Exclusive: Storm over Big Brother database

Size: px
Start display at page:

Download "Exclusive: Storm over Big Brother database"

Transcription

1 Joan Smith: The male-female divide gets worse as you grow older Exclusive: Storm over Big Brother database By Robert Verkaik and Nigel Morris Wednesday, 15 October 2008 Share Print Text Size Normal Large Extra Large PA The planned database containing information on every and phone call could be held at GCHQ SPONSORED LINKS:

2 Ads by Google NHS Organ Donor register If you believe in organ donation,prove it. Register now. Achieve Compliance CLAS; PCI DSS; ISO 27001; DPAand PIA compliance consultancy Database Solutions Microsoft certified partnersspecialised in database solutions Media Database On-Demand Access a Database of 800,000+ MediaContacts and More. Free Demo! Early plans to create a giant "Big Brother" database holding information about every phone call, and internet visit made in the UK were last night condemned by the Government's own terrorism watchdog. Lord Carlile of Berriew QC, the independent reviewer of anti-terrorist laws, said the "raw idea" of the database was "awful" and called for controls to stop government agencies using it to conduct fishing expeditions into the private lives of the public. Today the Home Secretary, Jacqui Smith, is expected to signal the Government's intention to press ahead with proposals to collect more details about people's phone, and web-browsing habits as she warns that the terrorist threat to Britain is growing. Related articles Hoon defends plans for 'Big Brother' database Big Brother database: the revolt grows Letters: 'Big Brother' database Search the news archive for more stories The controversial measure will be included as a way of combating terrorism in the Data Communications Bill, which is to be introduced in the Queen's Speech in December. Ministers are known to be considering the creation of a single database holding all the information, which would include phone numbers dialled and addresses to which s are sent but not details of phone conversations or the contents of s. An increasing number of influential figures from across the political spectrum have expressed growing alarm over the scale of the proposals that would give the state unprecedented access into the lives of its citizens. Lord Carlile described the government's recent track record on handling public data as an "unhappy one", and said that searches of a new database should only be carried out with the authority of a court warrant. He told The Independent: "As a raw idea it is awful. However it is a question of degrees and how it is developed. Searches should be made on a case-by-case basis with appropriate reviewing measures so that they can't be done willy-nilly by government." Under the proposal, internet service providers and telecoms companies would hand over millions of phone and internet records to the Home Office, which would store them for at least 12 months so that the police

3 and security services could access them. It is understood that more than 1bn has been earmarked for the database. Richard Thomas, the Information Commissioner, has described the plans as "a step too far for the British way of life". Yesterday his office added: "It is clear that more needs to be done to protect people's personal information, but creating big databases... means you can never eliminate the risk that the data will fall into the wrong hands." Shami Chakrabarti, director of the human rights group Liberty, said: "This is another example of the Government's obsession with gathering as much information on each of us as possible in case it might prove useful in the future. Like the discredited ID card scheme this will have a massive impact on our privacy but will do nothing to make us safer." Lord Carlile acknowledged the value of using phone and internet intelligence in fighting crime, but he said it would be wrong to go as far as the US Patriot Acts. "[They] go much further so that they [US data searches] include everyone who has made contact with a terror suspect... There must be codes of practice... In counter-terrorism collation is everything but raw data only has a limited use." Dominic Grieve, the Shadow Home Secretary, said: "The Government must justify the case for any such massive increase in state acquisition, sharing and retention of data, spell out the safeguards to prevent abuse and given its appalling record explain how it will protect the integrity of any database holding sensitive personal data." Chris Huhne, the Liberal Democrat home affairs spokesman, said: "Ministers simply can't be trusted with confidential data of this sort, as it has shown again and again." Plans for the giant database were first announced by the Prime Minister in February under the unprepossessing title of the Intercept Modernisation Programme. It is not clear where the database will be held but GCHQ, the government eavesdropping centre, may eventually be the home for the project. The proposal emerged as part of plans to implement an EU directive developed after the 7 July bombings to bring uniformity to record-keeping. Since last October telecoms companies have been required to keep records of phone calls and text messages for 12 months. That requirement is to be extended to internet, and voice-over-internet use and included in a Communications Data Bill. * Lord West of Spithead, the Counter-terrorism minister, last night said "another great plot" was being investigated by police and security services. How the Government wants to watch over us By Robert Verkaik What is the Communications Data Bill? It will allow the authorities to collect and retain details of every phone number we have called or texted, as well as every address to which we have sent s and internet site we have accessed. The Government is preparing to announce its inclusion in the Queen's Speech legislative programme to be set out on 3 December. What happens at the moment? Under the Regulation of Investigatory Powers Act (RIPA), some 650 public bodies including police and local authorities can require internet service providers or mobile-phone companies to hand over details of their customers' phone, and internet habits. About 500,000 requests were made last year. The rules say public bodies can only access records if it is for a legitimate purpose and proportionate criteria

4 which critics complain are too vague. Under a voluntary agreement, the internet service providers and phone companies store such records for a year. But they have protested about the huge pressure they are under to store such vast amounts of material. How does the Bill change this? It puts the retention of data on a statutory rather than voluntary basis and, crucially, paves the way for the information being transferred to a giant government database. The Bill also turns into British law an EU directive requiring companies to keep communications data for up to two years. How do ministers justify the plans? They say police and security services need more up-to-date tools in tackling terrorist and criminal conspiracies that are more international in nature and rely on high-tech communications. It is in the security services' interests to have a single point of access to track phone and internet records of suspects. It is harder to trace links between conspirators whose records are held by different companies. Would contents of s and phone calls be included? No. Investigators can only intercept s and tap phones under warrants approved by the Home Secretary. The aim is to monitor patterns of behaviour and establish links between conspirators. What information might they recover? Police or the security services could establish when a call was made and its length, as well as the number that was dialled. It is thought information could also be gathered as to the location of a mobile phone when a call was made. Information could be retrieved about when s were sent and who the recipient was, as well as a full picture of internet sites visited. How would access to such a database be governed? The details are likely to be spelt out later this year by the Home Secretary. The Government promises there will be "strict safeguards" to "strike the proper balance between privacy and protecting the public". The likelihood is that the RIPA rules requiring requests for information to be approved by senior officers within public bodies will continue to apply. How much electronic communication is there? About one trillion s and more than 60 billion text messages will be sent in Britain this year. Most homes and offices now have a computer; there are an estimated 20 million broadband connections. How does this information help solve crime? and telephone data has proved vital in the fight against al-qa'ida. Mobile-phone location data was used in January in the conviction of Colm Murphy for his part in the Omagh bombing. Telephone records helped to send the serial killer Harold Shipman to jail. Will the Big Brother 'Database Communications Bill' be included in the Queen's speech in December?

5 SPONSORED LINKS: Ads by Google Lynceus Training Law Enforcement TrainingComercial and Government; Worldwide World's Most Popular CRM Voted Best SME & Enterprise CRMat UK Software Satisfaction Awards Innovative Data Solutions Bespoke FileMaker & Web solutions- Project finance also available ACT! Software & Training London and Home Counties independent.co.uk Legal Terms & Policies sign-up RSS Contact us Syndication Advertising Guide Group sites London Careers Subscriptions

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP 2011 www.olswang.com 1

UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP 2011 www.olswang.com 1 UK Cloud Computing Interception - nothing new Clive Gringras Olswang LLP 2011 www.olswang.com 1 UK Cloud Computing Interception - nothing new Some UK cloud-computing customers are concerned that they should

More information

CONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA

CONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA CONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA A consultation paper March 2003 CONTENTS 1. Executive Summary 2. Introduction 3. Responses to the Consultation 4.

More information

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information

Draft Communications Data Bill

Draft Communications Data Bill Draft Communications Data Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2012 Cm 8359 20.00 Crown copyright 2012 You may re-use this information

More information

OFFICIAL. Operational Case for the Retention of Internet Connection Records

OFFICIAL. Operational Case for the Retention of Internet Connection Records Operational Case for the Retention of Internet Connection Records 1 Contents Chapter Page 1 Key Facts 3-5 2 What is an ICR? 6 3 The Value of ICRs 7 4 Why is there a problem? 8 5 How does this problem relate

More information

Technical Questions on Data Retention

Technical Questions on Data Retention Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

Information sharing. Advice for practitioners providing safeguarding services to children, young people, parents and carers

Information sharing. Advice for practitioners providing safeguarding services to children, young people, parents and carers Information sharing Advice for practitioners providing safeguarding services to children, young people, parents and carers March 2015 Contents Summary 3 About this government advice 3 Who is this advice

More information

Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000

Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Draft for public consultation February 2015 Contents Contents... 2 1. General...

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

Student Worksheet Government Surveillance of Citizens Raises Civil Liberty Questions

Student Worksheet Government Surveillance of Citizens Raises Civil Liberty Questions Page 1 http://www.pbs.org/newshour/extra Student Worksheet Government Surveillance of Citizens Raises Civil Liberty Questions http://www.pbs.org/newshour/extra/2013/06/government-surveillance-of-citizens-raises-civil-liberty-concerns/

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

Infrastructure Our Tax Securing Presented by:

Infrastructure Our Tax Securing Presented by: Securing Our Tax Infrastructure Security and Fraud in the efile Age FTA Technology Conference August 15, 2011 Presented by: Clinton Mugge Joan Barr 8/15/11 1 [ Agenda ] 1 2 3 4 Security Threats Impact

More information

Formal response to the Consultation Paper: Monitoring and Regulation of Migration

Formal response to the Consultation Paper: Monitoring and Regulation of Migration WITHOUT PREJUDICE Formal response to the Consultation Paper: Monitoring and Regulation of Migration 1 October 2004 1. Introduction 1.1. The role of the Office of the Data Protection Registrar ( the Registrar

More information

Crime and Policing newsletter: March 2013

Crime and Policing newsletter: March 2013 Page 1 of 5 Home Office Part of: Crime and Policing newsletter: March 2013 Crime and Policing newsletter: March 2013 Published 2 April 2013 The March edition of the newsletter. HMIC review On 12 March

More information

Online Research and Investigation

Online Research and Investigation Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,... DISPATCHES How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald 24 Feb 2014, 6:25 PM EST 1 of 17 02/25/2014 10:22 AM A page from a GCHQ top secret

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

Thank you for your request for information regarding ACPO UAS Steering Group which has now been considered.

Thank you for your request for information regarding ACPO UAS Steering Group which has now been considered. c/o PO BOX 481 Fareham Hampshire PO14 9FS Tel: 02380 674255 Email: acpo.request@foi.pnn.police.uk 29/08/2013 Dear Mr Jones FREEDOM OF INFORMATION REQUEST REFERENCE NUMBER: 000113/13 Thank you for your

More information

April 2009. Protecting the Public in a Changing Communications Environment

April 2009. Protecting the Public in a Changing Communications Environment April 2009 Protecting the Public in a Changing Communications Environment Protecting the Public in a changing Communications Environment Presented to Parliament by the Secretary of State for the Home

More information

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal. Dear Commissioner Malmström, As you know, we have been closely involved in consultations with the European Commission with regard to the impact assessment on, and probable review of, the Data Retention

More information

Enforced subject access (section 56)

Enforced subject access (section 56) ICO lo Enforced subject access (section 56) Data Protection Act Contents Introduction... 2 Overview.3 The criminal offence.... 3 Exceptions and penalties.... 7 Relevant records....... 8 Other considerations

More information

Draft Investigatory Powers Bill

Draft Investigatory Powers Bill Draft Investigatory Powers Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty November 1 Cm 912 Crown copyright 1 This publication is licensed under

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Civil Rights, Security and Consumer Protection in the EU

Civil Rights, Security and Consumer Protection in the EU Internationale Politikanalyse Internationale Politikanalyse International Policy Analysis European Integration Working Group* Civil Rights, Security and Consumer Protection in the EU Civil Liberties: Data

More information

Public Information and Open Meetings

Public Information and Open Meetings NEWLY ELECTED OFFICIALS WORKSHOP 2012 Public Information and Open Meetings Habib Erkan, Denton Navarro, Rocha & Bernal, P.C. - San Antonio, TX Public Information Act Public Information means information

More information

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing. Privacy in the cloud computing, and the company concerned is required to submit a risk analysis to DNB. 3 Cloud computing entails the saving, processing and using of company data on the servers of a cloud

More information

Identity Cards. The Next Steps

Identity Cards. The Next Steps Identity Cards The Next Steps Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty November 2003 Cm 6020 4.75 Crown Copyright 2003 The text in this document

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

REVIEW OF COUNTER-TERRORISM AND SECURITY POWERS REVIEW FINDINGS AND RECOMMENDATIONS

REVIEW OF COUNTER-TERRORISM AND SECURITY POWERS REVIEW FINDINGS AND RECOMMENDATIONS REVIEW OF COUNTER-TERRORISM AND SECURITY POWERS REVIEW FINDINGS AND RECOMMENDATIONS Cm 8004 REVIEW OF COUNTER-TERRORISM AND SECURITY POWERS REVIEW FINDINGS AND RECOMMENDATIONS Presented to Parliament by

More information

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below.

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below. IN THE SUPREME COURT OF BRITISH COLUMBIA No. ----- Vancouver Registry BETWEEN: THE BRITISH COLUMBIA CIVIL LIBERTIES ASSOCIATION Plaintiff AND: THE ATTORNEY GENERAL OF CANADA Defendant Narne and address

More information

Human Rights. Resource Pack

Human Rights. Resource Pack 1 Human Rights Resource Pack 2 What s in this pack? Sections Pages Important Notes Page 3 What s it all about? Page 4 Why the Human Rights Act? Page 6 Who we are and what we do Page 9 What are human rights?

More information

Guide to buying CRM Software

Guide to buying CRM Software Guide to buying CRM Software How to choose the right CRM Software for your business CONTENTS About Computer Weekly 3 About Approved Index 4 Introduction 5 The basics 6 Types of CRM 8 Operational CRM 8

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

counter fraud specialist (cacfs)

counter fraud specialist (cacfs) CIPFA accredited counter fraud specialist (cacfs) Building the counter fraud profession CIPFA COUNTER FRAUD CENTRE It will certainly help us to safeguard our assets against the risk of fraud. And it will

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

Liberty, Privacy International, Open Rights Group, Big Brother Watch, Article 19 and English PEN briefing on the fast-track Data Retention and

Liberty, Privacy International, Open Rights Group, Big Brother Watch, Article 19 and English PEN briefing on the fast-track Data Retention and Liberty, Privacy International, Open Rights Group, Big Brother Watch, Article 19 and English PEN briefing on the fast-track Data Retention and Investigatory Powers Bill Introduction 1. The Data Retention

More information

Why the Government believes that voting to remain in the European Union is the best decision for the UK. The EU referendum, Thursday, 23rd June 2016.

Why the Government believes that voting to remain in the European Union is the best decision for the UK. The EU referendum, Thursday, 23rd June 2016. Why the Government believes that voting to remain in the European Union is the best decision for the UK. The EU referendum, Thursday, 23rd June 2016. An important decision for the UK On Thursday, 23rd

More information

PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au. 10 November 2014

PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au. 10 November 2014 PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au The Committee Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021 Parliament House Canberra ACT 2600 10 November

More information

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed

More information

7 August 2015. I. Introduction

7 August 2015. I. Introduction Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation

More information

Brief on Did GCHQ Spy on You Illegally?

Brief on Did GCHQ Spy on You Illegally? Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied

More information

A GUIDE TO CRIMINAL INJURIES COMPENSATION

A GUIDE TO CRIMINAL INJURIES COMPENSATION A GUIDE TO CRIMINAL INJURIES COMPENSATION Being a victim of crime such as physical or sexual assault can have significant and long-term consequences for a woman s health and wellbeing. If you have experienced

More information

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

Data Retention and Investigatory Powers Bill

Data Retention and Investigatory Powers Bill Data Retention and Investigatory Powers Bill CONTENTS Retention of relevant communications data 1 Powers for retention of relevant communications data subject to safeguards 2 Section 1: supplementary Investigatory

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

The impact of corporate reputation on business performance

The impact of corporate reputation on business performance The impact of corporate reputation on business performance Graham McWilliam, Group Director of Corporate Affairs PR Week Reputation Management Strategy Conference 27 November 2012 Thanks James. I m going

More information

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 AUSTRALIAN HUMAN RIGHTS COMMISSION SUBMISSION TO THE PARLIAMENTARY JOINT COMMITTEE ON INTELLIGENCE AND

More information

White paper. The Essential Guide to the EU Data Law Changes. your technology, expertly marketed

White paper. The Essential Guide to the EU Data Law Changes. your technology, expertly marketed White paper The Essential Guide to the EU Data Law Changes This guide explains exactly what the EU Data Protection Regulation is and how it will change life as we know it when it comes into enforcement

More information

Financial services mis-selling: regulation and redress

Financial services mis-selling: regulation and redress Report by the Comptroller and Auditor General Financial Conduct Authority and Financial Ombudsman Service Financial services mis-selling: regulation and redress HC 851 SESSION 2015-16 24 FEBRUARY 2016

More information

To return to the list of Contents, simply click on the line NOT PROTECTIVELY MARKED at the foot of each page.

To return to the list of Contents, simply click on the line NOT PROTECTIVELY MARKED at the foot of each page. This PDF file contains interactive links that help you to navigate the document quickly, and to enable you to gain immediate access to all websites listed. Clicking on any of the items in the main list

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Number Translation Services

Number Translation Services Number Translation Services An Ofcom consultation on options for the future A summary Issued: 22 October 2004 Closing date for responses: 7 January 2005 Contents Section Page 1 Introduction 1 2 Options

More information

An Open and Safe Europe What s next?

An Open and Safe Europe What s next? An Open and Safe Europe What s next? Private Security Services Industry views to the European Commission public consultation on the Future of DG HOME Policies The Confederation of European Security Services

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

(Joint) Information Management Strategy 2014-2017. April 2014

(Joint) Information Management Strategy 2014-2017. April 2014 49 (Joint) Information Management Strategy 2014-2017 April 2014 49 50 CONTROL SHEET FOR: (Joint) Information Management Strategy Strategy Details Comments / Confirmation (Joint) Information Management

More information

Questions and Answers about ANPR systems

Questions and Answers about ANPR systems Questions and Answers about ANPR systems What is Automatic Number Plate Recognition (ANPR)? ANPR devices work by scanning vehicle registrations and checking them against information stored in databases,

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today. Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies

More information

PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS

PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS PROTECTING HUMAN RIGHTS IN THE UK THE CONSERVATIVES PROPOSALS FOR CHANGING BRITAIN S HUMAN RIGHTS LAWS HUMAN RIGHTS IN CONTEXT Britain has a long history of protecting human rights at home and standing

More information

The proposed legislation would end the all too frequent use of loopholes in State incorporation laws to hide money.

The proposed legislation would end the all too frequent use of loopholes in State incorporation laws to hide money. Testimony of Jack A. Blum, Esq. before The United States Senate Committee on Homeland Security and Governmental Affairs on S.569, the Incorporation Transparency and Law Enforcement Assistance Act November

More information

Enhancing surveillance transparency: A UK policy framework

Enhancing surveillance transparency: A UK policy framework Enhancing surveillance transparency: A UK policy framework Comments on this paper: Former Home Secretary David Blunkett MP: This paper highlights some very positive steps that will better inform the public

More information

PUBLIC. COUNCIL 10 December 2014 Item 10

PUBLIC. COUNCIL 10 December 2014 Item 10 COUNCIL 10 December 2014 Item 10 Classification Public Purpose For noting PRESIDENTIAL UPDATE The Issues This paper presents an update on my activities since taking office in July 2014 with a particular

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

The Human Rights Impact Assessment for Security Measures

The Human Rights Impact Assessment for Security Measures The Human Rights Impact Assessment for Security Measures Developing Security Measures that Respect Human Rights For more information about this guide, contact: Canadian Human Rights Commission 344 Slater

More information

Australia s counter-terrorism laws

Australia s counter-terrorism laws Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist

More information

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality Interparliamentary committee meeting European Parliament National Parliaments Smart Borders Package: European Challenges, National Experiences, the way ahead 23-24 February 2015 Smart Borders and Law Enforcement

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy

More information

IN THE WAR ON TERRORISM

IN THE WAR ON TERRORISM THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...

More information

THOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE 2014. Privacy, data retention and state surveillance: Digital Rights Ireland.

THOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE 2014. Privacy, data retention and state surveillance: Digital Rights Ireland. THOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE 2014 Privacy, data retention and state surveillance: Digital Rights Ireland Jessica Simor QC Matrix chambers 1. Anya has spoken about Costeja. That case raises

More information

b. Other serious crimes, including organized crime, that are transnational in nature; and

b. Other serious crimes, including organized crime, that are transnational in nature; and Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines

More information

Information Governance. and what it means for you

Information Governance. and what it means for you Information Governance and what it means for you 1 Content Introduction 3 Who are we? 4 What is Information Governance? 4 Purpose of Holding Information 5 Confidentiality and Security 5 Accuracy of Information

More information

RACE CRIME AND SECTARIAN CRIME LEGISLATION IN NORTHERN IRELAND. A Summary Paper

RACE CRIME AND SECTARIAN CRIME LEGISLATION IN NORTHERN IRELAND. A Summary Paper RACE CRIME AND SECTARIAN CRIME LEGISLATION IN NORTHERN IRELAND A Summary Paper Northern Ireland Office November 2002 RACE CRIME AND SECTARIAN CRIME LEGISLATION IN NORTHERN IRELAND: A CONSULTATION PAPER

More information

How do we Police Cyber Crime?

How do we Police Cyber Crime? How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals.

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. In some cases the prosecution can be misinformed by the

More information

HM Government Transparency Report 2015: Disruptive and Investigatory Powers

HM Government Transparency Report 2015: Disruptive and Investigatory Powers HM Government HM Government Transparency Report 2015: Disruptive and Investigatory Powers Cm 9151 HM Government Transparency Report 2015: Disruptive and Investigatory Powers Presented to Parliament by

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Isle of Man Government

Isle of Man Government Isle of Man Government Commitment to Combating Money Laundering and the Financing of Terrorism & Proliferation Council of Ministers June 2012 Isle of Man Government Commitment to Combating Money Laundering

More information

Request under the Freedom of Information Act 2000 (FOIA)

Request under the Freedom of Information Act 2000 (FOIA) Our Ref: 006685/12 Freedom of Information Section Nottinghamshire Police HQ Sherwood Lodge, Arnold Nottingham NG5 8PP Tel: 101 Ext 800 2507 Fax: 0115 967 2896 17 December 2012 Request under the Freedom

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Liberty and JUSTICE submission to the United Nations Human Rights Council s Universal Periodic Review of the United Kingdom

Liberty and JUSTICE submission to the United Nations Human Rights Council s Universal Periodic Review of the United Kingdom Liberty and JUSTICE submission to the United Nations Human Rights Council s Universal Periodic Review of the United Kingdom November 2007 About JUSTICE JUSTICE is an all-party, human rights and law reform

More information