Cyber Spying Laws Are Changing

As the UK  nears its final departure form the European Union (EU) a very rare thing has happened to British state spying laws: they have been tightened-up after parts of the so-called Snoopers' Charter were formally commenced into law. The UK's spy agency auditor has given public sector snoopers a clean bill of health, except for domestic surveillance by MI5. 

Now, in the US their National Security Agency (NSA) surveillance program has been ruled unlawful, seven years after it was exposed by whistleblower Edward Snowden.  The surveillance of millions of Americans' telephone records first came to light in 2013. Top US intelligence officials had publicly insisted the NSA had never knowingly collected data from private phone records, until Snowden exposed evidence to the contrary in 2013. 

The UK government’s bulk surveillance practices came under scrutiny before the Grand Chamber of the European Court of Human Rights.  This landmark hearing will consider whether two practices in particular violate the public’s right to privacy and freedom of speech:

(i) bulk interception of communications; and

(ii) intelligence sharing with foreign states such as the US. Newly commenced sections of the Investigatory Powers Act, better known as the Snoopers' Charter, will slightly restrict the ability of local councils and other such undesirables to spy on you and your business. 

Specifically, the Investigatory Powers Act 2016 (Commencement No.12) Regulations 2020, means anyone trying to spy on your communications data must now get the permission of your telco or postal service, or convince a judicial commissioner to sign off a warrant forcing disclosure.

Abuse of UK surveillance powers by local councils in particular has long been a feature of UK domestic spying laws. However, it appears that the tightening of the law explicitly excludes RIPA 2000 powers, of which a concerning number remain on the statute book.

Statutory auditor IPCO, the Investigatory Powers Commissioner's Office, issues annual reports into the use of spying powers by state agencies. Its most recent annual report concluded that all was well in state surveillance land despite some businesses, journalists, doctors, lawyers and MPs being spied upon by the public sector. 

It is currently very important that UK companies completely comprehend and engage with IT and cyber security laws that may affect their business as the UK finally leaves the EU on January 1st 2021. 

Clayden Law:    The Register:      The Register:        DPGLaw:      BBC:          Guardian:          Reuters:       

For  legal advice on Business Cyber Security and IT in the UK we recommend that you contact Clayden Law. They concentrate on advising on information technology, data privacy and cyber security law. 

You Might Also Read:

Clayden Law: GPPR Is 1-Year Old

 

« Five Things Management Must Know About Cyber Security
California & Florida Voter Websites Vulnerable To Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

Securaa

Securaa

Securaa is a comprehensive No Code Security Automation Platform. Smarter Security with Clarity and Control.