In article <[log in to unmask]>, Ian G Dean
<[log in to unmask]> writes
>I have been giving some thought to the Anti-Terrorism, Crime and Security Act
>2001 in relation to section 11 - Retention of Communications Data.
>
>Can anyone advise whether they have knowledge of interpretation of this act in
>relation to the retention of communications data
Yes, I'm on the panel negotiating the scope of this between the Home
Office, agencies and industry.
One important aspect is that no new logs are being requested, just
longer retention of any existing logs.
>e.g. who accessed our web site
>and when
That's web (or "hit") logs. If you have records of which IP number
accessed your site, and come under the scope [see below] then you'd be
asked to keep the logs [but RIPA cannot ask for disclosure of details of
*which page* of the site] for the standard period [6-24 months depending
on the final outcome of talks].
>, who sent E-mails to whom and when,
Yes. But no disclosure of subject lines [RIPA restriction again]. Period
as above.
>who received e-mails from who and
>when,
ISPs tell me this is rarely logged (by them). If it is, same as above.
>who within the company is accessing internet sites and when.
As above, if you log this (and it's not very common) 4-5 days retention
is currently being spoken of.
>If someone is expert can they advise wether I am correct in that this type of
>information falls within the act for 'communications providers' which are
>defined in RIPA.
ATCS is all about retention (and imho to start with only the large
public ISPs will be drawn in). Disclosure is not ATCS, and will (soon)
be done under relatively well understood RIPA provisions.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|