SlideShare a Scribd company logo
1 of 41
Communications privacy
and the state
Graham Smith
TMT Day, Stockholm
Bird & Bird LLP
11 February 2015
Page 2
© Bird & Bird LLP 2014
1987
Page 3
© Bird & Bird LLP 2014
“For five years we bugged and burgled our
way across London at the State's behest…”
Page 4
© Bird & Bird LLP 2014
“It hasn't got one. The Security Service
cannot have the normal status of a Whitehall
department because its work very often
involves transgressing propriety or the law.”
Page 5
© Bird & Bird LLP 2014
MI5's legal status?
1955
2015
Page 6
© Bird & Bird LLP 2014
Hacking and cracking their way
across the internet?
Page 7
© Bird & Bird LLP 2014
A Code of Practice for State hacking
Page 8
© Bird & Bird LLP 2014
S.5 Intelligence Services Act: Minister’s warrant
“… any or all of the following:
a) obtain information from the equipment in pursuit of intelligence
requirements;
b) obtain information concerning the ownership, nature and use of
the equipment in pursuit of intelligence requirements;
c) locate and examine, remove, modify or substitute
equipment hardware or software which is capable of yielding
information of the type described in a) and b);
d) enable and facilitate surveillance activity by means of the
equipment.”
Page 9
© Bird & Bird LLP 2014
A Code of Practice for State hacking
Page 10
© Bird & Bird LLP 2014
Flashpoints
● Bulk communications data retention v targeted preservation
• Digital Rights Ireland, new Data Retention Directive?
• Retention by ISPs, webmail, social media platforms?
- UK: DRIPA, C-TSB
• Retention v generation
● Communications data acquisition
• Volume, purposes, bodies, authorisation, datatypes, richness, blurring
• Professional and journalistic privilege
● Bulk interception (TEMPORA - content and related comms data)
• Telephone, e-mail, IM, web communications
● Product sharing among agencies (PRISM)
• NSA  GCHQ and others
● Cross-border powers v MLAT
• Providers abroad and/or conduct abroad (Microsoft US litigation)
● Exploits
Why the upsurge?
Page 11
© Bird & Bird LLP 2014
Page 12
© Bird & Bird LLP 2014
Page 13
© Bird & Bird LLP 2014
We are all human rights lawyers now
Page 14
© Bird & Bird LLP 2014
Page 15
© Bird & Bird LLP 2014
Article 8 ECHR – privacy protection
No interference by a public authority except such as is:
● in accordance with the law and
● is necessary in a democratic society
● in the interests of
• national security,
• public safety
• or the economic well-being of the country,
• for the prevention of disorder or crime,
• for the protection of health or morals,
• or for the protection of the rights and freedoms of others
● Proportionality
Legitimate aim, necessity and
proportionality are important…
Page 16
© Bird & Bird LLP 2014
but quality of law comes first
Human Rights Interferences
Page 17
© Bird & Bird LLP 2014
ECHR “In accordance with the law”
Existence and quality of law
● Existence: some basis in domestic law (statute or common law)
● Quality of law – compatible with rule of law
• Accessibility and foreseeability of consequences
- Publication, detail and precision
• Protection against arbitrary interference, having regard
to the legitimate aim of the measure
• For surveillance, a law which confers a discretion must
indicate with sufficient clarity the scope of that
discretion and the manner of its exercise
- Contrary to rule of law for executive discretion to be
expressed in terms of an unfettered power
• Laws, regulations, manuals and instructions (if sufficiently
publicised) Liberty v UK
• Independent supervision
Secrecy and quality of law
are natural enemies
Page 18
© Bird & Bird LLP 2014
Accessibility
"In many countries … vague and
broadly conceived legal provisions are
being invoked to legitimize and sanction
the use of seriously intrusive techniques.
Without explicit laws authorizing such
technologies and techniques, and defining
the scope of their use, individuals are not
able to foresee – or even know about
– their application.“
UN Special Rapporteur, 17 April 2013
Page 19
© Bird & Bird LLP 2014
Human Rights Interferences
“… the law must be sufficiently
accessible, clear and precise so that
an individual may look to the law and
ascertain who is authorized to conduct
data surveillance and under what
circumstances.”
Page 20
© Bird & Bird LLP 2014
UN High Commissioner’s Report June 2014
Human Rights Interferences
Secret law is not law
Page 21
© Bird & Bird LLP 2014
Human Rights Act 1998
Page 22
© Bird & Bird LLP 2014
A real issue
Pre-1985
No statutory framework
1984 Malone v UK
Phone taps warranted by SoS
Not "in accordance with the law"
IOCA 1985
Public telecommunications
1997 Halford v UK
Unwarranted tap of office phone
Not "in accordance with the law"
RIPA 2000
Public and private networks
Warranted and other interception
Uncertified and certified warrants
Outside and within UK
Civil and criminal remedies
Codes of Practice
2014 Liberty v GCHQ (IPT)
TEMPORA
"in accordance with the law"
PRISM receipt (pre-judgment)
Not "in accordance with the law"
2007 Copland v UK
Office e-mail, internet and phone use
Not "in accordance with the law"
2008 Liberty v UK
External warrants - filtering
Not "in accordance with the law"
2010 Kennedy v UK
Telephony internal warrants scheme
"in accordance with the law"
What is the interference?
Page 23
© Bird & Bird LLP 2014
Retention by ISPs?
Page 24
© Bird & Bird LLP 2014
“the obligation imposed by Articles 3 and 6 of Directive
2006/24 on providers of publicly available electronic
communications services or of public communications networks
to retain, for a certain period, data relating to a person’s
private life and to his communications, such as those referred to
in Article 5 of the directive, constitutes in itself an
interference with the rights guaranteed by Article 7 of the
Charter." (CJEU, Digital Rights Ireland)
Capture by state agencies?
Page 25
© Bird & Bird LLP 2014
“[UK gov’t] … accept that the interception under a s.8(4)
warrant may be regarded as giving rise to a technical
interference [with ECHR Art 8 rights] even if that
communication is not and/or cannot be read, looked at or
listened to by any person." (UK gov't submissions in IPT)
Access by state agencies?
Page 26
© Bird & Bird LLP 2014
“the access of the competent national authorities to the data
constitutes a further interference with that fundamental
right" (CJEU, Digital Rights Ireland)
Threat of surveillance?
Page 27
© Bird & Bird LLP 2014
“ … the mere existence of legislation which allows a system
for the secret monitoring of communications entails a threat of
surveillance for all those to whom the legislation may be
applied. This threat necessarily … amounts in itself to an
interference with the exercise of the applicants’ rights under
Article 8, irrespective of any measures actually taken against
them” (ECtHR: Weber [78]).
Snowden-inspired challenges
Page 29
© Bird & Bird LLP 2014
PRISM – receipt in accordance with law?
Privacy International (UK Investigatory Powers
Tribunal); Big Brother Watch (Strasbourg)
● Allegations: No legal regime with
• Sufficiently clear and detailed rules
• Sufficient safeguards
● Secret and unpublished rules (if any)
● Insufficient indication of scope of discretion
● Oversight regime
● IPT held:
• Mid-hearing disclosures provided sufficient rules for future
• Pre-judgment no adequate signposting of internal policies
- Pre-judgment regime for solicitation, receipt of
PRISM/UPSTREAM data re individuals located in UK
breached Art 8/10
Page 30
© Bird & Bird LLP 2014
TEMPORA – in accordance with law?
Privacy International (UK Investigatory Powers Tribunal); Big Brother
Watch (Strasbourg), Bureau of Investigative Journalism (Strasbourg)
RIPA external warrants provisions
● Allegations: Insufficiently specific or clear authorisation
● Insufficient public safeguards
● Lack of judicial or independent authority authorisation
● Oversight regime
● Automated versus sentient?
● Richer metadata?
● Secret legal interpretations?
● Professional/journalistic privilege
● IPT held 'in accordance with the law', including related comms
data
● DE: Harting - G10
It’s not only Snowden
Data Protection Seminar 26 June 2014
Page 32
© Bird & Bird LLP 2014
Data Retention Directive
– Digital Rights Ireland
Proportionality
● Strict necessity [52], [56]
● Clear and precise rules governing scope and application [54]
● Minimum safeguards against risk of abuse, unlawful access and
abuse [54]
Data Protection Seminar 26 June 2014
Page 33
© Bird & Bird LLP 2014
Proportionality issues
Generality
● Applies to all means of electronic communication (use
widespread and of growing importance in people’s everyday
lives) [56]
● All subscribers and registered users [56]
● Interference with fundamental rights of practically the entire
European population [56]
● All persons, all means of electronic communication without any
differentiation, limitation or exception [57]
Data Protection Seminar 26 June 2014
Page 34
© Bird & Bird LLP 2014
Proportionality issues
Suspicionless
● Applies even to persons for whom no evidence capable of
suggesting a link, even indirect or remote, with serious crime
[58]
● No relationship required between data retained and a threat to
public security: not restricted to:
• data pertaining to:
- particular time period
- particular geographical zone
- circle of particular persons likely to be involved in serious
crime [59]
• persons whose data for other reasons could contribute to
prevention, detection or prosecution of serious offences [59]
Data Protection Seminar 26 June 2014
Page 35
© Bird & Bird LLP 2014
Proportionality issues
Specific rights
● Applies to persons whose communications are subject to
professional secrecy [58]
Data Protection Seminar 26 June 2014
Page 36
© Bird & Bird LLP 2014
Proportionality issues
Access and use
● No objective criterion to determine limits of access to data and
subsequent use for prevention, detection or prosecution of
sufficiently serious offences [60]
● Leaves serious crime definition to national law [60]
● No substantive and procedural conditions relating to access and
subsequent use
• Left to member States to define procedures and conditions
in accordance with necessity and proportionality [61]
• In particular no objective criteria re restriction of number of
persons authorised to access and subsequently use to that
strictly necessary [62]
Data Protection Seminar 26 June 2014
Page 37
© Bird & Bird LLP 2014
Proportionality issues
Independent supervision
● Above all, access not dependent on prior review by court or
independent administrative body following a reasoned request
• No obligation on MS to establish such limits [62]
● Stricter standard than ECtHR?
Data Protection Seminar 26 June 2014
Page 38
© Bird & Bird LLP 2014
Proportionality issues
Retention period
● No distinction between categories of data on basis of:
• possible usefulness
• persons concerned [63]
● No objective criteria limited to strict necessity on which to base
determination of retention period [64]
Page 39
© Bird & Bird LLP 2014
Mandatory communications data retention
Member State responses to Digital Rights Ireland
● Many never implemented or invalidated by national constitutional
courts e.g. Germany
Post CJEU
● Pfleger - EU Charter applies because exception from PECR Art 15
• Slovakia: Constitutional Court temporary invalidity declaration on
retention aspects
• Romania: Constitutional Court declared unconstitutional
• Sweden: 4 operators ceased retention; regulator initially decided
not to pursue; changed following government committee;
challenge by CSP
• UK: substantially re-enacted by Data Retention and Investigatory
Powers Act
- Pending legal challenge by two Members of Parliament
- PECR Art 15/EU Charter – disapplication of national legislation
• Journalistic privilege (acquisition)
- UK law to be changed to judicial authorisation
Legal Challenges Landscape
Graham Smith
graham.smith@twobirds.com
@cyberleagle
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the
Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and
of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address.
twobirds.com
Thank you

More Related Content

What's hot

International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...Rupinder K Gill
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Terrance Tong
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
The cybercrimes act of tanzania an overview -all you need to know
The cybercrimes act of tanzania   an overview -all you need to knowThe cybercrimes act of tanzania   an overview -all you need to know
The cybercrimes act of tanzania an overview -all you need to knowHUMPHREY MORIS
 
Data Protection Adequacy and the Investigatory Powers Act
Data Protection Adequacy and the Investigatory Powers ActData Protection Adequacy and the Investigatory Powers Act
Data Protection Adequacy and the Investigatory Powers ActGraham Smith
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
 
Oic presentation public_may2010
Oic presentation public_may2010Oic presentation public_may2010
Oic presentation public_may2010Craig Thomler
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...pattok
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewAnonDownload
 

What's hot (19)

International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
The cybercrimes act of tanzania an overview -all you need to know
The cybercrimes act of tanzania   an overview -all you need to knowThe cybercrimes act of tanzania   an overview -all you need to know
The cybercrimes act of tanzania an overview -all you need to know
 
Data Protection Adequacy and the Investigatory Powers Act
Data Protection Adequacy and the Investigatory Powers ActData Protection Adequacy and the Investigatory Powers Act
Data Protection Adequacy and the Investigatory Powers Act
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Oic presentation public_may2010
Oic presentation public_may2010Oic presentation public_may2010
Oic presentation public_may2010
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...
POLICY SUPPORT IN MEDIA AND ENTERTAINMENT FOR MAKING IT GLOBALLY COMPETITIVES...
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 

Similar to Communications Privacy and the State

Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Data Retention - Dead or Merely Stunned?
Data Retention - Dead or Merely Stunned?Data Retention - Dead or Merely Stunned?
Data Retention - Dead or Merely Stunned?Graham Smith
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...FSR Communications and Media
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 
2014 Internet and ECommerce Law Update
2014 Internet and ECommerce Law Update2014 Internet and ECommerce Law Update
2014 Internet and ECommerce Law UpdateGraham Smith
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms daymoldovaictsummit2016
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internetblogzilla
 
BBW v UK - IP Act implications
BBW v UK - IP Act implicationsBBW v UK - IP Act implications
BBW v UK - IP Act implicationsGraham Smith
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy lawblogzilla
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar PresentationBanji Adenusi
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)JAMAL JUMA
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?blogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Featuresramrag2001
 

Similar to Communications Privacy and the State (20)

Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Data Retention - Dead or Merely Stunned?
Data Retention - Dead or Merely Stunned?Data Retention - Dead or Merely Stunned?
Data Retention - Dead or Merely Stunned?
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
2014 Internet and ECommerce Law Update
2014 Internet and ECommerce Law Update2014 Internet and ECommerce Law Update
2014 Internet and ECommerce Law Update
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internet
 
BBW v UK - IP Act implications
BBW v UK - IP Act implicationsBBW v UK - IP Act implications
BBW v UK - IP Act implications
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Rti vs osa
Rti vs osaRti vs osa
Rti vs osa
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Features
 

More from Graham Smith

Internet and eCommerce Law Review 2018
Internet and eCommerce Law Review 2018Internet and eCommerce Law Review 2018
Internet and eCommerce Law Review 2018Graham Smith
 
Investigatory Powers Act and Data Protection Adequacy
Investigatory Powers Act and Data Protection AdequacyInvestigatory Powers Act and Data Protection Adequacy
Investigatory Powers Act and Data Protection AdequacyGraham Smith
 
Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith
 
SCL Conference 8 June 2017 - Investigatory Powers Act
SCL Conference 8 June 2017 - Investigatory Powers ActSCL Conference 8 June 2017 - Investigatory Powers Act
SCL Conference 8 June 2017 - Investigatory Powers ActGraham Smith
 
Internet and eCommerce Law Review 2016
Internet and eCommerce Law Review 2016Internet and eCommerce Law Review 2016
Internet and eCommerce Law Review 2016Graham Smith
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
Geoblocking in context
Geoblocking in contextGeoblocking in context
Geoblocking in contextGraham Smith
 
IPBillOversightInsight
IPBillOversightInsightIPBillOversightInsight
IPBillOversightInsightGraham Smith
 
Future-proofing the IPBill
Future-proofing the IPBillFuture-proofing the IPBill
Future-proofing the IPBillGraham Smith
 
Draft Investigatory Powers Bill - Legal View
Draft Investigatory Powers Bill - Legal ViewDraft Investigatory Powers Bill - Legal View
Draft Investigatory Powers Bill - Legal ViewGraham Smith
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law ReviewGraham Smith
 
Communications Data Retention by Intermediaries
Communications Data Retention by IntermediariesCommunications Data Retention by Intermediaries
Communications Data Retention by IntermediariesGraham Smith
 
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...Graham Smith
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Graham Smith
 
Who wins when copyright and free speech clash?
Who wins when copyright and free speech clash?Who wins when copyright and free speech clash?
Who wins when copyright and free speech clash?Graham Smith
 

More from Graham Smith (15)

Internet and eCommerce Law Review 2018
Internet and eCommerce Law Review 2018Internet and eCommerce Law Review 2018
Internet and eCommerce Law Review 2018
 
Investigatory Powers Act and Data Protection Adequacy
Investigatory Powers Act and Data Protection AdequacyInvestigatory Powers Act and Data Protection Adequacy
Investigatory Powers Act and Data Protection Adequacy
 
Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017
 
SCL Conference 8 June 2017 - Investigatory Powers Act
SCL Conference 8 June 2017 - Investigatory Powers ActSCL Conference 8 June 2017 - Investigatory Powers Act
SCL Conference 8 June 2017 - Investigatory Powers Act
 
Internet and eCommerce Law Review 2016
Internet and eCommerce Law Review 2016Internet and eCommerce Law Review 2016
Internet and eCommerce Law Review 2016
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
Geoblocking in context
Geoblocking in contextGeoblocking in context
Geoblocking in context
 
IPBillOversightInsight
IPBillOversightInsightIPBillOversightInsight
IPBillOversightInsight
 
Future-proofing the IPBill
Future-proofing the IPBillFuture-proofing the IPBill
Future-proofing the IPBill
 
Draft Investigatory Powers Bill - Legal View
Draft Investigatory Powers Bill - Legal ViewDraft Investigatory Powers Bill - Legal View
Draft Investigatory Powers Bill - Legal View
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review
 
Communications Data Retention by Intermediaries
Communications Data Retention by IntermediariesCommunications Data Retention by Intermediaries
Communications Data Retention by Intermediaries
 
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...
Are Moral Rights Human Rights? Presentation to BLACA/IPKat seminar 12 Februar...
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?
 
Who wins when copyright and free speech clash?
Who wins when copyright and free speech clash?Who wins when copyright and free speech clash?
Who wins when copyright and free speech clash?
 

Recently uploaded

如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 

Recently uploaded (20)

如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 

Communications Privacy and the State

  • 1. Communications privacy and the state Graham Smith TMT Day, Stockholm Bird & Bird LLP 11 February 2015
  • 2. Page 2 © Bird & Bird LLP 2014 1987
  • 3. Page 3 © Bird & Bird LLP 2014
  • 4. “For five years we bugged and burgled our way across London at the State's behest…” Page 4 © Bird & Bird LLP 2014
  • 5. “It hasn't got one. The Security Service cannot have the normal status of a Whitehall department because its work very often involves transgressing propriety or the law.” Page 5 © Bird & Bird LLP 2014 MI5's legal status? 1955
  • 6. 2015 Page 6 © Bird & Bird LLP 2014
  • 7. Hacking and cracking their way across the internet? Page 7 © Bird & Bird LLP 2014
  • 8. A Code of Practice for State hacking Page 8 © Bird & Bird LLP 2014
  • 9. S.5 Intelligence Services Act: Minister’s warrant “… any or all of the following: a) obtain information from the equipment in pursuit of intelligence requirements; b) obtain information concerning the ownership, nature and use of the equipment in pursuit of intelligence requirements; c) locate and examine, remove, modify or substitute equipment hardware or software which is capable of yielding information of the type described in a) and b); d) enable and facilitate surveillance activity by means of the equipment.” Page 9 © Bird & Bird LLP 2014 A Code of Practice for State hacking
  • 10. Page 10 © Bird & Bird LLP 2014 Flashpoints ● Bulk communications data retention v targeted preservation • Digital Rights Ireland, new Data Retention Directive? • Retention by ISPs, webmail, social media platforms? - UK: DRIPA, C-TSB • Retention v generation ● Communications data acquisition • Volume, purposes, bodies, authorisation, datatypes, richness, blurring • Professional and journalistic privilege ● Bulk interception (TEMPORA - content and related comms data) • Telephone, e-mail, IM, web communications ● Product sharing among agencies (PRISM) • NSA  GCHQ and others ● Cross-border powers v MLAT • Providers abroad and/or conduct abroad (Microsoft US litigation) ● Exploits
  • 11. Why the upsurge? Page 11 © Bird & Bird LLP 2014
  • 12. Page 12 © Bird & Bird LLP 2014
  • 13. Page 13 © Bird & Bird LLP 2014
  • 14. We are all human rights lawyers now Page 14 © Bird & Bird LLP 2014
  • 15. Page 15 © Bird & Bird LLP 2014 Article 8 ECHR – privacy protection No interference by a public authority except such as is: ● in accordance with the law and ● is necessary in a democratic society ● in the interests of • national security, • public safety • or the economic well-being of the country, • for the prevention of disorder or crime, • for the protection of health or morals, • or for the protection of the rights and freedoms of others ● Proportionality
  • 16. Legitimate aim, necessity and proportionality are important… Page 16 © Bird & Bird LLP 2014 but quality of law comes first Human Rights Interferences
  • 17. Page 17 © Bird & Bird LLP 2014 ECHR “In accordance with the law” Existence and quality of law ● Existence: some basis in domestic law (statute or common law) ● Quality of law – compatible with rule of law • Accessibility and foreseeability of consequences - Publication, detail and precision • Protection against arbitrary interference, having regard to the legitimate aim of the measure • For surveillance, a law which confers a discretion must indicate with sufficient clarity the scope of that discretion and the manner of its exercise - Contrary to rule of law for executive discretion to be expressed in terms of an unfettered power • Laws, regulations, manuals and instructions (if sufficiently publicised) Liberty v UK • Independent supervision
  • 18. Secrecy and quality of law are natural enemies Page 18 © Bird & Bird LLP 2014 Accessibility
  • 19. "In many countries … vague and broadly conceived legal provisions are being invoked to legitimize and sanction the use of seriously intrusive techniques. Without explicit laws authorizing such technologies and techniques, and defining the scope of their use, individuals are not able to foresee – or even know about – their application.“ UN Special Rapporteur, 17 April 2013 Page 19 © Bird & Bird LLP 2014 Human Rights Interferences
  • 20. “… the law must be sufficiently accessible, clear and precise so that an individual may look to the law and ascertain who is authorized to conduct data surveillance and under what circumstances.” Page 20 © Bird & Bird LLP 2014 UN High Commissioner’s Report June 2014 Human Rights Interferences
  • 21. Secret law is not law Page 21 © Bird & Bird LLP 2014
  • 22. Human Rights Act 1998 Page 22 © Bird & Bird LLP 2014 A real issue Pre-1985 No statutory framework 1984 Malone v UK Phone taps warranted by SoS Not "in accordance with the law" IOCA 1985 Public telecommunications 1997 Halford v UK Unwarranted tap of office phone Not "in accordance with the law" RIPA 2000 Public and private networks Warranted and other interception Uncertified and certified warrants Outside and within UK Civil and criminal remedies Codes of Practice 2014 Liberty v GCHQ (IPT) TEMPORA "in accordance with the law" PRISM receipt (pre-judgment) Not "in accordance with the law" 2007 Copland v UK Office e-mail, internet and phone use Not "in accordance with the law" 2008 Liberty v UK External warrants - filtering Not "in accordance with the law" 2010 Kennedy v UK Telephony internal warrants scheme "in accordance with the law"
  • 23. What is the interference? Page 23 © Bird & Bird LLP 2014
  • 24. Retention by ISPs? Page 24 © Bird & Bird LLP 2014 “the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter." (CJEU, Digital Rights Ireland)
  • 25. Capture by state agencies? Page 25 © Bird & Bird LLP 2014 “[UK gov’t] … accept that the interception under a s.8(4) warrant may be regarded as giving rise to a technical interference [with ECHR Art 8 rights] even if that communication is not and/or cannot be read, looked at or listened to by any person." (UK gov't submissions in IPT)
  • 26. Access by state agencies? Page 26 © Bird & Bird LLP 2014 “the access of the competent national authorities to the data constitutes a further interference with that fundamental right" (CJEU, Digital Rights Ireland)
  • 27. Threat of surveillance? Page 27 © Bird & Bird LLP 2014 “ … the mere existence of legislation which allows a system for the secret monitoring of communications entails a threat of surveillance for all those to whom the legislation may be applied. This threat necessarily … amounts in itself to an interference with the exercise of the applicants’ rights under Article 8, irrespective of any measures actually taken against them” (ECtHR: Weber [78]).
  • 29. Page 29 © Bird & Bird LLP 2014 PRISM – receipt in accordance with law? Privacy International (UK Investigatory Powers Tribunal); Big Brother Watch (Strasbourg) ● Allegations: No legal regime with • Sufficiently clear and detailed rules • Sufficient safeguards ● Secret and unpublished rules (if any) ● Insufficient indication of scope of discretion ● Oversight regime ● IPT held: • Mid-hearing disclosures provided sufficient rules for future • Pre-judgment no adequate signposting of internal policies - Pre-judgment regime for solicitation, receipt of PRISM/UPSTREAM data re individuals located in UK breached Art 8/10
  • 30. Page 30 © Bird & Bird LLP 2014 TEMPORA – in accordance with law? Privacy International (UK Investigatory Powers Tribunal); Big Brother Watch (Strasbourg), Bureau of Investigative Journalism (Strasbourg) RIPA external warrants provisions ● Allegations: Insufficiently specific or clear authorisation ● Insufficient public safeguards ● Lack of judicial or independent authority authorisation ● Oversight regime ● Automated versus sentient? ● Richer metadata? ● Secret legal interpretations? ● Professional/journalistic privilege ● IPT held 'in accordance with the law', including related comms data ● DE: Harting - G10
  • 31. It’s not only Snowden
  • 32. Data Protection Seminar 26 June 2014 Page 32 © Bird & Bird LLP 2014 Data Retention Directive – Digital Rights Ireland Proportionality ● Strict necessity [52], [56] ● Clear and precise rules governing scope and application [54] ● Minimum safeguards against risk of abuse, unlawful access and abuse [54]
  • 33. Data Protection Seminar 26 June 2014 Page 33 © Bird & Bird LLP 2014 Proportionality issues Generality ● Applies to all means of electronic communication (use widespread and of growing importance in people’s everyday lives) [56] ● All subscribers and registered users [56] ● Interference with fundamental rights of practically the entire European population [56] ● All persons, all means of electronic communication without any differentiation, limitation or exception [57]
  • 34. Data Protection Seminar 26 June 2014 Page 34 © Bird & Bird LLP 2014 Proportionality issues Suspicionless ● Applies even to persons for whom no evidence capable of suggesting a link, even indirect or remote, with serious crime [58] ● No relationship required between data retained and a threat to public security: not restricted to: • data pertaining to: - particular time period - particular geographical zone - circle of particular persons likely to be involved in serious crime [59] • persons whose data for other reasons could contribute to prevention, detection or prosecution of serious offences [59]
  • 35. Data Protection Seminar 26 June 2014 Page 35 © Bird & Bird LLP 2014 Proportionality issues Specific rights ● Applies to persons whose communications are subject to professional secrecy [58]
  • 36. Data Protection Seminar 26 June 2014 Page 36 © Bird & Bird LLP 2014 Proportionality issues Access and use ● No objective criterion to determine limits of access to data and subsequent use for prevention, detection or prosecution of sufficiently serious offences [60] ● Leaves serious crime definition to national law [60] ● No substantive and procedural conditions relating to access and subsequent use • Left to member States to define procedures and conditions in accordance with necessity and proportionality [61] • In particular no objective criteria re restriction of number of persons authorised to access and subsequently use to that strictly necessary [62]
  • 37. Data Protection Seminar 26 June 2014 Page 37 © Bird & Bird LLP 2014 Proportionality issues Independent supervision ● Above all, access not dependent on prior review by court or independent administrative body following a reasoned request • No obligation on MS to establish such limits [62] ● Stricter standard than ECtHR?
  • 38. Data Protection Seminar 26 June 2014 Page 38 © Bird & Bird LLP 2014 Proportionality issues Retention period ● No distinction between categories of data on basis of: • possible usefulness • persons concerned [63] ● No objective criteria limited to strict necessity on which to base determination of retention period [64]
  • 39. Page 39 © Bird & Bird LLP 2014 Mandatory communications data retention Member State responses to Digital Rights Ireland ● Many never implemented or invalidated by national constitutional courts e.g. Germany Post CJEU ● Pfleger - EU Charter applies because exception from PECR Art 15 • Slovakia: Constitutional Court temporary invalidity declaration on retention aspects • Romania: Constitutional Court declared unconstitutional • Sweden: 4 operators ceased retention; regulator initially decided not to pursue; changed following government committee; challenge by CSP • UK: substantially re-enacted by Data Retention and Investigatory Powers Act - Pending legal challenge by two Members of Parliament - PECR Art 15/EU Charter – disapplication of national legislation • Journalistic privilege (acquisition) - UK law to be changed to judicial authorisation
  • 41. Graham Smith graham.smith@twobirds.com @cyberleagle Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses. Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address. twobirds.com Thank you