Feeds

Brussels rolls coppers over rights barrel

Rearguard action to restrict police data sharing

Providing a secure and efficient Helpdesk

Civil libertarians are holding the security hawks in Brussels to ransom over plans to share police data across the continent.

Ensconced in the European Parliament, they have no say in a European Commission proposal for data sharing between European police forces because security matters are outside their legal competence.

But the Parliament does have a say over another proposal working its way through the Brussels policy mangle, that of the Visa Information System (VIS), which when it gets approved (the Commission is busy building it anyway) will become the electronic brain at the heat of Fortress Europe.

The police, meanwhile, want their data sharing to be unfettered by the principles of human rights in established data protection law. (Despite the name of their framework, the "protection of personal data processed in the framework of police and judicial cooperation in criminal matters").

But they also want unfettered access to the VIS. So Baroness Sarah Ludford MEP, Parliament rapporteur for the VIS policy, is trying to get them over a barrel.

"We are battling to get European data protection rules on handling law enforcement information. We are trying to bring that into a tripartite package using the leverage we have on the VIS," said Ludford.

The third element is a bridging clause that contains the rules that will govern police access to the VIS. The Parliament have no say over that instrument either. But they do have control of the hinge - a single clause in the VIS framework that gives the police permission to access it.

As long as Ludford has the backing of the Parliament, the police will only get their hands on immigration data if they smarten up their ideas about data protection. They are being told they should have restricted access to data so they can't go data trawling, that there should be an audit trail, that people should have a right to redress and that no immigration data should be shared with third countries.

The funny thing is that the people running the member states that are pushing this through the Council, who lecture plebs about their rights and responsibilities, seem to forget their mantra when it comes to police matters. Sanctimonious hawks? Whatever next?®

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.