Print

Print


An article I read about this stated the request was to retain data for the
one day of the incidents only.

Ian W.
----- Original Message -----
From: "Tony Smith" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, September 20, 2001 12:38 PM


> E-mail Retention
>
> Thought people might be interested in this. It is from the lawzone
website.
>
> Tony Smith
>
>
> Eversheds e80
>
> The e-news service from Eversheds - Business Lawyers in Europe
>
> e-mail retention following terrorist attack
>
> The ISPA (Internet Service Providers Asociation) have confirmed to us
today
> that they were asked by the UK's National High Tech Crime Unit (NHTCU) to
> request all of their members to preserve existing communications data held
> on their systems to assist with investigations into the US terrorist
> attack.
>
> The NHTCU has confirmed to ISPA that any data preserved and retained as a
> result of this request will only be accessed in accordance with specific
> lawful authority. The request refers only to "communications data", such
as
> logs of e-mail sent and received. All requests for e-mail will still
> require interception warrants.
>
> ISPA has been informed that the Information Commissioner's office believes
> that "the request from the NHTCU is lawful and and proportionate in the
> circumstances. As there is provison in the Data Protection Act for
> anything which affects national security which would probably be
applicable
> now considering the circumstances." There may however be a need for
> specific advice in individual circumstances.
>
> e80 readers will be aware that there is an ongoing debate and some
> confusion as to the time period that ISPs are liable to retain e-mails and
> we will return to this again on e80.
>
> David Comrie
> Eversheds
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^