Feeds

Lords defy Government by proposing criminalisation of data rogues

Disclose our info and you'll pay

High performance access to file storage

The House of Lords has proposed making it a criminal offence to disclose personal information intentionally or recklessly. The Lords passed an amendment to the Criminal Justice and Immigration Bill, defeating the Government.

If it is to become law the amendment will need to be approved by MPs in the House of Commons. The Government opposed the amendment but was defeated by 134 votes to 130.

The amendment would make it a criminal offence to "intentionally or recklessly disclose information contained in personal data to another person, repeatedly and negligently allow information to be contained in personal data to be disclosed, or intentionally or recklessly fail to comply with [their] duties".

"Data controllers currently do not face anything like adequate sanctions if they intentionally or recklessly disclose information, or indeed are repeatedly negligent," said Liberal Democrat peer Baroness Miller of Chilthorne Domer, introducing the amendment.

"Goodness knows, this is not exactly a new issue. The Government have had time to address it. In 2002 in another place [the House of Commons] my honourable friend Paul Burstow revealed that a total of 1,354 government-owned computers had gone missing over the previous five years, while much more recently, as noble Lords will be aware, vast amounts of data, whether from Her Majesty’s Revenue and Customs or the health sector, have been lost," she said.

"The issue has been around for a long time, and not only in government sectors. The private sector, as we know, can be negligent, and it can do all sorts of things with data that it should not do. Both the public and private sectors need to be covered by further sanctions, which is the reason for our amendment," said Miller.

Until recently the bill contained a clause that would introduce jail sentences of up to two years for people who steal or sell personal data, but the Government has decided not to activate that clause of the law.

The new amendment would create a new offence, but Government minister Lord Hunt of Kings Heath opposed the change, saying that the Government wanted to wait until it had reviewed past problems with data loss before legislating.

"The Government are involved in a number of reviews on these matters in the light of some of the well publicised incidents that have taken place," he said. "Just as noble Lords usually say that the legislation I bring forward is premature and has not had enough consideration, I have to say that that is our position at the moment."

"The Government recognise the genuine and legitimate concerns expressed by noble Lords both in this debate and in Committee, but a number of imminent reviews and reports will inform both the actions that the Government have to take as a Government and whether legislative changes should be made. That is why we think it would be premature to legislate at this point," he said.

Miller said that the public could not afford a wait. "Basically the public will have to continue with this lack of protection for at least another year or two, during which time, at the rate of the past 12 months, millions more pieces of data will have gone missing," she said.

The Conservative Party proposed a weaker amendment which would only apply to public bodies or workers on contract to the public sector, but Miller said that it was a false distinction. "Citizens do not mind who lost the data; it is irrelevant to them. What is important is that it is their data that have been sold, lost or left on rubbish heaps and it is they who are affected by it," she said.

The Information Commissioner Richard Thomas has previously called for a law that would punish people or organisations that put other people's personal data at risk. In January the Parliamentary Justice Committee backed Thomas's calls for such a law.

Copyright © 2008, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.