22 December 2011

Nosey Parkers

Three years ago this month the Western Australia state Transport Minister tabled a government review into the release by the Department for Planning & Infrastructure of private vehicle registration details. That information was provided to two non-government bodies: Wilson Parking and Westralia Airports Corporation.

That review followed criticism that the state government had provided Wilson, the dominant Australian carpark operator, with registration details (including home addresses) regarding 25,522 vehicles that had overstayed their welcome at Wilson's private facuilities. The registrants had not expected the state to provide that information to a commercial body.

As the Minister's statement (Legislative Council Hansard of 9 December 2008, p 1042) indicates, Wilson was billed $75,049.15 by the Department for the personal information. The state government subsequently tried to retrieve the information on several occasions and sought legal advice on how to force Wilson to hand back or destroy the data after what was characterised as "an honest mistake" made by "a junior staff member". Wilson "declined to return the information and subsequently made several unsuccessful attempts to pay the account".

The Department's Acting Minister, Ljiljanna Ravlich, said at the time that Wilson Parking should return the records, rather plaintively explaining that -
Now that it is explained to them that this has arisen due to a very junior person making this mistake then I think that morally they should give that information back.

I am very disappointed that this has happened. I can understand the disappointment of the people that have received these notices, but what I can tell you is that I am doing everything in my power to make sure that this does not occur again.
A Wilson representative demurred, commenting that "We're entitled to be able to, in accordance with the road traffic act, receive this information and then use it commercially to follow up on people who aren't complying with our terms and conditions". no enthusiasm there for changing the Act.

The document tabled by Ravlich's colleague noted a finding by the WA Corruption & Crime Commission (alas not online) that "no misconduct" had occurred. It was accompanied by the Minister's announcement that the department had agreed to implement all of the review’s 34 recommendations, including changes to legislation. He stated that "I will now progress this legislation as a matter of priority" and would fully support bringing about cultural change within the licensing area.

Three years later Wilson, the state government and registrant privacy are again in the news. The SMH reports that -
The confidential details of 10,000 WA drivers have been revealed to a private parking company pursuing customers for unpaid parking fees.

The state government gave the information to Wilson Parking during September and October after the company took action in the Supreme Court to be able to contact a handful of drivers who had parking debts.

The government was ordered by the Supreme Court to make the details available, but rather than only the targeted drivers', 10,031 other drivers' records were sent.
A thousand here, a thousand there ... the numbers soon add up.

Opposition transport spokesman Ken Travers is reported as commenting that the Government had reneged on its 2008 commitment, repeated in 2010, to protect drivers' confidential details.
This is just another example of a government that is quick to grab the headlines but when it comes to action and protecting people it is nowhere to be seen.

It is outrageous for the Barnett Government to not only renege on their promise, but it never informed the public their private details were being released.

If the government intends to release personal information there must be the proper framework in place for managing that information
Travers called for safeguards. He may be waiting some time, given the slow pace of legislative reform, complacency within the government transport/registration agencies and silence on the part of privacy advocates.

Last year Wilson won a WA Supreme Court order for access to the names and addresses of 20 vehicle owners that Wilson argued had not paid its parking breach notices. With that precedent, Wilson was back in court in July this year. The Transport Department was ordered to provide details regarding a further 10,000 motorists, claimed to represent about $600,000 in unpaid breaches.

That action has attracted criticism, given that Wilson does not have the authority to issue fines, instead relying on parking infringement notices under contract law (characterised - delightfully - as not a fine but a "pre-calculation" of Wilson's lost revenue and enforcement costs, ie liquidated damages).

IMS

'Sorrell v. IMS Health: Details, Detailing, and the Death of Privacy' by Ashutosh Avinash Bhagwat in Vermont Law Review (2012) considers the implications of the US Supreme Court’s recent decision in IMS Health v. Sorrell, 131 S. Ct. 2653 (2011).

In IMS Health the Court struck down a Vermont statute that banned the sale or disclosure by pharmacies of information regarding the prescribing habits of physicians, if that information was going to be used for the purposes of marketing by pharmaceutical manufacturers.

Bhagwat indicates that
I consider here an important issue that was raised, discussed, but ultimately avoided in IMS Health: what restrictions does the First Amendment place on the government’s ability to limit or prohibit the disclosure of pure data, in order to protect personal privacy. The issue could be avoided in IMS Health because the specific Vermont statute at issue in that case did not, as it happens, impose a general restriction on data disclosure for privacy reasons, it rather only restricted specific uses of regulated data, in order to advance state interests quite distinct from privacy concerns. The broader question of data regulation, however, is lurking in the wings of this and other litigation, and is likely to pose difficult challenges for courts in coming years, as the spread of the Internet drives legislatures to adopt increasingly stringent privacy laws.

While the IMS Health majority did not decide the data-disclosure issue posed in the case, it did address it in ways that strongly suggest the six justices in the majority would treat such disclosures as fully protected speech. Moreover, the analysis provided in this article demonstrates that the majority’s hints are fully justified by current Supreme Court doctrine. As currently interpreted by the Court, the First Amendment provides full constitutional protection to disclosures of even personal data, and so restrictions on such disclosures must survive strict scrutiny, a standard that has proven almost impossible to satisfy in the First Amendment context. As a consequence, under current law most statutes seeking to protect privacy by prohibiting data disclosure are likely to be invalidated.

In the balance of the article, I suggest that this result reflects a serious weakness in current doctrine, which is the failure to recognize that factual speech is distinct from, and requires different constitutional analysis than, the sorts of political and cultural speech that have traditionally been the mainstay of First Amendment litigation. In particular, drawing on a number of areas of developed law, I argue that speech consisting purely of specific factual data regarding individuals should be considered to be fully protected under the First Amendment only if the speech meaningfully contributes to the process of democratic self-governance. Other data should remain protected, but under a lower standard of scrutiny, perhaps an intermediate standard incorporating an element of balancing. I also briefly explore how different kinds of privacy laws might fare under such an approach.

Anonymous Gametes

'Rethinking Sperm-Donor Anonymity: Of Changed Selves, Non-Identity, and One-Night Stands' by I. Glenn Cohen, forthcoming in Georgetown Law Journal, comments that -
In the United States, a movement urging legally prohibiting sperm-donor anonymity is rapidly gaining steam. In her forthcoming article in this journal, 'The New Kinship', and in her wonderful book, Test Tube Families, Naomi Cahn is among this movement’s most passionate and thoughtful supporters. She argues for mandatory sperm-donor registries of the type in place in Sweden, Austria, Germany, Switzerland, the Australian states of Victoria and Western Australia, the Netherlands, Norway, and, most recently, the United Kingdom and New Zealand. The UK system is typical in requiring new sperm (and egg) donors to put identifying information into a registry and providing that a donor-conceived child “is entitled to request and receive their donor’s name and last known address, once they reach the age of 18.”

In this Article, I explain why the arguments for these registries fail, using Cahn’s article as my jumping off point.

I demonstrate four problems with the arguments she offers for eliminating anonymous sperm donation:
1) Her argument for harm to sperm donor and recipient parents fails in light of the availability of open-identity programs for those who want them, such that she imposes a one-size-fits-all solution where it would be better to let sperm donor and recipients parents choose for themselves.

2) Her argument for harm to children that result from anonymous sperm donation fails for reasons relating to the Non-Identity Problem. This portion of the Article summarizes work I have done elsewhere, most in-depth in 'Regulating Reproduction: The Problem With Best Interests', 96 Minn. L. Rev (forthcoming, 2011), and 'Beyond Best Interests', 96 Minn. L. Rev. (forthcoming, 2012 and up on SSRN soon).

3) She has sub silentio privileged analogies to adoption over analogies to coital reproduction. When the latter analogy is considered, her argument is weakened. I show this through a Swiftian Modest Proposal of a Misattributed-Paternity and One-Night-Stand Registry paralleling the one she defends for sperm donation.

4) The argument may not go far enough even on its own terms in endorsing only a “passive” registry in which children have to reach out to determine if they were donor conceived, rather than an “active” registry that would reach out to them. If we recoil from such active registries, that is a reason to re-examine the reasons in favor of the less effective passive ones.
For the reasons discussed, despite my admiration for this paper and all of Cahn’s work, I am not persuaded by the argument for adopting a mandatory sperm-donor identification registry of the kind in place elsewhere in the world. Indeed, I think these registries should be eliminated, not replicated. At a moment in which the idea of these registries is rapidly gaining popularity and attention in the United States, I hope my dissenting voice will be heeded.
The article is worthy of consideration.

21 December 2011

Vodafail

Past entries in this blog have noted the permissive stance of the national Privacy Commissioner regarding problems with the Vodafone dealer network and - by extension - with poor practice on the part of Vodafone's competitors.

Unsurprisingly, the deficiencies of the co-regulatory regime are evident in the belated response by the Australian Communications & Media Authority (ACMA) to the large scale Vodafone data breach.

The Australian Communications Consumer Action Network (ACCAN) has criticised ACMA's response to "Vodafail" as revealing "deep flaws" in the regulatory regime [PDF] -
Peak consumer body ACCAN says current and ex Vodafone customers will be left shaking their heads today when they discover that, 12 months on, the telecommunications regulator has let the provider off virtually scot-free for the widespread network, complaint-handling problems that plagued Vodafone customers last summer.
ACCAN goes on to comment that -
Following an investigation, the Australian Communications and Media Authority (ACMA) has issued Vodafone with “directions” to comply with the voluntary Telecommunications Consumer Protection Code.

“These ‘directions’ by the ACMA effectively mean what was a voluntary industry Code is now mandatory for Vodafone,” said ACCAN Chief Executive Officer Teresa Corbin.

“There are no fines and no sanctions that the regulator can issue as a result of this investigation, despite its findings of four serious Code breaches by Vodafone, including customer service representatives giving their customers incorrect and inconsistent advice while experiencing widespread network problems, and failing to adequately identify and address systemic complaints.”

“These network problems impacted on millions of Vodafone customers last summer and were it not for the negative publicity generated through the media picking up on the story, Vodafone might have continued to deny there was any.”

“The media in Australia do a great job but we don’t think holding the telecommunications industry to account should be left to journalists, consumer advocates and members of the public
ACMA notes the national telco regulator "has issued directions to two Vodafone companies requiring them to comply with the Telecommunications Consumer Protections Code (TCP Code)" -
‘These directions are intended to make sure Vodafone remains focussed on improving outcomes for its consumers by increasing the regulatory consequences of any further breach,’ said ACMA Chairman, Chris Chapman.

‘Certainly, Vodafone has made positive changes over the course of this year but, from this point on, if either Vodafone company fails to comply with the TCP Code, the ACMA can approach the Federal Court seeking civil penalties of up to $250,000.’
Crunch the numbers, of course, and the penalty of a few cents per customer sounds somewhat less impressive. ACMA has belatedly concluded that Vodafone Pty Limited and Vodafone Network Pty Limited -
• failed to classify and analyse complaints as required by the TCP Code
• failed to provide timely customer information about network performance issues in late 2010
• had poor systems in place for protecting the privacy of customers’ personal details prior to January 2011.
Vodafone and the rest of the industry are no doubt quivering in their boots.

As I indicated in a conference paper last month, large-scale data breaches in Australia will continue to occur as long as regulators lack the will/capacity to impose meaningful sanctions and shoddy practice - such as that evident in the recent Telstra data breach - is excused as normal (thus acceptable) industry practice.

Employment Law

The Commonwealth Minister for Employment & Workplace Relations has announced membership of and terms of reference for the Review of the Fair Work Act 2009 (Cth).

The three person committee - Reserve Bank Board Member John Edwards, former Federal Court Judge the Hon Michael Moore and Professor Ron McCallum AO - is to report by 31 May 2012.

The Minister's media release states that -
The Government believes the Fair Work Act is working well, but there is always room for improvement and I am very pleased these three eminent Australians have agreed to lead the review. They are all highly respected and will bring the level of independence and objectivity required for a review of this nature.

We will of course continue to consult with employer organisations, trade unions, employees, workplace relations experts and peak bodies throughout the review period and beyond.

The Fair Work Act underlines a balanced system for good workplace relations – one that promotes national economic prosperity and social inclusion for all Australians. Real economic prosperity and growth requires fairness and security in the workplace. This review reaffirms the Gillard Government’s fundamental commitment to these aims. ...

The review represents an important opportunity to have an evidence based discussion about the operation of the legislation and the extent to which its effects have been consistent with the Government’s objectives.
The Terms of Reference require the committee toexamine and report on -
The extent to which the Fair Work legislation is operating as intended including
• creation of a clear and stable framework of rights and obligations that is simple and straightforward to understand;
• the emphasis on enterprise-level collective bargaining underpinned by simple good faith bargaining obligations and related powers of Fair Work Australia;
vthe promotion of fairness and representation at work;
• effective procedures to resolve grievances and disputes;
• genuine unfair dismissal protection;
• the creation of a new institutional framework and a single and accessible compliance regime; and
• any differential impacts across regions, industries occupations and groups of workers including (but not limited to) women, young workers and people from non-English speaking backgrounds;
and

Areas where the evidence indicates that the operation of the Fair Work legislation could be improved consistent with the objects of the legislation.
The review will not examine issues to be separately addressed by Fair Work Australia as part of the review of all modern awards (other than modern enterprise awards and state reference public sector moderns awards) after the first two years as required by Fair Work (Transitional Provisions and Consequential Amendments) Act 2009 (Cth) Schedule 5, Item 6.

The Minister indicated that the review will draw on a range of sources regarding the operation of the Fair Work legislation. Key evidence gathering will include -
• the release of a background paper on the Fair Work legislation inviting stakeholders to make a submission to the review;
• meetings with key stakeholders/roundtable discussions to outline their experiences with the Fair Work legislation; and
vthe commissioning of any additional quantitative and qualitative data that may be required.
Qualitative and quantitative data collection to measure the regulatory impact of the legislation will include -
• the Department of Education, Employment & Workplace Relations’ Workplace Agreements Database;
• the Fair Work Ombudsman;
• Fair Work Australia;
• the Australian Bureau of Statistics;
• evidence sources developed by stakeholders; and
• other relevant statistical sources.

20 December 2011

Anonymity

The 43 page 'Lessons Learned Too Well', a paper by Michael Froomkin for the Oxford Internet Institute’s September 2011 conference A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, "examines, contextualizes, and critiques an international trend towards the regulation of anonymity".

The paper -
describes private incentives and initiatives during the past decade that resulted in the deployment of a variety of technologies and services each of which is unfriendly to anonymous communication. It then looks at three types of government regulation, relevant to anonymity: the general phenomenon of chokepoint regulation, and the more specific phenomena of online identification requirements and data retention (which can be understood as a special form of identification).

The concluding section takes a pessimistic view of the likelihood that given the rapid pace of technical and regulatory changes the fate of online anonymity in the next decade will be determined by human rights law rather than by the deployment of new technologies or, most likely, pragmatic political choices. It therefore offers normative and pragmatic arguments why anonymity is worth preserving and concludes with questions that proponents of further limits on anonymous online speech should be expected to answer.

The consequences of an anonymity ban are likely to be negative. This paper attempts to explain how we came to this pass, and what should be done to avoid making the problem worse.
Froomkin comments that -
There are those who say that in order to be safe we will have to create an infrastructure of mandatory identification. Some, including many of those charged with making decisions for the public’s safety, clearly say it in the best of faith. Other argue, sometimes despite the evidence, that we in the US must do so to protect the profits of an industry important to our trade balance. It is all very well for academics, often living in genteel surroundings, to ask that we not give in to fear, and to reply that before we create a regime that may be persistent and eventually ineradicable we should first ensure that there are no less restrictive means, and that we should consider all the externalities. But that is our job.

Here, then, are a few suggestions for avoiding what could otherwise be an outcome we likely will regret, also based on lessons learned from the past twenty years or so. Several of these concepts are already present in European data protection law, but none of them are legal requirements in the US today.
• Demand evidence of the need for mandatory identification and data retention rules, and insist the rules be proportional to the need.
• Avoid rules that lock technology into law.
• Always consider what an identification rule proposed for one purpose can do in the hands of despots.
• Empower user self-regulation whenever possible rather than chokepoint regulation.
• Design filters and annotators before designing walls and takedown mechanisms.
• Require transparency. Make it an offense for devices to make records without clear, knowing, and meaningful consent on the part of the speaker, reader, listener, or viewer.
• Build alternatives in technology and law that allow people to control how much their counterparts know about them, and which by making selective release of information easier reduce the need for a binary choice between anonymity or data nudity.
• Require that privacy-enhancement be built in at the design level.
Those who disagree with these suggestions worry, with some reason, about new technology undermining the powers of states and sovereigns. Why is allowing people to speak freely to each other, without fear of eavesdroppers or retaliation, such a terrible thing? After all, most core government powers, like the power to tax, will not in fact be undermined in any substantial way by unfettered communication so long as we still need to eat and we want physical things such as houses. The issues are the same ‘four horsemen’ they have been for many years: fear of terrorism, money-laundering, child pornographers and drug-dealers, to which one might add in some countries, revolutionaries.

The flip side of these fears is the recognition that even if the power to speak freely and privately is sometimes misused, it is also empowering. Communicative freedom allows people to share ideas, to form groups, and to engage not just in self-realization, but in small scale and even mass political organization. Here then is the most important lesson to be learned, but one that needs to be learned over and over again:
Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority.
The Internet and related communications technologies have shown a great potential to empower end-users, but also to empower firms and especially governments at their expense. Governments (and firms) around the world have learned this lesson all too well, and are taking careful, thorough, and often coordinated steps to ensure that they will be among the winners when the bits settle.

The thing to watch out for, therefore, is whether we, and especially those individuals already burdened with repressive regimes, will be among the winners also.

Transparency

'WikiLeaks: The Illusion of Transparency' by Alasdair Roberts in International Review of Administrative Sciences, (2012) reaches the unremarkable conclusion about wikileaks transcendentalism. He comments that -
It has been said that the 2010 WikiLeaks disclosures marked "the end of secrecy in the old fashioned, cold-war-era sense." This is not true. Advocates of WikiLeaks have overstated the scale and significance of the leaks. They also overlook many ways in which the simple logic of radical transparency - leak, publish, and wait for the inevitable outrage - can be defeated in practice. WikiLeaks only created the illusion of a new era in transparency. In fact the 2010 leaks revealed the obstacles to achievement of increased transparency, even in the digital age.
Roberts argues that -
The WikiLeaks program is politically naive. It is predicated on the assumption that the social order -- the set of structures that channel and legitimize power -- is both deceptive and brittle. Deceptive, in the sense that most people who observe the social order are unaware of the ways in which power is actually used; and brittle, in the sense that it is at risk of collapse once people are shown the true nature of things. As Assange said in December 2006:
[I]n a world in which leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. ... [M]ass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance (Assange 2006b).
The primary goal, therefore, is revelation of the truth. In the past it has been difficult to do this, mainly (it is assumed) because primitive technologies made it difficult to collect and disseminate damning information. But now these technological barriers to revelation are gone.

None of this is right. There is no such thing, even in the age of the internet, as the instantaneous and complete revelation of the truth. In its undigested form, information has no ransformative power at all. Raw data must be distilled; the attention of a distracted audience must be captured; and that audience must accept the message that is put before it. The process by which this is done is complex and easily swayed by commercial and governmental interests. This was true before the advent of the internet and remains true today. Moreover it is not clear that the social order is either deceptive or brittle. We might even say that WikiLeaks proved the reverse: that what was in fact going on behind the curtain was more or less what most people had suspected and were prepared to tolerate. Perhaps for this reason, revelations were not destabilizing. There does not appear to be any fundamental way in which these disclosures have changed realities about the exercise of American power abroad.

The diplomatic and national security apparatus of the United States government employs millions of people and consumes perhaps a trillion dollars annually. Its internal architecture -- a mass of laws, regulations, treaties, routines and informal understandings -- was built up over three-quarters of a century and is now extraordinarily complex. Little of this happened in secret. Most of the critical decisions about the development of American foreign policy, and about the apparatus necessary to execute that policy, were made openly by democratically elected leaders, and sanctioned by voters in thirty national elections.

None of this is meant to deny the need for stronger accountability, and thus increased transparency, for the diplomatic and national security apparatus. Precisely because of the scale and importance of this sector of American government, it ought to be subjected to close scrutiny. Existing oversight policies are inadequate and ought to be strengthened. The monitoring capacity of journalists and other nongovernmental organizations must be enhanced. And citizens should be encouraged to engage more deeply in debates about the aims and methods of U.S. foreign policy. All of these steps involve hard work. There is no technological quick fix. A major difficulty with the WikiLeaks project is that it may delude us into believing otherwise.

19 December 2011

Convergence and other Reviews

We're still imbued by the deregulatory zeitgeist, judging by the 22 page interim report [PDF] of the Australian Government's Convergence Review, concerned with "the policy and regulatory frameworks that apply to the converged media and communications landscape in Australia". The review is independent of the concurrent Independent Media Inquiry being undertaken by Finkelstein and Ricketson.

In summary, the interim report (for public comment by early February) emphasises reduced regulation, recommending -
• a platform-neutral regulatory framework focused on the new concept of Content Services Enterprises
• a new independent regulator for communications in the digital economy
• removal of content-related licenses
The key recommendations are -
A platform-neutral regulatory framework focused on the new concept of Content Service Enterprises

The regulatory framework should centre on entities classified as ‘Content Service Enterprises’. The technology-neutral definition of a Content Service Enterprise would be set intentionally high and should include threshold criteria relating to the scale and nature of entities supplying content services.

A new independent regulator for content and communications in the digital economy

A new independent regulator for content and communications that operates at arms-length from government and industry. The regulator should have flexible powers to make rules within the principles and policy frameworks established by legislation.

Removal of content-related licenses

Content licences should no longer be required to provide a content service.

New diversity and competition arrangements

The minimum number of voices rule in a local market should be revised to include all Content Service Enterprises. This new rule could cover entities such as national newspapers, subscription television and online providers, where they qualify as a Content Service Enterprise.

A public interest test should be developed to ensure that diversity considerations are taken into account where Content Service Enterprises with significant influence at a national level are involved in mergers or acquisitions.

The new regulator should be given broad and flexible powers to issue directions and make rules in order to promote fair and effective competition in content and communications markets.

Reform of spectrum planning and allocation arrangements

The government should develop a common and consistent approach to the allocation and management of both broadcasting and non-broadcasting spectrum. This approach will separate most existing content-related obligations of broadcast enterprises from licenses to use spectrum.

New platform-neutral Australian content arrangements

All Content Service Enterprises that provide audio-visual content, whether linear or non-linear, should be required to support Australian content. This could be done by either:
• Committing a percentage of total program expenditure to producing specified Australian content, or where this is not practicable,
• Contributing to a converged content production fund.
Commercial free-to-air (FTA) television broadcasters will eventually fall under the Content Service Enterprises arrangements. Transitional measures for commercial FTA television broadcasters include:
• 55% Australian content quota on the main channel to continue in the interim
• Some increase in Australian sub quota content obligations should be flexibly applied to reflect the two additional channels each broadcaster currently operates without content requirements.
Promotion of local content and community broadcasters

Commercial FTA broadcasters using spectrum should continue to devote a minimum amount of programming to material of local significance. A more flexible compliance and reporting regime for this content should be implemented.
Community broadcasters and local content providers should be encouraged to explore innovative ways to deliver local content, including on new delivery platforms.

Reinforcing the role of public broadcasters

The ABC and SBS charters should expressly reflect their range of existing services, including online activities. This will give commercial operators increased certainty about the boundaries of public broadcaster activities. Australian content quotas should apply to public broadcasters.
The interim report could usefully be read in conjunction with Malcolm Turnbull's recent lecture on 'Politics, Journalism and the 24/7 News Cycle' [PDF] at Melbourne University's Centre for Advanced Journalism.

The Productivity Commission, sea-green incorruptibles all, has concurrently released a report on Identifying and Evaluating Regulation Reform [PDF].

The Commission was asked to -
1. examine lessons gathered in Australia and overseas in reviewing regulation, identifying regulatory reform opportunities and priorities, and evaluating regulation reform outcomes.

2. build on such lessons to analyse possible frameworks and approaches for identifying poorly performing areas of regulation and regulatory reform priorities, and both qualitative and quantitative methods for evaluating regulation reform outcomes

3. In proposing enhanced frameworks and approaches to identify poorly performing areas of regulation and regulatory reform priorities, and methods for evaluating reform outcomes, to
• seek public submissions and consult with interested parties as necessary
• have regard to any other relevant current or recent reviews commissioned by Australian governments’ and
• have regard to the assessment of the OECD in its 2009 Review of Regulatory Reform in Australia — Towards a Seamless National Economy that there is likely to be limited scope for gains to regulatory quality through a further tightening of existing processes.
Its report indicates that -
The regulatory system should ensure that new regulation and the existing ‘stock’ are appropriate, effective and efficient. This requires the robust vetting of proposed regulation; ‘fine tuning’ of existing regulations and selecting key areas for reform. It also requires that these be performed in a coordinated and cost-effective way, with political leadership a key factor in all this.

There is a range of approaches to reviewing existing regulation and identifying necessary reforms. Some are more ‘routine’, making incremental improvements through ongoing management of the stock; some involve reviews that are programmed, and some are more ad-hoc.

Designed for different purposes, the techniques within these three categories can complement each other, though their usefulness varies.
• Among ‘management’ approaches, red tape targets can be a good way to commence a burden reduction program. But ‘one-in, one-out’ rules have more disadvantages than advantages. Regulator practices can play a key role in compliance burdens, with scope apparent for improvement.
• Reviews embedded in legislation can usefully target areas of uncertainty. Sunsetting can help eliminate redundant regulation and ensure that re-made regulation is ‘fit for purpose’, but requires good preparation. Post implementation reviews, triggered by the avoidance of a regulation impact statement, are an important failsafe mechanism but need strengthening.
• Public stocktakes cast a wide net and can identify cross-jurisdictional and cumulative burdens. Reviews based on a screening principle, particularly the competition test, have been highly effective and could be extended. In-depth reviews are best for identifying options for reform in more complex areas, while benchmarking can point to leading practices.
Good design features vary for the individual techniques, but all require sound governance and effective consultation. For significant reviews, public exposure of preliminary findings is a key success factor.

While Australia’s regulatory system now has the necessary institutions and processes broadly in place, there remains scope for improvement in:
• prioritisation and sequencing of reviews and reforms — with greater attention paid to the costs of developing and undertaking reforms
• monitoring of reviews and the implementation of reforms
• advance information to achieve better focused consultations
• incentives and mechanisms for good practice by regulators — with a further review needed to identify the best approaches
• building public sector skills in evaluation and review.

18 December 2011

Bioethics

University of Pennsylvania bioethicists Lance Wahlert & Autumn Fiester have argued for a queer bioethics, noting claims that bioethics has to be reconceptualised to challenge the status quo, include the disadvantaged and encourage self-reflection among practitioners.

Their 'Queer Bioethics: Why Its Time Has Come' in 26(1) Bioethics (2011) calls for a bioethical analysis that accommodates LGBTQI (lesbian, gay, bisexual, transgender, queer, and intersex) people -
Queer bioethics requires us to take a two-fold approach: (1) We must pay greater attention to the topics, identities, and issues that are blatantly queer, for the service of queer persons; and, (2) We must examine the most common, the most pedestrian, and the most germane of universal health issues (those we wouldn't even instinctively think of as 'queer') and imagine how they might be complicated or rendered troubling by the injection of queer personhood."
Unfortunately the call does not feature a coherent agenda ... it would be useful to move beyond exhortations that "The time for queer bioethics is now". The authors state that -
LGBTQI bioethics, what we call ‘queer bioethics,’ meets all of the demands made by the discipline’s critics. It places the ‘less powerful’ center-stage; it chal- lenges the status quo and the presumptive legitimacy of the normative; it employs powerful intellectual resources from neighboring fields (queer theory, disability studies, medical humanities, and the history of medicine); and, it challenges our complacency in the face of injustice and discrimination in medical encounters, systems, and policies. Given a parallel urgency to the other topics that critics press us to address, the time for queer bioethics is now.
They comment that -
to address and to redress the topics that speak to queer bioethics is to do more than just highlight and collate a list of LGBTQI issues that need attention. This is certainly an indispensable aim of a queering of bioeth- ics; but it does not go far enough. A far loftier goal is to outline how doing queer bioethics constitutes more than expanding the canon of bioethical topics to include queer ones. Rather, queer bioethics mandates a change in both the topical and the methodological approaches to queer identity. To address the former, we maintain, of course, that we must make bioethicists pay greater attention to the ‘queer’ (as a noun) – the persons, identities, and LGBTQI health care matters central to the population in question. But we must also be mindful of the latter by encouraging bioethics to ‘queer’ itself (as a verb) – whereby otherwise non-queer subjects are considered for their sexual variations, are distorted to envision an appre- ciation that is not hetero-normative, and are re-imagined such that conventional notions and readings of patient selfhood (especially sexual- and gender-related ones) face directly the perils of marginalization and stigmatization.
They conclude that -
When it comes to gay, bi, trans, and intersex persons and patients, then, we have to ask multiple questions that might explain the field’s silence – or maybe even its avoid- ance of these persons altogether. Are queer patients being deemed ‘less sympathetic’ or perhaps ‘guilty’ in some unspoken way? Are they somehow read as distasteful and even culpable within the bioethical gaze for their indi- vidual gayness, seropositivity, gender nonconformity, or non-traditional family structures? Have we conflated, in particular in the wake of AIDS, a cultural notion of contagion with the very idea of queerness? In other words, is there an unacknowledged concern that, by showing an interest in queer matters, bioethicists are apprehensive to ‘out’ themselves – not just as queer, but also, more broadly, as queer-invested?