Feeds

Pretexting banned in the US

Privacy gets its Act together

Choosing a cloud hosting partner with confidence

The kind of surveillance activities carried out on behalf of computing giant Hewlett-Packard which caused controversy last year have been made illegal in the US thanks to a new law.

President George W Bush has signed an Act which outlaws pretexting, the practice of gaining information about a third party's phone use without their permission.

The federal legislation signed by Bush was the Federal Telephone Records and Privacy Protection Act. It creates criminal penalties for "the fraudulent or unauthorised acquisition or disclosure of confidential phone records information", according to a statement from the White House.

The Act was approved by the Senate in December last year and was signed by Bush on Friday. It creates penalties of up to 10 years in prison for anyone found to have broken the law. The punishment can be doubled if the activity is found to be on a large scale, which the Act defines as involving more than $100,000 or more than 50 victims.

Though the legislation was passed by the House of Representatives in April 2006 before being held up by the Senate, it became high profile news when HP's activities came to light.

An inquiry into leaks from HP's board resulted in the use of pretexting to discover details of board members' private telephone calls on non-HP phones. The activity, which was carried out by firms contracted directly or indirectly to HP, became public last August and prompted an outcry.

It later emerged that people acting for HP had also obtained phone records of journalists, had sent a fake email to one with a surveillance code in it and had even physically tracked one journalist.

HP chairwoman Patricia Dunn resigned over the affair and a federal prosecution is ongoing. In that case one investigator, Bryan Wagner of Colorado, has just pleaded guilty to identity theft and conspiracy charges.

Wagner's lawyer said that Wagner would testify on behalf of the prosecution in what is a major victory for prosecutors in their attempts to trace the charges back to more senior investigators and perhaps to HP itself.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Business security measures using SSL

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.