Feeds

Staffs Police face data protection probe over 'drink drivers named' Twitter campaign

ICO to ponder whether hashtag wrongly implied suspects' guilt

Internet Security Threat Report 2014

Staffordshire Police, who ran a Twitter campaign against alleged drink-drivers over the Christmas period by naming and shaming suspects charged with the offence, are now being investigated by the UK's information watchdog for a possible breach of data protection law.

The move comes after the Information Commissioner's Office received a complaint about the police force's decision to publish the details of the suspects - including name and age - on the micro-blogging site alongside the hashtag "DrinkDriversNamedOnTwitter".

Some argued that the hashtag itself implied that the suspects were guilty of the offence, despite only having been charged with the offences.

In the run up to Christmas, the cop shop tweeted the names of more than 80 individuals who had been cuffed and charged over allegations of driving drunk behind the wheel of a car. Significantly, none of the named individuals had been convicted or sentenced.

The controversial campaign was attacked by privacy experts, who questioned whether Staffordshire Police had violated data protection laws.

An ICO spokesman told The Register:

We are currently making enquiries into a possible breach of the Data Protection Act by Staffordshire Police relating to their #drinkdriversnamedontwitter campaign.

El Reg understands that the regulator is mulling over principle 1 of the Data Protection Act that requires information to be be processed fairly and lawfully.

In mid-December, Staffordshire Police - which tweets under the Twitter handle @StaffsPolice - claimed to have "overwhelming support" for its anti drink-driving campaign and said it would help reduce such alleged crimes in the area.

At the time, the constabulary's Chief Inspector Paul Trevor said the force would use Twitter to name and shame "those who have been caught drink-driving" on a daily basis.

In direct response to the criticism, Staffordshire Police added: "There have been concerns raised about naming those charged. However, it is force policy to name people who have been charged and when offenders attend court it becomes a matter of public record." ®

Bootnote

Surprisingly, Twitter is not yet trending with the following hashtag: #gohomestaffspoliceyouredrunk.

Providing a secure and efficient Helpdesk

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.