Feeds

Tabloid hack scum face jail

Oh no!

The Power of One eBook: Top reasons to choose HP BladeSystem

Journalists and private investigators who illegally obtain and trade in personal information will face jail sentences under planned changes to the Data Protection Act.

Ministers want to replace the current maximum sentence of an unlimited fine next April with a spell of up to two years inside.

The Information Commissioner's Office (ICO) has repeatedly called for tougher penalties for those who blag telephone, medical and other records.

On Thursday justice minister Michael Wills launched a consultation. Alongside harsher punishments, a new public interest defence will aim to protect legitimate journalistic inquiry.

Wills said: "The Government have no intention of curtailing responsible investigative journalism, so we are also consulting on commencing the new defence under section 55 for those who can show that they acted for the purposes of journalism, art and literature with a view to publishing journalistic, literary or artistic material, in the reasonable belief that the obtaining, disclosing or procuring was in the public interest."

The ICO highlighted abuses by journalists and private investigators in its 2006 report What Price Privacy? The unlawful trade in confidential personal information.

It took this summer's high profile tabloid celebrity phone hacking scandal to prompt action, however. As El Reg pointed out, the issue of dodgy gumshoes listening in on unsecured voicemails was relatively insignificant compared to burgeoning trade in data obtained by pretexting and corrupt insiders.

The consultation document is here. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.