House of Representatives Committees

| House of Representatives Standing Committee on Petitions

Navigation: Previous Page | Contents | Next Page

Chapter 4 Privacy and security concerns

Introduction

4.1                   Over the course of the inquiry three concerns have been raised on matters of privacy and security:

n  first, electronic petitions could be compromised by the fraudulent addition of electronic signatures, by hand or more particularly by way of an automated process, resulting in petitions that were not representative of actual opinion;[1]

n  second, petitioners signing electronic petitions could have their personal details disseminated, resulting in both a loss of privacy and deterring would-be petitioners;[2] and

n  third, electronic petitions could be disrupted through unauthorised access to electronic support systems, and this could result either in fraudulent signatures, or denial-of-service: that is, in the electronic petitions system being unavailable for a period of time.[3]

4.2                   The Clerk noted that in a UK Procedure Committee report on e-petitions it was

proposed that once the e-Petition had been submitted, the principal petitioner would receive an email asking him or her to confirm that he or she had sent the petition, thereby checking that the email address was genuine. A similar procedure would be followed for e-signatories and the names of e-signatories would not be added to e-petitions until signatories had confirmed signature of petitions. The system would identify duplicate names and addresses and would prevent someone signing a petition more than once.[4]

4.3                   This approach was currently in use, the Clerk told the Committee, by the 10 Downing Street electronic petitions website.[5]

4.4                   In relation to the second concern, the Clerk advised that a future model for electronic petitions in the House ‘will need to provide and convey security to its users to ensure that people felt comfortable using the system and providing their personal details’.[6]

4.5                   In relation to the third concern, the Clerk informed the Committee that any future electronic petitions system ‘will need to meet stringent IT security standards’ and that it was ‘essential for the system to be secure, robust and reliable’.[7] Statements by the Scottish Public Petitions Committee (PPC), cited below, also highlight the importance of this.

Preventing fraudulent signatures

4.6                   The Committee considered the methods used to prevent fraudulent signatures in Queensland and Scotland.

Queensland

4.7                   A number of measures are taken by the Queensland Parliament to provide checking of signatures to electronic petitions. First, the Clerk of the Legislative Assembly told the Committee, the electronic petitions web-site protects against ‘auto scripting’, so that:

each and every time somebody goes to sign up on a petition a page comes up that makes them copy down a number—and authentication number, if you like. [This] … essentially … stops people from running auto script databases. So somebody cannot actually have a database of names and addresses and automatically download that onto our system. The auto script procedure makes it a requirement that each and every time somebody enters an e-petition they are given an authentic, individual number and that number has to be put on the system.[8]

4.8                   Second, while the system ‘cannot stop people individually entering fraudulent names onto it, we can see ISP addresses’:

Say one computer has entered 500 addresses overnight. We can tell if it comes from the same IP address, so that would give us an indication to tell us whether or not there is fraud involved or whether or not it is just people where a petition has been popular.[9]

4.9                   The Clerk told the Committee that this ability to check signatures against IP addresses was one of the advantages of parliaments hosting their own system, in contrast to arrangements at the Scottish Parliament where the system is hosted by a third party: ‘We felt that, if we were going to have an e-petitions process, it should be administered by the parliament itself, which reduced the risk of any sort of fraud’.[10]

4.10               However the Clerk suggested that there was no absolute method to verify all signatures: ’when you are dealing in the electronic world, there are limitations to authentication’.

4.11               Comparisons between hard-copy and electronic petitions provided a useful perspective:

I think we have to take a relatively pragmatic view towards authentication. My view is this: for hundreds of years paper petitions have circulated in the community and members have placed their names on and signed petitions. The reality is that we have never conducted audits to make sure that those paper petitions are all the time authentic. We have only ever investigated fraud when allegations have been made and there has been some evidence of fraud submitted. So for hundreds of years we have accepted paper petitions and have taken at face value that there is no fraud involved with them, unless an allegation is made to that extent.[11]

4.12               As a result, Mr Laurie told the Committee:

I think we have to be as pragmatic when it comes to electronic petitions. We have to take at face value that the people who are signing are actually the people who are putting their name to it, if you can understand what I mean, until or unless somebody takes the contrary view.[12]

4.13               However, the methods employed by the Queensland Parliament provided a measure of control over the veracity of signatures, and applied a filter for more obvious instances of fraud:

There is no way that we can guarantee, or anyone can guarantee, authentication of people online unless there is a process for authentication such as that which the banks have with PINs or identification numbers. We have no way of being able to do that. However, the fact that it is done in-house here does allow us to notice suspicious activity. For example, if there is a lot of activity on a petition overnight, if the numbers go up by a thousand or something, it may cause us to have a look at the database to see whether there has been anything suspicious about that activity. But, as I say, there are no guarantees in this business. I do not think that the fears about authentication, however, should dissuade us from having processes like this.[13]

Scotland

4.14               The PPC told the Committee that in the Scottish Parliament several layers of checking were applied to e-petitions. First, both the electronic petitions website and the discussion forum were monitored by parliamentary staff. Second, the e-petitions system performed routine checking for duplications of signatories’ e-mail address, and for ‘rogue signatures’, such as ‘Mickey Mouse or Donald Duck’.[14]

4.15               These practices provide a level of scrutiny, but could not be expected to completely prevent false signatures, the PPC told the Committee. Parallels were drawn with hard-copy petitions, where manual checking could be anticipated to control for gross inaccuracies, but not at the other end of the scale. Consequently, ‘to a certain extent’ the Public Petitions Committee relies ‘on trust quite a lot’ for both hard-copy and electronic petitions.[15]

4.16                The PPC told the Committee that under this regime, to date, there has been ‘fairly little abuse of the system’:

Offensive comments, spam and rogue signatures are quickly removed (the monitoring of the site is undertaken by our clerks). This helps maintain the system's integrity.[16]

Privacy

4.17               The protection of personal information entered by signatories to petitions was considered a significant issue by contributors to the inquiry.

4.18               GetUP informed the Committee that it had ‘most serious concerns’ regarding privacy and online petitions hosted by Parliament. In particular GetUP suggested that an electronic petitions process should not ‘allow the collection of data on petitioners - their opinions, their whereabouts, their Internet use, personal details and other information’.[17] In no way should electronic petitions provide an opportunity ‘store or collect unnecessary information about’ petitioners. To prevent this, ‘there would need to be strong guarantees and procedures that guaranteed’ their privacy.[18]

4.19               The Committee regarded this aspect of electronic petitioning as important. Particular concern was voiced at the prospect that the personal details of petitioners, harvested from electronic petitions, could be used to create email lists which in turn would be used by those with a political interest to contact voters.[19]

4.20               The Speaker of the Legislative Assembly advised the Committee that specific processes have been framed to protect the privacy of signatories to electronic petitions in the Queensland Parliament:

The names and addresses of signatories are not available on the website. However printed copies of the tabled e-petition are available upon request to the public as is the case with paper petitions.[20]

4.21               In addition:

Petitioners' details are deleted from electronic storage in accordance with the data retention policy at a maximum of 6 months after the tabling date.[21]

4.22               The PPC did not comment directly on privacy in electronic petitioning. However the electronic petitions website of that committee makes the following statement:

Only your name and country will appear on the website. The other details you give us are needed by the [PPC] to validate your signature. This is the same information required for a paper petition. Your details will only be used by the PPC and the International Teledemocracy Centre (ITC) who host the e-Petitions System, unless you have given permission for your details to be passed on to the principal petitioner. Your details will not be used for any purposes other than e-Petitioner, unless you have expressly given permission otherwise.[22]

System integrity

4.23               For an electronic petitions website two important aspects of system integrity are the ability to protect against unauthorised access and the ability to manage variations in demand from internet users. Representatives of the Queensland and Scottish parliaments did not report any instances of unauthorised access to electronic petitions systems.

4.24               With respect to levels of demand, Mr Laurie told the Committee that the Queensland Parliament electronic petitions system had received ‘55,000 or 60,000 signatures in a week’, for a petition on daylight saving, but there had not been ‘any problem with the system operating with that sort of capacity’.[23]

4.25               However, the PPC was concerned about the currency and resilience of the electronic system that supports electronic petitions in the Scottish Parliament. This was important due to high volumes of traffic on the electronic petitions website which, the PPC informed the Committee regularly received ‘over 1 million hits per month, some months have approach[ed] 1.8 million hits’. As a result, the PPC suggested that such systems should have a capacity ‘to cope with usage beyond expectations’.[24]

4.26               These concerns were borne out early in 2008 when for ‘a period’ the discussion forum part of the electronic petitions website was ‘down due to hardware problems’. This was ‘extremely regrettable and inconvenient to us and petitioners’.[25]

Committee comment

4.27               In the Committee’s view, these three requirements—reasonable measures to control for fraudulent signatures; adequate privacy provisions; and sufficient redundancy and resilience in information technology arrangements—are achievable in the House of Representatives environment.

Verification

4.28               In the future new electronic tools may come into being which support higher levels of checking for electronic petitions. At present, the Committee agrees with the proposition of the PPC that balancing the twin imperatives of maintaining security and accessibility requires careful judgement.

4.29               As the PPC suggested, the challenge is to maintain ‘an open system, which allows the robust exchanges of views’, while ‘preventing abuse’. [26] Essentially, this entails tolerating minor degrees of error (for example in signature counts) in order to protect accessibility. While it is important that the majority of signatures are genuine and valid, too high a level of vigilance may effectively close-down access, defeating the purpose of a petitions system.

Privacy

4.30               Similarly, the Committee also heard persuasive evidence that the privacy of petitioners was a key aspect of their willingness to participate in a petitions process. It appears unequivocal that petitioners are wary of surrendering personal details in a petition and then having those details shared with other entities, or used for other purposes.

4.31               Queensland Parliament has adopted a clear policy on the confidentiality of petitioners’ details. While petitioner’s names are published electronically, other details, such as postal and email address are held in confidence in the back-end of the system. Electronic records of these details are deleted six months after the petition has closed, although they are retained in the record of the business of the chamber by virtue of the petition being printed prior to its presentation to Parliament.[27]

4.32               Here too balance is important. It is a standing arrangement that hard-copy petitions in the House can be viewed, at any time after presentation, on request. This is integral to principles of transparency: once presented, petitions are public documents, open to inspection by anyone who so asks.

4.33               Such a process is consistent with the idea, indicated above, that when a petitioner signs a petition, the surrender of personal details is the democratic ‘price’ of expressing a view. The information lends weight to the signature by providing a basis for verification.

4.34               In the House of Representatives requests may be made to view petitions, but are infrequent. It is important to consider whether the advent of electronic petitions in the House would make it necessary to change these arrangements.

4.35               In the Committee’s view, present anxieties over the sharing and transmission of personal details stem chiefly from the ease of sharing electronic information. Electronic contact lists have commercial and political value, and may be misused in a variety of ways.

4.36               These are good arguments for maintaining high levels of security and confidentiality when holding personal details in trust. Clear policies on how long such records are kept, and when they are deleted, are likely to help keep faith between Parliament and any future petitioners in the electronic domain.

4.37               In the Committee’s view, however, management of such details is less problematic in relation to paper printouts of petitions. Since they can only be viewed in the Table Office at Parliament House, and cannot be copied, access to petitions is unlikely to represent a significant threat to confidentiality for multiple signatories attached to a petition. There is value in the transparency provided by having these physical copies available, which should be held in balance with issues of confidentiality. 

4.38               Another question which relates to privacy is: should petitioners’ details be used for email communications from the Committee? Does this breach confidentiality? The Scottish Parliament employs an ‘opt-in’ approach, whether petitioners have to actively nominate to be contacted by the PPC via email. Many petitioners appear to do this: the PPC advised that subsequent to the introduction of electronic petitions, the majority of its correspondence took place via email.[28] This is an approach which could be followed by the House.

System integrity

4.39               The Committee notes the evidence of the PPC regarding sufficient IT capacity to allow for variations in demand. It also notes the Clerk of the House’s reference to system failure as a source of risk (resulting in loss of reputation) under an electronic petitions system.[29] This is important in view of the volumes of traffic quoted for the PPC’s electronic petitioning website.

4.40               The Committee notes the importance of an ability to add further elements to the system to respond to such volumes and variations in internet traffic (known as ‘scaleability’).

4.41               The Committee also notes the importance of monitoring technical developments, including those relevant to validation and verification. This is an area of technology undergoing significant and rapid change. If the House adopts electronic petitioning, electronic petitions facilities should be maintained and developed so they remain current.

4.42               Above all, the Committee wishes to emphasise the importance of getting the balance right between different imperatives involved in, and highlighted by, electronic petitioning to parliaments. The matters considered in this chapter show a strong nexus between reliability, accessibility, engagement, privacy and credibility, in order for electronic petitions to gain traction and the House keep faith with petitioners.

4.43               Together, these constitute a minimum requirement. Breaches in any of these areas would alienate potential petitioners. On a more positive note, if well-managed in this regard, an electronic petitioning system could make possible substantive gains in the realm of engagement—even without the use of the social networking facilities employed elsewhere—simply by providing a safe, secure, widely-accessible system through which petitioners can express their views.

 

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.