Feeds

ICO drops BT, ACS Law probe

Dangerous precedent "worse than usual incompetence"

The essential guide to IT transformation

The Information Commissioner's Office has ended an investigation against BT for handing over customer information to file-sharing-chaser law firm ACS:Law, which then leaked online.

ACS:Law's speciality is sending letters to suspected file-sharers threatening them with expensive legal action unless they send the law firm money for supposed copyright infringement.

Back in September the law firm received details of 500 BT customers in a plain text attachment to an email. This was later leaked online after ACS:Law was hacked. The details were actually customers of PlusNet - which was bought by BT.

But the ICO is quite happy BT can sort the problem out itself.

An ICO spokesperson said: “We have regular contact with a range of organisations regarding allegations of staff inappropriately accessing or disclosing personal information.

“Where it is found that the data controller has adequate policies and safeguards already in place, the usual and most appropriate outcome in these cases is disciplinary action taken by the employer. However, where that employee is accessing records for personal gain, such as selling the data on to third parties, the ICO may open a criminal investigation.”

In other words - it was a member of staff who sent the unencrypted data, and therefore it's not BT's responsibility.

Privacy lobbyists are less impressed. Alex Hanff of Privacy International, which is promising to push for a judicial review of the ruling, said the decision was worse than the ICO's "usual incompetence".

Hanff said: "This is an incredibly dangerous decision for the ICO to have made as it effectively dissolves any pretence that a company is responsible for the actions of their employees at work.

"Christopher Graham has, in essence, now created a Data Protection regime where companies will not be held responsible for the actions of their staff."

More criticism of ICO weakness here.

ACS:Law, which has been criticised by the Law Society, and consumer groups, for its shotgun greymail approach. Andrew Crossley - the lawyer behind ACS:Law - claims to have given up chasing file-sharers. ®

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.