Feeds

Climategate ruling: FOIA requests cover backup servers too

'We didn't delete the emails, but we don't have them'

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

Data seekers win a victory

Last June, Keiler won a FOIA victory by obliging CRU to disclose the data set Jones had sent to Georgia Tech to anyone who asked for it. But CRU still refused to disclosed some information - specifically, any instructions accompanying the release of data to Georgia Tech. The University of East Anglia argued that the emails were probably not 'held', and so could not be disclosed.

Keiller appealed, and the University enlisted an expensive battalion of lawyers to defend the case. Keiller's account (with Andrew Montford) of the Tribunal can be found here.

In summary, Judge Hamilton presiding over the Tribunal comprehensively rejected CRU's defence, and ordered the University to provide a copy or mirror of the backup server, and an independent contractor to examine it.

The University had delegated the job of finding the missing email to the man who had deleted it - Professor Jones. He also agreed it was inconsistent of UEA to argue that it did not believe the missing email contained any instructions or stipulations. Jones had made the claim that these instructions were only imparted verbally.

Nor was the Judge impressed by UEA's technical defence:

The Tribunal were rather disconcerted by the evidence adduced by the UEA on this issue. Jonathan Colam-French had almost no knowledge of the CRU’s back-up system and was simply unable to answer several pertinent questions.

There was one noticeable absentee from the Tribunal: Professor Jones himself. Keiller and Montford note he has never made a statement under oath.

It should be noted that public bodies can still refuse to disclose information - under Section 12 of the 2000 Freedom of Information Act - if the cost of compliance exceeds "the appropriate limit".

A cynic may expect the cost of performing backup server searches to rocket, overnight.

What do you think? ®

Bootnote

After the first batch of Climategate emails surfaced, they contained what the Information Commissioner's office described as evidence a breach of the Act. MPs demanded an enquiry, which was held in March 2010. At this enquiry, Lord Acton, The University of East Anglia's Vice Chancellor, testified that no emails had been deleted. How could he do this?

We now know this was a semantic deception. The Palutikof email describes staff moving all their emails to memory sticks. As David Holland summarises:

"How else could Acton tell Commons Select Committee that they didn't delete anything, that we [UEA] have all the emails and they can be read. What Russell and Acton didn't tell MPs or the Information Commissioner, is that they were on memory sticks and backups."

Useful and interesting links

The Tribunal Ruling PDF
Keiller's account of the Tribunal
McIntyre reconstructs the excuses: here and here

Eight steps to building an HP BladeSystem

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.