Feeds

Euro police data plan attacks 'fundamental rights'

EDPS slates police data sharing proposals, again

The Power of One Infographic

A proposal to allow European police forces to share data undermines fundamental human rights, the European Data Protection Supervisor said today.

The European Council's proposal to extend data protection into police and judicial matters was designed to ensure first that police managed their data properly so that they could then share it between forces.

But the European Data Protection Supervisor said the German Presidency had "significantly weakened" the proposal's protections so it could get the European Council to accept it.

Thus it would achieve the opposite of what it set out to do: it would make police co-operation harder and citizens more vulnerable, the EDPS said in an opinion (pdf) today.

"The EDPS is well aware of the difficulties in reaching unanimity in the council. However, the decision making procedure cannot justify the lowest common denominator approach that would hinder the fundamental rights of EU citizens as well as hamper the efficiency of law enforcement," it said.

As the proposal would leave member states to impose their own law, sharing between states would become "inefficient and unworkable". For example, shared records would be populated with data collated from different forces that operated under different standards - there might be no way of knowing how well data from another force could be trusted, nor how well it would be looked after when it was given away.

The directive appears to try and escape the likely confusion that might evolve from such a hodge-podge of intelligence by removing the basic data protections that would necessitate it being managed properly in the first place.

For example, it dropped the proposal that countries be prevented from sharing data with others that don't have adequate data protection. The principle that would ensure the quality of police data has also been dropped, meaning there is no obligation on them to distinguish the level of accuracy and reliability of the intelligence being used, nor distinguish between different sorts of data subject such as criminals, suspects, victims and witnesses.

Further, it removed the limitations normally put on the uses to which data can be put, and that any derogations from this rule should be "necessary, proportionate, precise and foreseeable".

Then there was no measure to periodically purge the databases of duff and redundant data and no obligation on the police to rectify any mistakes in the data they hold.

The EDPS doesn't describe just what might go wrong if rules were not in place to ensure police data was managed properly, but the situation looks topsy-turvy: the whole point of the legislation was to ensure that protection was there so the data could be shared.®

Boost IT visibility and business value

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.