Presentation is loading. Please wait.

Presentation is loading. Please wait.

Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC

Similar presentations


Presentation on theme: "Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC"— Presentation transcript:

1 Human Rights Act, Privacy in the context of email auditing Phil Huggins Chief Technologist, IRM PLC phil.huggins@irmplc.com

2 I AM NOT A LAWYER!! This is based on the best practises and advice I have been received. You will need to get your own legal advice.

3 Legal Context for Privacy of Email  Not “Interception of Communications”.  Confidentiality  A common law concept  Data Protection Act 1998  European Data Protection Directive  Human Rights Act 1998  European Convention on Human Rights

4 Confidentiality  Protects information where misuse would be “unconscionable”  Does not protect trivial information  Does not protect public domain information  Does not protect information about a crime  Traditionally applied to “professional” relationships:  Doctor/patient  Financial information  Applies to dead people

5 Data Protection Act 1998  Applies to all information  Only applies to recorded information  Protects living people only  “..where monitoring goes beyond mere human observation and involves the collection, processing and storage of any personal data it must be done in a way that is both lawful and fair to workers.”  Must conduct “impact assessment” for any monitoring.  Employee consent is NOT required UNLESS the data to be monitored is ‘sensitive data” as described under the DPA.  Covert monitoring requires authorisation at a “senior level” within the business.

6 Human Rights Act 1998  Article 8 - Right to respect for private and family life 1.Everyone has the right to respect for his private and family life, his home and his correspondence. 2.There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.

7 Article 8 in the Private Sector  A v B & C (No.2) 2002  Married footballer attempting to prevent publication of details of an affair by a newspaper or through other media by the mistress  Private sector organisations (probably) do not have to comply with Article 8 in their normal business.  However, a court or an employment tribunal is a public authority and HRA Article 8 may well affect the admissibility of evidence

8 Conclusion  Ensure all evidential material is gathered in a manner compliant with the Data Protection Act 1998  Ensure staff are aware of the expectations of privacy when using business communications systems

9 Regulation of Investigatory Powers Act 2000  RIPA introduced to cope with the change in communications systems since the rapid growth of the Internet.  Mainly focused on issues of interception and intrusive investigation.  Includes provision for law enforcement and other public bodies to try to deal with the rapid spread of good quality encryption systems.  Restrictions on businesses detailed in the Lawful Business Practice Regulations.

10 Lawful Business Practice Regulations  Under RIPA it is against the law for a business to intercept communications on it’s systems.  Exceptions:  Under a warrant  Consent of sender and receiver  Required for the operation of the system

11 Lawful Business Practice Regulations Is the interception connected with the operation of the communications system ? Have senders and receivers both given consent ? Is there an interception ? Interception can take place. Yes No Yes No Continue

12 Lawful Business Practice Regulations Interception can take place. No interception can take place Is the interception only for monitoring business related communications ? No Is the interception for an authorised business purpose ? Is a confidential telephone counselling service involved ? Is the interception to decide whether a communication is business related ? Have all reasonable efforts been made to inform users of Interception ? No Yes No

13 Lawful Business Practice Regulations  Authorised Business Use  “to prevent and detect crime”  “to investigate or detect unauthorised use of the telecommunications system”  “to ensure the security of the system and it’s effective operation”  However, must make all reasonable efforts to inform users of interception !  Workers, including temporary or contract staff, will be users of the system but outside callers or senders of e-mail will not be.


Download ppt "Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC"

Similar presentations


Ads by Google