Netherlands Court says Data retention a breach of privacy


Judges in The Hague says country’s regime for retaining telephone and Internet users helps to solve crime but is too intrusive
A judge has scrapped the Netherlands’ data retention law, saying that while it helps solve crime it also breaches the privacy of telephone and Internet users. 
 
The ruling by a judge in The Hague followed a similar decision in April by the European Union’s top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.
The Dutch security and justice ministry said it was considering an appeal.
Under the Dutch law telephone companies were required to store information about all fixed and mobile phone calls for a year. Internet providers had to store information on their clients’ Internet use for six months.
The written judgment by Judge GP van Ham conceded that scrapping the data storage “could have far-reaching consequences for investigating and prosecuting crimes” but added that this could not justify the privacy breaches the law entailed.
The judge did not set a deadline for disposing of the data.
Privacy First, one of the organisations that took the government to court, said the ruling “will bring to an end years of massive privacy breaches” in the Netherlands.
The Dutch government said after last year’s European court ruling that it would amend its law. In a written statement the security and justice ministry said it regretted the court’s decision.
“Providers are no longer required to store data for investigations,” the statement said. “The ministry is seriously concerned about the effect this will have on fighting crime.”
Data retention has been a heated issue in light of Edward Snowden’s revelations about the activities of the National Security Agency in the US and its affiliates overseas.
In Australia, a key US intelligence ally, the government is currently considering its own data retention package, which would store certain types of Australians’ phone and web data for two years.
Privacy concerns have been raised and a lengthy political debate has ensued amid confusion within the government itself over how far the laws would extend or what would be retained. But the bill is now closer to passing with the support of a parliamentary committee involving both major parties.
Guardian  http://ow.ly/KfIGp

« Snowden Appeals to Switzerland to Grant Asylum
Wikipedia challenging mass surveillance by NSA »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.

Slide

Slide

Slide is a modern, security-first Business Continuity & Disaster Recovery (BCDR) company built exclusively for Managed Service Providers.

Rydal Group

Rydal Group

Rydal Group is an award-winning, fully pledged communications & managed IT, Security and Energy provider supporting over 1,500 businesses across the UK.