Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.

Slides:



Advertisements
Similar presentations
SURVEILLANCE: opportunities and pitfall David Matthias QC and Ryan Kohli.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
1 Enforcement Powers of National Data Protection Authorities and Experience gained of the Data Protection Directive Safe Harbour Conference Washington.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Public Voice Symposium "Privacy in a New Era: Challenges, Opportunities and Partnerships" September 13, 2004 Wroclaw, Poland Poland : reducing the gap.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
Data privacy law in Asia-pacific -introduction to the privacy law in China (mainland China and Hong Kong) Yue Liu
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
European Data Protection Supervisor 1 A new body in the European Institutional Landscape : the EDPS Presentation at the Court of Justice Hielke HIJMANS.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
National implementation of REMIT Henrik Nygaard, Wholesale and transmission (DERA)
Right to Privacy in the Digital Age Graham Smith Data Protection and Privacy Commissioners’ Conference Bird & Bird LLP 16 October 2014.
Your Rights Under the Internet Law By: Sannita S. Lam.
CROATIAN REGULATORY AUTHORITY FOR NETWORK INDUSTRIES (HAKOM) TELECOM SINGLE MARKET – CHALLENGES AND CONCERNS DOMAGOJ MARIČIĆ, CROATIAN REGULATORY AUTHORITY.
Europol’s tailor-made data protection framework
RIPA John Riddell Weightmans LLP 12 th February 2015.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
1 Office of theCommissariat Privacy Commissionerà la protection de of Canadala vie privée du Canada Personal Information Protection and Electronic Documents.
CHAPTER 1 The sources and institutions of employment law.
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Forensic Surveillance techniques Profiling techniques
Republic of Moldova: general presentation Geographical position: South-Eastern Europe Territory: 33,8 thousand км 2 (situated between the Danube, Prut.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
DNA and the ECHR: rights, rules and technicalities Liz Heffernan Trinity College Dublin.
1 OVERVIEW PRESENTATION FREEDOM OF INFORMATION (SCOTLAND) ACT 2002.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
26 th June 2008 Enforcement Task Force Conference 2008 Enforcement for all? Bill Blakemore Programme Manager, The SPARKS Programme.
The New EU Directives Oftel Forum 25/04/02 Heather Clayton.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BC Public Libraries November, 2008 Privacy Principles.
PRESENTATION TO THE NCOP ON THE CONVENTION ON INTERNATIONAL INTERESTS IN MOBILE EQUIPMENT BILL, MARCH 2007.
TERENA Networking Conference 2005©The JNT Association, 2005 Network Performance Measurement: Privacy and Legal Issues Andrew Cormack, UKERNA
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data protection and European citizens’ initiatives
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Information Sharing & Corporate Governance Dave Parsons, Information Governance Manager, City of Cardiff Council.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
The UNCITRAL Model Law on International Commercial Arbitration: 25 Years 4 June 2010 “The Influence of the UNCITRAL Model Law in Hong Kong and China”
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Health and Social Care Vetting and Barring Scheme (VBS) Review of the Scheme.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Surveillance around the world
Right to Privacy in the Digital Age
Department of Health Philippines Short Briefing.
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
Data protection issues in regulatory investigations
Purposes of the Convention
DP BILL: DIFFERENCES AND DEROGATIONS
Introduction to GDPR 09/11/2018.
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
Privacy: a work in progress
General Data Protection Regulations 2018
Is Data Protection a Fundamental Right Protecting the Individual?
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
The EDPS: competences and processing of personal data in EU funds
Presentation transcript:

Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002

Introduction The RIP Act is designed to meet a number of aims: The RIP Act is designed to meet a number of aims: To implement changes in the law required as a result of a ruling in the ECourtHRTo implement changes in the law required as a result of a ruling in the ECourtHR To bring modern communications interception fully within a statutory frameworkTo bring modern communications interception fully within a statutory framework To provide the police and other agencies with new powers with regard to encrypted communicationsTo provide the police and other agencies with new powers with regard to encrypted communications To implement Art. 5 of EU Directive 97/66/EC concerning the processing of personal data and protection of privacy in the telecoms sector.To implement Art. 5 of EU Directive 97/66/EC concerning the processing of personal data and protection of privacy in the telecoms sector.

ECHR - Interception The RIP Act repeals the Interception of Communications Act 1985 (IOCA) The RIP Act repeals the Interception of Communications Act 1985 (IOCA) IOCA was originally designed to meet the standards required by the ECourtHR in the Malone case – interception by state. IOCA was originally designed to meet the standards required by the ECourtHR in the Malone case – interception by state. IOCA did not apply to private sector regulation & monitoring which was unregulated. IOCA did not apply to private sector regulation & monitoring which was unregulated. The ECourtHR in the Halford case held that private sector interception could be a breach of Art 8. EConventionHR. The ECourtHR in the Halford case held that private sector interception could be a breach of Art 8. EConventionHR.

ECHR - Interception Halford case – interception of calls from telephones in Halfords office were a breach of her "private life" and "correspondence" under Article 8 (1) ECHR Halford case – interception of calls from telephones in Halfords office were a breach of her "private life" and "correspondence" under Article 8 (1) ECHR As her employer had not informed her that calls from those phones might liable to interception, she had a reasonable expectation of privacy in relation to them. As her employer had not informed her that calls from those phones might liable to interception, she had a reasonable expectation of privacy in relation to them. No legal redress for her to pursue her case against her employer, meant there was a violation of Article 13 ECHR (failure to provide an effective domestic remedy) No legal redress for her to pursue her case against her employer, meant there was a violation of Article 13 ECHR (failure to provide an effective domestic remedy)

Interception Powers The main purpose of the Act is to ensure that investigatory powers are used in line with human rights. The main purpose of the Act is to ensure that investigatory powers are used in line with human rights. It thus intersects with the Data Protection Act 1998 and the Human Rights Act It thus intersects with the Data Protection Act 1998 and the Human Rights Act It deals with It deals with interception of communicationsinterception of communications acquisition of communications dataacquisition of communications data intrusive surveillance, covert surveillance in the course of specific operations, use of covert human intelligence sourcesintrusive surveillance, covert surveillance in the course of specific operations, use of covert human intelligence sources

Interception Powers For each of these powers, the Act provides for: For each of these powers, the Act provides for: the purposes for which they may be used;the purposes for which they may be used; which authorities can use the powers;which authorities can use the powers; who should authorize each use of the power;who should authorize each use of the power; the use that can be made of the material gained;the use that can be made of the material gained; independent judicial oversight;independent judicial oversight; a means of redress for the individual.a means of redress for the individual.

Encryption The Act contains provisions to maintain the effectiveness of existing law enforcement powers in the face of increasing criminal use of encryption. The Act contains provisions to maintain the effectiveness of existing law enforcement powers in the face of increasing criminal use of encryption. Specifically, it introduces a power to require disclosure of encrypted data. Specifically, it introduces a power to require disclosure of encrypted data. The encryption provisions were originally part of the Electronic Communications Bill, but were left out of the resulting Act due to their controversial nature. The encryption provisions were originally part of the Electronic Communications Bill, but were left out of the resulting Act due to their controversial nature.

Legislation The RIP Act 2000 received Royal Assent in July in force in October The RIP Act 2000 received Royal Assent in July in force in October It covers the interception of communications made via It covers the interception of communications made via public postal systems,public postal systems, public telecoms systemspublic telecoms systems private telecoms systems (including computer communications).private telecoms systems (including computer communications). It applies to England, Wales, Scotland (with minor exceptions) and N. Ireland. It applies to England, Wales, Scotland (with minor exceptions) and N. Ireland.

Legislation Public telecoms systems are any telecoms service which is offered or provided to, or to a substantial section of, the public in … the UK. Public telecoms systems are any telecoms service which is offered or provided to, or to a substantial section of, the public in … the UK. This would include fixed line providers, mobile service providers and ISPs.This would include fixed line providers, mobile service providers and ISPs. "Private telecom systems" are any telecoms system that is not a public telecoms system but is attached to such a system. "Private telecom systems" are any telecoms system that is not a public telecoms system but is attached to such a system. This would include internal telephone networks that are linked to a public telecoms system by a private exchange and internal computer networks connected to the Internet.This would include internal telephone networks that are linked to a public telecoms system by a private exchange and internal computer networks connected to the Internet. Thus institutional telecoms networks, and computer networks are covered by the Act. Thus institutional telecoms networks, and computer networks are covered by the Act.

Overview Large parts of the Act are of relevance only to police and related state agencies. Large parts of the Act are of relevance only to police and related state agencies. However, institutional interception and monitoring of communications must conform with the Act & its regulations. However, institutional interception and monitoring of communications must conform with the Act & its regulations. Data must also be collected and held in line with the DPA Data must also be collected and held in line with the DPA Institutions should be aware of Institutions should be aware of their rights and obligations when required by police to intercept & monitor communicationstheir rights and obligations when required by police to intercept & monitor communications their rights and obligations with regard to encrypted materialstheir rights and obligations with regard to encrypted materials