the detail referred to
above should be recorded in writing as soon as reasonably practicable.
Notifications
to Investigatory Powers Commissioner
5.15 The Attorney General must give notice in writing, at
least every 12 months, of the grant, renewal or cancellation of an
authorization to the Commissioner, in accordance with whatever arrangements
have been made by the Commissioner.
5.16 In respect of urgent cases, the notification must
specify the grounds on which the case was believed to be one of urgency. The
urgency provisions should not be used routinely.
All intrusive surveillance authorizations
5.17 Paragraphs 5.18 to 5.27 deal with the duration, renewal
and cancellation of authorizations. Unless otherwise specified the guidance
below applies to all authorizations.
Duration
of Authorizations
5.18 A written authorization granted by the Attorney General,
will cease to have effect (unless renewed) at the end of a period of 3 months, beginning with the day on which it took
effect.
5.19 Oral authorizations given in urgent cases by the
Attorney General will cease to have effect (unless renewed) at the end of the
period of 72 hours beginning with the time when
they took effect.
Attorney General’s intelligence services authorizations
5.20 A warrant issued by the Attorney General will cease to
have effect at the end of a period of 3 months beginning with the day on which
it was issued.
Renewals
5.21 If at any time before an authorization expires the
Attorney General considers the authorization should continue to have effect for
the purpose for which it was issued, the Attorney General may renew it in
writing for a further period of 3 months.
5.22 Subject to paragraph 5.36, if at any time before
the day on which the Attorney General’s authorization expires, the
Attorney General considers it necessary for the warrant to be renewed for the
purpose for which it was issued, he or she may renew it in writing for a
further period of 3 months, beginning with the day on which it would have
ceased to have effect, but for the renewal.
Intelligence services authorizations
5.23 All applications for a
renewal of an authorization or warrant should record:
· whether
this is the first renewal or every occasion on which the warrant/authorization
has been renewed previously;
· any
significant changes to the information listed in paragraph 5.12;
· the
reasons why it is necessary to continue with the intrusive surveillance;
· the
content and value to the investigation or operation of the product so far
obtained by the surveillance;
· the
results of regular reviews of the investigation or operation.
5.24 Authorizations may be renewed more than once, if
necessary, and the renewal should be kept/recorded as part of the central
record of authorizations (see paragraphs 2.14 - 2.15).
Reviews
5.25 Regular reviews of authorizations should be undertaken
to assess the need for the surveillance to continue. The results of a review
should be recorded on the central record of authorizations (see
paragraphs 2.14 - 2.15). Particular attention is drawn to the need to
review authorizations frequently where the intrusive surveillance provides
access to confidential information or involves collateral intrusion.
5.26 The member or official who made the application to the
Attorney General should determine how often a review should take place. This
should be as frequently as is considered necessary and practicable.
Cancellations
5.27 The Attorney General shall cancel an authorization if he
or she is satisfied that the surveillance no longer meets the criteria upon
which it was authorized.
Ceasing
of surveillance activity
5.28 As soon as the decision is taken that the intrusive
surveillance should be discontinued, instructions must be given to those
involved to stop all surveillance of the subject(s). The date and time when
such an instruction was given should be recorded in the central record of
authorizations (see paragraphs 2.14 - 2.15) and the notification of
cancellation where relevant.
6 AUTHORIZATION PROCEDURES
FOR ENTRY ON OR INTERFERENCE WITH PROPERTY OR WITH WIRELESS TELEGRAPHY
6.1 Part 11
of PPCE provides lawful authority for entry on or
interference with property or with wireless telegraphy by the police,
intelligence services, customs and excise, and immigration.
6.2 In
many cases a covert surveillance operation may involve both intrusive
surveillance and entry on or interference with property or with wireless
telegraphy. This can be done as a combined authorization, although the criteria
for authorization of each activity must be considered separately (see
paragraph 2.11).
Authorizations
for entry on or interference with property or with wireless telegraphy by the
police, Customs and Immigration
6.3 Responsibility
for such authorizations rests with the Attorney
General.
6.4 Authorizations
under PPCE may not be necessary where the public
authority is acting with the consent of a person able to give permission in
respect of relevant property, although consideration should still be given to
the need to obtain an authorization under Part 3 of RIPL.
6.5 In
giving an authorization for entry on or interference with property or with
wireless telegraphy under Article 101(2) of PPCE,
the Attorney General must believe that:
· it is
necessary for the action specified to be taken for the purpose of preventing or
detecting serious crime in the interests of national security; and
· that
the taking of the action is proportionate to what the action seeks to achieve.
6.6 The
Attorney General must take into account whether what it is thought necessary to
achieve by the authorized conduct could reasonably be achieved by other means.
6.7 Any
person applying for an authorization or warrant to enter on or interfere with
property or with wireless telegraphy will also need to be aware of particular
sensitivities in the local community where the entry or interference is taking
place and of similar activities being undertaken by other public authorities
which could impact on the deployment.
Authorization
procedures for entry on or interference with property or with wireless
telegraphy by the police, Customs and Immigration
6.8 Authorizations
will be given in writing by the Attorney General. However, in urgent cases,
they may be given orally. In such cases, a statement that the Attorney General
has expressly authorized the action should be recorded in writing by the
applicant as soon as is reasonably practicable. This should be done by the
person with whom the Attorney General spoke.
6.9 Applications
to the Attorney General for authorization must be made in writing by the Chief
Officer, Agent of the Impôts or Chief Inspector of Immigration and should
specify:
· the
identity or identities of those to be targeted (where known);
· the
property which the entry or interference with will affect;
· the
identity of individuals and/or categories of people, where known, who are
likely to be affected by collateral intrusion;
· details
of the offence planned or committed;
· details
of the intrusive surveillance involved;
· how
the authorization criteria (as set out in paragraphs 6.6 and 6.7) have
been met;
· any
action which may be necessary to retrieve any equipment used in the
surveillance;
· in
case of a renewal, the results obtained so far, or a full explanation of the
failure to obtain any results; and
· whether
an authorization was given or refused, by whom and the time and date.
6.10 Additionally, in urgent cases, the authorization should
record the reasons why the applying officer considered the case so urgent that
an oral instead of a written authorization was given.
6.11 Where the application is oral, the information referred
to above should be recorded in writing by the applicant as soon as reasonably
practicable.
Notifications
to Surveillance Commissioners
6.12 The Attorney General must give notice in writing when he
or she grants, renews or cancels an authorization to the Commissioner, at least
every 12 months, in accordance with arrangements made by the Commissioner.
Duration of authorizations
6.13 Written authorizations will cease to have effect at the
end of a period of 3 months beginning with the day on which they took effect.
6.14 Oral authorizations given in urgent cases will cease at
the end of the period of 72 hours beginning
with the time when they took effect.
Renewals
6.15 If at any time before the day on which an authorization
expires the Attorney General considers the authorization should continue to
have effect for the purpose for which it was issued, the Attorney General may
renew it in writing for a period of 3 months beginning with the day on which
the authorization would otherwise have ceased to have effect. Authorizations
may be renewed more than once, if necessary, and the renewal should be recorded
on the authorization record (see paragraph 6.27).
6.16 The Commissioner must be notified of renewals of
authorizations.
Reviews
6.17 The Attorney General should ensure regular reviews are
made of authorizations, to assess the need for the entry on or interference
with property or with wireless telegraphy to continue. This should be recorded
on the authorization record (see paragraph 6.27). The Attorney General
should determine how often a review should take place when giving an
authorization and who should undertake it. This can be delegated to a senior
officer of the authority that made the application. This should be as
frequently as is considered necessary and practicable and at no greater
interval than one month. Particular attention is drawn to the need to review authorizations
and renewals regularly and frequently where the entry on or interference with
property or with wireless telegraphy provides access to confidential
information or involves collateral intrusion.
Cancellations
6.18 The Attorney General must cancel an authorization, or
the person who made the application to the Attorney General must apply for its
cancellation, if he or she is satisfied that the authorization no longer meets
the criteria upon which it was authorized.
6.19 The Commissioner must be notified of cancellations of
authorizations.
6.20 The Tribunal has the power to cancel an authorization if
satisfied that, at any time after an authorization was given or renewed, there
were no reasonable grounds for believing the matters set out in paragraphs 6.5
and 6.6. In such circumstances, the Tribunal may order the destruction of
records, in whole or in part, other than any that are required for pending
criminal or civil proceedings.
Authorization
record
6.21 An authorization record should be created which records:
· the
time and date when an authorization is given;
· whether
an authorization is in written or oral form;
· the
time and date when it was notified to the Commissioner;
The authorization record
should also record:
· every
occasion when entry on or interference with property or with wireless
telegraphy has occurred;
· the
result of periodic reviews of the authorization;
· the
date of every renewal; and
· it
should record the time and date when any instruction was given by the
authorizing officer to cease the interference with property or with wireless
telegraphy.
Ceasing
of entry on or interference with property or with wireless telegraphy
6.22 Once an authorization or renewal expires or is cancelled
or quashed, the Attorney General must immediately instruct those carrying out
the surveillance to cease all the actions authorized for the entry on or
interference with property or with wireless telegraphy. The time and date when
such an instruction was given should be recorded on the authorization record
(see paragraph 6.21).
Retrieval
of equipment
6.23 Where the Tribunal quashes, or cancels, an authorization
or renewal, it will, if there are reasonable grounds for doing so, order that
the authorization remain effective for a specified period, to enable officers
to retrieve anything left on the property by virtue of the authorization. It
can only do so if the authorization or renewal makes provision for this.
Special
situations
6.24 In certain cases, special care must be used in
considering or granting an authorization for entry on or interference with
property (pursuant to Part 11 of PPCE). These
are cases where it is believed that:
· any
of the property specified in the authorization:
· is
used wholly or mainly as a dwelling or a bedroom in a hotel; or
· constitutes
office premises; or
· the
action authorized is likely to result in any person acquiring knowledge of:
· matters
subject to legal privilege;
· confidential
personal information; or
· confidential
journalistic material.
6.25 Office premises are defined as any building or part of a
building whose sole or principal use is as an office or for office purposes
(which means purposes of administration, clerical work, handling money and
telephone or telegraphic operation).
Authorizations
for entry on or interference with property or with wireless telegraphy by the
intelligence services
6.26 Before granting a warrant, the Attorney General must:
· think
it necessary for the action to be taken for the purpose of assisting the
relevant agency in carrying out its functions;
· be
satisfied that the taking of the action is proportionate to what the action
seeks to achieve;
· take
into account in deciding whether an authorization is necessary and
proportionate is whether the information which it is thought necessary to
obtain by the conduct authorized by the warrant could reasonably be obtained by
other means.
6.27 An application for a warrant must be made by a member of
the intelligence services for the taking of action in relation to that agency.
In addition, the Security Service may make an application for a warrant to act
on behalf of the Secret Intelligence Service (SIS) and the Governments
Communication Headquarters (GCHQ). SIS and GCHQ may not be granted a warrant
for action in support of the prevention or detection of serious crime which
relates to property in Jersey.
6.28 A warrant shall, unless renewed, cease to have effect at
the end of the period of 3 months beginning
with the day on which it was issued. In any other case, at the end of the
period ending with the second working day
following that day.
6.29 If at any time before the day on which a warrant would
cease to have effect the Attorney General considers it necessary for the
warrant to continue to have effect for the purpose for which it was issued, the
Attorney General may by an instrument under his or her hand renew it for a
period of 3 months beginning with that day. The
Attorney General shall cancel a warrant if he or she is satisfied that the
action authorized by it is no longer necessary.
6.30 The intelligence services should provide the same
information as the police, as and where appropriate, when making applications,
requests for renewal and requests for cancellation of property warrants.
Retrieval
of equipment
6.31 Because of the time it can take to remove equipment from
a person’s property it may also be necessary to renew a property warrant
in order to complete the retrieval. Applications to the Attorney General for
renewal should state why it is being or has been closed down, why it has not
been possible to remove the equipment and any timescales for removal, where
known.
7 OVERSIGHT BY COMMISSIONERS
7.1 PPCE and RIPL require the
Commissioner to keep under review (with the assistance of the Assistant
Commissioners) the performance of functions under Part 11 PPCE and Part 3 of RIPL.
7.2 This
code does not cover the exercise of any of the Commissioners’ functions.
It is the duty of any person who uses these powers to comply with any request
made by a Commissioner to disclose or provide any information the Commissioner
requires for the purpose of enabling the Commissioner to carry out his or her
functions.
7.3 References
in this code to the performance of review functions by the Commissioner apply
also to any Inspectors and other members of staff to whom such functions have
been delegated.
8 COMPLAINTS
8.1 RIPL establishes an independent Tribunal. This Tribunal
will be made up of a judge of the Court of Appeal and 2 Jurats and is
independent of the States. The Tribunal has powers to investigate and decide
any case within its jurisdiction.
This code does not cover
the exercise of the Tribunal’s functions. Details of the relevant complaints procedure can be obtained from the following
address:
Judicial Greffier
Morier House
St Helier
Jersey
JE1 1DD
Schedule 5[5]
(Article 5)
Code of practice on covert
human intelligence sources
CONTENTS
CHAPTER 1 BACKGROUND
CHAPTER 2 GENERAL
RULES ON AUTHORIZATIONS
CHAPTER 3 SPECIAL
RULES ON AUTHORIZATIONS
CHAPTER 4 AUTHORIZATION
PROCEDURES FOR COVERT HUMAN INTELLIGENCE SOURCES
CHAPTER 5 OVERSIGHT
CHAPTER 6 COMPLAINTS
Commencement
This code applies to
every authorization of the use or conduct by public authorities of covert human
intelligence sources carried out under Part 3 of the Regulation
of Investigatory Powers (Jersey) Law 2005 which begins on or after the day on which this code comes into
effect.
1 BACKGROUND - GENERAL -
COMMENCEMENT
1.1 In
this code –
· “ECHR”
means the European Convention on Human Rights;
· “PPCE” means the Police
Procedures and Criminal Evidence (Jersey) Law 2003;
· “Law” means the Regulation
of Investigatory Powers (Jersey) Law 2005;
1.2 This
Code of practice provides guidance on the authorization of the use or conduct
of covert human intelligence sources (“a source”) by public
authorities under Part 3 of the Law and it applies to every such
authorization or the use or conduct by 3 public authorities of covert human
intelligence sources carried out under the Law which begins on or after the day
on which this Code comes into effect.
1.3 The
provisions of the Law are not intended to apply in circumstances where members
of the public volunteer information to the police or other authorities, as part
of their normal civic duties, or to contact numbers set up to receive
information (such as Crimestoppers, Customs Confidential, the Anti Terrorist Hotline, or the Security Service Public
Telephone Number). Members of the public acting in this way would not generally
be regarded as sources.
1.4 Neither
Part 3 of the Law or this code of practice is intended to affect the
practices and procedures surrounding criminal participation of sources.
1.5 The
Law provides that all codes of practice relating to the Law are admissible as
evidence in criminal and civil proceedings. If any provision of the code
appears relevant to any court or tribunal considering any such proceedings, or
to the Investigatory Powers Tribunal established under the Law, or to the
Commissioner responsible for overseeing the powers conferred by the Law, it
must be taken into account.
General
extent of powers
1.6 Authorizations
can be given for the use or conduct of a source both inside and outside Jersey.
Authorizations for actions outside Jersey can only validate them for the
purposes of proceedings in Jersey. An authorization under Part 3 of the
Law does not take into account the requirements of the country outside Jersey
in which the investigation or operation is taking place.
1.7 Members
of foreign law enforcement or other agencies or sources of those agencies may
be authorized under the Law in Jersey in support of domestic and international
investigations.
Use
of material in evidence
1.8 Material
obtained from a source may be used as evidence in criminal proceedings. The
proper authorization of a source should ensure the suitability of such evidence
under the customary law, Article 76 of PPCE and
the Human
Rights (Jersey) Law 2000. Furthermore, the product obtained by
a source described in this code is subject to the ordinary rules for retention
and disclosure of material, where those rules apply to the law enforcement body
in question. There are also well-established legal procedures that will protect
the identity of a source from disclosure in such circumstances.
2 GENERAL RULES ON
AUTHORIZATIONS
2.1 An
authorization under Part 3 of the Law will provide lawful authority for
the use of a source. Responsibility for giving the authorization will depend on
which public authority is responsible for the source.
2.2 Part 3
of the Law does not impose a requirement on public authorities to seek or
obtain an authorization where, under the Law, one is available (see Article 57
of the Law). Nevertheless, where there is an interference by a public authority
with the right to respect for private and family life guaranteed under Article 8
of the ECHR, and where there is no other lawful authority, the consequences of
not obtaining an authorization under the Law may be that the action is unlawful
by virtue of Article 7 of the Human
Rights (Jersey) Law 2000.
2.3 Public
authorities are therefore strongly recommended to seek an authorization where
the use or conduct of a source is likely to interfere with a person's Article 8
rights to privacy by obtaining information from or about a person, whether or
not that person is the subject of the investigation or operation. Obtaining an
authorization will ensure that the action is carried out in accordance with law
and subject to stringent safeguards against abuse.
Necessity
and Proportionality
2.4 Obtaining
an authorization under the Law will only ensure that the authorized use or
conduct of a source is a justifiable interference with an individual's Article 8
rights if it is necessary and proportionate for the source to be used. The Law
first requires that the person granting an authorization must believe that the
authorization is necessary in the circumstances of the particular case for one
or more of the statutory grounds in Article 35(3) of the Law.
2.5 Then,
if the use of the source is necessary, the person granting the authorization
must believe that the use of a source is proportionate to what is sought to be
achieved by the conduct and use of that source. This involves balancing the
intrusiveness of the use of the source on the target and others who might be
affected by it against the need for the source to be used in operational terms.
The use of a source will not be proportionate if it is excessive in the
circumstances of the case or if the information which is sought could
reasonably be obtained by other less intrusive means. The use of a source
should be carefully managed to meet the objective in question and sources must
not be used in an arbitrary or unfair way.
Collateral
Intrusion
2.6 Before
authorizing the use or conduct of a source, the authorizing officer should also
take into account the risk of intrusion into the privacy of persons other than
those who are directly the subjects of the operation or investigation
(collateral intrusion). Measures should be taken, wherever practicable, to
avoid unnecessary intrusion into the lives of those not directly connected with
the operation.
2.7 An
application for an authorization should include an assessment of the risk of
any collateral intrusion. The authorizing officer should take this into
account, when considering the proportionality of the use and conduct of a
source.
2.8 Those
tasking a source should inform the authorizing officer if the investigation or
operation unexpectedly interferes with the privacy of individuals who are not
covered by the authorization. When the original authorization may not be
sufficient, consideration should be given to whether the authorization needs to
be amended and reauthorized or a new authorization is required.
2.9 Any
person granting or applying for an authorization will also need to be aware of
any particular sensitivities in the local community where the source is being
used and of similar activities being undertaken by other public authorities
which could impact on the deployment of the source. Consideration should also
be given to any adverse impact on community confidence or safety that may
result from the use or conduct of a source or of information obtained from that
source. Additionally, the authorizing officer should make an assessment of any
risk to a source in carrying out the proposed authorization.
2.10 In a very limited
range of circumstances an authorization under Part 3 may, by virtue of
Articles 32(6) and 33 of the Law, render lawful conduct which would
otherwise be criminal, if it is incidental to any conduct falling within
Article 32(7) of the Law which the source is authorized to undertake. This
would depend on the circumstances of each individual case, and consideration
should always be given to seeking advice from the Law Officers’
Department when such activity is contemplated. A source that acts beyond the
limits recognised by the law will be at risk from prosecution. The need to
protect the source cannot alter this principle.
Combined
authorizations
2.11 A single
authorization may combine 2 or more different authorizations under Part 3
of the Law. For example, a single authorization may combine authorizations for
intrusive surveillance and the conduct of a source. In such cases the
provisions applicable to each of the authorizations must be considered
separately. Thus, the Chief Officer of the Force can authorize the conduct of a
source but an authorization for intrusive surveillance by the police needs the
separate authority of the Attorney General. Where an authorization for the use
or conduct of a covert human intelligence source is combined with the Attorney
General’s authorization for intrusive surveillance, the combined
authorization must be issued by the Attorney General. However, this does not
preclude public authorities from obtaining separate authorizations.
Directed
surveillance against a potential source
2.12 It may be
necessary to deploy directed surveillance against a potential source as part of
the process of assessing their suitability for recruitment, or in planning how
best to make the approach to them. An authorization under this code authorizing
an officer to establish a covert relationship with a potential source could be
combined with a directed surveillance authorization so that both the officer
and potential source could be followed. Directed surveillance is defined in
Article 32(1) of the Law. See the code of practice on Covert Surveillance.
Central
Record of all authorizations
2.13 A centrally
retrievable record of all authorizations should be held by each public
authority and regularly updated whenever an authorization is granted, renewed
or cancelled. The record should be made available to the Commissioner or an
Inspector from the Office of Commissioner, upon request. These records should
be retained for a period of at least 3 years from the ending of the
authorization.
2.14 Proper records
must be kept of the authorization and use of a source. Article 35(5) of
the Law provides that an authorizing officer must not grant an authorization
for the use or conduct of a source unless he or she believes that there are
arrangements in place for ensuring that there is at all times a person with the
responsibility for maintaining a record of the use made of the source.
2.15 In addition,
records or copies of the following, as appropriate, should be kept by the
relevant authority:
· a
copy of the authorization together with any supplementary documentation and
notification of the approval given by the authorizing officer;
· a
copy of any renewal of an authorization, together with the supporting
documentation submitted when the renewal was requested;
· the
reason why the person renewing an authorization considered it necessary to do
so;
· any
authorization which was granted or renewed orally (in an urgent case) and the
reason why the case was considered urgent;
· any
risk assessment made in relation to the source;
· the
circumstances in which tasks were given to the source;
· the
value of the source to the investigating authority;
· a
record of the results of any reviews of the authorization;
· the
reasons, if any, for not renewing an authorization;
· the
reasons for cancelling an authorization.
· the
date and time when any instruction was given by the authorizing officer to
cease using a source.
2.16 The records kept
by public authorities should be maintained in such a way as to preserve the
confidentiality of the source and the information provided by that source.
There should, at all times, be a designated person within the relevant public
authority who will have responsibility for maintaining a record of the use made
of the source.
Retention
and destruction of the product
2.17 Where the product
obtained from a source could be relevant to pending or future criminal or civil
proceedings, it should be retained in accordance with established disclosure
requirements for a suitable further period, commensurate to any subsequent
review.
2.18 In the cases of
the law enforcement agencies, particular attention is drawn to the requirements
that material which is obtained in the course of a criminal investigation and
which may be relevant to the investigation must be recorded and retained.
2.19 There is nothing
in the Law which prevents material obtained from properly authorized use of a
source being used in other investigations. Each public authority must ensure
that arrangements are in place for the handling, storage and destruction of
material obtained through the use of a source. Authorizing officers must ensure
compliance with the appropriate data protection requirements and any relevant
codes of practice produced by individual authorities in the handling and
storage of material.
3 SPECIAL RULES ON
AUTHORIZATIONS
Confidential Information
3.1 The
Law does not provide any special protection for ‘confidential
information’. Nevertheless, particular care should be taken in cases
where the subject of the investigation or operation might reasonably expect a
high degree of privacy, or where confidential information is involved.
Confidential information consists of matters subject to legal privilege,
confidential personal information or confidential journalistic material.
3.2 In
cases where, through the use of or conduct of a source, it is likely that
knowledge of confidential information will be acquired, it is recommended that
the grant of authority to deploy the source is considered at a senior level
and, in case of difficulty, advice sought from the Law Officers’
Department.
Communications
Subject to Legal Privilege
3.3 Article 5
of PPCE describes those matters that are subject to
legal privilege.
3.4 Legal
privilege does not apply to communications made with the intention of
furthering a criminal purpose (whether the lawyer is acting unwittingly or
culpably). Legally privileged communications will lose their protection if
there are grounds to believe, for example, that the professional legal adviser
is intending to hold or use them for a criminal purpose. But privilege is not
lost if a professional legal adviser is properly advising a person who is
suspected of having committed a criminal offence. The concept of legal
privilege applies to the provision of professional legal advice by any
individual, agency or organisation qualified to do so.
3.5 The
Law does not provide any special protection for legally privileged information.
Nevertheless, such information is particularly sensitive and any source which
acquires such material may engage Article 6 of the ECHR (right to a fair
trial) as well as Article 8. Legally privileged information obtained by a
source is extremely unlikely ever to be admissible as evidence in criminal
proceedings. Moreover, the mere fact that use has been made of a source to
obtain such information may lead to any related criminal proceedings being
stayed as an abuse of process. Accordingly, action which may lead to such
information being obtained is subject to additional safeguards under this code.
3.6 In
general, an application for the use or conduct of a source which is likely to
result in the acquisition of legally privileged information should only be made
in exceptional and compelling circumstance. Full regard should be had to the
particular proportionality issues such a use or conduct of a source raises. The
application should include, in addition to the reasons why it is considered
necessary for the use or conduct of a source to be used, an assessment of how
likely it is that information subject to legal privilege will be acquired. The
application should clearly state whether the purpose (or one of the purposes)
of the use or conduct of the source is to obtain legally privileged
information.
3.7 This
assessment will be taken into account by the authorizing officer in deciding whether
the proposed use or conduct of a source is necessary and proportionate for a
purpose under Article 35 of the Law. The authorizing officer may require
regular reporting so as to be able to decide whether the authorization should
continue. In those cases where legally privileged information has been acquired
and retained, the matter should be reported to the Commissioner or Inspector
during his or her next inspection and the material should be made available to
him or her if requested.
3.8 A
substantial proportion of the communications between a lawyer and his client(s)
may be subject to legal privilege. Therefore, any case where a lawyer is the
subject of an investigation or operation should be notified to the Commissioner
or Inspector during his or her next inspection and any material which has been
retained should be made available to him or her if requested.
3.9 Where
there is any doubt as to the handling and dissemination of information which
may be subject to legal privilege, advice should be sought from the Law
Officers’ Department before any further dissemination of the material
takes place. Similar advice should also be sought where there is doubt over
whether information is not subject to legal privilege due to the “in
furtherance of a criminal purpose” exception. The retention of legally
privileged information, or its dissemination to an outside body, should be
accompanied by a clear warning that it is subject to legal privilege. It should
be safeguarded by taking reasonable steps to ensure there is no possibility of
it becoming available, or its contents becoming known to any person whose
possession of it might prejudice any criminal or civil proceedings related to
the information. Any dissemination of legally privileged material to an outside
body should be notified to the relevant Commissioner or Inspector during his
next inspection.
Communications
involving Confidential Personal Information and Confidential Journalistic
Material
3.10 Similar
consideration must also be given to authorizations that involve confidential
personal information and confidential journalistic material. In those cases
where confidential personal information and confidential journalistic material
has been acquired and retained, the matter should be reported to the Commissioner
or Inspector during his or her next inspection and the material be made
available to him or her if requested. Confidential personal information is
information held in confidence relating to the physical or mental health or
spiritual counselling concerning an individual (whether living or dead) who can
be identified from it. Such information, which can include both oral and
written communications is held in confidence if it is held subject to an
express or implied undertaking to hold it in confidence or it is subject to a
restriction on disclosure or an obligation of confidentiality contained in
existing legislation. Examples might include consultations between a health
professional and a patient, or information from a patient’s medical
records.
3.11 Spiritual
counselling means conversations between an individual and a Minister of
Religion acting in his or her official capacity, where the individual being
counselled is seeking or the Minister is imparting forgiveness, absolution or
the resolution of conscience with the authority of the Divine Being(s) of their
faith.
3.12 Confidential
journalistic material includes material acquired or created for the purposes of
journalism and held subject to an undertaking to hold it in confidence, as well
as communications resulting in information being acquired for the purposes of
journalism and held subject to such an undertaking.
Vulnerable
individuals
3.13 A
‘vulnerable individual’ is a person who is or may be in need of
community care services by reason of mental or other disability, age or illness
and who is or may be unable to take care of himself or herself, or unable to
protect himself or herself against significant harm or exploitation. Any
individual of this description should only be authorized to act as a source in
the most exceptional circumstances and only after advice has been sought from
the Law Officers’ Department.
Juvenile
sources
3.14 Special safeguards also apply to the use or conduct of
juvenile sources; that is sources under the age of 18 years. On no occasion should the use or conduct of a source under 16
years of age be authorized to give information against his or her parents or
any person who has parental responsibility for the source. In other
cases, authorizations should not be granted unless special provisions
prescribed by the Minister are satisfied. It is recommended that the grant of
authority to use a source under 16 years of Attorney General is considered
at a senior level in the public authority. The duration of such an authorization
is one month instead of 12 months.
4 AUTHORIZATION PROCEDURES
FOR COVERT HUMAN INTELLIGENCE SOURCES
4.1 Under
Article 32(7) of the Law a person is a source if:
(a) he or she establishes or maintains a
personal or other relationship with a person for the covert purpose of
facilitating the doing of anything falling within paragraph (b) or (c);
(b) he or
she covertly uses such a relationship to obtain information or to provide
access to any information to another person; or
(c) he or
she covertly discloses information obtained by the use of such a relationship
or as a consequence of the existence of such a relationship.
4.2 A
source may include those referred to as agents, informants and officers working
undercover.
4.3 By
virtue of Article 32(9)(b) of the Law a purpose is covert, in relation to
the establishment or maintenance of a personal or other relationship, if and
only if, the relationship is conducted in a manner that is calculated to ensure
that one of the parties to the relationship is unaware of the purpose.
4.4 By
virtue of Article 32(9)(c) of the Law a relationship is used covertly, and
information obtained as mentioned in paragraph 4.1(c) above is disclosed
covertly, if and only if it is used or, as the case may be, disclosed in a
manner that is calculated to ensure that one of the parties to the relationship
is unaware of the use or disclosure in question.
4.5 The
use of a source involves inducing, asking or assisting a person to engage in
the conduct of a source or to obtain information by means of the conduct of
such a source.
4.6 The
conduct of a source is any conduct falling within Article 35(4) of the
Law, or which is incidental to anything falling within Article 35(4) of
the Law.
Authorization
procedures
4.7 Under
Article 35(3) of the Law an authorization for the use or conduct of a
source may be granted by the authorizing officer where he believes that the
authorization is necessary:
· in
the interests of national security;
· for
the purpose of preventing and detecting crime or of preventing disorder;
· in
the interests of the economic well-being of Jersey;
· in
the interests of public safety;
· for
the purpose of protecting public health
· for
the purpose of assessing or collecting any tax, duty, levy or other imposition,
contribution or charge payable to a government department; or
· for
any other purpose prescribed in an Order made by the Minister for Justice and
Home Affairs.
4.8 The authorizing officer must also believe that the authorized use or
conduct of a source is proportionate to what is sought to be achieved by that
use or conduct.
4.9 The
public authorities entitled to authorize the use or conduct of a source are
those listed in Schedule 1 to the Law. Responsibility for authorizing the
use or conduct of a source rests with the authorizing
officer and all authorizations require the personal authority of the
authorizing officer. An authorizing officer is the person designated under
Article 36 of the Law to grant an authorization for the use or conduct of
a source. In certain circumstances the Attorney General will be the authorizing
officer (see Article 36 of the Law).
4.10 The authorizing
officer must give authorizations in writing, except that in urgent cases, they
may be given orally by the authorizing officer. In such cases, a statement that
the authorizing officer has expressly authorized the action should be recorded
in writing by the applicant as soon as is reasonably practicable.
4.11 A case is not
normally to be regarded as urgent unless the time that would elapse before the
authorizing officer was available to grant the authorization would, in the
judgement of the person giving the authorization, be likely to endanger life or
jeopardise the operation or investigation for which the authorization was being
given. An authorization is not to be regarded as urgent where the need for an
authorization has been neglected or the urgency is of the authorizing
officer’s own making.
4.12 The Chief Officer,
Agent of the Impôts or Chief Inspector of Immigration may only grant authorizations
on application by a member of their own force or Service.
Information
to be provided in applications for authorization
4.13 An application for
authorization for the use or conduct of a source should be in writing and
record:
· the
reasons why the authorization is necessary in the particular case and on the
grounds (e.g. for the purpose of preventing or detecting crime) listed in
Article 35(3) of the Law;
· the
reasons why the authorization is considered proportionate to what it seeks to
achieve;
· the
purpose for which the source will be tasked or deployed (e.g. in relation to an
organised serious crime, espionage, a series of racially motivated crimes etc);
· where
a specific investigation or operation is involved, nature of that investigation
or operation;
· the
nature of what the source will be tasked to do;
· the
level of authority required (or recommended, where that is different);
· the
details of any potential collateral intrusion and why the intrusion is
justified;
· the
details of any confidential information that is likely to be obtained as a
consequence of the authorization; and
· a
subsequent record of whether authority was given or refused, by whom and the
time and date.
4.14 Additionally, in
urgent cases, the authorization should record the reasons why the authorizing
officer considered the case so urgent that an oral instead of a written
authorization was given.
4.15 Where the
authorization is oral, the detail referred to above should be recorded in
writing by the applicant as soon as reasonably practicable.
Duration of authorizations
4.16 A written
authorization will, unless renewed, cease to have effect at the end of a period
of 12 months beginning with the day on which it
took effect.
4.17 Urgent oral
authorizations will, unless renewed, cease to have effect after 72 hours, beginning with the time when the
authorization was granted or renewed.
Reviews
4.18 Regular reviews of
authorizations should be undertaken to assess the need for the use of a source
to continue. The review should include the use made of the source during the
period authorized, the tasks given to the source and the information obtained
from the source. The results of a review should be recorded on the
authorization record (see paragraphs 2.13 ‑ 2.15).
Particular attention is drawn to the need to review authorizations frequently
where the use of a source provides access to confidential information or
involves collateral intrusion.
4.19 In each case the
authorizing officer within each public authority should determine how often a
review should take place. This should be as frequently as is considered
necessary and practicable.
Renewals
4.20 Before an
authorizing officer renews an authorization, he or she must be satisfied that a
review has been carried out of the use of a source as outlined in
paragraph 4.19.
4.21 If at any time
before an authorization would cease to have effect, the authorizing officer
considers it necessary for the authorization to continue for the purpose for
which it was given, the officer may renew it in writing for a further period of
12 months. Renewals may also be granted orally
in urgent cases and last for a period of 72 hours.
4.22 A renewal takes
effect at the time at which, or day on which the authorization would have
ceased to have effect but for the renewal. An application for renewal should
not be made until shortly before the authorization period is drawing to an end.
Any person who would be entitled to grant a new authorization can renew an
authorization. Authorizations may be renewed more than once, if necessary,
provided they continue to meet the criteria for authorization. The renewal
should be kept/recorded as part of the authorization record (see
paragraphs 2.13 ‑ 2.15).
4.23 All applications
for the renewal of an authorization should record:
· whether
this is the first renewal or every occasion on which the authorization has been
renewed previously;
· any
significant changes to the information in paragraph 4.14;
· the
reasons why it is necessary to continue to use the source;
· the
use made of the source in the period since the grant or, as the case may be,
latest renewal of the authorization;
· the
tasks given to the source during that period and the information obtained from
the conduct or use of the source;
· the
results of regular reviews of the use of the source.
Cancellations
4.24 The authorizing
officer who granted or renewed the authorization must (or his or her deputy)
cancel it if the officer is satisfied that the use or conduct of the source no
longer satisfies the criteria for authorization or that satisfactory arrangements
for the source’s case no longer exist. Where the authorizing officer is
no longer available, this duty will fall on the person who has taken over the rôle of authorizing officer or the person who is
acting as authorizing officer in accordance with an Order of the Minister for
Justice and Home Affairs under Article 41(4) of the Law. Where necessary,
the safety and welfare of the source should continue to be taken into account
after the authorization has been cancelled.
Management
of Sources
Tasking
4.25 Tasking is the
assignment given to the source by the persons defined at Articles 35(5)(a)
and (b) of the Law, asking the source to obtain information, to provide access
to information or to otherwise act, incidentally, for the benefit of the
relevant public authority. Authorization for the use or conduct of a source is
required prior to any tasking where such tasking requires the source to
establish or maintain a personal or other relationship for a covert purpose.
4.26 The person
referred to in Article 35(5)(a) of the Law will have day to day
responsibility for:
· dealing
with the source on behalf of the authority concerned;
· directing
the day to day activities of the source;
· recording
the information supplied by the source; and
· monitoring
the source’s security and welfare.
4.27 The person
referred to in Article 35(5)(b) of the Law will be responsible for the
general oversight of the use of the source.
4.28 In some instances,
the tasking given to a person will not require the source to establish a personal
or other relationship for a covert purpose. For example a source may be tasked
with finding out purely factual information about the layout of commercial
premises. Alternatively, a trading standards officer may be involved in the
test purchase of items which have been labelled misleadingly or are unfit for
consumption. In such cases, it is for the relevant public authority to
determine where, and in what circumstances, such activity may require
authorization.
4.29 It is not the
intention that authorizations be drawn so narrowly that a separate
authorization is required each time the source is tasked. Rather, an
authorization might cover, in broad terms, the nature of the source’s
task. If this changes, then a new authorization may need to be sought.
4.30 It is difficult to
predict exactly what might occur each time a meeting with a source takes place,
or the source meets the subject of an investigation. There may be occasions
when unforeseen action or undertakings occur. When this happens, the occurrence
must be recorded as soon as practicable after the event and, if the existing
authorization is insufficient it should either be updated and reauthorized (for
minor amendments only) or it should be cancelled and a new authorization should
be obtained before any further such action is carried out.
4.31 Similarly where it
is intended to task a source in a new way or significantly greater way than
previously identified, the persons defined at Article 35(5)(a) or (b) of
the Law must refer the proposed tasking to the authorizing officer, who should
consider whether a separate authorization is required. This should be done in
advance of any tasking and the details of such referrals must be recorded.
Management
responsibility
4.32 Public authorities
should ensure that arrangements are in place for the proper oversight and
management of sources, including appointing individual officers as defined in
Article 35(5)(a) and (b) of the Law for each source.
4.33 The person
responsible for the day-to-day contact between the public authority and the
source will usually be of a rank or position below that of the authorizing
officer.
4.34 In cases where the
authorization is for the use or conduct of a source whose activities benefit
more than a single public authority, responsibilities for the management and
oversight of that source may be taken up by one authority or can be split
between the authorities.
Security
and welfare
4.35 Any public
authority deploying a source should take into account the safety and welfare of
that source, when carrying out actions in relation to an authorization or
tasking, and to foreseeable consequences to others of that tasking. Before
authorizing the use or conduct of a source, the authorizing officer should
ensure that a risk assessment is carried out to determine the risk to the
source of any tasking and the likely consequences should the role of the source
become known. The ongoing security and welfare of the source, after the
cancellation of the authorization, should also be considered at the outset.
4.36 The person defined
at Article 35(5)(a) of the Law is responsible for bringing to the
attention of the person defined at Article 35(5)(b) of the Law any
concerns about the personal circumstances of the source, insofar as they might
affect:
· the
validity of the risk assessment
· the
conduct of the source, and
· the
safety and welfare of the source.
4.37 Where deemed
appropriate, concerns about such matters must be considered by the authorizing
officer, and a decision taken on whether or not to allow the authorization to
continue.
Additional Rules
Recording of telephone conversations
4.38 Subject to paragraph 4.40, the interception of
communications sent by post or by means of public telecommunications systems or
private telecommunications systems attached to the public network may be
authorized only by the Attorney General, in accordance with the terms of Part 2
of the Law. Nothing in this code should be taken as granting dispensation from
the requirements of that Part of the Law.
4.39 Part 2 of the Law provides certain exceptions to
the rule that interception of telephone conversations must be warranted under
that Part. This includes, where one party to the communication consents to the
interception, it may be authorized in accordance with Articles 30(4) and
31(4) of the Law provided that there is no interception warrant authorizing the
interception. In such cases, the interception is treated as directed
surveillance (see chapter 4 of the Covert Surveillance code of practice).
Use
of covert human intelligence source with technical equipment
4.40 A source, whether
or not wearing or carrying a surveillance device and invited into residential
premises or a private vehicle, does not require additional authorization to
record any activity taking place inside those premises or vehicle which take
place in his presence. This also applies to the recording of telephone
conversations other than by interception which takes place in the
source’s presence. Authorization for the use or conduct of that source
may be obtained in the usual way.
4.41 However, if a
surveillance device is to be used, other than in the presence of the source, an
intrusive surveillance authorization and if applicable an authorization for
interference with property should be obtained.
5 OVERSIGHT BY COMMISSIONERS
5.1 The
Law requires the Commissioner to keep under review (with the assistance of the
Assistant Surveillance Commissioners) the performance of functions under Part 11
of PPCE and Part 3 of the Law by the police and
of the Law the other public authorities listed in Schedule 1.
5.2 This
code does not cover the exercise of any of the Commissioner’s functions.
It is the duty of any person who uses these powers to comply with any request
made by the Commissioner to disclose or provide any information the
Commissioner requires for the purpose of enabling the Commissioner to carry out
his or her functions.
5.3 References
in this code to the performance of review functions by the Commissioner apply
also to Inspectors and other members of staff to whom such functions have been
delegated.
6 COMPLAINTS
6.1 The
Law establishes an independent Tribunal. This Tribunal will be made up of
senior members of the judiciary and the legal profession and is independent of
States. The Tribunal has full powers to investigate and decide any case within
its jurisdiction.
6.2 This
code does not cover the exercise of the Tribunal’s functions. Details of
the relevant complaints procedure can be obtained from
the following address:
The Secretary
Investigatory Powers Tribunal
States Greffe
Jersey
JE1 1DD