Home Government Tech Policy Britain passes sweeping surveillance laws

Britain has passed a sweeping set of surveillance laws that have been in the pipeline since 2012, introduced by the current Prime Minister Theresa May when she held the home portfolio.

The Investigatory Powers Bill, commonly referred to as the Snooper's Charter due to the intrusive nature of its powers, allows the government to do bulk hacking of networks, devices and services.

The law requires Internet, phone and communications applications firms to store records for a year and allow law enforcement to access the data on demand.

The data could be Internet search histories, content of calls made or messages that have been sent.

Government agencies will also be able to order companies to decrypt data, making end-to-end encryption of little use in maintaining privacy.

The new bill, once passed into law by royal assent, will replace the Regulation of Investigatory Powers Act.

Independent media group openDemocracy said some of the powers in the Bill were "deeply intrusive, and with very little possible justification".

"All of us want to be safe, and protected from terrorists and the like – but the evidence that these powers are all needed is thin indeed. However, the cost to all of our privacy is huge," it said in an op-ed.

It pointed out that a a power the state never had before was to require a log of 12 months of Internet browsing history.

"If you ever choose to visit a depression support website, would you want that to now be logged, potentially revealing your mental health state? What about an abortion advice site? Marriage guidance? Why does the state need to know this about every one of us?" it asked.

"There are many other problems with the legislation – real threats to tech companies in the UK, risks of inappropriate interference with telecoms equipment, pervasive bulk powers, far too little oversight, and a huge bill."

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect