Anderson Report: Review Of UK Anti-Terror Data Laws.

Anderson_NICA103357_270895c.jpg

David Anderson QC

The UK Government will publish a comprehensive review on the laws governing the bulk interception of communications on mobile phones and the Internet.

The report by David Anderson QC, an Independent Reviewer of Terrorism Legislation, has examined all laws, which allow police and security services to access the public's personal communications – and will offer new recommendations.
Lord Carlile, his predecessor, told Sky News: "There's been a huge amount of controversy about intercepted communications, communications data, about the state of the law, and about the capacity of the police and other authorities to detect very serious crime using material that comes from internet service providers and from mobile telephony. There is a huge need for the law to be revamped and revised."

The Anderson Review was a condition of emergency legislation passed last year by the Government to force phone and Internet companies to keep records for up to two years. It was delivered to Downing St on 6 May.
The review is expected to look at the relationship between the Government and US Internet giants such as Google, Twitter and Facebook.

Last year, the inquiry into the murder of Fusilier Lee Rigby blamed Facebook for not passing on messages exchanged between the soldier's killers, Michael Adebowale and Michael Adebolajo.
The Government is set to introduce a wide-ranging investigatory powers bill – dubbed the "snoopers' charter" – which the Home Office says will "better equip law enforcement and intelligence agencies to meet their key operational requirements, and address the gap in these agencies' ability to build intelligence and evidence where subjects of interest, suspects and vulnerable people have communicated online".

Details are few, though, because the Government has promised that its legislation will respond to the Anderson Review.
Writing on his blog ahead of the report's publication, Mr Anderson said: "The report won't please everybody (indeed it may not please anybody).
"But if it succeeds in informing the public and parliamentary debate on the future of the law, from an independent perspective, it will have done its job."

The Waves:  http://bit.ly/1FbamOd

 

« NSA Planned to Plant Malware via Google & Samsung Phones
The Brave New World of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Rule4

Rule4

Rule4 is a global professional services firm that provides practical, real-world knowledge and solutions in areas including cybersecurity, AI, Machine Learning and industrial control systems.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.