Previous WeekMondayTuesdayWednesdayThursdayFridayNext Week

../Morning Post
Posted December 5 2011

____________________
US CDN Border Security

CCLA, ACLU, PI (UK) Release "Core Legal Principles" For The U.S.- Canada Security Perimeter

Endorsed in Canada by Gar Pardy and the Rideau Institute

TORONTO - In advance of the formal announcement by Canadian Prime Minister Stephen Harper and U.S. President Barack Obama of the Beyond the Border Action Plan for the North American security perimeter on December 7, 2011, the Canadian Civil Liberties Association, Privacy International UK and the American Civil Liberties Union release 12 "Core Legal Principles" the three organizations believe must be adhered to by both countries. These principles are endorsed by the Rideau Insitute and Gar Pardy.

These Core Principles have been developed to ensure that constitutional rights on both sides of the border are not diluted, and they seek to address some of the key legal issues raised by the Security Perimeter, including privacy, law enforcement, watch lists, due process and information sharing.

Furthermore, these principles seek to ensure that the highest legal standards between the countries prevail. Indeed, all three organizations believe that where there are differing standards between Canada and the United States, the higher standard - granting the greater protections to individuals - should prevail.

"An international perspective on the security perimeter is paramount in this context, and we need to ensure the constitutional protection for residents on both sides of the border for the anticipated continental entry-exit system," said Nathalie Des Rosiers, CCLA's general counsel. She continued, " CCLA has been fighting for the protection of constitutional and privacy rights in Canada for decades, and we're pleased to join our colleagues from the United States and the UK to work to ensure that border agreements respect international and constitutional legal protections for privacy. "



CORE LEGAL PRINCIPLES THAT MUST BE COMPLIED WITH IN ANY CANADA-
U.S. SECURITY PERIMETER AGREEMENT

In February 2011, U.S. President Obama and Canadian Prime Minister Harper reached an agreement to create a “North American Security Perimeter.” This plan outlined the following objectives: “addressing threats early,” trade facilitation, integrated cross-border law enforcement, and critical infrastructure and cybersecurity.

However, greater harmonization of U.S. and Canadian security policies such as a continental entry-exit system must not lead to large scale surveillance systems . Both countries recognize a constitutional right to travel, and the legal systems of both countries recognize that privacy is a fundamental right.

In order to ensure that implementation of the Security Perimeter comports with both nations’ longstanding values of privacy and civil liberties, we call on both leaders to require that the proposed Canada-U.S. Security Perimeter Cooperation Agreement adhere to following principles:

1. HIGHER STANDARDS PREVAIL: Where there are differing standards of legal safeguards between the two countries, the standard granting the greater protections to individuals should be adopted.

2. ADHERENCE TO EXISTING OBLIGATIONS: Both countries must uphold the International Covenant on Civil and Political Rights, the 1951 International Convention Relating to the Status of Refugees (including the principle of non- refoulement), the UN Convention Against Torture, and the UN Convention on the Rights of the Child, and all other relevant international human rights laws to which either country is party.

3. LEGITIMATE, NECESSARY AND PROPORTIONAL: States must comply with the International Covenant on Civil and Political Rights’ prohibition against arbitrary or unlawful deprivation of an individual’s right to privacy. In order to ensure that a limitation on the right to privacy is not arbitrary, it should be legitimate, necessary and proportional aCORE LEGAL PRINCIPLES THAT MUST BE COMPLIED WITH IN ANY CANADA-U.S. SECURITY PERIMETER AGREEMENT

In February 2011, U.S. President Obama and Canadian Prime Minister Harper reached an agreement to create a “North American Security Perimeter.” This plan outlined the following objectives: “addressing threats early,” trade facilitation, integrated cross-border law enforcement, and critical infrastructure and cybersecurity.

However, greater harmonization of U.S. and Canadian security policies such as a continental entry-exit system must not lead to large scale surveillance systems . Both countries recognize a constitutional right to travel, and the legal systems of both countries recognize that privacy is a fundamental right.

In order to ensure that implementation of the Security Perimeter comports with both nations’ longstanding values of privacy and civil liberties, we call on both leaders to require that the proposed Canada-U.S. Security Perimeter Cooperation Agreement adhere to following principles:

1. HIGHER STANDARDS PREVAIL: Where there are differing standards of legal safeguards between the two countries, the standard granting the greater protections to individuals should be adopted.

2. ADHERENCE TO EXISTING OBLIGATIONS: Both countries must uphold the International Covenant on Civil and Political Rights, the 1951 International Convention Relating to the Status of Refugees (including the principle of non- refoulement), the UN Convention Against Torture, and the UN Convention on the Rights of the Child, and all other relevant international human rights laws to which either country is party.

3. LEGITIMATE, NECESSARY AND PROPORTIONAL: States must comply with the International Covenant on Civil and Political Rights’ prohibition against arbitrary or unlawful deprivation of an individual’s right to privacy. In order to ensure that a limitation on the right to privacy is not arbitrary, it should be legitimate, necessary and proportional as follows:

a. It must be essential to achieving a specific, legitimate aim that is specified in advance.

b. It must be the least intrusive means possible of achieving such an aim.

c. It must be proportional to the interest to be protected.

d. To ensure these principles are met, any limitation must be based on individualized suspicion or evidence of wrongdoing.

4. COLLECTION: States should only engage in targeted, lawful collection of personal information.

a. Surveillance and “intelligence” about domestic subjects must be individually targeted, based upon individualized suspicion of wrongdoing, and subject to judicial oversight.

b. The creation of dossiers, watchlisting, “intelligence” collection, investigation and infiltration must never be based on invidivuals’ exercise of their rights to freedom of expression and religion.

c. New technologies permitting broader forms of surveillance must be subject to full public consultation and debate, authorized by law, necessary and proportional, and subject to independent assessment and oversight.

5. LIMITS ON INFORMATION SHARING: Any information exchanges between security and intelligence agencies must be subject to clear controls and limits – both between Canadian and U.S. agencies and among domestic agencies. In particular, information shared among or between national intelligence agencies must be subject to a public, written agreement between the national agencies with respect to purpose, use, storage, dissemination.

a. Any information sharing must be restricted to its particular purpose, and not used, disseminated or stored for secondary uses.

b. The storage of personal information must be subject to rules limiting the duration of its retention to reasonable periods.

c. Information should never be shared with third countries that are suspected of engaging in or condoning serious violations of human rights, including torture or cruel, inhuman, or degrading treatment or punishment.

6. OVERSIGHT AND ACCOUNTABILITY: Information collection, sharing, use, dissemination, and storage practices must be subject to independent oversight, review, and accountability procedures. This applies to all intelligence agencies, in both countries, engaged in information sharing practices. In Canada, the federal Privacy Commissioner for example, would have the expertise to monitor and review all information sharing agreements and practices. In the United States, such independent oversight could be provided by the Privacy and Civil Liberties Oversight Board – an institution created by Congress in 2007 yet which has stood vacant ever since as presidents Bush and Obama have refused to nominate members to the Board.

7. NONDISCRIMINATION: In the treatment of personal information, there must not be any discrimination between U.S. and Canadian citizens, or between citizens and permanent residents of either country.

8. DUE PROCESS: No person should be subject to impingements on their right to travel or other ill effects without full due process, including:

a. The right to notice of the deprivation and of the legal and factual bases for the deprivation.

b. The right to access and review the evidence against them.

c. The right to challege the accuracy or reliability of the evidence against them, and to receive redress.

d. The right to challenge adverse designations through an adversarial process before a judge and subject to judicial review.

e. Cooperation between countries and jurisdictional issues shall not be permitted to form a barrier to individuals seeking redress.

9. WATCH LISTS: Watch lists must be narrowly focused on persons who pose a genuine and immediate threat. No person should be placed on a watch list (or denied access to a “trusted traveler” whitelist) unless:

a. They are given full due process as outlined above, including the right to notice that they have been included on a watch list or excluded from a whitelist.

b. There are tight, well-defined criteria by which individuals are added to a watch list, or excluded from a whitelist.

c. The watch list is subject to independent oversight, including rigorous procedures for the removal of names that should not be on the list.

d. The agencies involved in placing names on the watch list or denying access to a whitelist refrain from using “guilty by association” in targeting individuals.

10. DATA MINING: Security screening determinations or any other decisions that produce legal effects or significantly affect the data subject may not be based solely on automated processing of data. A form of appeal and other due process rights must be provided when automatic decision making processes are used. 11. CYBERSECURITY: All cybersecurity measures must comply with the principles listed above.

12. FOREIGN INFORMATION SHARING AND MUTUAL ASSISTANCE: Steps must be taken to ensure that domestic law enforcement can never use foreign law enforcement to circumvent legal safeguards that apply to the domestic agency. A law enforcement agency must not carry out surveillance on one country’s citizens on behalf of another country’s law enforcement agencies in circumstances where those agencies are prohibited from carrying out such surveillance on their own.

Submit press release to pressrelease@exchangemagazine.com - Editor Jon Rohr - Content published on this site represents the opinion of the individual/organization and/or source provider of the Content. ExchangeMagazine.com is non-partisan, online journal. Privacy Policy. Copyright of Exchange produced editorial is the copyright of Exchange Business Communications Inc. 2011/*.*. Additional editorials, comments and releases are copyright of respective source(s) and/or institutions or organizations.

 




Contact an Exchange Representative

Current Issue: November/December 2011
Receive Exchange Online Now










Submit Press Release
Visitor Centre
Weather
Advertising Inquires
Email
Tel: 519.886.0298

Subscribe to Exchange Magazine Print Edition

Contact Information:

Publisher:
Exchange Business Communication Inc.
Waterloo, Ontario, Canada
Tel: 519.886.0298

Editor-in-Chief
Jon Rohr
editor@exchangemagazine.com

Account Manager

John Hobin
john.hobin@exchangemagazine.com