Germany Will Make Telecoms Companies Disclose Data To Police.

 

Despite two previous laws having been ruled unconstitutional, data retention is back in Germany

Even as the European Union attempts to tighten privacy laws, law-enforcement interests have won a battle in Germany: A new law forces communications service providers there to once again make data about their customers' communications available to police.

Recently the German parliament approved a law requiring ISPs and mobile and fixed telecommunications operators to retain communications metadata for up to ten weeks.

The country has had an on-again, off-again affair with telecommunications data retention, first introducing a law requiring it in 2008 to comply with a European Union directive.

The German Federal Constitutional Court overturned that law in March 2010 after finding it conflicted with Germany's privacy laws, prompting the European Commission to take the country to court in May 2012 to enforce the directive.
In April 2014, it was the turn of the EU's highest court, the Court of Justice of the EU, to overturn the directive itself on the grounds that it, too, interfered with fundamental privacy rights.

The CJEU has also just overturned the so-called Safe Harbor agreement between the Commission and US authorities on the transfer of private personal data to the US because the agreement did not provide Europeans with sufficient privacy protection from US law enforcement.

The CJEU's and the Constitutional Court's previous decisions didn't discourage German lawmakers from reintroducing the requirement for service providers to conserve the connection data of all their customers, though.
There's a ten-week limit for information about who called whom and when, which IP addresses were attributed to whom and when, and who sent SMS text messages to whom. A four-week limit applies to the location from which an SMS was sent. The content of communications is not stored, and email is exempt from the law.

The German parliament plans to review the law once there is sufficient statistical information about its effectiveness in reducing crime.
Computerworld: http://bit.ly/1LR3nia

 

 

« Apple Removes Spy Apps
Hackers Compromise Cisco Web »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.