Feeds

Government begins RIPA review

Peeking at snooping laws

Providing a secure and efficient Helpdesk

The Government will review the use of the Regulation of Investigatory Powers Act 2000 (RIPA), the law that governs state tapping of phone, email and internet use. The law will be looked at as part of a wider review of counter-terrorism laws.

Civil liberties campaigners criticised several anti-terrorism laws introduced by the last Labour Government as being restrictive of individual freedoms. The current Conservative and Liberal Democrat coaltion Government will review those laws, claiming its aim is to restore some lost rights.

"The review will look at what counter-terrorism powers and measures could be rolled back in order to restore the balance of civil liberties and counter-terrorism powers," said a Home Office statement on the review.

"National security is the first duty of government but we are also committed to reversing the substantial erosion of civil liberties," said Home Secretary Theresa May. "I want a counter-terrorism regime that is proportionate, focused and transparent. We must ensure that in protecting public safety, the powers which we need to deal with terrorism are in keeping with Britain’s traditions of freedom and fairness."

RIPA powers to monitor citizens' activities could be used not just by police and state security services but also by local authorities to monitor compliance with various laws. Civil liberties campaigners criticised the use of RIPA to monitor residents' compliance with dog fouling or refuse recycling laws.

Security minister Baroness Pauline Neville-Jones told ZDNet UK last week that some local authority uses of RIPA were not acceptable.

"We will reduce the powers of local authorities," she said. "It's a question of how many bodies have powers and what powers they have. We want to create a situation which is less intrusive on the part of local authorities into the lives of ordinary citizens."

The Government review could also examine existing rules that force telecoms companies and ISPs to store records of individuals’ use of their systems on behalf of the authorities.

The Home Office said that its review would examine "the use of the Regulation of Investigatory Powers Act 2000 (RIPA) by local authorities, and access to communications data more generally".

The review will be overseen by Liberal Democrat peer and former director of public prosecutions Lord Ken Macdonald.

"We will look at the evidence presented to us and where it is clear that legislation needs to be amended or powers need to be rolled back, we will do," said May.

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.