Feeds

Info commissioner says comms database is leap too far

Thomas demands proper debate

High performance access to file storage

Information Commissioner Richard Thomas said today that government plans for a communications database are a step too far and need proper public debate.

Speaking at the launch of the regulator's annual report Thomas said: "I am absolutely clear that the targeted, and duly authorised, interception of the communications of suspects can be invaluable in the fight against terrorism and other serious crime. But there needs to be the fullest public debate about the justification for, and implications of, a specially-created database – potentially accessible to a wide range of law enforcement authorities – holding details of everyone’s telephone and internet communications."

Thomas said recent examples such as the extension of the DNA database and increasing use of ANPR cameras showed the government was grabbing more and more private data without proper public, or Parliamentary debate.

The ICO is today filing enforcement notices to Her Majesty's Revenue and Customs and the Ministry of Defence asking what progress they have made to tighten up procedures following their recent data breaches.

The ICO annual report (pdf) also revealed the regulator received 2,646 complaints in the year and closed 51 per cent within a month, but 36 per cent are still open. An informal solution was found for 48 per cent of cases in the year, while 14 per cent ended with a decision notice being served and 33 per cent were ineligible for some reason.

Of the 395 decision notices closed in the year, 30 per cent resulted in an upheld complaint, 25 per cent in a complaint not upheld and 45 per cent saw partially upheld complaints.

Freedom of Information requests closed in the period were mostly to government - 39 per cent to local government, 29 per cent to central government, ten per cent to police and criminal justice organisations, nine per cent to health bodies, four per cent to education organisations and just one per cent to private companies.

Public awareness of the issues seem to be improving - the ICO reckons 90 per cent of people are aware that they have a right to see information held about them. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.