Cyber Spying Laws Are Changing

As the UK  nears its final departure form the European Union (EU) a very rare thing has happened to British state spying laws: they have been tightened-up after parts of the so-called Snoopers' Charter were formally commenced into law. The UK's spy agency auditor has given public sector snoopers a clean bill of health, except for domestic surveillance by MI5. 

Now, in the US their National Security Agency (NSA) surveillance program has been ruled unlawful, seven years after it was exposed by whistleblower Edward Snowden.  The surveillance of millions of Americans' telephone records first came to light in 2013. Top US intelligence officials had publicly insisted the NSA had never knowingly collected data from private phone records, until Snowden exposed evidence to the contrary in 2013. 

The UK government’s bulk surveillance practices came under scrutiny before the Grand Chamber of the European Court of Human Rights.  This landmark hearing will consider whether two practices in particular violate the public’s right to privacy and freedom of speech:

(i) bulk interception of communications; and

(ii) intelligence sharing with foreign states such as the US. Newly commenced sections of the Investigatory Powers Act, better known as the Snoopers' Charter, will slightly restrict the ability of local councils and other such undesirables to spy on you and your business. 

Specifically, the Investigatory Powers Act 2016 (Commencement No.12) Regulations 2020, means anyone trying to spy on your communications data must now get the permission of your telco or postal service, or convince a judicial commissioner to sign off a warrant forcing disclosure.

Abuse of UK surveillance powers by local councils in particular has long been a feature of UK domestic spying laws. However, it appears that the tightening of the law explicitly excludes RIPA 2000 powers, of which a concerning number remain on the statute book.

Statutory auditor IPCO, the Investigatory Powers Commissioner's Office, issues annual reports into the use of spying powers by state agencies. Its most recent annual report concluded that all was well in state surveillance land despite some businesses, journalists, doctors, lawyers and MPs being spied upon by the public sector. 

It is currently very important that UK companies completely comprehend and engage with IT and cyber security laws that may affect their business as the UK finally leaves the EU on January 1st 2021. 

Clayden Law:    The Register:      The Register:        DPGLaw:      BBC:          Guardian:          Reuters:       

For  legal advice on Business Cyber Security and IT in the UK we recommend that you contact Clayden Law. They concentrate on advising on information technology, data privacy and cyber security law. 

You Might Also Read:

Clayden Law: GPPR Is 1-Year Old

 

« Five Things Management Must Know About Cyber Security
California & Florida Voter Websites Vulnerable To Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.