Feeds

Data Retention Directive CLASHES with EU citizens' privacy rights, says top lawman

'Serious interference', claims Court of Justice Advocate General

Top three mobile application threats

A seven-year-old EU directive that requires telecoms outfits to retain details of phone calls and emails - such as traffic and location - clashes with the 28-member bloc's privacy rights for citizens, a Court of Justice Advocate General has said.

Pedro Cruz Villalón believes that the 2006 data retention directive "constitutes a serious interference with the fundamental right of citizens to privacy".

His opinion [PDF] was laid down in Luxembourg this morning in response to proceedings taking place in Ireland's High Court and Austria's Constitutional Court (Verfassungsgerichtshof) where challenges have been mounted against state powers that have, it is alleged, "unlawfully" sat on, processed and gained control of communications data.

Both cases await a preliminary ruling.

The AG's opinion is not binding, but - in most cases - the EU's Court of Justice adopts such viewpoints.

He claimed that the directive was "incompatible" with the Charter of Fundamental Rights because the data retained by ISPs, which are obliged to store traffic and location information on their networks for up to two years, could be abused.

The opinion reads:

[T]he use of those data may make it possible to create a both faithful and exhaustive map of a large portion of a person’s conduct strictly forming part of his private life, or even a complete and accurate picture of his private identity.

There is, moreover, an increased risk that the retained data might be used for unlawful purposes which are potentially detrimental to privacy or, more broadly, fraudulent or even malicious. Indeed, the data are not retained by the public authorities, or even under their direct control, but by the providers of electronic communications services themselves.

Nor does the Directive provide that the data must be retained in the territory of a Member State. They can therefore be accumulated at indeterminate locations in cyberspace.

He concluded that the EU should be given time within a "reasonable period" to adopt measures that address the supposed clash with a citizens' privacy rights. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.