Collecting phone data is only legal in a few cases ECJ says

European Court of Justice said retaining bulk data only valid in the most serious circumstances

The European Court of Justice has ruled that bulk phone and email data can only be retained if it relates to serious crimes and should not be collected otherwise.

The findings come after ex-backbench Tory David Davis, and Tom Watson, Labour's deputy leader brought a claim to the court, saying it was unjust for the GCHQ, or any other organisation claiming to need access for legal issues to collect such sensitive information in bulk.

However, Davis withdrew his complaint after he was appointed to the cabinet, evidently not wanting to upset his peers.

"Solely the fight against serious crime is an objective in the general interest that is capable of justifying a general obligation to retain data, whereas combating ordinary offences and the smooth conduct of proceedings other than criminal proceedings are not," The ECJ's advocate general Henrik Saugmandsgaard said.

Advertisement - Article continues below

This opinion brings the European Union's stance closer to the regulations set out in the UK's Investigatory Powers Bill, which could come into question when the UK exits the EU.

"This legal opinion shows the prime minister was wrong to pass legislation when she was home secretary that allows the state to access huge amounts of personal data without evidence of criminality or wrongdoing," Tom Watson, Labour's deputy leader said.

"Labour has already secured important concessions, but I hope the government she leads will now revisit it. The opinion makes it clear that information including browsing history and phone data should not be made available to the security services and other state bodies without independent authorisation. The security services have an important job to do, but judicial oversight is vital if we are to maintain the right balance between civil liberties and state power."

The European Court of Justice will come to a final decision about a course of action in the next few months.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now


Policy & legislation

Breaking up big tech 'will cause more problems', says EU

8 Nov 2019
cyber security

The EU calls for cyber security pact with post-Brexit UK

6 Nov 2019
Business strategy

Can the UK tech sector still attract investment post-Brexit?

19 Sep 2019
Business operations

IT Pro Panel: The truth about talent

1 Jul 2019

Most Popular

mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019