Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (148 of 2018)

Schedule 2   Computer access warrants etc.

Part 1   Amendments

Surveillance Devices Act 2004

49   At the end of Part 2

Add:

Division 4 - Computer access warrants

27A Application for computer access warrant

Warrants sought for offence investigations

(1) A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if the law enforcement officer suspects on reasonable grounds that:

(a) one or more relevant offences have been, are being, are about to be, or are likely to be, committed; and

(b) an investigation into those offences is being, will be, or is likely to be, conducted; and

(c) access to data held in a computer (the target computer ) is necessary, in the course of that investigation,for the purpose of enabling evidence to be obtained of:

(i) the commission of those offences; or

(ii) the identity or location of the offenders.

(2) If the application is being made by or on behalf of a State or Territory law enforcement officer, the reference in subsection (1) to a relevant offence does not include a reference to a State offence that has a federal aspect.

Warrants sought for recovery orders

(3) A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if:

(a) a recovery order is in force; and

(b) the law enforcement officer suspects on reasonable grounds that access to data held in a computer (the target computer ) may assist in the location and safe recovery of the child to whom the recovery order relates.

Warrants sought for mutual assistance investigations

(4) A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if the law enforcement officer:

(a) is authorised to do so under a mutual assistance authorisation; and

(b) suspects on reasonable grounds that access to data held in a computer (the target computer ) is necessary, in the course of the investigation or investigative proceeding to which the authorisation relates, for the purpose of enabling evidence to be obtained of:

(i) the commission of the offence to which the authorisation relates; or

(ii) the identity or location of the persons suspected of committing the offence.

Warrants sought for integrity operations

(5) A federal law enforcement officer (or another person on the federal law enforcement officer's behalf) may apply for the issue of a computer access warrant if:

(a) an integrity authority is in effect authorising an integrity operation in relation to an offence that it is suspected has been, is being or is likely to be committed by a staff member of a target agency; and

(b) the federal law enforcement officer suspects on reasonable grounds that access to data held in a computer (the target computer ) will assist the conduct of the integrity operation by enabling evidence to be obtained relating to the integrity, location or identity of any staff member of the target agency.

Control order access warrants

(6) A law enforcement officer (or another person on the law enforcement officer's behalf) may apply for the issue of a computer access warrant if:

(a) a control order is in force in relation to a person; and

(b) the law enforcement officer suspects on reasonable grounds that access to data held in a computer (the target computer ) to obtain information relating to the person would be likely to substantially assist in:

(i) protecting the public from a terrorist act; or

(ii) preventing the provision of support for, or the facilitation of, a terrorist act; or

(iii) preventing the provision of support for, or the facilitation of, the engagement in a hostile activity in a foreign country; or

(iv) determining whether the control order, or any succeeding control order, has been, or is being, complied with.

Note: For control orders that have been made but not come into force, see section 6C.

Procedure for making applications

(7) An application under subsection (1), (3), (4), (5) or (6) may be made to an eligible Judge or to a nominated AAT member.

(8) An application:

(a) must specify:

(i) the name of the applicant; and

(ii) the nature and duration of the warrant sought; and

(b) subject to this section, must be supported by an affidavit setting out the grounds on which the warrant is sought.

Unsworn applications - warrants sought for offence investigations

(9) If a law enforcement officer believes that:

(a) immediate access to data held in the target computer referred to in subsection (1) is necessary as described in paragraph (1)(c); and

(b) it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection (1) may be made before an affidavit is prepared or sworn.

(10) If subsection (9) applies, the applicant must:

(a) provide as much information as the eligible Judge or nominated AAT member considers is reasonably practicable in the circumstances; and

(b) not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated AAT member, whether or not a warrant has been issued.

Unsworn applications - warrants sought for recovery orders

(11) If a law enforcement officer believes that:

(a) immediate access to data held in the target computer referred to in subsection (3) may assist as described in paragraph (3)(b); and

(b) it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection (3) may be made before an affidavit is prepared or sworn.

(12) If subsection (11) applies, the applicant must:

(a) provide as much information as the eligible Judge or nominated AAT member considers is reasonably practicable in the circumstances; and

(b) not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated AAT member, whether or not a warrant has been issued.

Unsworn applications - control order access warrants

(13) If a law enforcement officer believes that:

(a) immediate access to data held in the target computer referred to in subsection (6) would be likely to substantially assist as described in paragraph (6)(b); and

(b) it is impracticable for an affidavit to be prepared or sworn before an application for a warrant is made;

an application for a warrant under subsection (6) may be made before an affidavit is prepared or sworn.

(14) If subsection (13) applies, the applicant must:

(a) provide as much information as the eligible Judge or nominated AAT member considers is reasonably practicable in the circumstances; and

(b) not later than 72 hours after the making of the application, send a duly sworn affidavit to the eligible Judge or nominated AAT member, whether or not a warrant has been issued.

Target computer

(15) The target computer referred to in subsection (1), (3), (4), (5) or (6) may be any one or more of the following:

(a) a particular computer;

(b) a computer on particular premises;

(c) a computer associated with, used by or likely to be used by, a person (whose identity may or may not be known).

27B Remote application

(1) If a law enforcement officer believes that it is impracticable for an application for a computer access warrant to be made in person, the application may be made under section 27A by telephone, fax, email or any other means of communication.

(2) If transmission by fax is available and an affidavit has been prepared, the person applying must transmit a copy of the affidavit, whether sworn or unsworn, to the eligible Judge or to the nominated AAT member who is to determine the application.

27C Determining the application

(1) An eligible Judge or a nominated AAT member may issue a computer access warrant if satisfied:

(a) in the case of a warrant sought in relation to a relevant offence - that there are reasonable grounds for the suspicion founding the application for the warrant; and

(b) in the case of a warrant sought in relation to a recovery order - that such an order is in force and that there are reasonable grounds for the suspicion founding the application for the warrant; and

(c) in the case of a warrant sought in relation to a mutual assistance authorisation - that such an authorisation is in force and that there are reasonable grounds for the suspicion founding the application for the warrant; and

(d) in the case of a warrant sought for the purposes of an integrity operation - that the integrity authority for the operation is in effect, and that there are reasonable grounds for the suspicions founding the application for the warrant (as mentioned in paragraphs 27A(5)(a) and (b)); and

(e) in the case of a control order access warrant - that a control order is in force in relation to a person, and that access to data held in the relevant target computer to obtain information relating to the person would be likely to substantially assist in:

(i) protecting the public from a terrorist act; or

(ii) preventing the provision of support for, or the facilitation of, a terrorist act; or

(iii) preventing the provision of support for, or the facilitation of, the engagement in a hostile activity in a foreign country; or

(iv) determining whether the control order, or any succeeding control order, has been, or is being, complied with; and

(f) in the case of an unsworn application - that it would have been impracticable for an affidavit to have been sworn or prepared before the application was made; and

(g) in the case of a remote application - that it would have been impracticable for the application to have been made in person.

Note: For control orders that have been made but not come into force, see section 6C.

(2) In determining whether a computer access warrant should be issued, the eligible Judge or nominated AAT member must have regard to:

(a) in the case of a warrant sought in relation to a relevant offence or a mutual assistance authorisation, or for the purposes of an integrity operation - the nature and gravity of the alleged offence; and

(b) in the case of a warrant sought to assist in the location and safe recovery of a child to whom a recovery order relates - the circumstances that gave rise to the making of the order; and

(c) the extent to which the privacy of any person is likely to be affected; and

(d) the existence of any alternative means of obtaining the evidence or information sought to be obtained; and

(e) in the case of a warrant sought in relation to a relevant offence or a recovery order, or for the purposes of an integrity operation - the likely evidentiary or intelligence value of any evidence or information sought to be obtained; and

(f) in the case of a warrant sought in relation to a mutual assistance authorisation - the likely evidentiary or intelligence value of any evidence or information sought to be obtained, to the extent that this is possible to determine from information obtained from the foreign country to which the authorisation relates; and

(g) in the case of a control order access warrant issued on the basis of a control order that is in force in relation to a person - the likely value of the information sought to be obtained, in:

(i) protecting the public from a terrorist act; or

(ii) preventing the provision of support for, or the facilitation of, a terrorist act; or

(iii) preventing the provision of support for, or the facilitation of, the engagement in a hostile activity in a foreign country; or

(iv) determining whether the control order, or any succeeding control order, has been, or is being, complied with; and

(h) in the case of a control order access warrant issued on the basis of a control order that is in force in relation to a person - whether the access to data held in the relevant target computer in accordance with the warrant would be the means of obtaining the evidence or information sought to be obtained, that is likely to have the least interference with any person's privacy; and

(i) in the case of a control order access warrant issued on the basis of a control order that is in force in relation to a person - the possibility that the person:

(i) has engaged, is engaging, or will engage, in a terrorist act; or

(ii) has provided, is providing, or will provide, support for a terrorist act; or

(iii) has facilitated, is facilitating, or will facilitate, a terrorist act; or

(iv) has provided, is providing, or will provide, support for the engagement in a hostile activity in a foreign country; or

(v) has facilitated, is facilitating, or will facilitate, the engagement in a hostile activity in a foreign country; or

(vi) has contravened, is contravening, or will contravene, the control order; or

(vii) will contravene a succeeding control order; and

(j) in the case of a warrant sought in relation to a relevant offence or a recovery order - any previous warrant sought or issued under this Division in connection with the same alleged offence or the same recovery order; and

(k) in the case of a control order access warrant issued on the basis of a control order that is in force in relation to a person - any previous control order access warrant sought or issued on the basis of a control order relating to the person.

27D What must a computer access warrant contain?

(1) A computer access warrant must:

(a) state that the eligible Judge or nominated AAT member issuing the warrant is satisfied of the matters referred to in subsection 27C(1) and has had regard to the matters referred to in subsection 27C(2); and

(b) specify:

(i) the name of the applicant; and

(ii) if the warrant relates to one or more alleged relevant offences - the alleged offences in respect of which the warrant is issued; and

(iii) if the warrant relates to a recovery order - the date the order was made and the name of the child to whom the order relates; and

(iv) if the warrant relates to a mutual assistance authorisation - the offence or offences against the law of a foreign country to which the authorisation relates; and

(v) if the warrant is issued for the purposes of an integrity operation - the integrity authority for the operation and each alleged relevant offence in relation to which the authority was granted; and

(vi) the date the warrant is issued; and

(vii) if the target computer is or includes a particular computer - the computer; and

(viii) if the target computer is or includes a computer on particular premises - the premises; and

(ix) if the target computer is or includes a computer associated with, used by or likely to be used by, a person - the person (whether by name or otherwise); and

(x) the period during which the warrant is in force (see subsection (3)); and

(xi) the name of the law enforcement officer primarily responsible for executing the warrant; and

(xii) any conditions subject to which things may be done under the warrant.

(2) If a control order access warrant is issued on the basis of a control order that is in force in relation to a person, the warrant must also specify the following details in relation to the control order:

(a) the name of the person;

(b) the date the control order was made;

(c) whether the control order is an interim control order or a confirmed control order.

(3) A warrant may only be issued:

(a) for a period of no more than 90 days; or

(b) if the warrant is issued for the purposes of an integrity operation - for a period of no more than 21 days.

Note: The access to data held in the target computer pursuant to a warrant may be discontinued earlier - see section 27H.

(4) In the case of a warrant authorising the access to data held in the target computer on premises that are vehicles, the warrant need only specify the class of vehicle in relation to which the access to data held in the target computer is authorised.

(5) A warrant must be signed by the person issuing it and include the person's name.

(6) As soon as practicable after completing and signing a warrant issued on a remote application, the person issuing it must:

(a) inform the applicant of:

(i) the terms of the warrant; and

(ii) the date on which, and the time at which, the warrant was issued; and

(b) give the warrant to the applicant while retaining a copy of the warrant for the person's own record.

27E What a computer access warrant authorises

(1) A computer access warrant must authorise the doing of specified things (subject to any restrictions or conditions specified in the warrant) in relation to the relevant target computer.

(2) The things that may be specified are any of the following that the eligible Judge or nominated AAT member considers appropriate in the circumstances:

(a) entering specified premises for the purposes of doing the things mentioned in this subsection;

(b) entering any premises for the purposes of gaining entry to, or exiting, the specified premises;

(c) using:

(i) the target computer; or

(ii) a telecommunications facility operated or provided by the Commonwealth or a carrier; or

(iii) any other electronic equipment; or

(iv) a data storage device;

for the purpose of obtaining access to data (the relevant data ) that is held in the target computer at any time while the warrant is in force, in order to determine whether the relevant data is covered by the warrant;

(d) if necessary to achieve the purpose mentioned in paragraph (c) - adding, copying, deleting or altering other data in the target computer;

(e) if, having regard to other methods (if any) of obtaining access to the relevant data which are likely to be as effective, it is reasonable in all the circumstances to do so:

(i) using any other computer or a communication in transit to access the relevant data; and

(ii) if necessary to achieve that purpose - adding, copying, deleting or altering other data in the computer or the communication in transit;

(f) removing a computer or other thing from premises for the purposes of doing any thing specified in the warrant in accordance with this subsection, and returning the computer or other thing to the premises;

(g) copying any data to which access has been obtained, and that:

(i) appears to be relevant for the purposes of determining whether the relevant data is covered by the warrant; or

(ii) is covered by the warrant;

(h) intercepting a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing specified in the warrant in accordance with this subsection;

(i) any other thing reasonably incidental to any of the above.

Note: As a result of the warrant, a person who, by means of a telecommunications facility, obtains access to data stored in a computer etc. will not commit an offence under Part 10.7 of the Criminal Code or equivalent State or Territory laws (provided that the person acts within the authority of the warrant).

(2A) If:

(a) a computer access warrant authorises the removal of a computer or other thing from premises as mentioned in paragraph (2)(f); and

(b) a computer or thing is removed from the premises in accordance with the warrant;

the computer or thing must be returned to the premises within a reasonable period.

(3) For the purposes of paragraph (2)(g), if:

(a) access has been obtained to data; and

(b) the data is subject to a form of electronic protection;

the data is taken to be relevant for the purposes of determining whether the relevant data is covered by the warrant.

When data is covered by a warrant

(4) For the purposes of this section, data is covered by a warrant if:

(a) in the case of a warrant sought in relation to a relevant offence - access to the data is necessary as described in paragraph 27A(1)(c); or

(b) in the case of a warrant sought in relation to a recovery order - access to the data may assist as described in paragraph 27A(3)(b); or

(c) in the case of a warrant sought in relation to a mutual assistance authorisation - access to the data is necessary as described in paragraph 27A(4)(b); or

(d) in the case of a warrant sought for the purposes of an integrity operation - access to the data will assist as described in paragraph 27A(5)(b); or

(e) in the case of a control order access warrant - access to the data would be likely to substantially assist as described in paragraph 27A(6)(b).

Certain acts not authorised

(5) Subsection (2) does not authorise the addition, deletion or alteration of data, or the doing of any thing, that is likely to:

(a) materially interfere with, interrupt or obstruct:

(i) a communication in transit; or

(ii) the lawful use by other persons of a computer;

unless the addition, deletion or alteration, or the doing of the thing, is necessary to do one or more of the things specified in the warrant; or

(b) cause any other material loss or damage to other persons lawfully using a computer.

Warrant must provide for certain matters

(6) A computer access warrant must:

(a) authorise the use of any force against persons and things that is necessary and reasonable to do the things specified in the warrant; and

(b) if the warrant authorises entering premises - state whether entry is authorised to be made at any time of the day or night or during stated hours of the day or night.

Concealment of access etc.

(7) If any thing has been done in relation to a computer under:

(a) a computer access warrant; or

(b) this subsection;

then, in addition to the things specified in the warrant, the warrant authorises the doing of any of the following:

(c) any thing reasonably necessary to conceal the fact that any thing has been done under the warrant or under this subsection;

(d) entering any premises where the computer is reasonably believed to be, for the purposes of doing the things mentioned in paragraph (c);

(e) entering any other premises for the purposes of gaining entry to or exiting the premises referred to in paragraph (d);

(f) removing the computer or another thing from any place where it is situated for the purposes of doing the things mentioned in paragraph (c), and returning the computer or other thing to that place;

(g) if, having regard to other methods (if any) of doing the things mentioned in paragraph (c) which are likely to be as effective, it is reasonable in all the circumstances to do so:

(i) using any other computer or a communication in transit to do those things; and

(ii) if necessary to achieve that purpose - adding, copying, deleting or altering other data in the computer or the communication in transit;

(h) intercepting a communication passing over a telecommunications system, if the interception is for the purposes of doing any thing mentioned in this subsection;

(i) any other thing reasonably incidental to any of the above;

at the following time:

(j) at any time while the warrant is in force or within 28 days after it ceases to be in force;

(k) if none of the things mentioned in paragraph (c) are done within the 28-day period mentioned in paragraph (j) - at the earliest time after that 28-day period at which it is reasonably practicable to do the things mentioned in paragraph (c).

(8) Subsection (7) does not authorise the doing of a thing that is likely to:

(a) materially interfere with, interrupt or obstruct:

(i) a communication in transit; or

(ii) the lawful use by other persons of a computer;

unless the doing of the thing is necessary to do one or more of the things specified in subsection (7); or

(b) cause any other material loss or damage to other persons lawfully using a computer.

(9) If a computer or another thing is removed from a place in accordance with paragraph (7)(f), the computer or thing must be returned to the place within a reasonable period.

27F Extension and variation of computer access warrant

(1) A law enforcement officer to whom a computer access warrant has been issued (or another person on the law enforcement officer's behalf) may apply, at any time before the expiry of the warrant:

(a) for an extension of the warrant for a period of no more than:

(i) 90 days after the day the warrant would otherwise expire; or

(ii) if the warrant is issued for the purposes of an integrity operation - 21 days after the day the warrant would otherwise expire; or

(b) for a variation of any of the other terms of the warrant.

(2) The application is to be made to an eligible Judge or to a nominated AAT member and must be accompanied by the original warrant.

(3) Sections 27A and 27B apply, with any necessary changes, to an application under this section as if it were an application for the warrant.

(4) The eligible Judge or nominated AAT member may grant an application if satisfied that the matters referred to in subsection 27C(1) still exist, having regard to the matters in subsection 27C(2).

(5) If the eligible Judge or nominated AAT member grants the application, the eligible Judge or nominated AAT member must endorse the new expiry date or the other varied term on the original warrant.

(6) An application may be made under this section more than once.

27G Revocation of computer access warrant

(1) A computer access warrant may, by instrument in writing, be revoked by an eligible Judge or nominated AAT member on the initiative of the eligible Judge or nominated AAT member at any time before the expiration of the period of validity specified in the warrant.

(2) If the circumstances set out in paragraphs 27H(2)(a) and (b), 27H(3)(a) and (b), 27H(4)(a) and (b), 27H(5)(a) and (b), 27H(6)(a) and (b) or 27H(7)(a) and (b) apply in relation to a computer access warrant, the chief officer of the law enforcement agency to which the law enforcement officer to whom the warrant was issued belongs or is seconded must, by instrument in writing, revoke the warrant.

(3) The instrument revoking a warrant must be signed by the eligible Judge, the nominated AAT member or the chief officer of the law enforcement agency, as the case requires.

(4) If an eligible Judge or nominated AAT member revokes a warrant, the eligible Judge or nominated AAT member must give a copy of the instrument of revocation to the chief officer of the law enforcement agency to which the law enforcement officer to whom the warrant was issued belongs or is seconded.

(5) If:

(a) an eligible Judge or nominated AAT member revokes a warrant; and

(b) at the time of the revocation, a law enforcement officer is executing the warrant;

the law enforcement officer is not subject to any civil or criminal liability for any act done in the proper execution of that warrant before the officer is made aware of the revocation.

27H Discontinuance of access under warrant

Scope

(1) This section applies if a computer access warrant is issued to a law enforcement officer.

Discontinuance of access

(2) If:

(a) the computer access warrant has been sought by or on behalf of a law enforcement officer in relation to a relevant offence; and

(b) the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded is satisfied that access to data under the warrant is no longer required for the purpose of enabling evidence to be obtained of:

(i) the commission of the relevant offence; or

(ii) the identity or location of the offender;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure that access to data authorised by the warrant is discontinued.

(3) If:

(a) the computer access warrant has been sought by or on behalf of a law enforcement officer in relation to a recovery order; and

(b) the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded is satisfied that access to data under the warrant is no longer required for the purpose of locating and safely recovering the child to whom the recovery order relates;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure that access to data authorised by the warrant is discontinued.

(4) If:

(a) the computer access warrant has been sought by or on behalf of a law enforcement officer as authorised under a mutual assistance authorisation; and

(b) the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded is satisfied that access to data under the warrant is no longer required for the purpose of enabling evidence to be obtained of:

(i) the commission of the offence against a law of a foreign country to which the authorisation relates; or

(ii) the identity or location of the persons suspected of committing the offence;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure that access to data authorised by the warrant is discontinued.

(5) If:

(a) the computer access warrant has been sought by or on behalf of a federal law enforcement officer for the purposes of an integrity operation; and

(b) the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded is satisfied that:

(i) access to data under the warrant is no longer necessary for the purposes of the integrity operation; or

(ii) the integrity authority for the integrity operation is no longer in effect;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure access to data authorised by the warrant is discontinued.

(6) If:

(a) the computer access warrant is a control order access warrant issued on the basis of a control order that was in force in relation to a person; and

(b) the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded is satisfied that access to data under the warrant to obtain information relating to the person is no longer required for any of the following purposes:

(i) protecting the public from a terrorist act;

(ii) preventing the provision of support for, or the facilitation of, a terrorist act;

(iii) preventing the provision of support for, or the facilitation of, the engagement in a hostile activity in a foreign country;

(iv) determining whether the control order, or any succeeding control order, has been, or is being, complied with;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure that access to data authorised by the warrant is discontinued as soon as practicable.

(7) If:

(a) the computer access warrant is a control order access warrant issued on the basis of a control order that was in force in relation to a person; and

(b) no control order is in force in relation to the person;

the chief officer must, in addition to revoking the warrant under section 27G, take the steps necessary to ensure that access to data authorised by the warrant is discontinued as soon as practicable.

(8) If the chief officer of a law enforcement agency is notified that a warrant has been revoked by an eligible Judge or a nominated AAT member under section 27G, the eligible Judge or nominated AAT member must take the steps necessary to ensure that access to data authorised by the warrant is discontinued as soon as practicable.

(9) If the law enforcement officer to whom the warrant is issued, or who is primarily responsible for executing the warrant, believes that access to data under the warrant is no longer necessary for the purpose:

(a) if the warrant was issued in relation to a relevant offence - of enabling evidence to be obtained of the commission of the relevant offence or the identity or location of the offender; or

(b) if the warrant was issued in relation to a recovery order - of enabling the location and safe recovery of the child to whom the order relates; or

(c) if the warrant was issued in relation to a mutual assistance authorisation - of enabling evidence to be obtained of:

(i) the commission of the offence against a law of a foreign country to which the authorisation relates; or

(ii) the identity or location of the persons suspected of committing the offence;

the law enforcement officer must immediately inform the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded.

(10) In the case of a warrant issued for the purposes of an integrity operation, if the law enforcement officer to whom the warrant is issued, or who is primarily responsible for executing the warrant, believes that:

(a) access to data under the warrant is no longer necessary for those purposes; or

(b) the integrity authority for the integrity operation is no longer in effect;

the law enforcement officer must immediately inform the chief officer of the law enforcement agency to which the law enforcement officer belongs or is seconded.

27J Relationship of this Division to parliamentary privileges and immunities

To avoid doubt, this Division does not affect the law relating to the powers, privileges and immunities of any of the following:

(a) each House of the Parliament;

(b) the members of each House of the Parliament;

(c) the committees of each House of the Parliament and joint committees of both Houses of the Parliament.