26.01.2015 Views

Responding to the financial abuse of older people - Loddon ...

Responding to the financial abuse of older people - Loddon ...

Responding to the financial abuse of older people - Loddon ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

69. Manda<strong>to</strong>ry reporting may give reporters an impression that only those matters<br />

that are specifically required <strong>to</strong> be reported are relevant and <strong>the</strong>y may <strong>the</strong>refore<br />

fail <strong>to</strong> exercise judgement as <strong>to</strong> whe<strong>the</strong>r any o<strong>the</strong>r fac<strong>to</strong>rs should be considered.<br />

70. The Banking and Financial Services Ombudsman issued its Bulletin 56,<br />

Financial <strong>abuse</strong> <strong>of</strong> <strong>the</strong> vulnerable <strong>older</strong> person, in December 2007 and addressed<br />

issues <strong>of</strong> privacy and confidentiality on pp. 21 and 22. Most <strong>of</strong> <strong>the</strong> privacy issues<br />

discussed in Bulletin 56 have already been discussed above, except that <strong>the</strong><br />

Bulletin suggests obtaining early consent <strong>to</strong> notify ‘named, trusted third parties’<br />

<strong>of</strong> suspicious account activities where <strong>the</strong> third party cannot operate <strong>the</strong> account.<br />

An example <strong>of</strong> such a third party may be a trusted relative who may have access<br />

<strong>to</strong> view account information but is not permitted <strong>to</strong> operate <strong>the</strong> elder’s account.<br />

71. K. Wills, ‘Privacy <strong>of</strong> deb<strong>to</strong>rs’ information’ in Australian Consumer Credit Law,<br />

LexisNexis, [17.075].<br />

72. See <strong>the</strong> exceptions regarding NPP 2 (use and disclosure) discussed in section 6.5<br />

<strong>of</strong> this report.<br />

73. See F. Gurry, ‘Breach <strong>of</strong> confidence’ in P. D. Finn (ed.), Essays in Equity, Law Book Co,<br />

Sydney, 1985, p. 116; Telstra Corp Ltd v First Netcom Pty Ltd (1997) 148 ALR 202;<br />

Cornelius v De Taran<strong>to</strong> [2002] EMLR 6.<br />

74. Smith Kline and French Labora<strong>to</strong>ries (Aust) Ltd v Secretary, Department <strong>of</strong><br />

Community Services and Health (1991) 20 IPR 643. This is a case where <strong>the</strong><br />

Department used <strong>the</strong> information provided in one pharmaceutical company’s<br />

application <strong>to</strong> assess ano<strong>the</strong>r pharmaceutical company’s drugs and <strong>the</strong> first<br />

pharmaceutical company argued that <strong>the</strong> Department was only authorised <strong>to</strong> use<br />

<strong>the</strong> information <strong>to</strong> assess its own products but not <strong>the</strong> second company’s products.<br />

75. Our view is based on <strong>the</strong> assumption that any report <strong>of</strong> suspected <strong>abuse</strong> will<br />

necessarily entail <strong>the</strong> bank’s disclosure <strong>of</strong> information <strong>of</strong> a confidential nature;<br />

in particular, information relating <strong>to</strong> <strong>the</strong> operation <strong>of</strong> a cus<strong>to</strong>mer’s account<br />

(see section 6.2(d) above). For example, if a bank teller observes that a third party<br />

is exerting undue pressure on a cus<strong>to</strong>mer <strong>to</strong> withdraw money and makes a report<br />

<strong>of</strong> suspected <strong>abuse</strong>, that report will include information in respect <strong>of</strong> <strong>the</strong> operation<br />

<strong>of</strong> <strong>the</strong> cus<strong>to</strong>mer’s account and is <strong>the</strong>refore information <strong>of</strong> a confidential nature.<br />

76. See NRMA Ltd v Geeson (2001) 39 ACSR 401; and NP Generations Pty Ltd v Feneley<br />

(2001) 80 SASR 151.<br />

77. For example, Commonwealth v John Fairfax & Sons Ltd (1980) 147 CLR 39 at 51–52;<br />

At<strong>to</strong>rney General (UK) v Heinemann Publishers Australia Pty Ltd (1987) 75 ALR 353<br />

at 454. Compare: NRMA Ltd v Geeson (2001) 39 ACSR 401.<br />

78. This is an overlap <strong>of</strong> a bank’s obligations under <strong>the</strong> Privacy Act, fur<strong>the</strong>r discussed<br />

in section 6 <strong>of</strong> this report.<br />

55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!