Data retention
   HOME

TheInfoList



OR:

Data retention defines the policies of persistent data and
records management Records management, also known as records and information management, is an organizational function devoted to the management of information in an organization throughout its life cycle, from the time of creation or receipt to its eventual dispos ...
for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the
Data Protection Act 1998 The Data Protection Act 1998 (DPA, c. 29) was an Act of Parliament of the United Kingdom designed to protect personal data stored on computers or in an organised paper filing system. It enacted provisions from the European Union (EU) Data Prote ...
. The different data retention policies weigh legal and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
concerns against economics and need-to-know concerns to determine the retention time, archival rules, data formats, and the permissible means of storage,
access Access may refer to: Companies and organizations * ACCESS (Australia), an Australian youth network * Access (credit card), a former credit card in the United Kingdom * Access Co., a Japanese software company * Access Healthcare, an Indian BPO se ...
, and
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
. In the field of
telecommunication Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that ...
s, data retention generally refers to the storage of
call detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through th ...
s (CDRs) of
telephony Telephony ( ) is the field of technology involving the development, application, and deployment of telecommunication services for the purpose of electronic transmission of voice, fax, or data, between distant parties. The history of telephony is i ...
and
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
traffic Traffic comprises pedestrians, vehicles, ridden or herded animals, trains, and other conveyances that use public ways (roads) for travel and transportation. Traffic laws govern and regulate traffic, while rules of the road include traffic ...
and transaction data ( IPDRs) by governments and commercial organisations. In the case of government data retention, the data that is stored is usually of telephone calls made and received,
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
s sent and received, and
website A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google, Facebook, Amazon, and W ...
s visited. Location data is also collected. The primary objective in government data retention is
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observe ...
and
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
. By analysing the retained data, governments can identify the locations of individuals, an individual's associates and the members of a group such as political opponents. These activities may or may not be lawful, depending on the constitutions and laws of each country. In many jurisdictions access to these databases may be made by a government with little or no judicial oversight. In the case of commercial data retention, the data retained will usually be on transactions and web sites visited. Data retention also covers data collected by other means (e.g., by
Automatic number-plate recognition Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit tel ...
systems) and held by government and commercial organisations.


Data Retention Policy

A data retention policy is a recognized and proven protocol within an organization for retaining information for operational use while ensuring adherence to the laws and regulations concerning them. The objectives of a data retention policy are to keep important information for future use or reference, to organize information so it can be searched and accessed at a later date and to dispose of information that is no longer needed. The data retention policies within an organization are a set of guidelines that describes which data will be archived, how long it will be kept, what happens to the data at the end of the retention period (archive or destroy) and other factors concerning the retention of the data. A part of any effective data retention policy is the permanent deletion of the retained data; achieving secure deletion of data by encrypting the data when stored, and then deleting the encryption key after a specified retention period. Thus, effectively deleting the data object and its copies stored in online and offline locations.


Australia

In 2015, the Australian government introduced mandatory data retention laws that allows data to be retained up to two years. The scheme is estimated to cost at least AU$400 million per year to implement, working out to at least $16 per user per year. It will require telecommunication providers and ISPs to retain telephony, Internet and email metadata for two years, accessible without a warrant, and could possibly be used to target file sharing. The
Attorney-General In most common law jurisdictions, the attorney general or attorney-general (sometimes abbreviated AG or Atty.-Gen) is the main legal advisor to the government. The plural is attorneys general. In some jurisdictions, attorneys general also have exec ...
has broad discretion on which agencies are allowed to access metadata, including private agencies.
The Greens The Greens or Greens may refer to: Current political parties *Australian Greens, also known as ''The Greens'' *Greens of Andorra * Greens of Bosnia and Herzegovina *Greens of Burkina * Greens (Greece) * Greens of Montenegro *Greens of Serbia *Gree ...
were strongly opposed to the introduction of these laws, citing privacy concerns and the increased prospect of 'speculative invoicing' over alleged copyright infringement cases. The Labor Party initially opposed as well, but later agreed to passing the law after additional safeguards were put in place to afford journalists some protection.


European Union

On 15 March 2006, the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are located primarily in Europe, Europe. The union has a total area of ...
adopted the
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connec ...
, on "the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC". It required Member States to ensure that communications providers retain data as specified in the Directive for a period of between 6 months and 2 years in order to: * Trace and identify the source of a communication; * Trace and identify the destination of a communication; * Identify the date, time, and duration of a communication; * Identify the type of communication; * Identify the communication device; * Identify the location of mobile communication equipment. The data was required to be available to "competent" national authorities "for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law". The Directive covered
fixed telephony A landline (land line, land-line, main line, home phone, fixed-line, and wireline) is a telephone connection that uses metal wires or optical fiber telephone line for transmission, as distinguished from a mobile cellular network, which uses ...
,
mobile telephony Mobile telephony is the provision of telephone services to phones which may move around freely rather than stay fixed in one location. Telephony is supposed to specifically point to a voice-only service or connection, though sometimes the l ...
, Internet access, email, and
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
. Member States were required to transpose it into national law within 18 months—no later than September 2007. However, they could if they wished postpone the application of the Directive to Internet access, email, and VoIP for a further 18 months after this date. A majority of Member States exercised this option. All 28 EU States at the time notified the European Commission about the transposition of the Directive into their national law. Of these, however, Germany and Belgium had only transposed the legislation partially. A report evaluating the Directive was published by the European Commission in April 2011. It concluded that data retention was a valuable tool for ensuring criminal justice and public protection, but that it had achieved only limited harmonisation. There were serious concerns from service providers about the compliance costs and from civil society organisations who claimed that mandatory data retention was an unacceptable infringement of the fundamental right to privacy and the protection of personal data according to EU law. In response to the report, on May 31, 2011, the European Data Protection Supervisor expressed some concerns on the European Data Retention Directive, underlining that the Directive "does not meet the requirements imposed by the fundamental rights to privacy and data protection". Criticisms of the directive aroused. The council's Legal Services was reported to have stated in closed session that paragraph 59 of the European Court of Justice's ruling "suggests that general and blanket data retention is no longer possible". A legal opinion funded by the Greens/EFA Group in the European Parliament finds that the blanket retention data of unsuspected persons generally violates the EU Charter of Fundamental Rights, both in regard to national telecommunications data retention laws and to similar EU data retention schemes (PNR, TFTP, TFTS, LEA access to EES, Eurodac, VIS). The criticisms led to that Digital Rights Ireland brought the directive to the High Court of Ireland, that then brought it further to the European Court of Justice of the European Union. The case was also joined by the Constitutional Court of Austria. The process led to that the Court on 8 April 2014 declared the Directive 2006–24/EC invalid for violating fundamental rights, stating that ", the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data". https://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf This led further to that the member states in various degrees abolished or modified their implementations of the directive. Since the Swedish implementation of the directive was kept in a similar manner, the Swedish implementation was brought to the European Court by the telecom provider Tele2, and the case was merged with a similar case from the United Kingdom, initiated by three persons with intervention by Open Rights Group, Privacy International and The Law Society of England and Wales. Since the original directive no longer existed, the basis for the judgment was an exception to the Directive 2002/58/EC, https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32002L0058 "concerning the processing of personal data and the protection of privacy in the electronic communications sector." in its Article 15(1), referring to the possibility to exceptionally apply data retention for fighting serious crime. On the 21 of December 2016 the Court ruled "https://curia.europa.eu/juris/document/document.jsf;jsessionid=B902EE80BC54C2EEE4E4799A65A4C980?text=&docid=186492&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=6002190 that "the protection of privacy in the electronic communications sector must be interpreted as precluding national legislation which, for the purpose of fighting crime, provides for general and indiscriminate retention of all traffic and location data of all subscribers and registered users relating to all means of electronic communication." Blanket data retention was ruled out another time, but the actual consequences all over the EU are varied and under discussion since then.


Czech Republic

Implementation of the directive was part of Act. No. 259/2010 Coll. on electronic communications as later amended. Under Art. 97 (3), telecommunication data are to be stored between 6 and 12 months. The Czech Constitutional Court has deemed the law unconstitutional and found it to be infringing on the peoples right to privacy. As of July 2012, new legislation was on its way.


Denmark

Denmark ) , song = ( en, "King Christian stood by the lofty mast") , song_type = National and royal anthem , image_map = EU-Denmark.svg , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of Denmark , establish ...
has implemented the EU data retention directive and much more, by logging all internet flow or sessions between operators and operators and consumers. * "2.2.1. Session logging (section 5(1) of the Executive Order) Providers of access to the internet must, in respect of the initiating and terminating package of an internet session, retain data that identifies the sending and receiving internet protocol address (in the following called IP address), the sending and receiving port number and the transmission protocol." * "2.2.2. Sampling (section 5(4) of the Executive Order) The obligation to retain data about the initiating and terminating package of an internet session does not apply to providers in case such retention is not technically feasible in their systems. In that case, data must instead be retained for every 500th package that is part of an end user's communication on the internet." * "2.2.5. Hot spots (section 5(3) of the Executive Order) In addition to the internet data that must otherwise be retained, the provider must retain data that identifies the precise geographic or physical location of a hot spot and the identity of the communication equipment used. This means that a provider of internet access via a hot spot must retain data on a user's access to the internet and, at the same time, retain data that identifies the geographic location of the hot spot in question."


Germany

The
German German(s) may refer to: * Germany (of or related to) **Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
Bundestag The Bundestag (, "Federal Diet") is the German federal parliament. It is the only federal representative body that is directly elected by the German people. It is comparable to the United States House of Representatives or the House of Comm ...
had implemented the directive in "Gesetz zur Neuregelung der Telekommunikationsüberwachung und anderer verdeckter Ermittlungsmaßnahmen sowie zur Umsetzung der Richtlinie 2006/24/EG". The law became valid on 1 January 2008. Any communications data had to be retained for six months. On 2 March 2010, the
Federal Constitutional Court of Germany The Federal Constitutional Court (german: link=no, Bundesverfassungsgericht ; abbreviated: ) is the supreme constitutional court for the Federal Republic of Germany, established by the constitution or Basic Law () of Germany. Since its in ...
ruled the law
unconstitutional Constitutionality is said to be the condition of acting in accordance with an applicable constitution; "Webster On Line" the status of a law, a procedure, or an act's accordance with the laws or set forth in the applicable constitution. When l ...
as a violation of the guarantee of the secrecy of correspondence. On 16 October 2015, a second law for shorter, up to 10 weeks long, data retention excluding email communication was passed by parliament. However, this act was ruled incompatible with German and European laws by an injunction of the Higher Administrative Court of
North Rhine-Westphalia North Rhine-Westphalia (german: Nordrhein-Westfalen, ; li, Noordrien-Wesfale ; nds, Noordrhien-Westfalen; ksh, Noodrhing-Wäßßfaale), commonly shortened to NRW (), is a state (''Land'') in Western Germany. With more than 18 million inha ...
. As a result, on June 28, 2017, three days before the planned start of data retention, the
Federal Network Agency The Federal Network Agency (german: Bundesnetzagentur or ) is the German regulatory office for electricity, gas, telecommunications, post and railway markets. It is a federal agency of the Federal Ministry for Economic Affairs and Climate Acti ...
suspended the introduction of data retention until a final decision in the principle proceedings.


Italy

In July 2005 new legal requirements on data retention came into force in Italy. ;Subscriber information : Internet cafés and public telephone shops with at least three terminals must seek a license permit within 30 days from the Ministry of Home Affairs. They must also store traffic data for a period which may be determined later by administrative decree.
Wi-Fi hotspot A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider. Public hotspots may be created ...
s and locations that do not store traffic data have to secure ID information from users before allowing them to log on. For example, users may be required to enter a number from an ID card or driving license. It is not clear how this information is validated. Mobile telephony users must identify themselves before service activation, or before a
SIM card A typical SIM card (mini-SIM with micro-SIM cutout) A GSM mobile phone file:Simkarte NFC SecureElement.jpg, T-Mobile nano-SIM card with NFC capabilities in the SIM tray of an iPhone 6s file:Tf sim both sides.png, A TracFone Wireless SIM card ha ...
may be obtained. Resellers of mobile subscriptions or pre-paid cards must verify the identity of purchasers and retain a photocopy of identity cards. ; Telephony data : Data, including location data, on fixed line and mobile telephony must be retained for 24 months. There is no requirement to store the content of calls. Telephony operators must retain a record of all unsuccessful dial attempts. ; ISP data : Internet service providers must retain all data for at least 12 months. The law does not specify exactly what traffic data must be retained. There is no requirement to store the content of internet communications. ; Legality : The legislation of July 2005 enables data retention by outlawing all the relevant data protection provisions until 31 December 2007. Under the data protection provisions, service providers are obliged to store traffic data and user data for no less than 365 days, even if they no longer need it to process the communication or to send bills, policy requires user id information, location, tracking data be stored and kept on file for easy access by law enforcement and/or other authorities who request this information (permission must be asked to view sensitive user ID data on file). The traffic data which will now be retained can be used for anti-terrorism purposes and for general penal enforcement of criminal offences large and small. Italy already required the retention of telephony traffic data for 48 months, but without location data. Italy has adopted the EU Directive on Privacy and Electronic Communications 2002 but with an exemption to the requirement to erase traffic data.


Romania

The EU directive has been transposed into
Romanian law The law of Romania is civil law. History The Romanian judicial system experienced a major overhaul in the early 2010s, with the introduction of four new codes: the Civil Code (2011), the Civil Procedure Code (2013) and the Penal and Penal Proced ...
as well, initially as Law 298/2008. However, the Constitutional Court of Romania subsequently struck down the law in 2009 as violating constitutional rights. The court held that the transposing act violated the constitutional rights of privacy, of confidentiality in communications, and of free speech. The
European Commission The European Commission (EC) is the executive of the European Union (EU). It operates as a cabinet government, with 27 members of the Commission (informally known as "Commissioners") headed by a President. It includes an administrative body ...
has subsequently sued Romania in 2011 for non-implementation, threatening Romania with a fine of 30,000 euros per day. The Romanian parliament passed a new law in 2012, which was signed by president
Traian Băsescu Traian Băsescu (; born 4 November 1951) is a conservative Romanian politician who served as President of Romania from 2004 to 2014. Prior to his presidency, Băsescu served as Romanian Minister of Transport on multiple occasions between 1991 ...
in June. The Law 82/2012 has been nicknamed " Big Brother" (using the untranslated English expression) by various Romanian non-governmental organizations opposing it. On July 8, 2014, this law too was declared unconstitutional by the Constitutional Court of Romania.


Slovakia

Slovakia Slovakia (; sk, Slovensko ), officially the Slovak Republic ( sk, Slovenská republika, links=no ), is a landlocked country in Central Europe. It is bordered by Poland to the north, Ukraine to the east, Hungary to the south, Austria to the ...
has implemented the directive in Act No. 610/2003 Coll. on electronic communications as later amended. Telecommunication data are stored for six months in the case of data related to Internet, Internet email and Internet telephony (art. 59a (6) a), and for 12 months in the case of other types of communication (art. 59a (6) b). In April 2014, the Slovak Constitutional Court preliminary suspended effectiveness of the Slovak implementation of Data Retention Directive and accepted the case for the further review. In April 2015 Constitutional court decided that some parts of Slovak laws implementing DR Directive are not in compliance with Slovak constitution and Convention for the Protection of Human Rights and Fundamental Freedoms. According to now invalid provisions of the Electronic Communications Act, the providers of electronic communications were obliged to store traffic data, localization data and data about the communicating parties for a period of 6 months (in the case Internet, email or VoIP communication) or for a period of 12 months (in case of other communication).


Sweden

Sweden Sweden, formally the Kingdom of Sweden,The United Nations Group of Experts on Geographical Names states that the country's formal name is the Kingdom of SwedenUNGEGN World Geographical Names, Sweden./ref> is a Nordic countries, Nordic c ...
implemented the EU's 2006
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connec ...
in May 2012, and it was fined €3 million by the
Court of Justice of the European Union The Court of Justice of the European Union (CJEU) (french: Cour de justice de l'Union européenne or "''CJUE''"; Latin: Curia) is the judicial branch of the European Union (EU). Seated in the Kirchberg quarter of Luxembourg City, Luxembour ...
for its belated transposition (the deadline was 15 September 2007). The directive allowed member states to determine the duration data is retained, ranging from six months to two years; the
Riksdag The Riksdag (, ; also sv, riksdagen or ''Sveriges riksdag'' ) is the legislature and the supreme decision-making body of Sweden. Since 1971, the Riksdag has been a unicameral legislature with 349 members (), elected proportionally and se ...
, Sweden's legislature, opted for six months. In April 2014, however, the CJEU struck down the Data Retention Directive. Following the judgement, PTS, Sweden's telecommunications regulator, told Swedish ISPs and telcos that they would no longer have to retain call records and internet metadata. The Swedish government initiated a one-man investigation that stated that Sweden could keep on with data-retention. After that, the PTS reversed course. Most of Sweden's major telecommunications companies complied immediately, though Tele2 appealed this order before the Administrative Court in Stockholm claiming that the Swedish implementation should be reversed following the directive being declared unvalid, including the fact that the Swedish implementation went further than the directive, including registration of failed telephone calls and the geographic endpoint of a mobile communications. The appeal was rejected. The one holdout ISP,
Bahnhof Bahnhof ( German for "railway station") is a Swedish Internet service provider (ISP) founded in 1994 by Oscar Swartz in Uppsala, Sweden, and is the country's first independent ISP. Today the company is represented in Stockholm, Gothenburg, Upps ...
, was given an order to comply by November 24 deadline or face a five million krona ($680,000) fine. Tele2 appealed the first level court rejection to the Swedish Administrative Court of Appeal, that sent the matter to the European Court of Justice of the European Union. That led to a judgement that once again invalidated blanket data retention of all communications of all citizens' communications to combat crime. See under European Union above.


United Kingdom


Data Retention and Investigatory Powers Act 2014

The Data Retention and Investigatory Powers Act came into force in 2014. It is the answer by the United Kingdom parliament after a declaration of invalidity was made by the Court of Justice of the European Union in relation to Directive 2006/ 24/EC in order to make provision, about the retention of certain communications data. In addition, the purpose of the act is to: * Amend the grounds for issuing interception warrants, or granting or giving certain authorizations or notices. * Make provision about the extraterritorial application of that Part and about the meaning of "telecommunications service" for the purposes of that Act; * Make provision about a review of the operation and regulation of investigatory powers; and for connected purposes. The act is also to ensure that communication companies in the UK retain communications data so that it continues to be available when it is needed by law enforcement agencies and others to investigate committed crimes and protect the public. Data protection law requires data that isn't of use to be deleted. This means that the intention of this Act could be using data retention to acquire further policing powers using, as the Act make data retention mandatory. An element of this Act is the provision of the investigatory powers to be reported by 1 May 2015.


Controversy

The
Data Retention and Investigatory Powers Act 2014 The Data Retention and Investigatory Powers Act 2014 (also known as DRIP or DRIPA) was an Act of the Parliament of the United Kingdom, repealed in 2016. It received Royal Assent on 17 July 2014, after being introduced on 14 July 2014. The purpos ...
was referred to as the "snooper's charter" communications data bill.
Theresa May Theresa Mary May, Lady May (; née Brasier; born 1 October 1956) is a British politician who served as Prime Minister of the United Kingdom and Leader of the Conservative Party from 2016 to 2019. She previously served in David Cameron's cab ...
, a strong supporter of the Parliament Act, said in a speech that "If we (parliament) do not act, we risk sleepwalking into a society in which crime can no longer be investigated and terrorists can plot their murderous schemes undisrupted." The
United Kingdom parliament The Parliament of the United Kingdom is the supreme legislative body of the United Kingdom, the Crown Dependencies and the British Overseas Territories. It meets at the Palace of Westminster, London. It alone possesses legislative supremac ...
its new laws increasing the power of data retention is essential to tackling crime and protecting the public. However, not all agree and believe that the primary objective in the data retention by the government is
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
. After Europe's highest court said the depth of data retention breaches citizens' fundamental
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 194 ...
and the UK created its own Act, it has led to the British government being accused of breaking the law by forcing telecoms and internet providers to retain records of phone calls, texts and internet usage. From this information, governments can identify an individual's associates, location, group memberships, political affiliations and other personal information. In a television interview, the EU Advocate General Pedro Cruz Villalón highlighted the risk that the retained data might be used illegally in ways that are "potentially detrimental to privacy or, more broadly, fraudulent or even malicious".


Retention of other data

; Postal data – retention period unknown : Information written on the outside of a postal item (such as a letter or parcel), online tracking of postal items, records of special postal items (such as records of registered, recorded or special delivery postal items), records of parcel consignment, delivery and collection. ; Banking data – seven years : ''
The Economist ''The Economist'' is a British weekly newspaper printed in demitab format and published digitally. It focuses on current affairs, international business, politics, technology, and culture. Based in London, the newspaper is owned by The Eco ...
'' reported that UK banks are required to retain data on all financial transactions for seven years though this has not been verified. It is not clear whether data on credit card transactions is also retained for seven years. ; Vehicle movement data – two years : Documents leaked from the Association of Chief Police Officers (ACPO) have revealed that the UK is planning to collect data from a nationwide network of automatic numberplate recognition cameras and store the data for two years in a controversial new centre being built at Hendon. This data could then be linked to other data held by the government and watchlists from the police and security services.


Access to retained data

The bodies that are able to access retained data in the United Kingdom are listed in the Regulation of Investigatory Powers Act 2000 (RIPA). These are the following: * Police forces, as defined in section 81(1) of RIPA * National Criminal Intelligence Service * Serious Organised Crime Agency, formerly the National Crime Squad * HM Customs and Excise * Inland Revenue (the latter two have been merged into
HM Revenue and Customs HM Revenue and Customs (His Majesty's Revenue and Customs, or HMRC) is a non-ministerial government department, non-ministerial Departments of the United Kingdom Government, department of the His Majesty's Government, UK Government responsible fo ...
) * Security Service * Secret Intelligence Service *
Government Communications Headquarters Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
(GCHQ) However, the Regulation of Investigatory Powers Act 2000 (RIPA) also gives the
Home Secretary The secretary of state for the Home Department, otherwise known as the home secretary, is a senior minister of the Crown in the Government of the United Kingdom. The home secretary leads the Home Office, and is responsible for all nationa ...
powers to change the list of bodies with access to retained data through secondary legislation. The list of authorised bodies now includes: * Food Standards Agency * Local authorities *
National Health Service The National Health Service (NHS) is the umbrella term for the publicly funded healthcare systems of the United Kingdom (UK). Since 1948, they have been funded out of general taxation. There are three systems which are referred to using the " ...


Reasons for accessing retained data

The justifications for accessing retained data in the UK are set out in the Regulation of Investigatory Powers Act 2000 (RIPA). They include: * Interests of national security; * Preventing or detecting crime or of preventing disorder; * Economic well-being of the United Kingdom; * Public safety; * Protecting public health; * Assessing or collecting any tax, duty, levy or other imposition, contribution or charge payable to a government department; * Preventing death or injury in an emergency or any damage to a person's physical or mental health, or of mitigating any injury or damage to a person's physical or mental health; * Any other purpose not listed above which is specified for the purposes of this subsection by an order made by the Secretary of State.


Norway

The EU's Data Retention Directive has been implemented into Norwegian law in 2011, but this will not be in effect before 1 January 2015.


Russia

A 2016 anti-terrorist federal law 374-FZ known as Yarovaya Law requires all telecommunication providers to store phone call, text and email metadata, as well as the actual voice recordings for up to 6 months. Messaging services like
WhatsApp WhatsApp (also called WhatsApp Messenger) is an internationally available freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by American company Meta Platforms (formerly Facebook). It allows use ...
are required to provide cryptographic backdoors to law-enforcement. The law has been widely criticized both in Russia and abroad as an infringement of human rights and a waste of resources.


Serbia

On 29 June 2010, the Serbian parliament adopted the Law on Electronic Communications, according to which the operator must keep the data on electronic communications for 12 months. This provision was criticized as unconstitutional by opposition parties and by Ombudsman
Saša Janković Saša Janković ( sr-cyr, Саша Јанковић, ; born 27 April 1970) is a Serbian lawyer, journalist, human rights activist and politician who served as the National Ombudsman of the Republic of Serbia between 2007 and 2017. He resigned his ...
.


Switzerland

As from 7 July 2016, the Swiss Federal Law about the Surveillance of the Post and Telecommunications entered into force, passed by the Swiss government on 18 March 2016.


Mobile phones

Swiss mobile phone operators have to retain the following data for six months according to the BÜPF: # Phone numbers of incoming and outgoing calls # SIM- (Subscriber Identity Module), IMSI- (International Mobile Subscribers Identity) and IMEI-numbers (International Mobile Equipment Identity) # „the location and the electrical boresight of the antenna of the mobile phone with which the monitored person is connected to the communications system at the time of the communication" # date, time and duration of the connection


Email

All Internet service providers must retain the following data for six months: # type of the connections (telephone, xDSL, Cable, permanent line etc.) and if known login data, address information of the origin (
MAC address A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking te ...
, telephone number), name, address and occupation of the user and duration of the connection from beginning to end # time of the transmission or reception of an email, header information according to the SMTP-protocol and the IP addresses of the sending and receiving email application. Email application refers to SMTP-, POP3-, IMAP4, webmail- and remail-server.


Exemptions

Switzerland only applies data retention to the largest Internet service providers with over 100 million CHF in annual Swiss-sourced revenue. This notably exempts derived communications providers such as ProtonMail, a popular encrypted email service based in Switzerland.


United States

The
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) commonly records Internet metadata for the whole planet for up to a year in its
MARINA A marina (from Spanish , Portuguese and Italian : ''marina'', "coast" or "shore") is a dock or basin with moorings and supplies for yachts and small boats. A marina differs from a port in that a marina does not handle large passenger ships or ...
database, where it is used for pattern-of-life analysis. U.S. persons are not exempt because metadata are not considered data under US law (section 702 of the FISA Amendments Act). Its equivalent for phone records is
MAINWAY MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and ...
. The NSA records
SMS Short Message/Messaging Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile devices exchange short text ...
and similar
text messages Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile devices, desktops/ laptops, or another type of compatible compu ...
worldwide through
DISHFIRE Dishfire (stylised DISHFIRE) is a covert global surveillance collection system and database run by the United States of America's National Security Agency (NSA) and the United Kingdom's Government Communications Headquarters (GCHQ) that collect ...
.


Leveraging commercial data retention

Various United States agencies leverage the (voluntary) data retention practised by many U.S. commercial organizations through programs such as PRISM and
MUSCULAR Skeletal muscles (commonly referred to as muscles) are organs of the vertebrate muscular system and typically are attached by tendons to bones of a skeleton. The muscle cells of skeletal muscles are much longer than in the other types of muscle ...
. Amazon is known to retain extensive data on customer transactions. Google is also known to retain data on searches, and other transactions. If a company is based in the United States the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) can obtain access to such information by means of a
National Security Letter A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Cr ...
(NSL). The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
states that "NSLs are secret subpoenas issued directly by the FBI without any judicial oversight. These secret subpoenas allow the FBI to demand that online service providers or
ecommerce E-commerce (electronic commerce) is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain managemen ...
companies produce records of their customers' transactions. The FBI can issue NSLs for information about people who haven't committed any crimes. NSLs are practically immune to judicial review. They are accompanied by gag orders that allow no exception for talking to lawyers and provide no effective opportunity for the recipients to challenge them in court. This secret subpoena authority, which was expanded by the controversial
USA PATRIOT Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
, could be applied to nearly any online service provider for practically any type of record, without a court ever knowing". ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' has published a well researched article on the FBI's use of
National Security Letters A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Cre ...
.


Failed mandatory ISP retention legislation attempts

The United States does not have any
Internet Service Provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
(ISP) mandatory data retention laws similar to the European
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connec ...
, which was retroactively invalidated in 2014 by the
Court of Justice of the European Union The Court of Justice of the European Union (CJEU) (french: Cour de justice de l'Union européenne or "''CJUE''"; Latin: Curia) is the judicial branch of the European Union (EU). Seated in the Kirchberg quarter of Luxembourg City, Luxembour ...
. Some attempts to create mandatory retention legislation have failed: * In 1999 two models of mandatory data retention were suggested for the United States: What
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
was assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
for an unspecified amount of time. * The Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act (SAFETY Act) of 2009 also known as H.R. 1076 and S.436 would require providers of "electronic communication or remote computing services" to "retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user". This bill never became a law.


Arguments against data retention

While it is often argued that data retention is necessary to combat terrorism and other crimes, there are still others who oppose data retention. Data retention may assist the police and security services to identify potential terrorists and their accomplices before or after an attack has taken place. For example, the authorities in Spain and the United Kingdom stated that retained telephony data made a significant contribution to police enquires into the
2004 Madrid train bombings The 2004 Madrid train bombings (also known in Spain as 11M) were a series of coordinated, nearly simultaneous bombings against the Cercanías commuter train system of Madrid, Spain, on the morning of 11 March 2004—three days before Spain's g ...
and the 2005 London bombings. The opponents of data retention make the following arguments: # The Madrid train bombings can also be seen as proof that the current data retention level is sufficient and hence the EU directive is not necessity. # Schemes for data retention do not make provisions for adequate regulation of the data retention process and for independent judicial oversight. # Data retention is an invasion of privacy and a disproportionate response to the threat of terrorism. # It is easy for terrorists to avoid having their communications recorded. The Home Office Voluntary Code of Practice of Data Retention admits that there are some internet protocols which cannot be effectively monitored. It would be possible for terrorists to avoid monitoring by using
anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
technologies, internet cafés,
anonymous proxies An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It acce ...
or several other methods. Some police officers in the EU are sceptical about the value of data retention. For example, Heinz Kiefer, president of Eurocop, the European Confederation of Police, issued a press statement saying "it remains easy for criminals to avoid detection through fairly simple means, for example mobile phone cards can be purchased from foreign providers and frequently switched. The result would be that a vast effort is made with little more effect on criminals and terrorists than to slightly irritate them. Activities like these are unlikely to boost citizens' confidence in the EU's ability to deliver solutions to their demand for protection against serious crime and terrorism". # The hardware and software required to store all the retained data would be extremely costly. The costs of retaining data would not only fall on
Internet Service Providers An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privat ...
and telephone companies, but also on all companies and other organisations which would need to retain records of traffic passing through their switchboards and servers. #Data retention gives excessive power to the state to monitor the lives of individual citizens. #Data retention may be abused by the police to monitor the activities of any group which may come into conflict with the state; including ones which are engaged in legitimate protests. The UK police have used anti-terrorism powers against groups opposed to the war in Iraq and protesters at an arms fair. The definition of terrorism in the UK Terrorism Act 2000 includes not only action, but the threat of action, involving serious violence against a person, or serious damage to property, for the purposes of advancing a "political, religious or ideological cause". There is concern that the definition is vaguely worded and could be applied to supporters of animal liberation, anti-war demonstrators, and many others. #Even if data retention may be justified, the retention periods proposed in some cases are excessive. It has been argued that a period of five days for web activity logs and ninety days for all other data would be adequate for police purposes. #Data retention by search engines provides an unfair advantage to dominant search engines.


Protection against data retention

The current directive proposal (see above) would force ISPs to record the internet communications of its users. The basic assumption is that this information can be used to identify with whom someone, whether innocent citizen or terrorist, communicated throughout a specific timespan. Believing that such as mandate would be useful is ignoring that some very committed community of crypto professionals has been preparing for such legislation for decades. Below are some strategies available today to anyone to protect themselves, avoid such traces, and render such expensive and legally dubious logging operations useless.


Anonymizing proxy services: Web

There are anonymizing proxies that provide slightly more private web access. Proxies must use
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
encryption in order to provide any level of protection at all. Unfortunately, proxies require the user to place a large amount of trust in the proxy operator (since they see everything the user does over HTTP), and may be subject to
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observe ...
.


P2P communications

Some P2P services like file transfer or voice over IP use other computers to allow communication between computers behind firewalls. This means that trying to follow a call between two citizens might, mistakenly, identify a third citizen unaware of the communication.


Privacy enhancing tools

For security conscious citizens with some basic technical knowledge, tools like I2P – The Anonymous Network, Tor, Mixmaster and the cryptography options integrated into any many modern mail clients can be employed. I2P is an international peer-to-peer anonymizing network, which aims at not only evading data retention, but also at making spying by other parties impossible. The structure is similar to the one TOR (see next paragraph) uses, but there are substantial differences. It protects better against traffic analysis and offers strong anonymity and for net-internal traffic
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecommunications service providers, telecom providers, Internet ...
. Due to unidirectional tunnels it is less prone to timing attacks than Tor. In I2P, several services are available: anonymous browsing, anonymous e-mails, anonymous instant messenger, anonymous file-sharing, and anonymous hosting of websites, among others. Tor is a project of the U.S. non-profit Tor Project to develop and improve an
onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of net ...
network to shield its users from traffic analysis. Mixmaster is a remailer service that allows anonymous email sending.
JAP ''Jap'' is an English abbreviation of the word "Japanese". Today, it is generally regarded as an ethnic slur. In the United States, some Japanese Americans have come to find the term very offensive, even when used as an abbreviation. Prior to t ...
is a project very similar to Tor. It is designed to route web requests through several proxies to hide the end user's Internet address. Tor support has been included into JAP.


Initiative against extensive data retention

The Arbeitskreis Vorratsdatenspeicherung (German Working Group on Data Retention) is an association of civil rights campaigners, data protection activists and Internet users. The Arbeitskreis coordinates the campaign against the introduction of data retention in Germany. An analysis of federal Crime Agency (BKA) statistics published on 27 January 2010 by civil liberties NGO AK Vorrat revealed that data retention did not make a prosecution of serious crime any more effective. As the EU Commission is currently considering changes to the controversial EU data retention directive, a coalition of more than 100 civil liberties, data protection and human rights associations, jurists, trade unions and others are urging the commission to propose the repeal of the EU requirements regarding data retention in favour of a system of expedited preservation and targeted collection of traffic data.


Plans for extending data retention to social networks

In November 2012, answers to a parliamentary inquiry in the
German Bundestag German(s) may refer to: * Germany (of or related to) **Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
revealed plans of some EU countries including France to extend data retention to chats and social media. Furthermore, the German
Federal Office for the Protection of the Constitution The Federal Office for the Protection of the Constitution (german: Bundesamt für Verfassungsschutz or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungss ...
(Germany's domestic intelligence agency) has confirmed that it has been working with the ETSI LI Technical Committee since 2003.
FM4 FM4 is an Austrian national radio station operated by the ORF. Its main target is the youth audience, and much of the music output is characterised by an alternative rock and electronic music slant. Programmimg The programming of ''FM4'' is al ...
Online ( ORF)
Vorratsspeicherung für Facebook-Daten
(in German). 2012-10-30. Retrieved 2012-11-08
Statement by the German Secretary of Justice


See also

*
Data security Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption Disk encryption refe ...
*
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connec ...
*
Data retention hardware Computer data storage is a technology consisting of computer components and recording media that are used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a compute ...
*
Data Protection Act 1998 The Data Protection Act 1998 (DPA, c. 29) was an Act of Parliament of the United Kingdom designed to protect personal data stored on computers or in an organised paper filing system. It enacted provisions from the European Union (EU) Data Prote ...
*
Computer data storage Computer data storage is a technology consisting of computer components and recording media that are used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a comput ...
* Customer proprietary network information *
Data privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
*
Electronic discovery Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often refe ...
*
Lawful interception Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries requir ...
*
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
*
NSA call database MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, ...
*
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
* Secrecy of correspondence *
Traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observe ...
* I2P - The Anonymous Network


References


External links


Data Retention
on the
Open Rights Group The Open Rights Group (ORG) is a UK-based organisation that works to preserve digital rights and freedoms by campaigning on digital rights issues and by fostering a community of grassroots activists. It campaigns on numerous issues including m ...
wiki
The Politics of the EU Court Data Retention Opinion: End to Mass Surveillance?
* * Boehm, F. and Cole, M.
Data Retention after the Judgement of the Court of Justice of the European Union
(2014). (PDF-file) * * Centre for European Policy Studies (CEP)
Policy Brief on Data Retention
(2011). (PDF-File) *

* Digital Rights Ireland
Digital Rights Ireland's challenge against the EU Data Retention Directive and Irish retention legislation on the grounds of European and Irish constitutional law
*
Electronic Privacy Information Center Electronic Privacy Information Center (EPIC) is an independent nonprofit research center in Washington, D.C. EPIC's mission is to focus public attention on emerging privacy and related human rights issues. EPIC works to protect privacy, freed ...

EPIC data retention page
(to 2007) *
European Digital Rights European Digital Rights (EDRi) is an international advocacy group headquartered in Brussels, Belgium. EDRi is a network collective of non-profit organizations (NGO), experts, advocates and academics working to defend and advance digital rights ...

EDRI news tracking page on data retention
(current) * Feiler, L.
The Data Retention Directive
(2008). Seminar paper. (PDF-File) * Frost & Sullivan Whitepaper
"Meeting the challenges of Data Retention: Now and in the future"
* Ganj, C.
"The Lives of Other Judges: Effects of the Romanian Data Retention Judgment"
(December 4, 2009). (PDF-File) * Goemans, C. and Dumortier, J.
"Mandatory retention of traffic data in the EU: possible impact on privacy and on-line anonymity
Digital Anonymity and the Law, series IT & Law/2, T.M.C. Asser Press, 2003, p 161–183. (PDF-File) * Milford, P.
"The Data Retention Directive: too fast, too furious a response?
(2008). LLM Dissertation – Southampton Business School. (PDF-File) * Mitrou, L.
"Communications Data Retention: A Pandora's Box for Rights and Liberties?"
From Digital Privacy: Theory, Technologies, and Practices edited by Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis and Sabrina di Vimercati. Auerbach Publications, 2008. (PDF-File) * * Statewatch
The surveillance of telecommunications in the EU

UK Data Retention Requirements
with full references to legislation, codes of practice, etc. * UK Home Office
Consultation papers
on data retention and on access to communications data. * * Working Group on Data Retention
List of documents relating to communications data retention in the EU
(current) {{Data Data laws Telephony Privacy of telecommunications Intelligence analysis Mass surveillance