Feeds

Surveillance response 'inadequate', say Lords

Upper house forced to do Government's job for them again

Gartner critical capabilities for enterprise endpoint backup

The Government's response to a Parliamentary report on the monitoring and legislation surrounding surveillance is "inadequate" and it has "paid insufficient attention" to the report's recommendations, a follow up report has said.

The House of Lords Select Committee on the Constitution produced a report earlier this year which made a series of recommendations on how the law and Government behaviour should change in order to protect citizens and their privacy as data gathering and surveillance becomes more pervasive.

The report said that there should be judicial oversight of surveillance, and that the increasing monitoring of citizens was breaking the bond of trust between the Government and the people.

The Government rejected most of the report's recommendations and claimed that its current and planned policies give an effective balance between personal privacy and state security.

The House of Lords Committee has hit back, saying that the Government's response fails to understand or address the scale of the problem.

"We regret that the Government have not agreed to a number of important recommendations which sought to assist the executive in promoting the responsible and proper use of data processing, including data sharing, together with other modes of surveillance," its response said. "The Government have paid insufficient attention to a number of fundamental points and criticisms made in the Report."

The Lords' analysis of the Government response accused it of seeming to agree with the Lords without outlining any effective action.

"The response reiterates the need to balance privacy with security and other objectives, and to ensure that the principles of necessity and proportionality are adhered to, without sufficiently indicating how this can be achieved," it said.

Much of the Government's response rested on its recommendation that Government departments use privacy impact assessments (PIA) to ensure that policies do not harm people's privacy. The Lords' analysis was scathing about how much good such reports could do.

"While we firmly support PIA, we note that it is almost entirely untried in the British public sector and is therefore not entrenched in the policy process," it said. "Versions of PIA differ in terms of the stringency of their requirements. In the light of this, any suggestion that PIA is a panacea for the issues that we raise must be treated with caution, in particular where further details of the nature of the PIA to be undertaken in each case, and how and by whom it will be evaluated, have not been provided."

The Lords called for privacy regulator the Information Commissioner's Office (ICO) to be allowed to inspect private sector bodies, as well as public sector ones, without their permission. The Government rejected that idea, saying that the Secretary of State could order such inspections. The Lords now say that the Government should make public when this has happened in the past to prove its efficacy.

"The Government state that it is possible for private and third-sector data controllers to be inspected (with notice) if the Secretary of State considers that they are exercising functions of a public nature or under contract to a public authority," the analysis said. "The Government should show when this has occurred. The Secretary of State's powers of intercession in the inspection process should be justified."

The Lords had also called on Government to create primary legislation outlining its surveillance and data processing regime. The Government rejected that call, and the Lords now say that such matters are too important to be left to the discretion of the administration.

"We are disappointed that the Government have not accepted our recommendation … for powers of surveillance and data processing to be set out in primary legislation. We do not believe that it is sufficient for 'basic principles' to be stated in primary legislation, with important details left to secondary legislation," it said.

The analysis of the Government's response to the report is available here.

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.