ICO: Private email is subject to FOI

Guidance suggests organisations should update communications policies.

Data Security

Guidance issued by The Information Commissioner's Office (ICO) has put the use of personal email for business communications under the spotlight.

The ICO clarified last week that information concerning official business held in private email accounts is subject to the Freedom of Information (FOI) Act.

The watchdog published its guidance after the Financial Times reported education secretary Michael Gove and his advisers had been using private email for departmental business. Gove refused to release data from the accounts in response to FOI requests.

Christopher Graham, information commissioner, said it should not come as a surprise to public authorities that information held in private email accounts can be subject to FOI law if it relates to official business.

"This has always been the case the Act covers all recorded information in any form," he stated.

Greg Jones, ICO press officer, also told IT Pro that, although the ICO has never stated personal email fell outside the remit of the FoI, the Cabinet Office guidance that had been circulated to other government departments gave that impression.

"That's why we've issued new guidance today with two key aims first, to give public authorities an authoritative steer on the factors that should be considered before deciding whether a search of private email accounts is necessary when responding to a request under the Act; second, to set out the procedures that should generally be in place to respond to requests," Graham said.

While the guidance (PDF download) said the need to search private email accounts should be a rare occurrence, minimising any increased regulatory burden on public authorities, Jones confirmed that the use of private email for public authority business should also be an exception rather than the rule.

While "it should be avoided if possible," he said copying the email into an official authority address would ensure the completeness of the authority's records and avoid it having to take extra effort and time to access personal accounts.

If an individual's email account might include official information, which falls within the scope of the request and is not held elsewhere, the ICO said the authority is required to ask that individual to search their account. An audit trail of the access and search should be maintained also.

The guidance also reminds public authorities to remind staff that deleting or concealing information with the intention of preventing its disclosure following receipt of a request is a criminal offence under section 77 of the FOI Act.

Graham added that, having conducted a good practice visit at the Department for Education, the ICO is now "keen to carry out similar visits to other Whitehall departments."

He added that its investigation of specific complaints made to the ICO about the Department of Education's handling of individual FOI requests was still ongoing and that its decisions would be published early in the New Year.

The data protection watchdog used its powers to make the University of East Anglia commit to better FOI practices last year.

Stewart Room, partner in the Privacy and Information Law Group of Field Fisher Waterhouse, said having to manage private email systems for compliance with FOI law "will be very burdensome."

"Another interesting question is the extent to which this decision indicates a course of trajectory for the Commissioner on the issue of data security," Room said.

"If the principles behind the FOI decision are extended to the matter of security breaches, we may conclude that invasion of the "private space" of private emails will be more readily justified, if this is required to achieve an appropriate degree of security."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021

Most Popular

University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021