Cyber Spying Laws Are Changing

As the UK  nears its final departure form the European Union (EU) a very rare thing has happened to British state spying laws: they have been tightened-up after parts of the so-called Snoopers' Charter were formally commenced into law. The UK's spy agency auditor has given public sector snoopers a clean bill of health, except for domestic surveillance by MI5. 

Now, in the US their National Security Agency (NSA) surveillance program has been ruled unlawful, seven years after it was exposed by whistleblower Edward Snowden.  The surveillance of millions of Americans' telephone records first came to light in 2013. Top US intelligence officials had publicly insisted the NSA had never knowingly collected data from private phone records, until Snowden exposed evidence to the contrary in 2013. 

The UK government’s bulk surveillance practices came under scrutiny before the Grand Chamber of the European Court of Human Rights.  This landmark hearing will consider whether two practices in particular violate the public’s right to privacy and freedom of speech:

(i) bulk interception of communications; and

(ii) intelligence sharing with foreign states such as the US. Newly commenced sections of the Investigatory Powers Act, better known as the Snoopers' Charter, will slightly restrict the ability of local councils and other such undesirables to spy on you and your business. 

Specifically, the Investigatory Powers Act 2016 (Commencement No.12) Regulations 2020, means anyone trying to spy on your communications data must now get the permission of your telco or postal service, or convince a judicial commissioner to sign off a warrant forcing disclosure.

Abuse of UK surveillance powers by local councils in particular has long been a feature of UK domestic spying laws. However, it appears that the tightening of the law explicitly excludes RIPA 2000 powers, of which a concerning number remain on the statute book.

Statutory auditor IPCO, the Investigatory Powers Commissioner's Office, issues annual reports into the use of spying powers by state agencies. Its most recent annual report concluded that all was well in state surveillance land despite some businesses, journalists, doctors, lawyers and MPs being spied upon by the public sector. 

It is currently very important that UK companies completely comprehend and engage with IT and cyber security laws that may affect their business as the UK finally leaves the EU on January 1st 2021. 

Clayden Law:    The Register:      The Register:        DPGLaw:      BBC:          Guardian:          Reuters:       

For  legal advice on Business Cyber Security and IT in the UK we recommend that you contact Clayden Law. They concentrate on advising on information technology, data privacy and cyber security law. 

You Might Also Read:

Clayden Law: GPPR Is 1-Year Old

 

« Five Things Management Must Know About Cyber Security
California & Florida Voter Websites Vulnerable To Hackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.