Feeds

Euro email storage scheme 'illegal', warns official

Proposal fails to impress Data Protection Supervisor

Top three mobile application threats

The European Data Protection Supervisor (EDPS) has said that he is not yet convinced by the arguments put forward in favour of a European directive on data retention, and has set out strict conditions any such law would have to meet if it's to be considered acceptable by his office.

EDPS Peter Hustinx published his commentary on the proposed directive today.

If ratified the directive would demand all Internet data - typically email traffic - be held for six months and telephone call data for one year. It would also see ISPs and telcos compensated for their compliance costs. The directive was inspired by hopes that the information could be used to prevent terrorism or to prosecute those accused of terrorist acts.

However, Hustinx said: "The Directive has a direct impact on the protection of privacy of EU citizens and it is crucial that it respects their fundamental rights, as settled by the case law of the European Court of Human Rights. A legislative measure that would weaken the protection is not only unacceptable but also illegal."

He said that retaining data for longer than the six or 12 months proposed in the Commission's draft version of the directive would not be acceptable. He also said adequate safeguards must be put in place to protect personal data.

"If one considers the proposal solely from the perspective of data protection, traffic and location data should not be retained at all for the purpose of law enforcement," he wrote. "A high data security is even more important since the mere existence of data might lead to demands for access and use."

As well as tighter controls, Hustinx argued that the proposal would need the backing of the European Council and the Parliament, an indirect swipe at the competing Draft Framework Decision put forward by the UK. In theory, the draft framework could be ushered into law without the backing of either the Commission or the Parliament.

Hustinx specifically noted that his remarks were confined to the Commission's proposal, as he has not been consulted on the Draft Framework Decision, the legal footing of which has been challenged by top European lawyers.

The European Parliament has called for the UK's proposal to be scrapped.

Read Hustinx's full opinion here. ®

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.