Feeds

Government wants encryption key offence in force

Return of the RIPA?

Combat fraud and increase customer satisfaction

The government plans to bring into force a controversial power that can require the disclosure of an encryption key on pain of five years' imprisonment. The power has lain dormant for six years; but its time has come, Home Office Minister Liam Byrne said.

In 2000, government passed the Regulation of Investigatory Powers Act, better known as RIPA. Part 3 of RIPA has never been brought into force. It includes a power which allows certain authorities to force the disclosure of information that is stored in an encrypted form and it can force the disclosure of the encryption key itself. Section 53 of RIPA makes failing to comply an offence.

"The use of encryption is...proliferating," Byrne told the House of Commons last Wednesday. "Encryption products are more widely available and are integrated as security features in standard operating systems, so the Government has concluded that it is now right to implement the provisions of part 3 of RIPA, including section 53, which is not presently in force."

Parliamentary scrutiny is not required to bring part 3 into force. But Byrne said government will publish for consultation a draft statutory code of practice for the investigation of protected electronic data and the exercise of powers in part 3.

Under RIPA, the maximum sentence for a breach of section 53 was two years' imprisonment. However, the legislation was amended by the Terrorism Act 2006 such that any "national security case" can be punished with a maximum sentence of five years.

OUT-LAW.COM editor Struan Robertson, also a senior associate with Pinsent Masons, said: "When it was passed, RIPA evoked fears that innocent people would be sent to jail for forgetting their password. The Home Office will have a tough job addressing the renewal of these fears in its code of practice."

A Home Office spokesman told OUT-LAW that the consultation would be published soon. According to ZD Net UK, amendments may be made to part 3 after the consultation has been completed.

See:

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

3 Big data security analytics techniques

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
UK.gov chucks £28m at F1 tech for buses and diggers plan
Well, not really F1 but who's heard of LMP and VLN*?
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.