Legislative Assembly for the ACT: 2011 Week 1 Hansard (16 February) . . Page.. 218..
come out of a report done by the Australian Privacy Foundation into the bill. So we actually have looked at existing legislation, how it operates. I will note again that there have been no major problems with the bill operating in New South Wales, including the process of having to apply for a covert surveillance order.
Again I thank members for their contribution and I seek leave to table a revised explanatory statement to this bill.
MS BRESNAN: I table a revised explanatory statement. As I noted, this is in response to concerns which were raised by the scrutiny committee.
Question resolved in the affirmative.
Bill agreed to in principle.
Bill, by leave, taken as a whole.
MS BRESNAN (Brindabella) (5.08): I move amendment No 1 circulated in my name [see schedule 1 at page 242].
This amendment is to provide clarity that a person who conducts surveillance does so whether they do it themselves or cause another person to do it on their behalf. The original wording left some ambiguity and I have introduced this amendment for clarity.
Amendment agreed to.
MR CORBELL (Molonglo—Attorney-General, Minister for the Environment, Climate Change and Water, Minister for Energy and Minister for Police and Emergency Services) (5.09), by leave: I move amendments Nos 1 to 14 circulated in my name together [see schedule 2 at page 242].
I have outlined the purposes of the government's amendments in my speech in the in-principle debate, so I will not reiterate those again and I simply commend the amendments to the Assembly.
MS BRESNAN (Brindabella) (5.09): The Greens will be supporting the amendments that the government has put forward, as I have also foreshadowed in my speech previously.
I will just address a couple of those amendments in terms of their content. The first amendment that has been discussed requires an employer to explicitly state what computer resources can or cannot be used for and how the employer intends to monitor an employee and audit their computer usage in accordance with the policy. This ensures that employees are clear from the outset as to the appropriate usage of computer resources provided by the employer.