Feeds

Tories fear legal dodge over comms überdatabase

Euro data law comes into force on Monday

Maximizing your infrastructure through virtualization

Laws mandating a massive central database of email, web browsing, telephone and social networking data may already have been passed without proper scrutiny by MPs, according to the Conservatives.

The Home Office is due to publish its delayed consultation on the Interception Modernisation Programme (IMP) "shortly".

In a Lords debate on privacy on Thursday, however, shadow security minister Baroness Neville-Jones asked whether the European rules obliging data retention by ISPs, which come into force on Monday, could be used to legitimise a centralised system or a prototype. UK law was brought into line with the EU data retention directive by statutory instrument, so it was not debated by either house of Parliament.

"The Government have not been able to satisfy these benches that last week's statutory instrument did not create a vehicle through which the interception modernisation programme could be carried into practice without further primary legislation," Neville-Jones said.

Leaked plans for a central warehouse of data detailing who contacts whom, when and where have been described as a potential personal data "hellhouse" by recently-retired Director of Public Prosecutions Sir Ken Macdonald. The government says it has not settled on a system.

When the government first announced its intention for laws mandating the Interception Modernisation Programme early last year, it said they would be bundled with the EU laws in a single piece of primary legislation, the Communications Data Bill. Primary legislation requires the approval of MPs.

The plan was changed last summer, with the EU laws brought in separately, ostensibly to meet Brussels' compliance deadline.

Neville-Jones said: "The draft Queen's Speech led us to believe that primary legislation would be forthcoming and that the powers contained in the [statutory instrument] would be transposed in a bill of primary legislation.

"Instead, the [statutory instrument] has been transposed separately, and against the background of the Home Secretary having cast doubt in a recent speech on the need for primary legislation."

In October, during a speech at the Institute for Public Policy Research, Jacqui Smith discussed IMP publicly for the first time. "The changes we need to make may require legislation," she said. "The safeguards we will want to put in place certainly will. And we may need legislation to test what a solution will look like."

Responding for the government yesterday, Ministry of Justice minister Lord Bach declined to directly address Neville-Jones' concern over whether IMP could go ahead without further legislation or Parliamentary scrutiny. "There has been, we believe, widespread misrepresentation of our plans for future communications data retention," he said.

"Since those plans have not been finalised, I cannot say that there will be a prototype, as plans will be confirmed only after the consultation."

A Home Office spokesman declined to say whether primary legislation will be brought forward, or whether the EU data retention directive could be used as a legal mandate. "We will be going into consultation shortly and options will be put," he said, saying Smith's speech in October explained the government's position.

Register sources have indicated a prototype communications data collection system is proposed, with funding of almost £1bn already secured from the counter-terror budget, allocated during 2007's Comprehensive Spending Review. BT and Vodafone have been lined up as cooperative fixed line and mobile operators to provide the first data, our sources say.

Professor Richard Clayton of Cambridge University's computer lab said the EU data retention laws were unlikely to offer legal cover for the massive network of deep packet inspection (DPI) equipment that ubiquitous communications data collection would require. "It's clear that being forced to fit DPI equipment would go well beyond what the directive envisages," he said. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.