Page:Interception of Communications and Surveillance Ordinance (Cap. 589).pdf/65

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.

INTERCEPTION OF COMMUNICATIONS AND
SURVEILLANCE ORDINANCE—SCHEDULE 3

Ord. No. 20 of 2006
A1321


(iv) if known, particulars of any premises or any object or class of objects in or on which the Type 2 surveillance is to be carried out;
(v) the proposed duration of the Type 2 surveillance;
(vi) the grounds for the reasonable suspicion specified in section 3(1)(b) of this Ordinance;
(vii) the following information—
(A) where the purpose sought to be furthered by carrying out the Type 2 surveillance is that specified in section 3(1)(a)(i) of this Ordinance, the particular serious crime to be prevented or detected and an assessment of its immediacy and gravity; or
(B) where the purpose sought to be furthered by carrying out the Type 2 surveillance is that specified in section 3(1)(a)(ii) of this Ordinance, the particular threat to public security, an assessment of its immediacy and gravity, and an assessment of its impact, both direct and indirect, on the security of Hong Kong, the residents of Hong Kong, or other persons in Hong Kong;
(viii) the benefits likely to be obtained by carrying out the Type 2 surveillance;
(ix) an assessment of the impact (if any) of the Type 2 surveillance on any person referred to in subparagraph (iii);
(x) the likelihood that any information which may be subject to legal professional privilege, or may be the contents of any journalistic material, will be obtained by carrying out the Type 2 surveillance;
(xi) the reason why the purpose sought to be furthered by carrying out the Type 2 surveillance cannot reasonably be furthered by other less intrusive means; and
(xii) if known, whether, during the preceding 2 years, there has been any application for the issue or renewal of a prescribed authorization in which any person set out in the statement under subparagraph (ii) has also been identified as the subject of the interception or covert surveillance concerned, and if so, particulars of such application; and
(c) identify by name, rank and post the applicant.