Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

Size: px
Start display at page:

Download "Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ"

Transcription

1 16th March 2014 The Rt. Hon Dominic Grieve QC MP, Attorney General, 20 Victoria Street London SW1H 0NF c.c. The Rt. Hon Theresa May, Home Secretary Dear Mr. Grieve, Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ I am writing with regard to recent public disclosures that Government Communications Headquarters (GCHQ) has for some years engaged in a programme of indiscriminate access to and storage of webcam images of a substantial number possibly millions - of Yahoo customers. This programme named Optic Nerve - was recently made public as a result of publication of a number of internal GCHQ documents made available by the whistleblower Edward Snowden. If this information is verified it would be reasonable to conclude that GCHQ has engaged in unauthorised interception in violation of s.1 (1) of the Regulation of Investigatory Powers Act. As you are fully aware, this legislation provides for substantial criminal penalties, including imprisonment, for unlawful communications interception. In this case, it would appear that the required s.42 RIPA authorisation was not issued by or sought from - the Secretary of State. On the basis of the documentation it is doubtful whether any exemption (particularly the claimed

2 research exemption) would apply to such a substantial interception operation. As a user of Yahoo services, I like many other people have been deeply troubled by these reported mass surveillance activities. During the period of Optic Nerve s operation I regularly used Yahoo both in the UK and in at least twenty other countries. The question of the geographical areas in which these interceptions took place is dealt with below. In light of 1) the circumstances set out in this letter, 2) the absence of an appropriate complaint mechanism, 3) the existence of a substantial body of evidence and 4) the exceptional public interest in this matter, I request that you consider using your discretionary prerogative to invite the Commissioner of the Metropolitan Police to investigate this alleged violation. Alternatively, I ask you to consider requesting the DPP to initiate a request. As you are aware, such an action while being unusual - would not be without precedent. This plea is made to you in your capacity as an independent guardian of the public interest and the rule of law. I strongly feel that in light of the extensive controversy in recent months over such matters, your intervention is necessary to maintain public trust in both the right to privacy and in the rule of law. The Snowden disclosures have triggered widespread concern over national security operations. This followed considerable alarm over a spectrum of phone hacking allegations that went to the heart of the integrity of media and the police. Any claim of unlawful conduct by a security agency must surely be investigated and resolved as a matter of urgency. If, after considering this request, you feel it is not appropriate for you to take any action, would you please advise which agency I should approach regarding this matter. Background to the webcam interception programme On 28 th February 2014 the Guardian newspaper reported that it had obtained documented evidence that GCHQ had indiscriminately intercepted and stored the webcam images of a considerable number Yahoo! Messenger users. 1 The programme allegedly commenced operation in 2008 and remained active until at least Documents obtained by the Guardian explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month 1 2

3 period in 2008 alone, the agency collected webcam imagery including substantial quantities of sexually explicit communications from more than 1.8 million Yahoo user accounts globally. A GCHQ internal memo confirming the project is set out in Appendix 1. The system was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" intelligence agency parlance for bulk rather than targeted collection. One document likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals. Substance of the concerns It is not necessary for me to outline the provisions set out in RIPA. As you are aware, there are very few circumstances in which an interception can take place. In a scenario such as the one outlined above, the appropriate course would be a s.42 authorisation. It may, however, be useful to clarify the legal basis for an investigation of a s.1 RIPA violation by GCHQ. - Webcam data is content protected by RIPA Webcam traffic falls within the definition of interception in s 2(2)(b) of RIPA: 2 (2) For the purposes of this Act, but subject to the following provisions of this section, a person intercepts a communication in the course of its transmission by means of a telecommunication system if, and only if, he (a) so modifies or interferes with the system, or its operation, (b) so monitors transmissions made by means of the system, or (c) so monitors transmissions made by wireless telegraphy to or from apparatus comprised in the system, 2 3

4 as to make some or all of the contents of the communication available, while being transmitted, to a person other than the sender or intended recipient of the communication. - A s.42 authorisation is required S 42 (1) states that authorisations must be made by the issue of a warrant granted by the Secretary of State and must be compliant with s 32 of RIPA (s42(3). Webcam traffic - if it shows people in their homes - is intrusive surveillance which must pass the tests of s 32 of RIPA. i.e. necessary ( s 32(2)), proportionate (s 32(3)) and for the purposes set out in s 33: in the interests of national security; for the purpose of preventing or detecting serious crime; or in the interests of the economic well-being of the United Kingdom. - The claimed research exemption is invalid In these circumstances a claimed research justification could not meet the necessity and proportionality tests. If technical testing of face recognition algorithms were considered necessary via webcams it could have been undertaken in a controlled environment, indeed the research would be more valid because a variety of test circumstances could be established. RIPA protections are relevant regardless of the location of target individuals. RIPA and ISA appear to be agnostic as to territoriality (though enforcement would generally take place via UK mechanisms). However the question of territory is largely irrelevant. GCHQ accessed images substantially via a UK public telecommunications system, and in the case of webcam images of overseas targets in conversation with UK residents the access would also involve intercepting private systems. These circumstances indicate that a s.42 authorisation would most definitely be needed to lawfully conduct the interception. On the basis of the published documentation, however, it would seem that such authorisation was neither sought nor granted. One internal document explained the agency s reasoning: "It was agreed that the legalities of such a capability would be considered once it had been developed, but that the general principle applied would be that if the accuracy of the algorithm was such that it was useful to the 4

5 analyst (ie, the number of spurious results was low, then it was likely to be proportionate)" "This is allowed for research purposes but at the point where the results are shown to analysts for operational use, the proportionality and legality questions must be more carefully considered." This assessment demonstrates a fundamental misunderstanding of the law. RIPA criminalises the fact of an intercept unless at least one of a limited number of conditions has been met. How the intercepted data are processed - or the purposes to which they are put - are not relevant. It is possible that staff had failed to differentiate between the permissible exemptions and exceptions in RIPA and the Data Protection Act (1998) (DPA) and had confused the two pieces of legislation. Certain research purposes are permissible under the DPA. However, even if this exemption was relevant, the DPA does not in any practical sense apply to GCHQ. Even if a full exemption for research existed under the DPA this condition would have no bearing on the authorisation requirements set out in RIPA. It is also important to consider the possibility that SoS authorisation was sought and obtained, but that the SoS acted ultra vires, issuing a warrant outside the scope permitted in RIPA, perhaps on poor legal advice. This situation may fall within the scope of other investigatory entities for consideration, or even be subject to judicial review. Inadequacy of alternative complaint mechanisms As you aware, the Data Protection Act (1998) has limited relevance to GCHQ s activities. Most of the key principles (particularly the 1 st, 2 nd and 8 th principles) are exempt, while the 3 rd and 5 th principles have almost no effect. The extensive use of s.28 certificates has created a default exemption for national security operations. The absence of a s.42 authorisation is most likely a procedural failure by GCHQ rather than a breach of responsibility by the Secretary of State, and so this issue would not be of relevance to either the Interception of Communications Commissioner nor the Investigatory Powers Tribunal. Additionally, in instances of alleged criminal law violations, neither the Commissioner nor the Tribunal will take action on complaints. Instead, they advise that the matter should be brought to the attention of police. In normal events I would have brought this matter directly to the attention of police. Two conditions dissuaded me from this course of action. 5

6 First, I am aware of the arrangements that have been put in place between your office and the CPS regarding investigations into matters of national security. 3 You have a clearly defined role in such matters, and it seems to me that in these circumstances you should be the first avenue of approach. Police would inevitably need to consult CPS, and according to the Protocol mentioned above, CPS would then need to consult you. Second, I understand that in normal events - in the absence of guidance - police would have great difficulty investigating a complex entity such as GCHQ. There is historical evidence to support this view. In as the then Director of Privacy International - I unsuccessfully raised a strikingly similar complaint with the Metropolitan Police over apparent s.1 (1) RIPA violations by Google. 4. The 2010 complaint arose from an equally widespread data capture programme that involved the interception of wireless content across the UK. Senior officers at Scotland Yard advised me that in the absence of an identified individual perpetrator, they were not prepared to take action. The fact of the intercept was not in dispute; the principal issue for police appeared to be that the interception was conducted by a complex entity and no single individual could be held accountable. They argued that this raised a number of complexities for any investigation, including budgetary and legal considerations. The reluctance of police to act against large entities regarding s.1 violations of RIPA is also indicated by the decision of the City of London police in 2008 to discontinue an investigation into s.1 offences by BT during covert technical trials of an online advertising company called Phorm. 5 While police justified the decision on the basis that they did not believe there was criminal intent by BT (which in itself was contentious reasoning), the same cannot be said of GCHQ, which in the matter of the webcam interception clearly intended to systematically conduct the intercepts. Police also claimed there was implied consent by BT customers to be intercepted, a condition that again - is not relevant to the GCHQ operation. In light of this recent experience, it would fanciful to imagine that police would take action again in the absence of an identified individual perpetrator - to investigate a security agency over RIPA violations. 3 eral_and_the_prosecuting_departments.pdf

7 I am sure you will understand the difficult position this creates for a complainant such as myself. If - in these circumstances and in light of the above history - I went to the police in the first instance, your prerogative of a referral to them would not be possible. I had also considered the option of approaching the Parliament s Intelligence and Security Committee, however the terms of reference of the committee s present inquiry 6 are more focused on the adequacy of the legal framework rather than an investigatory approach to specific operational issues. A focused police investigation on the lawfulness of one of GCHQ s programmes would, however, doubtless be of some value to the Committee. The precedent for a referral to police by the Attorney General I am aware that any action by you to initiate or encourage a police investigation would be highly unusual. There is, however, a precedent of which I am certain you are familiar. This precedent involved certain elements in common with the GCHQ matter. In 2009 the case of Binyam Mohamed, a former British Guantanamo detainee, was investigated by police after a request by your predecessor, Baroness Scotland QC. The case centred on claims of torture conducted by an MI5 officer. In a ministerial statement 7 Baroness Scotland said "I have concluded that the appropriate course of action is to invite the Commissioner of the Metropolitan Police to commence an investigation into the allegations that have been made in relation to Binyam Mohamed. "I have expressed to the Commissioner the hope that the investigation can be taken forward as expeditiously as possible given the seriousness and sensitivity of the issues involved. The conduct of the investigation will be a matter for the police, with advice from the Crown Prosecution Service. I would argue that such a referral would be an equally appropriate course of action in the GCHQ matter. As with the Mohamed case, security concerns and official secrecy have restricted the normal legal avenues a matter compounded in both cases by an alleged operational partnership of US and UK security 6 7crVTrH6i4tkG8keKqsV4N4ZwEfohaCX1K4ldrhGWnuHzlYJtBELZV8fGFiCKOF-oDj_7VPbugNb07br- 6Vyiaz6SLxgqzDGRyTpVtzUeJH929EQgdCvAcFSCnzUgF4vFwU2RdSWEQ01guxmNhO2XtKOCiL4l5SyhqdN5mr9i8DXmUq900 yyjyidqr_nu3sqs_ap_inkazrognrwnez0yhw-iszihhmzlkhb1qx2ulb5xc76ppjmpqdohebkkqj_slphax2_fifn8zpbs14ahyhqkjhwq%3d%3d&attredirects=

8 agencies. I hope you are able to resolve these matters swiftly to ensure that Internet users continue to enjoy protection of their privacy and personal information. If you are unable to agree to my request, could you please advice the appropriate course of action? Yours sincerely, Simon Davies 8

9 APPENDIX 1 9

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence

More information

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

INVESTIGATORY POWERS BILL EXPLANATORY NOTES INVESTIGATORY POWERS BILL EXPLANATORY NOTES What these notes do These Explanatory Notes relate to the Investigatory Powers Bill as brought from the House of Commons on 8. These Explanatory Notes have been

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill [AS AMENDED ON REPORT] CONTENTS PART 1 GENERAL PRIVACY PROTECTIONS Overview and general privacy duties 1 Overview of Act 2 General duties in relation to privacy Prohibitions against

More information

I. REGULATION OF INVESTIGATORY POWERS BILL

I. REGULATION OF INVESTIGATORY POWERS BILL These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

1 June Introduction

1 June Introduction Privacy International's submission in advance of the consideration of the periodic report of the United Kingdom, Human Rights Committee, 114 th Session, 29 June 24 July 2015 1. Introduction 1 June 2015

More information

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL Background 1. This memorandum has been lodged by Michael Matheson, Cabinet Secretary for Justice, under Rule 9B.3.1(a) of the Parliament s Standing

More information

Submission to the Joint Committee on the draft Investigatory Powers Bill

Submission to the Joint Committee on the draft Investigatory Powers Bill 21 December 2015 Submission to the Joint Committee on the draft Investigatory Powers Bill 1. The UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression;

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 ch2300a00a 01-08-00 22:01:07 ACTA Unit: paga RA Proof 20.7.2000 Regulation of Investigatory Powers Act 2000 CHAPTER 23 ARRANGEMENT OF SECTIONS Part I Communications Chapter I Interception Unlawful and

More information

Regulation of Investigatory Powers Bill

Regulation of Investigatory Powers Bill Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary

More information

On 4 November the government published the draft Investigatory Powers Bill, set to be. Understanding the Investigatory Powers Bill.

On 4 November the government published the draft Investigatory Powers Bill, set to be. Understanding the Investigatory Powers Bill. Royal United Services Institute for Defence and Security Studies Briefing Paper, November 2015 Understanding the Investigatory Powers Bill Calum Jeffray Key Points Many of the most significant proposed

More information

House Standing Committee on Social Policy and Legal Affairs

House Standing Committee on Social Policy and Legal Affairs Australian Broadcasting Corporation submission to the House Standing Committee on Social Policy and Legal Affairs and to the Senate Legal and Constitutional Affairs Committee on their respective inquiries

More information

Privacy And? Surveillance

Privacy And? Surveillance University of Leeds From the SelectedWorks of Subhajit Basu Fall November 28, 2015 Privacy And? Surveillance Subhajit Basu Available at: https://works.bepress.com/subhajitbasu/88/ School of something FACULTY

More information

PRIVACY INTERNATIONAL. and. (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS Respondents

PRIVACY INTERNATIONAL. and. (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS Respondents IN THE INVESTIGATORY POWERS TRIBUNAL BETWEEN: PRIVACY INTERNATIONAL and Case No. IPT 14/85/CH Claimant (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS

More information

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND Mandates of the Special Rapporteur on the promotion and protection

More information

2018 No. 873 (C. 66) INVESTIGATORY POWERS

2018 No. 873 (C. 66) INVESTIGATORY POWERS S T A T U T O R Y I N S T R U M E N T S 2018 No. 873 (C. 66) INVESTIGATORY POWERS The Investigatory Powers Act 2016 (Commencement No. 7 and Transitional and Saving Provisions) Regulations 2018 Made - -

More information

BULK POWERS IN THE INVESTIGATORY POWERS BILL:

BULK POWERS IN THE INVESTIGATORY POWERS BILL: BULK POWERS IN THE INVESTIGATORY POWERS BILL: The Question Of Trust Remains Unanswered September 2016 1/10 Introduction We are on the brink of introducing the most pervasive and intrusive surveillance

More information

Report of the Interception of Communications Commissioner

Report of the Interception of Communications Commissioner Report of the Interception of Communications Commissioner Review of directions given under section 94 of the Telecommunications Act (1984) The Rt Hon. Sir Stanley Burnton July 2016 Report of the Interception

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

Law Enforcement processing (Part 3 of the DPA 2018)

Law Enforcement processing (Part 3 of the DPA 2018) Law Enforcement processing (Part 3 of the DPA 2018) Introduction This part of the Act transposes the EU Data Protection Directive 2016/680 (Law Enforcement Directive) into domestic UK law. The Directive

More information

Acquisition and Disclosure of Communications Data. A public consultation

Acquisition and Disclosure of Communications Data. A public consultation Acquisition and Disclosure of Communications Data A public consultation A PUBLIC CONSULTATION Summary This consultation paper seeks views on the contents of a revised draft statutory code of practice on

More information

Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April Communication Data

Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April Communication Data Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April 2012 Communication Data Thank you for your letter of 2 April regarding Home Office plans on electronic surveillance.

More information

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2 Document Information Summary Partners ISA Ref: As Part 1 An agreement to formalise the information sharing arrangements for the purpose of specific Information sharing pursuant to Crime and Disorder reduction

More information

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010 First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition

More information

Data Protection Bill [HL]

Data Protection Bill [HL] [AS AMENDED IN PUBLIC BILL COMMITTEE] CONTENTS PART 1 PRELIMINARY 1 Overview 2 Protection of personal data 3 Terms relating to the processing of personal data PART 2 GENERAL PROCESSING CHAPTER 1 SCOPE

More information

Before : THE PRESIDENT THE VICE-PRESIDENT MR PETER SCOTT QC (1) MS JENNY PATON (2) C2 (3) C3 (4) C4 (5) C5. and

Before : THE PRESIDENT THE VICE-PRESIDENT MR PETER SCOTT QC (1) MS JENNY PATON (2) C2 (3) C3 (4) C4 (5) C5. and IN THE INVESTIGATORY POWERS TRIBUNAL Before : Case Nos: IPT/09/01/C IPT/09/02/C IPT/09/03/C IPT/09/04/C IPT/09/05/C Date: 29 July 2010 THE PRESIDENT THE VICE-PRESIDENT SHERIFF PRINCIPAL JOHN McINNES QC

More information

DURHAM CONSTABULARY POLICY

DURHAM CONSTABULARY POLICY DURHAM CONSTABULARY POLICY Durham Constabulary Freedom of Information Act Publication Scheme Name of Policy Body Worn Video Devices Registry Reference No. DCP 166 Policy Owner Head of Neighbourhood & Partnership

More information

Spying on humanitarians: implications for organisations and beneficiaries

Spying on humanitarians: implications for organisations and beneficiaries Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE EDINBURGH NAPIER UNIVERSITY CCTV CODE OF PRACTICE Introduction The monitoring, recording, holding and processing of images of identifiable individuals constitutes personal data as defined by the Data Protection

More information

Telecommunications Information Privacy Code 2003

Telecommunications Information Privacy Code 2003 Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8

More information

DATA SHARING AND PROCESSING

DATA SHARING AND PROCESSING DATA SHARING AND PROCESSING Capita Business Services Limited March 2016 Version 1.3 TABLE OF CONTENTS: Item Heading Page 1 Data Processing Agreement 2 2 Data Protection Act 1998 2 3 Data Protection Act

More information

Conducting surveillance in a public place

Conducting surveillance in a public place Ministerial Policy Statement Conducting surveillance in a public place Summary It is lawful for the Government Communications Security Bureau (GCSB) and the New Zealand Security Intelligence Service (NZSIS)

More information

Counter-Terrorism Bill

Counter-Terrorism Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 6 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following

More information

Investigatory Powers Bill Briefing

Investigatory Powers Bill Briefing Investigatory Powers Bill Briefing What is the Investigatory Powers Bill? Running to 245 pages, the Investigatory Powers Bill is an attempt to establish a clear framework for the authorisation and use

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

National Security Legislation Amendment Bill (No. 1) 2014 No., 2014

National Security Legislation Amendment Bill (No. 1) 2014 No., 2014 0-0 The Parliament of the Commonwealth of Australia THE SENATE As passed by both Houses National Security Legislation Amendment Bill (No. ) 0 No., 0 A Bill for an Act to amend the law relating to national

More information

Analysis of the Workplace Surveillance Bill 2005

Analysis of the Workplace Surveillance Bill 2005 Analysis of the Workplace Surveillance Bill 2005 16 May 2005 Introduction This paper sets out the Australian Privacy Foundation s analysis of the Workplace Surveillance Bill 2005 (NSW). The Workplace Surveillance

More information

Data Protection Bill [HL]

Data Protection Bill [HL] [AS AMENDED IN COMMITTEE] CONTENTS PART 1 PRELIMINARY 1 Overview 2 Terms relating to the processing of personal data PART 2 GENERAL PROCESSING CHAPTER 1 SCOPE AND DEFINITIONS 3 Processing to which this

More information

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015 IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no. 24960/15 B E T W E E N:- 10 HUMAN RIGHTS ORGANISATIONS -v- UNITED KINGDOM Applicants Respondent Government Introduction SUBMISSIONS MADE IN LIGHT OF

More information

REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL

REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL REGULATION OF INVESTIGATORY POWERS (SCOTLAND) BILL EXPLANATORY NOTES (AND OTHER ACCOMPANYING DOCUMENTS) CONTENTS 1. As required under Rule 9.3 of the Parliament s Standing Orders, the following documents

More information

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations Presented by: Alison Choy Flannigan Partner (02) 9390 8338 alison.choyflannigan@holmanwebb.com.au

More information

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD Objective/Risk Create the governance and safeguards necessary to ensure we appropriately balance respect for our customers right to privacy and

More information

Brussels, 16 May 2006 (Case ) 1. Procedure

Brussels, 16 May 2006 (Case ) 1. Procedure Opinion on the notification for prior checking received from the Data Protection Officer (DPO) of the Council of the European Union regarding the "Decision on the conduct of and procedure for administrative

More information

EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS

EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS Data Protection in a : Future EU-US international agreement on the protection of personal data when transferred and processed

More information

The Right to Privacy in the Digital Age: Meeting Report

The Right to Privacy in the Digital Age: Meeting Report The Right to Privacy in the Digital Age: Meeting Report In light of the recent revelations regarding mass surveillance, interception and data collection the Permanent Missions of Austria, Brazil, Germany,

More information

SUBSIDIARY LEGISLATION DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS

SUBSIDIARY LEGISLATION DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) [S.L.440.05 1 SUBSIDIARY LEGISLATION 440.05 DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS 30th September,

More information

INVESTIGATORY POWERS AND LEGAL PROFESSIONAL PRIVILEGE

INVESTIGATORY POWERS AND LEGAL PROFESSIONAL PRIVILEGE INVESTIGATORY POWERS AND LEGAL PROFESSIONAL PRIVILEGE A position paper produced by the Bar Council and The Law Society and supported by the Bar of Northern Ireland and the Faculty of Advocates For further

More information

COMP Article 1. Article 1 Subject matter and objectives

COMP Article 1. Article 1 Subject matter and objectives Proposal for a directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention,

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

Investigatory Powers Bill. How to make it fit-for-purpose

Investigatory Powers Bill. How to make it fit-for-purpose Investigatory Powers Bill How to make it fit-for-purpose Contents Introduction 1 The draft Bill fails in its mission to be clear and comprehensive 2 The operational case has not been made for all powers

More information

Council of the European Union Brussels, 1 February 2017 (OR. en)

Council of the European Union Brussels, 1 February 2017 (OR. en) Council of the European Union Brussels, 1 February 2017 (OR. en) 5884/17 INFORMATION NOTE From: Legal Service LIMITE JUR 58 JAI 83 DAPIX 36 TELECOM 28 COPEN 27 CYBER 14 DROIPEN 12 To: Permanent Representatives

More information

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction

Protection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction Protection of Freedoms Bill Delegated Powers - Memorandum by the Home Office Introduction 1. This Memorandum identifies the provisions of the Protection of Freedoms Bill which confer powers to make delegated

More information

EXECUTIVE SUMMARY. 3 P a g e

EXECUTIVE SUMMARY. 3 P a g e Opinion 1/2016 Preliminary Opinion on the agreement between the United States of America and the European Union on the protection of personal information relating to the prevention, investigation, detection

More information

Official Gazette No. 55 issued on 8 May Data Protection Act. of 14 March 2002

Official Gazette No. 55 issued on 8 May Data Protection Act. of 14 March 2002 Official Gazette 2002 No. 55 issued on 8 May 2002 Data Protection Act of 14 March 2002 I hereby grant my consent to the following resolution adopted by the Diet: I. General provisions Article 1 Objective

More information

Information Privacy Act 2000

Information Privacy Act 2000 Section Version No. 031 Information Privacy Act 2000 Version incorporating amendments as at 1 July 2014 TABLE OF PROVISIONS Page PART 1 PRELIMINARY 1 1 Purposes 1 2 Commencement 1 3 Definitions 2 4 Interpretative

More information

Data protection. Guide to the Law Enforcement Provisions

Data protection. Guide to the Law Enforcement Provisions Data protection Guide to the Law Enforcement Provisions Introduction What is it? Who does Part 3 of the DP Bill apply to? How can we comply? 3 4 6 9 07 December 2017-1.0.6 2 Introduction The Guide to the

More information

Surveillance Devices Act 2007 No 64

Surveillance Devices Act 2007 No 64 New South Wales Surveillance Devices Act 2007 No 64 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Relationship to other laws and matters 2 4 Definitions 2 5 Eligible Judges

More information

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding Safeguarding and Prevent Statutory Frameworks 1. Safeguarding The legal framework for the protection of children in the UK is set out in the Children Act 1989. A child is defined by this act as any person

More information

In the present analysis, we cover the most problematic points of the Directive. For our views on the Regulation, please go to our document pool.

In the present analysis, we cover the most problematic points of the Directive. For our views on the Regulation, please go to our document pool. In light of the trialogue negotiations on the proposal for the Law Enforcement Data Protection Directive 1, EDRi, fipr and Panoptykon would like to provide comments on selected key elements the current

More information

***I DRAFT REPORT. EN United in diversity EN 2012/0010(COD)

***I DRAFT REPORT. EN United in diversity EN 2012/0010(COD) EUROPEAN PARLIAMT 2009-2014 Committee on Civil Liberties, Justice and Home Affairs 20.12.2012 2012/0010(COD) ***I DRAFT REPORT on the proposal for a directive of the European Parliament and of the Council

More information

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing

More information

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995 DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

More information

A guide to the new privacy landscape for the Commonwealth Government

A guide to the new privacy landscape for the Commonwealth Government A guide to the new privacy landscape for the Commonwealth Government Contents compliance: it s time to get ready compliance: it s time to get ready 3 Overview of the Australian Principles 4 The other requirements

More information

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

DATA PROCESSING AGREEMENT. between [Customer] (the Controller) and LINK Mobility (the Processor) DATA PROCESSING AGREEMENT between [Customer] (the "Controller") and LINK Mobility (the "Processor") Controller Contact Information Name: Title: Address: Phone: Email: Processor Contact Information Name:

More information

Protection of Freedoms Act 2012

Protection of Freedoms Act 2012 Protection of Freedoms Act 2012 Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data March 2013 Issued Pursuant to Section 22

More information

Identity Cards Bill EXPLANATORY NOTES. Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN.

Identity Cards Bill EXPLANATORY NOTES. Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN. Identity Cards Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary Clarke has made

More information

Telecommunications (Interception Capability and Security) Bill

Telecommunications (Interception Capability and Security) Bill Government Bill Explanatory note General policy statement This Bill repeals and replaces the Capability) Act 2004. The main objectives of the Bill are to ensure that the interception obligations imposed

More information

Code of Practice - Covert Human Intelligence Sources. Covert Human Intelligence Sources. Code of Practice

Code of Practice - Covert Human Intelligence Sources. Covert Human Intelligence Sources. Code of Practice Covert Human Intelligence Sources Code of Practice Regulation of Investigatory Powers (Bailiwick of Guernsey) Law, 2003 Code ofpractice - Covert Human Intelligence Sources COVERT NUItlAN INTELLIGENCE SOURCES

More information

Cybercrime Legislation Amendment Bill 2011

Cybercrime Legislation Amendment Bill 2011 Cybercrime Legislation Amendment Bill 2011 Joint Select Committee on Cyber-Safety 14 July 2011 GPO Box 1989, Canberra ACT 2601, DX 5719 Canberra 19 Torrens St Braddon ACT 2612 Telephone +61 2 6246 3788

More information

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981 EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COP 200 TELECOM 151 CODEC 1206 OC 981 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE

More information

Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361

Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361 Image: geralt Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361 In partnership with: With support from:

More information

Data Protection. Standard Operating Procedure

Data Protection. Standard Operating Procedure Data Protection Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as

More information

Liberty s briefing on Report of the Bulk Powers Review

Liberty s briefing on Report of the Bulk Powers Review Liberty s briefing on Report of the Bulk Powers Review August 2016 1 About Liberty Liberty (The National Council for Civil Liberties) is one of the UK s leading civil liberties and human rights organisations.

More information

David Anderson QC Independent Reviewer of Terrorism Legislation Brick Court Chambers 7-8 Essex Street London WC2R 3LD

David Anderson QC Independent Reviewer of Terrorism Legislation Brick Court Chambers 7-8 Essex Street London WC2R 3LD David Anderson QC Independent Reviewer of Terrorism Legislation Brick Court Chambers 7-8 Essex Street London WC2R 3LD Re: Evidence for Investigatory Powers Review 10 October 2014 Dear Mr Anderson 1. The

More information

Regulation of Interception of Act 18 Communications Act 2010

Regulation of Interception of Act 18 Communications Act 2010 ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception

More information

closer look at Rights & remedies

closer look at Rights & remedies A closer look at Rights & remedies November 2017 V1 www.inforights.im Important This document is part of a series, produced purely for guidance, and does not constitute legal advice or legal analysis.

More information

Prisons and Courts Bill

Prisons and Courts Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Ministry of Justice, are published separately as Bill 14 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Elizabeth Truss has made the

More information

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 2 DATA PROTECTION (JERSEY) LAW 2005: CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV PART 1: CODE OF PRACTICE Introduction

More information

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources September 2013 About Liberty Liberty (The National Council for Civil Liberties)

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

COUNTER-TERRORISM AND SECURITY BILL

COUNTER-TERRORISM AND SECURITY BILL COUNTER-TERRORISM AND SECURITY BILL EXPLANATORY NOTES INTRODUCTION 1. These Explanatory Notes relate to the Counter-Terrorism and Security Bill as introduced in the House of Commons on 26 November 2014.

More information

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE References to clauses are to the Bill as introduced to the House of Lords. References are square bracketed and include

More information

Investigatory Powers Bill 2016: Part 8. Surveillance Oversight. Briefing for House of Commons Committee Stage. April 2016

Investigatory Powers Bill 2016: Part 8. Surveillance Oversight. Briefing for House of Commons Committee Stage. April 2016 Investigatory Powers Bill 2016: Part 8 Surveillance Oversight Briefing for House of Commons Committee Stage April 2016 For further information contact Angela Patrick, Director of Human Rights Policy email:

More information

Privacy. Purpose. Scope. Policy. Appendix A

Privacy. Purpose. Scope. Policy. Appendix A Privacy NZQA Quality Management System Policy Appendix A Purpose To ensure NZQA and personnel meet the legal obligations under the Privacy Act 1993 and in relation to its functions under section 246A of

More information

Information exempt from the subject access right (section 40(4) and

Information exempt from the subject access right (section 40(4) and ICO lo Information exempt from the subject access right (section 40(4) and Freedom of Information Act Environmental Information Regulations Contents Introduction... 2 Overview... 3 What FOIA says... 4

More information

The Protection of Freedoms Bill

The Protection of Freedoms Bill The Protection of Freedoms Bill The Protection of Freedoms Bill deals with a wide variety of areas. It includes provisions on retention of DNA and fingerprints by the police, use of biometrics by schools,

More information

TekSavvy Solutions Inc.

TekSavvy Solutions Inc. TekSavvy Solutions Inc. Law Enforcement Guide TekSavvy Solutions Inc. ( TekSavvy ) is a provider of Internet access, voice telephony, and related telecommunication services. We retain subscriber information

More information

Freedom of Information Act 2000 (FOIA) Decision notice

Freedom of Information Act 2000 (FOIA) Decision notice Freedom of Information Act 2000 (FOIA) Decision notice Date: 9 August 2012 Public Authority: Address: Royal Mail Group Ltd 100 Victoria Embankment London EC4Y 0HQ Decision (including any steps ordered)

More information

FOURTH SECTION. CASE OF LIBERTY AND OTHERS v. THE UNITED KINGDOM. (Application no /00) JUDGMENT STRASBOURG. 1 July 2008

FOURTH SECTION. CASE OF LIBERTY AND OTHERS v. THE UNITED KINGDOM. (Application no /00) JUDGMENT STRASBOURG. 1 July 2008 FOURTH SECTION CASE OF LIBERTY AND OTHERS v. THE UNITED KINGDOM (Application no. 58243/00) JUDGMENT STRASBOURG 1 July 2008 This judgment will become final in the circumstances set out in Article 44 2 of

More information

[2015] UKIPTrib 13_77-H Case Nos: IPT/13/77/H, IPT/13/92/CH, IPT/13/ /H, IPT/13/194/CH, IPT/13/204/CH. Before :

[2015] UKIPTrib 13_77-H Case Nos: IPT/13/77/H, IPT/13/92/CH, IPT/13/ /H, IPT/13/194/CH, IPT/13/204/CH. Before : [2015] UKIPTrib 13_77-H Case Nos: IPT/13/77/H, IPT/13/92/CH, IPT/13/168-173/H, IPT/13/194/CH, IPT/13/204/CH IN THE INVESTIGATORY POWERS TRIBUNAL P.O. Box 33220 London SW1H 9ZQ Date: 06/02/2015 Before :

More information

Neutral Citation Number: [2016] UKIPTrib 15_110-CH No. IPT/15/110/CH. Before:

Neutral Citation Number: [2016] UKIPTrib 15_110-CH No. IPT/15/110/CH. Before: Neutral Citation Number: [2016] UKIPTrib 15_110-CH No. IPT/15/110/CH IN THE INVESTIGATORY POWERS TRIBUNAL Before: Rolls Building 26, 27,28,29 July 2016 THE HON. MR. JUSTICE BURTON (PRESIDENT) THE HON.

More information

Hacking and the Law. John MacKenzie

Hacking and the Law. John MacKenzie Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors

More information

Draft Voluntary Code of Practice on Retention of Communications Data under Part 11 of the Anti-terrorism, Crime and Security Act 2001

Draft Voluntary Code of Practice on Retention of Communications Data under Part 11 of the Anti-terrorism, Crime and Security Act 2001 House of Lords House of Commons Joint Committee on Human Rights Draft Voluntary Code of Practice on Retention of Communications Data under Part 11 of the Anti-terrorism, Crime and Security Act 2001 Sixteenth

More information

DATA PROTECTION LAWS OF THE WORLD. South Korea

DATA PROTECTION LAWS OF THE WORLD. South Korea DATA PROTECTION LAWS OF THE WORLD South Korea Downloaded: 31 August 2018 SOUTH KOREA Last modified 26 January 2017 LAW In the past, South Korea did not have a comprehensive law governing data privacy.

More information

Douwe Korff Professor of International Law London Metropolitan University, London (UK)

Douwe Korff Professor of International Law London Metropolitan University, London (UK) NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European

More information

Changes to RIPA. It is worth considering the history and purposes of RIPA before examining the changes and their potential impact.

Changes to RIPA. It is worth considering the history and purposes of RIPA before examining the changes and their potential impact. Bulletin www.jamesbutton.co.uk Changes to RIPA As you may be aware, significant changes in the way local authorities can use the powers to conduct covert surveillance contained in the Regulation of Investigatory

More information

Policies and Procedures

Policies and Procedures Policies and Procedures QMS3: POL5 Privacy Policy Policy Details Responsible area General Endorsed by CEO Date 22 November 2017 Review date 22 November 2018 Policy Statement At Linx Institute, we are committed

More information

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Executive Summary: The draft bill is far-reaching with the potential to intrude into the private lives of individuals.

More information

Act No. 502 of 23 May 2018

Act No. 502 of 23 May 2018 Act No. 502 of 23 May 2018 This version has been translated for the Danish Ministry of Justice. The official version was published in Lovtidende (the Law Gazette) on 24 May 2018. Only the Danish version

More information