Feeds

'One size fits all' EU data law would undermine rights, says Clarke

Just too risky

Intelligent flash storage arrays

"Harm can arise to the citizen where information is not being properly shared, by people he is entitled to assume are sharing it, as well as when it is shared carelessly, so our regime has both to protect the use of data, but also to enable the use of data for a proper purpose," Clarke said.

Clarke said that the European Commission's plans to revise the Data Retention Directive should be viewed "with caution". In April the Commission said it would consider strengthening regulations of the storage, access to and use of retained data to improve the protection of personal data.

Plans for a new EU Passenger Name Record (PNR) Directive should be broadened so that passenger details are recorded for all flights within the EU, Clarke said. The European Commission's plans for a new PNR Directive currently propose recording passenger's details for all flights to and from the EU.

"It makes no sense to collect PNR information on flights to and from third countries without also collecting the same information on flights between EU Member States," Clarke said.

Clarke described the UK's existing PNR arrangement with the US as "absolutely critical to improving US and EU security" and said that countries should share data collected on passengers.

"It was the use of Passenger Name Record data that enabled the identification of the terrorist facilitator at the heart of the Mumbai attacks," Clarke said.

"We will be positively negligent if we fail to take advantage of the improved security that we can give to passengers by properly pooling protected data that we both have," Clarke said.

Clarke said it was wrong to impose EU data protection laws on companies based elsewhere in the world that may handle EU citizens' personal information. "It’s wrong to view the extension of the application of European Union law on a global scale as some simple and unquestioned process," Clarke said.

"If we expect the EU regime to protect the data of EU citizens regardless of location, then it wouldn’t be unreasonable to expect Australians, Japanese and citizens from other countries working in the European Union to import their own legislative rights with them," Clarke said.

Clarke said new data protection laws should make it easier for companies to transfer customer data.

"We should consider moving from a system which restricts information based on national standards of data protection, to a system based on the standard of data protection of the particular company involved – far more relevant to modern methods of business," Clarke said.

The European Commission is expected to propose changes to the Data Protection Directive later this year.

See: Ken Clarke's speech at the British Chamber of Commerce in Brussels (10-page Word document – click through from link)

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.