Feeds

UK gov waves white flag on secret lobbying ruling

Will 'fess up on secret meetings/menus

Top three mobile application threats

The Department of Business, Enterprise and Regulatory Reform has decided not to appeal a legal ruling that it must release information on secret meetings between ministers, civil servants and lobbyists at the Confederation of British Industry.

The Department had until this Friday to take the Information Tribunal ruling to the High Court or release the information.

But in a statement today BERR, formerly known as the DTI, said:

BERR will not be appealing this Information Tribunal decision and some information requested by Friends of the Earth was released to them yesterday (27th May) following the Tribunal’s decision. The Tribunal has agreed with BERR that other information requested by Friends of the Earth can rightfully be withheld.

BERR sets great store by our ability to hold free and frank exchanges with the CBI and other external stakeholders. The Tribunal recognised that it is in the public interest to release certain information relating to our dialogue with stakeholders. It also recognised that is in the public interest for the more sensitive information to be withheld.

The case was originally brought by Friends of the Earth three years ago. It wanted details of meetings between Sir Digby Jones, then head of the CBI and trade minister Alan Johnson. It also wanted to know details of a corporate jolly involving senior civil servants and CBI staff. Digby Jones is now Digby Lord Jones of Birmingham Minister of State for Trade and Investment at BERR - presumably he's not allowed to take himself out for fat lunches any more.

The Information Commissioner granted FoE's request for the information but BERR appealed to the Information Tribunal.

BERR said keeping such information private would "protect the 'thinking space' necessary for good public policy formulation". The Information Tribunal said that there should be transparency in how lobby groups interact with government and: "There is a strong public interest in ensuring that there is not, and it is seen that there is not, any impropriety." ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.