House of Commons (21) - Commons Chamber (11) / Westminster Hall (7) / Public Bill Committees (2) / General Committees (1)
(8 years, 8 months ago)
Public Bill CommitteesOn a point of order, Madam Chairman. I will be writing to you today to summarise all of the areas on which the Solicitor General and I have offered to provide more information during the course of our sittings. I will do that each week, with a view to informing the debate and ensuring that all members of the Committee have the information.
Thank you very much, Minister.
Clause 61
Relevant public authorities and designated senior officers
I beg to move amendment 135, in clause 61, page 49, line 32, leave out subsections (1) and (2) and insert—
“(1) For the purposes of this Part, a relevant public authority is—
(a) a police force maintained under section 2 of the Police Act 1996,
(b) the Metropolitan police force,
(c) the City of London police force,
(d) the Police Service of Scotland,
(e) the Police Service of Northern Ireland,
(f) the British Transport Police Force,
(g) the Ministry of Defence Police,
(h) the Royal Navy Police,
(i) the Royal Military Police,
(j) the Royal Air Force Police,
(k) the Security Service
(l) the Secret Intelligence Service,
(m) the GCHQ,
(n) the National Crime Agency and
(o) the Criminal Cases Review Commission.
(2) For the purposes of authorisations sought pursuant to section 53(7)(g) a relevant public authority also includes—
(a) a National Health Service Trust established under section 5 of the National Health Service and Community Care Act 1990 whose functions include the provision of emergency ambulance service,
(b) a fire and rescue authority under the Fire and Rescue Services Act 2004,
(c) the Northern Ireland Ambulance Service Health and Social Care trust,
(d) the Northern Ireland Fire and Rescue Service Board
(e) the Scottish Ambulance Service Board and
(f) the Welsh Ambulance Services National Health Service Trust.
(3) For the purposes of authorisations sought pursuant to Section 53(7)(h), a relevant public authority also includes—
(a) the Criminal Cases Review Commission and
(b) the Scottish Criminal Cases Review Commission”.
With this it will be convenient to discuss amendment 236, in clause 61, page 49, line 34, leave out subsection (2) and insert—
“(2) For the purposes of this Part, a relevant public authority is—
(a) a police force maintained under section 2 of the Police Act 1996,
(b) the Metropolitan Police Force,
(c) the City of London Police Force,
(d) the Police Service of Scotland,
(e) the Police Service of Northern Ireland,
(f) the British Transport Police Force,
(g) the Ministry of Defence Police,
(h) the Royal Navy Police,
(i) the Royal Military Police,
(j) the Royal Air Force Police,
(k) the Security Service,
(l) the Secret Intelligence Service,
(m) the GCHQ,
(n) the National Crime Agency,
(o) the Criminal Cases Review Commission, or
(p) the Scottish Criminal Cases Review Commission.
(2A) For the purposes of authorisations sought pursuant to 53(7)(g), a relevant public authority also includes—
(a) a National Health Service Trust established under section 5 of the National Health Service and Community Care Act 1990 whose functions include the provision of emergency ambulance service,
(b) a fire and rescue authority under the Fire and Rescue Services Act 2004,
(c) the Northern Ireland Ambulance Service Health and Social Care trust,
(d) the Northern Ireland Fire and Rescue Service Board,
(e) the Scottish Ambulance Service Board, and
(f) the Welsh Ambulance Services National Health Service Trust.
(2B) For the purposes of authorisations sought pursuant to Section 57(3)(h), a relevant public authority also includes—
(a) the Criminal Cases Review Commission and
(b) the Scottish Criminal Cases Review Commission.”
This amendment ensures that only police forces and security agencies may request a communications data warrant, except where the warrant is issued for the purpose of preventing death, in which circumstances emergency and rescue services also fall within the definition.
It is a pleasure to continue to serve under your chairmanship, Ms Dorries.
The clause sets out the relevant public authorities and designated senior officers for the purposes of part 3 of the Bill—in essence, those who may exercise the powers of obtaining communications data throughout this part. Last week, I drew attention to schedule 4 to the Bill and, in particular, to the large number of public authorities listed as “relevant”, including Food Standards Scotland, the Food Standards Agency, the Gambling Commission, the Office of Communications and the Northern Ireland Fire and Rescue Service Board. The list of relevant public authorities in schedule 4 is very long.
I also drew attention to the designated senior officers, who are authorised to obtain communications data. They are listed in the second column in schedule 4. To remind the Committee, if we take the Food Standards Agency, the designated senior officer is a grade 6 officer; if we take the Northern Ireland Fire and Rescue Service Board, the officer is the watch manager of control; and, to take one more example, for the Office of Communications, the officer is a senior associate. The point that I made last week was that, where there are wide powers of retention under the Bill, which we will come to later, the threshold for accessing the data is vital. The number of relevant public authorities is too wide and the level of the designated senior officers too low to provide a proper safeguard.
The amendment is intended to address that defect by setting out in the legislation a narrower set of relevant public authorities, listed in paragraphs (a) to (o) of proposed new subsection (1). It is a shorter and tighter list, but would none the less be a functional and effective one. Proposed new subsections (2) and (3) are an attempt to tie in other relevant public authorities to the particular power that would be appropriate for them to exercise. The relevant public authorities for the purposes of authorisation under clause 53(7)(g) are listed under proposed new subsection (2) and, similarly, those for clause 53(7)(h) are listed under proposed new subsection (3).
The amendment would tighten up the drafting of the Bill to limit the number of relevant public authorities and tie the lists more closely to the particular objectives set out in clause 53. Logically, therefore, it follows from the point that I was making last week and anticipates the one that I will make later this morning about the scope of the retention powers.
There is one small difference between amendment 135, which was tabled by the Labour party, and amendment 236, which was tabled by the Scottish National party. Amendment 236 includes, in proposed new subsection (2)(p), the Scottish Criminal Cases Review Commission, which is a separate body. I say that for completeness.
It is good to serve under your chairmanship once again, Ms Dorries. I welcome the spirit in which the amendments have been tabled. There is a common sense of purpose among Committee members to ensure that the ambit of the authorities that have power to access communications data should always be strictly scrutinised. In that spirit, the Government have progressively reduced the number of such authorities. They have reviewed that number and keep it under review. The list of such authorities in the Bill is not simply a replication of the list in the Regulation of Investigatory Powers Act 2000, but has been the subject of careful consideration.
It has been judged that it is necessary for those public authorities to be allowed to access communications data for a narrow range of purposes. For example, insider trading needs to be investigated, and the Financial Conduct Authority is the body to do that. The Maritime and Coastguard Agency will need access to such information to locate people lost at sea. Bodies such as the Food Standards Agency and the Department for Work and Pensions have been given clear remits by Parliament to investigate certain types of criminality and civil matters, because such investigations often require dedicated resources and specialist knowledge. To unduly restrict those agencies in their work would cause an imbalance.
I know that the hon. and learned Gentleman shares those views, because in his previous incarnation as the Director of Public Prosecutions he made it clear, for example, that communications data should be available to organisations such as the DWP in investigating any abuse of the welfare system or other public funds. I therefore know that he has a common purpose in mind.
The Bill for the first time brings together all the public authorities with access to communications data in primary legislation. That is an important and welcome step up from previous practice. I should be clear that all the authorities listed in the Bill were required to make the case that they needed the power to access communications data. Therefore, as I have outlined, the list in the Bill is not just a blind replication of existing lists. As I have said, we removed 13 public authorities from the list in February last year. Amendments that were tabled by my right hon. Friend the Minister for Security and that we will debate shortly will introduce further restrictions on certain public authorities. That shows that the Government are taking great care in this area.
I wonder whether the Solicitor General can assist the Committee, either now or at some later stage, by setting out some detail about how the case was made for each of the agencies, and in particular why the designated senior officer grades were chosen. That is quite a complicated question, but it is striking, from the Committee’s point of view, that a watch manager is listed as a designated senior officer when one is talking about accessing communications data. I have already given other examples.
I shall try to assist the hon. and learned Gentleman. I will not be able to give him an exhaustive list here and now, as he is aware, and I am pretty sure that the information that he seeks is available in some form. We will, of course, help to signpost him to it.
I make the simple case about watch managers that there will be emergency situations, such as missing persons inquiries, in which fleetness of foot is essential. Suggesting that a more senior level of management would be appropriate risks important data being lost or not being available in those emergency situations. There are certain key situations where we are talking about the protection of life in which the balance needs to be struck in the way that we suggest in schedule 4.
With regard to schedule 4, public authorities cannot all acquire communications data for the full range of statutory purposes. Each can acquire data only for the purposes for which it has justified a need for them. That maintains the essential principle of proportionality, so that the public authorities concerned only have the powers for which they have made a compelling case.
To give some examples of the changes from RIPA, ambulance services will no longer be able to acquire communications data for the purposes of preventing and detecting crime, and the Prudential Regulation Authority will no longer be able to acquire communications data in any circumstances. In addition, the Bill allows for the ability of a public authority to access communications data to be removed, should a public authority cease to have a requirement to make those acquisitions. That is a very important check and balance.
To fill in some more detail in respect of the question the hon. and learned Member for Holborn and St Pancras asked about the detailed justification for each public authority, each authority has been required to provide evidence of utility and the need to acquire communications data. That included detailed consideration of the level of authorising officers, so that we got the balance right in terms of appropriateness.
I note that the Solicitor General spoke of details of the “utility”, but the Digital Rights Ireland case sets out that states must limit the number of persons authorised to access and use this sort of data to what is “strictly necessary”. Does he agree that a long list of authorities, many of whose primary functions are wholly unrelated to law enforcement in the context of serious crime, is inconsistent with the requirement of strict necessity laid down in the Digital Rights case?
I am grateful to the hon. and learned Lady and can correct the record in this way. I should have used the phrase “utility and need”. I think that important word, to which she quite rightly draws my attention, answers the point. In one of the examples I have given, where a need was not demonstrated by the PRU, the power was removed entirely.
Among the bodies that the amendment seeks to remove are Her Majesty’s Revenue and Customs and the Ministry of Defence. I am afraid that both bodies are intercepting agencies, and communications data are part of their work in targeting interception so that the powers which we all accept are intrusive are used in as tightly constrained circumstances as possible. My worry is that the amendment, however well intentioned, might well have the contrary effect on that important targeted work and the need for those organisations to target their activities.
I remind the Committee that David Anderson QC concluded in his report:
“It should not be assumed that the public interest is served by reducing the number of bodies with such powers, unless there are bodies which have no use for them.”
The Joint Committee on the Draft Investigatory Powers Bill also recognised communications data as
“an important tool for law enforcement and other public bodies.”
For those reasons, I urge the hon. and learned Gentleman to withdraw the amendment.
I am grateful to the Solicitor General. There is obviously concern about the threshold and safeguards for accessing communications data. That is what the Digital Rights case is all about; it is what the Tom Watson and David Davis case will test. To some extent, until that case is concluded, we will not know in specific terms what the safeguards are, although, as I foreshadowed last week, my view is that the requirements for safeguards will tighten as time goes by. It may not be exactly as the divisional court set out.
The Solicitor General has indicated that he will point me to the material that at least summarises why it was thought that each body should be on list. I am grateful for that and will consider it carefully. Will he also, either in a letter or some other appropriate form, set out the test that was applied in clear terms, so that it can be contrasted with the Digital Rights case and any outcome of the David Davis case in due course? I acknowledge that the hon. and learned Gentleman makes a powerful point about Her Majesty’s Revenue and Customs and, on that basis, I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
According to the list I have, Ms Dorries, amendment 236 is also to be dealt with. As I explained, there are small differences between amendments 135 and 236.
I realise that, but I have not been asked whether I want to put amendment 236 to a vote.
Amendment 236 is not formally before the Committee. As I said in the opening notes at the beginning of the Committee, if you wanted to put it to a vote, you had to make me aware of that at the beginning.
For the assistance of the Committee, I and Mr Starmer have spent a long time discussing who would lead on which clause, in order to speed matters up. I wish to put amendment 236 to a vote, although I did not speak to it. I would like that to be recorded in the minutes. If I am to be prevented from doing so, so be it.
Although this is unusual, as we have not actually moved on we can vote on amendment 236 so that the matter is transparent, with the leave of the Committee.
Ms Cherry, would you like to speak to your amendment before the Committee votes?
I have nothing to add to what Mr Starmer said and the points that I made in my intervention.
On a point of order, Ms Dorries. It may be that I am in error, and if I am I apologise and will take your chastisement. I thought I was correct in believing that when we are in a Public Bill Committee, it is as if we are having a debate on the Floor of the House and we are therefore referred to as the hon. Member or hon. Gentleman or whatever, rather than using Christian or first name and surname. Can you confirm that? I know some people get frightfully anxious about all the traditions of the House, but I just wanted to make sure that my understanding is correct.
On that point, Ms Cherry and I had an informal discussion outside the Committee earlier this morning.
Amendment proposed: 236, in clause 61, page 49, line 34, leave out subsection (2) and insert—
“(2) For the purposes of this Part, a relevant public authority is—
(a) a police force maintained under section 2 of the Police Act 1996,
(b) the Metropolitan Police Force,
(c) the City of London Police Force,
(d) the Police Service of Scotland,
(e) the Police Service of Northern Ireland,
(f) the British Transport Police Force,
(g) the Ministry of Defence Police,
(h) the Royal Navy Police,
(i) the Royal Military Police,
(j) the Royal Air Force Police,
(k) the Security Service,
(l) the Secret Intelligence Service,
(m) the GCHQ,
(n) the National Crime Agency,
(o) the Criminal Cases Review Commission, or
(p) the Scottish Criminal Cases Review Commission.
(2A) For the purposes of authorisations sought pursuant to 53(7)(g), a relevant public authority also includes—
(a) a National Health Service Trust established under section 5 of the National Health Service and Community Care Act 1990 whose functions include the provision of emergency ambulance service,
(b) a fire and rescue authority under the Fire and Rescue Services Act 2004,
(c) the Northern Ireland Ambulance Service Health and Social Care trust,
(d) the Northern Ireland Fire and Rescue Service Board,
(e) the Scottish Ambulance Service Board, and
(f) the Welsh Ambulance Services National Health Service Trust.
(2B) For the purposes of authorisations sought pursuant to Section 57(3)(h), a relevant public authority also includes—
(a) the Criminal Cases Review Commission and
(b) the Scottish Criminal Cases Review Commission.”—(Joanna Cherry.)
This amendment ensures that only police forces and security agencies may request a communications data warrant, except where the warrant is issued for the purpose of preventing death, in which circumstances emergency and rescue services also fall within the definition.
Question put, That the amendment be made.
I beg to move amendment 105, in schedule 4, page 206, line 40, at end insert—
“An ambulance trust in England | Duty Manager of Ambulance Trust Control Rooms | All | (g)” |
Welcome to the Chair, Ms Dorries.
The amendments make minor changes to schedule 4. As has already been said, schedule 4 lists the public authorities that are able to acquire communications data, the types of communications that they are able to acquire and the statutory purposes for which they can do so. Amendment 105 adds a new entry for ambulance trusts in England, amendment 106 removes the existing entry and amendment 108 introduces the definition of an ambulance trust. The changes make the definition of ambulance trusts consistent with the definition in the Policing and Crime Bill.
The amendments also remove purpose (b) in clause 53(7) from the purposes for which ambulance trusts can acquire communications data, because ambulance trusts obviously do not need to acquire communications data for the purpose of the prevention or detection of crime. In the same vein, amendment 107 restricts the purposes that the Northern Ireland Fire and Rescue Service Board can use to acquire communications data, consistent with the purposes for English fire and rescue authorities. These are uncontentious amendments designed to make the Bill consistent and coherent.
Amendment 105 agreed to.
Amendments made: 106, in schedule 4, page 207, leave out lines 24 to 35.
See the explanatory statement for amendment 105.
Amendment 107, in schedule 4, page 207, line 39, leave out—
“Group Manager (Control) | All | (b) and (d)” |
I rise to put on the record a concern about the clause and to remind the Committee that with the wide power of retention, the safeguards on access provisions are critical to the operation of the Bill as a whole. Broadly speaking, the safeguards are: who can authorise access, what the test is, the scope of the conduct authorised and such checks and limits as are otherwise put in the Bill. The clause covers who can authorise access, and my strong feeling is that that should be in the Bill rather than left to regulations, because it is a central safeguard. I will not vote against the clause, but I want to put on the record my view that a provision as important as who can access should be in the Bill and that amendments should be made to legislation rather than through regulation.
I know the hon. and learned Gentleman is probing. He is right that the clause sets out how the Secretary of State may, by regulation, add or remove public bodies listed in schedule 4 and make modifications accordingly, but it also sets out that the Secretary of State does so by means of regulations. He will have noted that in practice that means a statutory instrument, which is subject to the affirmative procedure, as is made clear in clause 63(3).
I understand the hon. and learned Gentleman’s point, which is reasonable, but there are limits on what the Secretary of State can do in the sense that the affirmative procedure must be followed, which will give an opportunity for further consideration. I am happy to confirm that the intention in the Bill and the spirit in which it was constructed are very much along the lines he described.
I wish to oppose this clause.
Question put, That the clause stand part of the Bill.
I wish to raise two issues for the Committee’s consideration. The first is that the test in subsection (5) for a judicial authority is very weak. We are talking about restrictions on local authorities and we have moved from a test of reviewing the decision, found in other parts of the clause, to a test whether the judicial authority, in this case a justice of the peace, considers that
“there are reasonable grounds for considering requirements of this Part would be satisfied”.
The second is that the authority in this case is a JP. I accept that this a replication of another scheme in the same words, as the Solicitor General says. I will not oppose the clause, but in a Bill that is tightening safeguards, there is nothing to prevent that test being aligned with the other tests applied when judges, magistrates or other independent judicial figures oversee authorisations by bodies such as local authorities.
In fairness, I think these clauses were put in to tighten the controls on local authorities.
That is welcome and we support them for that reason. In tightening controls, there has been a failure, perhaps deliberate, not to align this with the test in other cases. The judicial authority would be able to say, “I would not in fact authorise, but there were reasonable grounds on which somebody else could have done so.” I am making a probing point; no amendment was tabled. I support the further protection in relation to local authorities. I just wondered whether there was a deliberate intention not to align this provision with the other safeguard provisions in the Bill.
There are two things to say. First, the measure replicates the current position under the Regulation of Investigatory Powers Act 2000, so it is established practice. Secondly, as the hon. and learned Gentleman conceded, it is an attempt to add an additional safeguard, for the reasons he gave. It seemed important that this was not used permissively. The only other thing I would add, given that he is probing, is that all of this would have to pass the tests of proportionality and necessity; that is a given. I am happy to look at whether we need to reinforce that, in the code or perhaps elsewhere, because proportionality and necessity underpin all of this; that is not specified in this part, but it is a prevailing and underpinning assumption about authorisation. I understand that he is probing and also appreciate that he understands what we are trying to do.
I am grateful to the Minister for the spirit in which he is approaching this issue. I accept that necessity and proportionality are the key tests for the application in the first place. The question for the magistrate is then whether there are reasonable grounds for considering it to be necessary and proportionate. That leaves room for the magistrate to say, “I personally do not think it is necessary and proportionate but I accept that somebody else might think there are reasonable grounds.” I do not want to take this too far because it is a relatively minor provision in the Bill and I accept that it is in the scheme of tightening the safeguards; however, I just wonder whether some thought can be given. When the other tests have been so carefully construed—and we will have further discussion on what those tests are—this is an outlier in the way that it is expressed. I accept that it reflects current practice, but I do not think that is necessarily a good reason for simply replicating that unless, on reflection, current practice is thought to be the right way forward from here.
I will test that. The hon. and learned Gentleman makes a reasonable point, so I will test our experience of current practice regarding this issue and I will also test and consider whether we need to provide further guidance. I would not want to go too far because, as he says, it is a minor matter, but he is right to say that it is important that it is consistent. I am more than happy to take a look at that, and on that basis I think we should move on.
Question put, That the clause stand part of the Bill.
I beg to move amendment 241, in clause 67, page 53, line 8, leave out subsections (4)(a) and (b) and insert—
“(a) is an officer appointed by the Investigatory Powers Commissioner;
(b) works subject to the supervision of the Investigatory Powers Commissioner; and is responsible for advising—
(i) officers of the relevant public authorities about applying for authorisations; or
(ii) designated senior officers of public authorities about granting authorisations.”
The amendment provides for the SPoC scheme to be operated under the authority of the Investigatory Powers Commissioner.
The clause deals with the use of a single point of contact. The purpose of the amendment is to provide for the single point of contact scheme to be operated under the authority of the Investigatory Powers Commissioner. The Bill, as it currently stands, provides that authorisations shall be largely self-approved by officials and officers of public bodies, subject to the advice of a single point of contact. The single point of contact is within the organisation and is responsible for advising on the lawfulness of the authorisation. Local authorities, police forces and public bodies that are too small to have their own single point of contact are required by the Bill to enter into collaboration agreements with others and if the amendment is successful, it will necessitate leaving out clauses 69 to 71.
The Scottish National party’s preferred model would be judicial authorisation for access to communications data, as addressed in the amendments to clause 53 that we discussed in Committee last week—I have no doubt that they will be revisited on Report. But if we are to be stuck with the current model, we in the SNP think it only fair and right that the Bill should provide for the single point of contact scheme to be operated under the authority of the Investigatory Powers Commissioner. In my submission, that would give the sort of oversight that we were promised in advance of the Bill but that is absent from the Bill itself.
It is my argument that it is completely unacceptable for a public authority to be able to authorise itself to have access to revealing personal data. In making this argument, I do not seek to impugn the integrity of public officials or, indeed, senior employees of our law enforcement agencies, but rather to point out the glaring reality that the primary concern of such persons will relate to the operational capacity of their agencies. That is simply a matter of organisational culture: it is perfectly understandable, but it militates in favour of independent third-party authorisation. If we are to have an Investigatory Powers Commissioner, why not give him or her that power, so that there will be meaningful oversight?
In my argument, the value and credibility of any single point of contact model would be enhanced by ensuring its independence from the public authority that seeks to use the intrusive powers given under this part of the Bill. That would also remove the need for collaboration agreements, because the single point of contact advisers would be centralised within the IPC framework. It would lift a great deal of bureaucracy out of the public organisations and law enforcement agencies by putting oversight in the hands of the Investigatory Powers Commissioner, who would then be able to encourage, across the board, a standardised approach to the advice given and, importantly, consistency in the application of the law.
The provisions currently in the Bill consolidate existing practice on the guidance issue for single points of contact and the self-authorisation regime, but the Joint Committee on the draft Communications Data Bill recommended consolidation under the leadership of police forces. However, I would argue that, while the single points of contact remain embedded within the same organisations that seek to access this intrusive material, they cannot be considered to be independent for the purposes of the role they play in the authorisation process. If they are not independent, we risk passing legislation that conflicts with European law, which, for the time being at least, applies in the United Kingdom.
The amendment would mean that the single point of contact framework, if continued, would operate as part of an overriding single oversight body, under the auspices of the Investigatory Powers Commissioner. As I said, that would create a single consistent body of staff, capable of providing help, assistance and guidance before the final determination of any application. To my mind, that is a highly sensible and appropriate approach; I would like to know why the Government are not prepared to support it.
I am grateful to the hon. and learned Lady for her amendment and her observations, because they give me an opportunity to remind the Committee how important the single point of contact system is, and how envied it is by other parts of the world. Those are not just my words; paragraph 9.93 of David Anderson’s important report, “A Question of Trust” states:
“As to the authorisation of communications data requests, the police took a good deal of pride in the SPoC system, which was said to be ‘the envy of many friendly countries’.”
Mr Anderson makes a particularly important observation in paragraph 9.94, when he states:
“Within law enforcement generally, it was felt that SPoCs should have strong relationships with the investigators and this was more likely to happen where they were part of the same organisation, working to the same goal (albeit with distinct and independent responsibilities).”
I will finish the paragraph:
“Their effectiveness as a ‘guardian and gatekeeper’ could however diminish were they to become simply part of the investigation team”.
Here the hon. and learned Lady’s point is a strong one, but it has to be observed in the right context, which is that of the investigation. I absolutely agree with her about the importance of having an arm’s length approach, which is why the designated senior officer who is allowed to authorise an application must not be part of that operation. The draft code of practice contains helpful guidance from paragraph 4.28 to paragraph 4.47, and paragraph 4.48 then deals with the question of the designation of a single responsible officer.
Therefore, in the light of all the careful consideration that has been given to this tried and tested system, I argue that the balance is being properly struck here. Indeed, the extensive benefit and the safeguarding mechanism which the SPOC role brings to this process has been recognised by the Interception of Communications Commissioner, who in his report of March 2015 described the SPOC role as “a stringent safeguard”. These are people who are specially trained in the acquisition of communications data.
I reiterate that this point was made very clearly by Michael Atkinson of the National Police Council’s Data Communications Group. He described the role of the SPOC as being “independent of the investigation” and subject to IOCCO inspections. They would also be regularly overseen, scrutinised and challenged on their work. So there is a very robust system of oversight and review, is there not?
My hon. Friend is absolutely right. It is that oversight which I argue establishes the essential checks and balances here, to prevent the sort of abuse about which all of us on the Committee would, rightly, be worried. These are sensitive matters.
At the Scottish Bar we often use the phrase “nemo iudex in sua causa”, which means “no man should be a judge in his own cause”. I am sure that that is used at the English Bar as well. Will the Solicitor General tell me how he is able to elide this principle, as the SPOC comes from the same organisation as the initial authoriser?
I thought I had made it clear to the hon. and learned Lady that the key word here is investigation. Those officers who are responsible for the course of the investigation are not the SPOC. That person is independent and they are at arm’s length. They are therefore able to exercise the objectivity and the sense of self-discipline that is essential if public authorities are to retain our confidence. It is all underpinned by the scrutiny of the IOCCO. In my submission, to move away from a tried and tested system that is internationally recognised would be, with regret, a mistake.
With respect to the hon. and learned Lady, I do not see how the process would be enhanced if it were to be done in the way that the amendment suggests. We already have oversight, as I have indicated. In fact, my concern is that the expertise within public authorities of how best to facilitate these sort of requests could be diminished, and there could be a detrimental impact on the relationships with both the service providers and the investigators. My worry is therefore that the understandable aims behind this amendment could be frustrated in a way that is perhaps not being properly foreseen.
On a connected point, the evidence from Jo Cavan at IOCCO has expressed concern about the inclusion of subsection (3)(b), “the interests of national security”. I would like to probe this. It has been suggested that the justification for deeming the interests of national security to be almost an exceptional circumstance is unclear. What is the justification?
In a nutshell, we are talking here about rare and exceptional circumstances where it might not be possible to consult an SPOC. Where we are talking about national security, I would envisage a risk to the nation that all of us would understand if we saw it—rather like an elephant in a room. As I have said, though, it is couched with particular regard to the governing part of that clause, which is exceptional circumstances. Therefore the hon. Lady can be reassured that this is not some sort of back door by which this power would be misused. For all the reasons I have advanced, I urge the hon. Lady to withdraw the amendment.
I am not prepared to withdraw the amendment.
Question put, That the amendment be made.
I beg to move amendment 138, in clause 67, page 53, line 26, at end insert—
‘( ) the public interest in the protection of privacy and the integrity of personal data; and
( ) the public interest in the integrity of communications systems and computer networks.”
With this it will be convenient to discuss amendment 140, in clause 67, page 53, line 38, at end insert—
‘( ) the public interest in the protection of privacy and the integrity of personal data; and
( ) the public interest in the integrity of communications systems and computer networks.”
The two amendments can essentially be read together: they bite on clause 67(5) and (6) respectively. The purpose of this clause, as I understand it, is to provide a mandatory consultation exercise for designated senior officers, with a single point of contact. That will be particularly important where the designated senior officer has little if any experience of authorising and will therefore be particular important in some of the smaller relevant public authorities, which may not exercise this power on a regular basis, although I realise it is mandatory in all cases. The point of amendments 138 and 140 is to put in the Bill a requirement that, in the course of that consultation exercise, the single point of contact advises not only on issues such as appropriate methods, costs, resource implications, unintended consequences and so on, but, as set out in amendment 138, on
“the public interest in the protection of privacy and the integrity of personal data; and…the public interest in the integrity of communications systems and computer networks.”
Such an amendment is necessary because there is a lack of an overarching privacy provision that can be read into each of these clauses. When a designated senior officer is being advised, it would be prudent and sensible for them to be advised not only about costs and resources, but about privacy and integrity, which are critical to the operation of the Bill.
The amendments are jointly supported by Labour and the Scottish National party.
Throughout this part of the Bill, public authorities and other decision makers are placed under a duty to consider a range of factors connected to the decision to access retained communications data. Those factors include cost and other resource implications and
“any issues as to the lawfulness of the proposed authorisation.”
These amendments include a specific duty to consider the public interest and the protection of individual privacy—that is, the protection of the privacy of our constituents; and the security of communications systems and computer networks—that is, the security of our constituents’ private data. Both David Anderson, in his independent review, and the Intelligence and Security Committee, in its report on the draft Bill, emphasise the importance of privacy principles and the need to make clear the legality of the use of surveillance powers in this new legislation.
Although we are focusing on a specific amendment to increase safeguards for individual privacy and security of data, we are concerned that throughout the Bill there appear to be statutory duties on public agencies, officials and agents and on judicial commissioners, to consider factors relevant to national security and the prevention and detection of crime, and the effectiveness of powers and resources expended, but there is no specific treatment of privacy standards and the public interest.
While the clauses that these amendments are attached to refer to
“any issues as to the lawfulness”
of the powers, the vagueness of this instruction is, in my submission, very contradictory. Surely it must be the first consideration of any individual considering the exercise of powers under the Bill that they should be legal. Legality should be a first consideration; treating it as just one at the end of a list of other factors to be considered seems entirely inappropriate. In this regard, it would be of huge assistance if the Minister could give us a fuller explanation of why statutory duties in the Bill have been approached in this way, with legality as a final duty; of the objectives of including the factors as provided in the manner in which they are drafted; and of why the protection of privacy and the public interest in the integrity of communications systems and computer networks will not be mentioned unless this amendment is made.
The hon. and learned Member for Holborn and St Pancras is right about the purpose of the clause, and I understand the reason for the amendments. The single point of contact may advise the applicant and designated senior officer of the cost and resource implications for the public authority, and the communications service provider of any unintended consequences of the proposed authorisation and any issues surrounding the lawfulness of the proposed authorisation—one of the points that the hon. and learned Member for Edinburgh South West raised.
The points about cost and lawfulness that the hon. and learned Lady raised are certainly part of the advice that the applicant should receive, as well as the appropriate methods to obtain the data they are seeking, while the designated senior officer will be advised on the practicality of obtaining the data sought. Bear in mind that the single point of contact can already advise on the lawfulness of proposed authorisations. For authorisation to be lawful, it has to be both necessary for one of the statutory purposes in the Bill, and proportionate in all circumstances.
The point the hon. and learned Lady made about privacy is a reprise of the debate we had at the very beginning of our consideration, when I argued—I thought pretty convincingly, but clearly not—that privacy is woven through the Bill. For the sake of emphasis, I say again that the protection of privacy and personal data must be a key consideration in gauging proportionality.
I hear what the Minister is saying. As I understand it, he is saying that the issues highlighted by the amendments will be taken into account, so why not say so? What is the detriment in saying so and making it crystal clear? This is for the comfort of the many constituents and members of the public who are concerned about the privacy and integrity of their data, so why not say so in the Bill? What possible detriment could there be in following that course of action?
Let me rehearse the argument that I used originally, because despite what I described as its persuasiveness, it clearly was not sufficiently well articulated to convert the hon. and learned Lady to the cause of virtue. Let me rearticulate it: if privacy is separated out in the way that some argue we should have done and might do now, and it is identified in the desiccated way that those people suggest, its significance is curiously—one might even go so far as to say paradoxically—weakened as a defining characteristic of the purposes of the legislation. However, it is worth emphasising the point I made a few moments ago about the need to tie personal interests and the protection of private data in to the test of proportionality in the draft codes of practice.
I draw attention to the codes of practice at paragraph 3.18—the heading is “Further guidance on necessity and proportionality”—which says:
“An examination of the proportionality of the application should particularly include a consideration of the rights (particularly to privacy and, in relevant cases, freedom of expression) of the individual and a balancing of these rights against the benefit to the investigation.”
That could not be plainer in doing precisely what I have described, which is to look at the right to privacy—I do not like to use the word “right”; I prefer to use “entitlement”—the entitlement to privacy with the functioning nature of an investigation into the effectiveness of the process.
As I understand it, the Minister is saying that privacy is so important and so woven into the Bill that to single it out would weaken its importance. Surely lawfulness is equally important and that has been singled out by the draftsmen in subsection (6)(d).
I have already argued that lawfulness is, again, an underpinning requirement in these terms. Just to be absolutely categorical, the designated senior officer is the one who makes the final assessment of necessity and proportionality, as required by the code of practice. They must have a working knowledge of legislation, specifically that which relates to necessity and proportionality and the entitlements of individuals in those terms.
I just think that the combination of the Bill and the codes of practice render the amendment unnecessary. I emphasised previously that the codes of practice are drafts and the final code of practice will reflect some of this Committee’s considerations. If I may turn my attention momentarily from the hon. and learned Lady, if the hon. and learned Member for Holborn and St Pancras feels that the code should be strengthened in that regard—I re-emphasise that I think they are pretty clear—I would of course be prepared to hear his argument. [Interruption.] Before I move on to the amendment about system integrity, I can see that he is champing at the bit, or maybe I am misinterpreting him.
I was going to cover this in my reply, but the argument the Minister is now putting is unpersuasive, and I am afraid I found it unpersuasive a week ago. In practical reality, when a senior designated officer gets to lawfulness, they will be thinking necessity and proportionality, and they are likely to be advised about that. That is the test for restricting privacy. What we do not see is the statement of privacy, either in this subsection or an overarching clause—I have been trying to articulate what is nagging away as to why the overarching clause is needed. In the end, real people, in real time, will find that lawfulness will mean going back to check necessity and proportionality. That is welcome and right, but they are not the definition of privacy; they are the permitted restrictions of it.
That is a fair argument and that is why it is necessary to supplement what the hon. and learned Gentleman describes with the code of practice in the way that I have described. My invitation to him was that if he accepts that, he might want to focus attention on the code of practice to see whether it is as good as it might be. I drew attention to the provision on the necessity and proportionality. It might be that the draft could be further improved. After all, nothing, at least on earth, is perfect, and certainly no Government would want to claim perfection—
Is it not impossible that privacy will not be considered as part of any application? Proportionality runs through the authorisation regime, and if a single point of contact has to apply a proportionality test, by definition and necessity, he will incorporate a wide-ranging consideration of the impact on privacy.
Yes, I agree. That is an elegant re-articulation of the point that I was imperfectly making about the intrinsic relationship between a consideration of personal interest and the test of proportionality. For the exercise of the power to be proportionate, it must take proper account of the balance that I described between personal interest and investigative effectiveness.
This is a relatively minor point, but it goes to the wider question of the overarching clause.
We have to look at this issue practically, through the eyes of the people who will operate such authorisations. I know how it will work: they will be directed to look at the necessity against clause 53(7) and they will go through a list. They will then be asked to look at the proportionality against the matters set out in clause 53. That does not point them to privacy. In the vast majority of cases—in good faith, I am sure—they will go through that clause, rather like a checklist. I do not mean to demean or undermine the exercise that they will go through, but I have seen the operation of such tests many times. Those people will ask themselves, “Is it in the interests of X, Y and Z? Is it proportionate to that?” I accept the point about the code of practice, but they will not necessarily ask themselves about privacy. That point is probably more about the overarching clause than about the specific amendment, but that is our nagging concern. One has to see this issue through the eyes of how in practice the process will work on the ground in real time.
The hon. and learned Gentleman describes the concerns and says that he knows them. Of course, he will also know that it is part of the requirements that those people undertake the right training and that they are expected to have competence, in particular an understanding of all the necessary legislation, including rights legislation. It is important to understand that those people will be making an assessment based on both evidence and comprehension. I re-emphasise that the code of practice is vital. I am trying to tip him off—perhaps I am being too subtle—that he may want to press me further on those very matters in terms of the draft code of practice, which is pretty good, but such drafts can always be improved.
Let me be even more generous. I am an Hegelian, as the hon. and learned Gentleman knows, and I believe that the truth lies in the whole, as Hegel said. The emphasis on privacy that underpins the whole Bill is fundamentally important, but in this regard I take his point that those missioned to do this job need to be very clear about that balance. To be still more generous, he is right in his strong implication that the training and guidance that those people receive about the interpretation of proportionality in this regard is important. That is the purpose of the code of practice, but we might want to go still further and I am happy to be tested further on that during the course of our consideration. I want to move on to the next group of amendments, because otherwise we will do this to death, but have I signalled clearly my direction of travel?
I am grateful to the Minister. I raised this issue of how we go through this exercise with the codes of practice, to which we cannot table amendments, a week ago today. I take his comments as an invitation to draft or suggest tightening amendments—not necessarily in Committee, but outside it—where we think they are appropriate. I take it that those will be taken into consideration in any possible re-drafting of the code. I am grateful for that and we will engage with that exercise.
I would like to think I was a young blood with an old head. That is how I would see it; let us leave it there and move on.
Let me turn to systems integrity. It is important to set out the process for obtaining communications data. A public authority must require a communications provider to disclose communication data or it may engage in activity to acquire the data directly from a telecommunications system. Where data are sought from a provider, they will mostly be data that the provider has for business purposes or data retained under a retention notice. To the extent that a provider has put in place any dedicated system to provide for the acquisition of communications data, that capability and the necessary security assurances will be provided for under a data retention notice or technical capability notice.
In relation to obtaining data directly from a telecommunications system, the communications data code of practice makes it clear that communications data authorisation cannot permit the undertaking of any technique that involves interference with those systems themselves. That is quite important because, as various Committee members will know, that is an important assurance for providers. Such techniques could be authorised only under an equipment interference warrant. We will discuss those matters in the next part of the Bill.
The processes of requiring a provider to disclose data or the obtaining of data directly from a network will not have any impact on the integrity of telecommunications systems or the computer networks concerned. Accordingly, this is not an area on which the applicant or designated person will require advice. In essence, with that absolute firm assurance, the amendment is unnecessary and I invite the hon. and learned Member for Holborn and St Pancras to withdraw it.
The more I have listened to the debate on the amendment, the more convinced I have become that there is a need for an overarching privacy clause, to which I will turn our attention at a later stage. It follows from that that I will focus my energies elsewhere, and therefore I beg to ask leave to withdraw the amendment.
I hear what the Opposition spokesman says in this regard, and I have much sympathy with it. However, I wish to press the amendment, for the simple reason that if privacy and integrity are as important as the Minister acknowledges, why not have them in the Bill? That would cause no possible detriment; it can only do good. Therefore, I wish to press the amendment to a vote.
Question put, That the amendment be made:—
I beg to move amendment 141, in clause 68, page 54, leave out lines 3 to 13 and insert—
“( ) An application for an order shall be made on notice to the journalist or journalists affected unless the Judicial Commissioner determines that an application without such notice is required in order to avoid prejudice to the investigation.
( ) Paragraphs 7 – 9 of Schedule 1 to the Police and Criminal Evidence Act 1984 shall apply in relation to the service of a notice of application for an order under subsection (1) as if the application were for an order under Schedule 1 Police and Criminal Evidence Act 1984.
( ) Criminal Procedure Rules may make provision about proceedings under this section where the Judicial Commissioner determines that an application without such notice is required.
( ) A Judicial Commissioner may only make an order if the person making the application has convincingly established that—
(a) the order is directed to one or more of the legitimate aims specified in Article 10.2 of the Convention, and
(b) there is an overriding public interest necessitating the order, and
(c) reasonable alternative measures to the order do not exist or have been exhausted, and
(d) the order is proportionate to the legitimate aim or aims being pursued.
( ) The costs of any application and of anything done or to be done in pursuance of an order made under it shall be in the discretion of the Judicial Commissioner”.
How journalistic material and in particular journalists’ sources are to be protected under part 3 of the Bill is a substantive issue of real importance in a modern democracy.
“Issues surrounding the infringement of the right to freedom of expression may arise where an application is made for the communications data of a journalist. There is a strong public interest in protecting a free press and freedom of expression in a democratic society, including the willingness of sources to provide information to journalists anonymously.”
Those strong statements of principle that underpin our democracy are agreed across this House. I say that with confidence not only because of the strong public interest, but because they are written into the code of practice at paragraph 6.5. That suggests they are shared and important democratic principles. I argue that that expression of principle is not translated into reality in the provisions of the clause or through the Bill, and the clause is of considerable concern.
Let me give the background, as there is a chequered history. It is now clear that, in the case of Tom Newton Dunn, the police used the Regulation of Investigatory Powers Act 2000 to access his phone records in secret in 2014. They did not notify him that they had accessed his material or sources; the Metropolitan police obtained the phone records without notification or consent. In other RIPA cases, no journalists were informed in advance. The Interception of Communications Commissioner highlighted in a report in February 2015 that 19 police forces had accessed the communications data of 82 journalists using RIPA in that way. The point of real importance is that there is no fundamental difference between the authorities asking for a journalist’s physical contact book and footage or for their telephone and communications records; the effect on journalists and sources is exactly the same and the same legal safeguards must apply to both.
The safeguards in the Police and Criminal Evidence Act 1984 set a higher standard than those in the Bill as it stands. Under PACE, journalists are notified when the authorities want to access their material and sources, and they have the ability to defend their sources. Neither RIPA nor the Bill apply the same protections and safeguards. The RIPA interim codes of practice, published in March 2015, stated that the authorities must use the PACE procedures to apply to the court for a production order to obtain data. The Bill fails to meet that test.
I am trying to think how this will work in practice. Under the usual rules for a non-notice application, to show that it will be without notice it would be necessary to highlight a number of factors of history as to why it should be without notice rather than on notice—for example, fraud or historical events. In this case, what would the circumstance be that would make it without notice rather than on notice? There would be a significant risk that any journalist would take action. What evidence could be put to the judicial commissioner to persuade them that this should be a without-notice application? There would be no history on the journalist himself.
I am grateful to the hon. and learned Lady for that intervention. As she will know, there is a 20 to 25-year history of the evolution of protections for journalists, from the point when they were not put on notice to the point when they are now routinely put on notice. There are exceptions that have been tested in the Court of Appeal, but journalists are pretty well always put on notice and on many occasions will go and argue their corner to protect their source. Over the years, the case law has determined what the proper test is; on some occasions it has protected the source and on others it has allowed access. Under the PACE regime, there is now a clearly established way to proceed in cases in which journalists’ sources are an issue. It is well understood and it works well. It is significant that none of the law enforcement bodies to my knowledge are complaining that the on-notice PACE procedure for obtaining material that relates to journalists’ sources is not working in practice. Having battled it out over 25 years, pretty well all the sides accept that the current arrangement represents and protects their interests.
The amendment would essentially apply the same regime to communications data where communications data has been retained and is now being accessed. In the modern world, as journalists have made absolutely clear, to say that authorities have to go via PACE when they want to get a physical address book with a source in it but not when they want the virtual version through comms data is to cut right through the protection that has been so carefully crafted over the last 20 to 25 years. That does not protect journalists’ sources and is a cause of real concern.
Amendment 141 reflects current practice by providing for exceptional circumstances in which applications do not have to be on notice, whereas the Bill simply does not offer journalists any meaningful protection whatever. It is a carefully thought through, constructive amendment, intended to give journalists the protection they need without thwarting an investigation that needs to be protected. The test in paragraph (b) of the fourth subsection of the amendment puts the code of practice into the Bill. There is then a provision on costs.
The amendment is simple: it preserves PACE protections and extends them to communications data. It sets out the right test for the designated senior official and the judicial commissioner to apply. Nobody can quarrel with the test, because it is taken from the code of practice itself. It is all very well having warm words in the code of practice and warm words, which we have heard many times, about the protection of journalists’ sources, but unless they are translated into something that has real bite and effect, they remain warm words. I do not say that to underplay what the Solicitor General will say. I know that he believes in the underpinning principles I have outlined, but history shows that unless protection for journalists is written into legislation in a meaningful and effective way, it will not apply in practice as it should.
I thank the hon. and learned Gentleman for clearly outlining the kernel of his concern about the way the clause is drafted. Although in the drafting of the clause we have tried, quite properly, to address what is a sensitive occupation—I hesitate to use the word “profession” because some journalists do not like to be described in that way—we are in danger of moving the focus away from the public interest that journalists serve, which is freedom of expression in a democratic society without fear of intrusion by the authorities and in a way in which sources, and the journalists themselves, can be protected. We have to draw a very important distinction. It is tempting to try to draft amendments dealing with journalists in an ad hominem, or group, way. However, we are not talking about that; we are talking about the source material. Therefore, in a nutshell, I am afraid that the amendment does not really deal with the essential public interest, and that is why I commend the Government’s approach to the Committee.
I will say to the hon. and learned Gentleman, by way of reassurance, that if we can do better in the code of practice, we will. I am certainly open to active consideration of the ways in which we can improve the drafting to make the principles of freedom of expression, and the points that he and I agree on, even clearer to those applying these rules.
The Solicitor General is resisting this sensible and constructive amendment, which reflects the PACE approach, on the basis that one should not get too specific and one needs to understand the underlying public interest. He must accept that the points he makes apply equally to the PACE test. It does not matter whether someone is physically seizing a document that reveals a source or seizing something that serves virtually the same purpose. He must accept that the test is working well in practice and that all sides are pretty content with the way it works at the moment.
I am grateful to the hon. and learned Gentleman, but, tempting though it is to draw that comparison, I think that he is mistaken. The PACE code of practice focuses on the person who, as it appears to the judge, is in possession of the material. That is not always the journalist; for example, a journalist’s material in regards to comms data will be held by the communication service providers and not by the journalist. Under PACE, journalists are not notified in such cases.
I will not give way at this stage because I want to explain the position. I have given way repeatedly and I want the chance to make my argument. I am sorry if people think, for some reason, that I am not listening or being reasonable. I need to explain the case because I do not think that it has been fully understood.
The hon. and learned Gentleman is right to talk about the position under PACE whereby journalists are asked to surrender data, such as in notebooks; however, under RIPA and the PACE procedures, applications are already being made to others in possession of material, journalists are not notified and the principles are very clear. I do not think it is right of him to draw such an easy comparison and to say, “It is working for PACE, therefore it should be read across the provisions of the Bill.” That is comparing apples with pears—with respect to him.
I have obviously looked carefully at what the Government said in the past on this issue and what was said in response to the pre-legislative Committees. The point has been made that, on the one hand, it is seizing from the journalist themselves and on the other hand, it is seizing from the person who holds the data; that is a material difference and we cannot compare the two schemes. I wonder whether that withstands proper scrutiny. The whole point is to give a source confidence that they can come forward and tell a journalist something and they will be protected. Otherwise, all the case law recites the fact that sources will not come forward and wrongdoing will not be exposed, which is unhealthy for democracy.
The argument that, if you seize my name in physical form from a journalist, it is to be protected, but if my name is being held by a data holder it can be given up and does not require protection, defies common sense. For the source, the question is: what is the protection for me if I come forward and try to expose someone? The argument that you are fine if it is written in a notebook and held by the journalist, but you are not protected if it finds its way into a bit of data held by someone else does not hold up.
Yes, but with respect, the hon. and learned Gentleman is ignoring the function of this clause, which is that where you do have that list, we have a special procedure. The problem with that argument is that there is a sensitive issue here. Where someone—whether they are a journalist or not—is the subject of a legitimate investigation, that could undermine such an investigation. Getting the balance right is therefore very important—[Interruption.] I want to finish this point. That is why, both in the Bill and this clause, special procedures apply where the sort of mischief about a source being compromised is indeed a live issue.
In amendment 141, which the Solicitor General is resisting, we have deliberately and intentionally accommodated the test that notice need not be given where it is necessary
“in order to avoid prejudice to the investigation.”
He has given a powerful example, but we have catered for that by saying that notice does not need to be given in that instance. The norm is that notice is given in the usual way, but the exception is where there is prejudice to the investigation. That absolutely meets his concerns; but it does meet my point that notice should otherwise be given.
I am glad we both note that we are trying to get to the same objective. I have already said to the hon. and learned Gentleman that the combination of legislation and the code of practice will be the way in which this framework is set out. I have indicated that if we can do better on the code of practice, we will; we will work with him on that. I also reiterate the amount of care that my right hon. Friend the Minister for Security and I are taking on this particular issue. We have met with leading representatives from journalism on three occasions to discuss the Bill. We have written to the National Union of Journalists and the News Media Association about the concerns they have raised. This is part of a dialogue that is very much ongoing about the protections afforded by the Bill to journalistic material. They rightly say to us that it is not about them but about the interests that they serve. I cannot reiterate enough that we must focus on that issue when drafting the legislation.
May I deal with other Members who have considered the issue? The Interception of Communications Commissioner carefully considered it last year. He made it clear in his recommendation that, where communications data are sought that do not relate to investigation to determine the source of journalistic information, then judicial authorisation is not necessary. I know that the hon. and learned Gentleman is trying in effect to replicate that carve-out. On the proposed restrictions on the circumstances in which a communications commissioner may approve the obtaining of communications data that are journalistic in nature, where the request is for one of the legitimate aims in article 10.2 of the convention, there is an overriding public interest necessitating the order and the order is proportionate to the legitimate aim or aims being pursued, we already have the concepts of necessity and proportionality under part 3 as spelt out in the draft code of practice—as indeed they are in the code of practice for existing legislation. We already have a tightly constrained framework here, which offers a high degree of reassurance to all of us who care passionately about these issues, as I do. The Investigatory Powers Tribunal has been clear in recent authority, such as the case of News Group Newspapers Ltd and others v. Metropolitan Police Commissioner in December last year, that the 2015 code of practice drafted under the current provisions and replicated in the regime in the Bill meets the standards on freedom of expression set out in article 10.
On the proposed requirement for a judicial commissioner to ensure that all reasonable alternative measures to such an authorisation have been exhausted, I am afraid that in my view, there are problems with its practicability. There are many reasons why a particular approach to an investigation might be selected and the use of a particular power might be called for. Judicial commissioners, with respect to them, are not the experts in this consideration and should not be expected to be. It is for those with expertise in the range of investigative options available in the particular circumstances of the case to decide that. Then, of course, the tests can be applied.
I do not want to take technical points. With regard to the technicalities of the amendment, there are some drafting issues that would need to be worked on, but I accept that it is really about principle and the approach to be taken. At this stage, although I disagree with the means by which the hon. and learned Gentleman seeks to make the change, continuing dialogue on the issue is meaningful. For those reasons and in that context, I respectfully ask him to withdraw the amendment.
I have listened carefully to the Solicitor General. In the end, it boils down to a matter of principle. I think that he accepts what amendment 141 says in proposed new subsections (a), (b), (c) and (d). He criticises (c), but I will not spend time on that. The most important thing is to establish that the order is directed to one or more of the legitimate aims in article 10.2 and that an overriding public interest makes it necessary. He says that that is the framework within which the decisions should be taken, so there is no disagreement between them.
The difference, then, appears to be simply that I say it should be on the face of the statute and clear to all, and he says, “No, it can be in a code without express reference in statute.” There is a problem in principle with that. Protection of journalists’ sources should be on the face of the Bill. That is important in a modern democracy. For the Bill to be silent about the test, and for only the code of practice to apply it, is wrong in principle.
Secondly, I am afraid that there is a test spelled out in the Bill, and it is inconsistent with that test. The test for the judicial commissioner in the Bill is simply to check that there were reasonable grounds for considering something, but that the other requirements in the provisions were complied with. As a matter of statutory construction, the judicial commissioner is bound to apply the test in the Bill and cannot apply any other test, so it is wrong in principle not to put it in the Bill. It is also problematic, because there is a test in the Bill and it is not a special test. Ultimately, it says that the judicial commissioner must ensure that the other provisions of the Act are complied with. We would expect that; it is hardly an enhanced test by anybody’s standards.
In those circumstances, I am afraid that the Solicitor General’s arguments are wholly unpersuasive. I will withdraw the amendment, partly because I think that there is room for improvement, on which I will certainly work with the Government. To be absolutely clear, partly because I want to reserve my position to propose the amendment at a later stage, as it is of such importance to the Bill, I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 142, in clause 68, page 54, line 5, leave out from “data” to “and” on line 7 and insert “further to this Part”.
With this it will be convenient to discuss the following:
Amendment 143, in clause 68, page 54, line 18, leave out “considers” and insert “determines”.
Amendment 144, in clause 68, page 54, line 19, leave out subsections (5) (a) and (b) and insert—
‘( ) that the conduct permitted by the authorisation is necessary for one or more of the purposes in section 53(7); and
( ) that the conduct permitted by the authorisation is proportionate to what is sought to be achieved by that conduct.”
Amendment 145, in clause 68, page 54, line 29, leave out subsection (7) and insert—
‘( ) The Investigatory Powers Commissioner may for the purposes of approving authorisations under this Section appoint Deputy Judicial Commissioners.
( ) A “Deputy Judicial Commissioner” must be—
(a) in relation to England and Wales, a justice of the peace,
(b) in relation to Scotland, a sheriff, and
(c) in relation to Northern Ireland, a district judge (magistrates’ courts) in Northern Ireland.
( ) An authorisation under this Section may not grant authorisation in relation to the obtaining by a relevant public authority of communications data—
(a) insofar as the communication consists of matters subject to legal privilege; or
(b) related communications data, insofar as the data relate to the communication of matters subject to legal privilege.
( ) For the purposes of subsection (1), legal privilege means—
(a) communications between a professional legal adviser and his client or any person representing his client made in connection with the giving of legal advice to the client;
(b) communications between a professional legal adviser and his client or any person representing his client and any other person with or in contemplation of legal proceedings or for the purposes of such proceedings;
(c) items enclosed with or referred to in such communications and made—
(i) In connection with the giving of legal advice or
(ii) In connection with the contemplation of legal proceedings or for the purposes of such proceedings.
(d) communications made with the intention of furthering a criminal purpose are not subject to legal privilege.
( ) An application which contains a statement that the purpose of a warrant is to access communications data in connection with communications made for the purpose of furthering a criminal purpose, but which would otherwise attract legal privilege must be considered by a Judicial Commissioner.
( ) A Judicial Commissioner may issue an authorisation sought under subsection (3), if satisfied that—
(a) there are reasonable grounds to believe that the communications data relates to communications made with the intent of furthering a criminal purpose;
(b) that the data is likely to be of substantial value to the investigation in connection with which the application is made; and
(c) that the data concerned is likely to be relevant evidence;
(d) other proportionate methods of obtaining the data have been tried without success or were not tried because they were bound to fail;
(e) it is in the public interest that the authorisation is granted, having regard to—
(i) the benefit likely to accrue to the investigation and prosecution if the data is accessed,
(ii) the importance of the prosecution and
(iii) the importance of maintaining public confidence in the confidentiality of material subject to legal professional privilege,
( ) A code of practice issued under Schedule 6 must contain provision about—
(a) the steps to be taken to minimise the risk of conduct undertaken pursuant to a warrant to which this section applies resulting in accidental acquisition of a communication, or communications data, falling within subsection (1);
(b) the steps to be taken if it appears that such conduct has accidentally resulted in acquisition of such a communication or data.
( ) Where an authorisation issued under this Part would seek to authorise any activity which may involve access to special procedure material, the following subclauses apply.
( ) Special procedure material subject to subsection (1) will include—
(a) journalistic material other than material which a person holds in confidence and
(b) communications sent by, or intended for, a member of the relevant legislature.
( ) The special procedure authorisation may only be granted on application to a Judicial Commissioner.
( ) The Judicial Commissioner must be satisfied that there are reasonable grounds to believe that—
(a) a criminal offence has been committed,
(b) the material is likely to be of substantial value to the investigation of that offence,
(c) other proportionate methods of obtaining the information have been tried without success or were not tried because they were bound to fail and
(d) it is in the public interest that the warrant is granted, having regard to—
(i) the benefit likely to accrue to the investigation and prosecution if the information is accessed,
(ii) the importance of the prosecution,
(iii) the importance of maintaining public confidence in the integrity of journalists’ work product, and/or communications with members of relevant legislatures and
(iv) the public interest in the freedom of expression enjoyed by journalists and the members of the relevant legislatures, including as protected by Article 10 ECHR.
( ) Where data could reasonably be obtained by means of a search and seizure order pursuant to the Police and Criminal Evidence Act 1984, a warrant under this Part will not be in the public interest.
( ) An application for an authorisation concerning journalistic material held in confidence or information for the purpose of identifying or confirming a source of journalistic information, may only be considered by the Investigatory Powers Commissioner, who must be satisfied that there are reasonable grounds to believe—
(a) a criminal offence has been committed,
(b) the communications data is likely to be of substantial value to the investigation of that offence,
(c) other proportionate methods of obtaining the information have been tried without success or were not tried because they were bound to fail and
(d) it is in the public interest that the authorisation is granted, having regard to—
(i) the benefit likely to accrue to the investigation and prosecution if the information is accessed;
(ii) the importance of the prosecution;
(iii) the importance of maintaining public confidence in the integrity of journalists’ work product and
(iv) the public interest in the freedom of expression enjoyed by journalists and the members of the relevant legislatures, including as protected by Article 10 ECHR.
( ) In considering an authorisation concerning journalistic material held in confidence, the Investigatory Powers Commissioner must give notice to the journalist concerned, unless it would not be in the public interest to do so.
( ) If an authorisation is considered without notice, the Investigatory Powers Commissioner must appoint a Special Advocate to represent the interests of the journalist and the person to whom confidence is owed, and the wider public interest in the integrity of journalists sources and freedom of expression, including as protected by Article 10 ECHR.
( ) Journalistic material is held in confidence for the purposes of this section if—
(a) it is held subject to such an undertaking, restriction or obligation and
(b) it has been continuously held (by one or more persons) subject to such an undertaking, restriction or obligation since it was first acquired or created for the purposes of journalism.”
Amendment 242, in clause 68, page 54, line 29, leave out subsection (7) and insert—
‘( ) The Investigatory Powers Commissioner may for the purposes of approving authorisations under this Section appoint Deputy Judicial Commissioners.
( ) A “Deputy Judicial Commissioner” must be—
(a) in relation to England and Wales, a justice of the peace,
(b) in relation to Scotland, a sheriff, and
(c) in relation to Northern Ireland, a district judge (magistrates’ courts) in Northern Ireland.
( ) An authorisation under this Section may not grant authorisation in relation to the obtaining by a relevant public authority of communications data—
(a) insofar as the communication consists of matters subject to legal privilege; or
(b) related communications data, insofar as the data relate to the communication of matters subject to legal privilege.
( ) For the purposes of subsection (1), legal privilege means—
(a) communications between a professional legal adviser and his client or any person representing his client made in connection with the giving of legal advice to the client;
(b) communications between a professional legal adviser and his client or any person representing his client and any other person with or in contemplation of legal proceedings or for the purposes of such proceedings;
(c) items enclosed with or referred to in such communications and made—
(i) in connection with the giving of legal advice, or
(ii) in connection with the contemplation of legal proceedings or for the purposes of such proceedings.
(d) communications made with the intention of furthering a criminal purpose are not subject to legal privilege.
( ) An application which contains a statement that the purpose of a warrant is to access communications data in connection with communications made for the purpose of furthering a criminal purpose, but which would otherwise attract legal privilege must be considered by a Judicial Commissioner.
( ) A Judicial Commissioner may issue an authorisation sought under subsection (3), if satisfied that—
(a) there are reasonable grounds to believe that the communications data relates to communications made with the intent of furthering a criminal purpose;
(b) that the data is likely to be of substantial value to the investigation in connection with which the application is made;
(c) that the data concerned is likely to be relevant evidence;
(d) other proportionate methods of obtaining the data have been tried without success or were not tried because they were bound to fail;
(e) it is in the public interest that the authorisation is granted, having regard to the—
(i) benefit likely to accrue to the investigation and prosecution if the data is accessed;
(ii) importance of the prosecution; and
(iii) importance of maintaining public confidence in the confidentiality of material subject to legal professional privilege.
( ) A code of practice issued under Schedule 6 must contain provision about—
(a) the steps to be taken to minimise the risk of conduct undertaken pursuant to a warrant to which this section applies resulting in accidental acquisition of a communication, or communications data, falling within subsection (1);
(b) the steps to be taken if it appears that such conduct has accidentally resulted in acquisition of such a communication or data.
( ) Where an authorisation issued under this Part would seek to authorise any activity which may involve access to special procedure material, the following subclauses apply.
( ) Special procedure material subject to subsection (1) will include—
(a) journalistic material other than material which a person holds in confidence;
(b) communications sent by, or intended for, a member of the relevant legislature.
( ) The special procedure authorisation may only be granted on application to a Judicial Commissioner.
( ) The Judicial Commissioner must be satisfied that there are reasonable grounds to believe that—
(a) a criminal offence has been committed;
(b) the material is likely to be of substantial value to the investigation of that offence;
(c) other proportionate methods of obtaining the information have been tried without success or were not tried because they were bound to fail;
(d) it is in the public interest that the warrant is granted, having regard to the—
(i) benefit likely to accrue to the investigation and prosecution if the information is accessed;
(ii) importance of the prosecution;
(iii) importance of maintaining public confidence in the integrity of journalists’ work product; and
(iv) public interest in the freedom of expression enjoyed by journalists and the members of the relevant legislatures, including as protected by Article 10 ECHR.
( ) In considering an authorisation concerning journalistic material held in confidence, the Investigatory Powers Commissioner must give notice to the journalist concerned, unless it would not be in the public interest to do so.
( ) If an authorisation is considered without notice, the Investigatory Powers Commissioner must appoint a Special Advocate to represent the interests of the journalist and the person to whom confidence is owed, and the wider public interest in the integrity of journalists sources and freedom of expression, including as protected by Article 10 ECHR.
( ) Journalistic material is held in confidence for the purposes of this section if—
(a) it is held subject to such an undertaking, restriction or obligation;
(b) it has been continuously held (by one or more persons) subject to such an undertaking, restriction or obligation since it was first acquired or created for the purposes of journalism.”
This amendment proposes special procedures for communications data, subject to legal professional privilege, and for the protection of journalistic material and the communications data of politicians. It also provides for the Investigatory Powers Commissioner to appoint Deputy Judicial Commissioners to consider applications for the authorisation of access to Communications Data.
New clause 14—Authorisations in relation to items subject to legal privilege—
‘(1) Subsections (2) and (3) apply if—
(a) an application is made by or on behalf of a relevant public authority for authorisation under this Part, and
(b) the purpose, or one of the purposes, of the authorisation is to obtain communications data which contains, or might tend to reveal the content of, items presumptively subject to legal privilege.
(2) The application must contain a statement that the purpose, or one of the purposes, of the authorisation is to obtain communications data which contains, or might tend to reveal the content of, items presumptively subject to legal privilege.
(3) The person to whom the application is made may grant the authorisation only if the person considers—
(a) that compelling evidence indicates that the items in question consist of, or relate to, communications made for a criminal purpose such that it is necessary to authorise the acquisition of the communications data in question, and
(b) that the relevant public authority has made arrangements of the kind described in section 46 (safeguards relating to retention and disclosure of intercepted material), including specific arrangements for the handling, retention, use and destruction of such items.
(4) Subsections (5) and (6) apply if—
(a) an application is made by or on behalf of a relevant public authority for authorisation under this Part,
(b) the relevant public authority considers that the relevant communications data is likely to include communications data which contains, or might tend to reveal the content of, items subject to legal privilege, and
(c) subsections (2) and (3) do not apply.
(5) The application must contain—
(a) a statement that the relevant public authority considers that the relevant communications data is likely to include communications data which contains, or might tend to reveal the content of, items subject to legal privilege, and
(b) an assessment of how likely it is that the relevant communications data will include communications data which contains, or might tend to reveal the content of, such items.
(6) The person to whom the application is made may grant the authorisation only if the person considers that the relevant public authority has made arrangements of the kind described in section 46 (safeguards relating to retention and disclosure of material), including specific arrangements for the handling, retention, use and destruction of any communications data which contains, or might tend to reveal the content of, items subject to legal privilege.
(7) Subsections (1) to (6) of section 68 (commissioner approval for authorisations in relation to journalistic sources) apply to an authorisation to which this section applies as they apply to an authorisation in relation to the obtaining by a relevant public authority of communications data for the purpose mentioned in subsection (1)(a) of that section.
(8) In this section “relevant communications data” means any communications data the obtaining of which is authorised by the authorisation.”
Although there are numerous amendments, they will not take as long as the previous amendment, because to some extent they cover the same ground. Amendments 142 to 144 are intended to tighten up the test for journalistic material and apply a stricter test. Amendment 145 is an attempt comprehensively to redraft clause 68 to provide meaningful protection for journalist’s material and the protection of journalist’s sources. It is also an attempt to provide protection for other protected information, namely that which is subject to legal privilege and communications between MPs. This is a form that we have seen on previous occasions.
I invite interventions because I cannot now quite remember, but I do not think that in this part of the Bill there is a self-standing provision for MPs in relation to access to data. I will happily be intervened on if I am wrong, because then this would not apply. My concern when drafting this amendment was that, while in other parts of the Bill there is a specific provision—although we can argue about whether it is strong enough—for MPs’ correspondence in relation to accessing the communications data of MPs, there is no provision at this point in the Bill. That should be a cause of concern to everyone on the Committee, and it will certainly be a cause of concern to others.
I am grateful to the hon. and learned Gentleman for the typically clear and concise way in which he has approached these amendments to clause 68, on which I wholeheartedly support him. On the question of protection for parliamentarians, the wording that has been used is a “relevant” parliamentarian. That will cover Members of the Scottish Parliament and the devolved Assemblies as well.
I am grateful for that. On looking at it, it is clear that clause 94 applies generally across this—actually, I am not sure that it does. I am sorry to pause on this, Ms Dorries.
Perhaps I could assist the hon. and learned Gentleman. The phraseology that is used is “a member of a relevant legislature”, which is defined to include the Scottish Parliament and the devolved Assemblies.
I am grateful for that. The purpose of the amendment is really to cover all three protected areas—legal professional privilege, MPs’ correspondence and journalism—and to set out a comprehensive test for all three. It is similar to a provision that we have already looked at in relation to other parts of the Bill. I commend it as a constructive way to protect the interests that ought properly to be protected on the face of the Bill.
I will not revisit the arguments except to say that there are important differences between the regime for communications data and that which is contained within clause 94, for example, which deals with equipment interference. We will come on to that in due course. I remind the hon. and learned Gentleman that paragraph 6.4 of the code of practice contains specific reference to a number of sensitive occupations, including,
“medical doctors, lawyers, journalists, Members of Parliament, or ministers of religion”.
If there is any lack of clarity in the code as to whether this includes Members of the Scottish Parliament or indeed of other devolved institutions, I am sure that that could be cleared up, and it should be.
My point is not about the definition of parliamentarians but on the question of legal professional privilege. I think I am right in saying that the Government do not currently recognise that comms data come within the definition of legally privileged material. Does he not agree with me that a phone call from or to a lawyer could, for example, identify a potential witness in a case, and therefore comms data should come within the definition of legal professional privilege?
I do not want to go back to arguments that we have already had on this or to anticipate any future arguments. With regards to legal professional privilege, sometimes it might be difficult to establish precisely what comes within and without that category. However, we are talking not about the content of what has been said or done but about the fact of a communication having been made, so communications data will rarely, if ever, attract legal professional privilege; it is difficult to think of an example when it would.
I think the guidance that we are given in declaring our interests to the House is that, for legal work, the identity of the person advised is not to be disclosed, because that comes within legal professional privilege. In other words, the fact that somebody has sought advice and who has sought advice are protected by legal professional privilege. I have never known there to be any doubt about that. This is an area where there is a need for special protection; that ought to be in the statute. I think that is common ground. That is how I have always understood it. I am not entitled to say who instructs me without the consent of the client, certainly before the matter comes to court.
While I agree with the hon. and learned Gentleman on the principle and the absolute nature of the privilege—subject to the iniquity exemption that we all know about and those of us who practise are familiar with—I am talking about a restricted area, in which we are looking at the threads of an investigation as opposed to the actual meat of the subject.
May I just deal with this matter? As I said, I am having difficulty identifying a circumstance in which communications data—material without context or wider information—would attract that protection. In what we call the David Davis and Tom Watson case, which has been referred by the Court of Appeal to the Court of Justice of the European Union, in its judgment the court of first instance, the divisional court, said:
“No doubt such an example of privilege would rarely arise.”
I think it is important to note that, while I am not saying that it would never arise, I am having difficulty in imagining that the material itself would breach the dam, if you like, of the important safeguard of legal professional privilege.
Just in response to the hon. and learned Gentleman’s point about the identity of the person being subject to legal professional privilege: in litigation it is always known, because the solicitor is on the record as to who he acts for, and at a case management conference the barristers who are taking the matter forward will be identified.
I am grateful to my hon. and learned Friend. There might be an earlier stage, for example at a police station in a criminal investigation, when that might not be a matter that is automatically disclosed in that way.
I absolutely accept that, for litigation in open court, it is pretty clear who everybody is acting for. It is common practice in the commercial world for protection to be put around whether a client is seeking advice and from whom. That is jealously guarded by every law firm that I have ever had anything to do with, for very obvious reasons. People go to lawyers; they do not necessarily want the world at large to know that they have gone and to which lawyer they have gone. I cannot over-emphasise that, in the commercial reality of the real world, that is jealously guarded.
I am grateful to hon. Members for trying to sift their way through what appears to be something of a labyrinth at times. I do not want to overcomplicate the situation. The Government’s view is that, combined with the code of practice, we have the necessary protections in the Bill that acknowledge that the degree and nature of the interference in an individual’s rights and freedoms will of course be greater in these sort of circumstances, so considerations of the necessity and proportionality become highly germane because they draw attention to any such circumstances that might lead to an unusual degree of intrusion or infringement of rights and freedoms, in particular privacy.
The Solicitor General is very generous in taking interventions. We currently have four silks arguing about whether LPP can apply to comms data. Too many lawyers spoil the broth perhaps, but is that not an indication that a code of practice is not going to be enough to resolve this issue? It should go before a judicial commissioner, as proposed by the amendment.
The hon. and learned Lady makes her point with force. Although the concerns she has about content and the issues that we have debated and will debate in part 5 are understandable, we are talking about a different nature of material and a different regime, where considerations can be distinct from those that apply in other parts of the Bill.
I will deal as quickly as I can with the points that have been made. I would argue that we have, in effect, a particular restriction that I would regard as not striking the right balance with respect to those who need it. We have to think in the context of the operational capability of our security and intelligence services in particular.
If there is a specific requirement for the use of PACE powers in these circumstances, I am worried that the requirements of clarity, consistency and transparency that we have to abide by will be undermined. The Interception of Communications Commissioners Office was clear in its rejection of the claim that public authorities had utilised RIPA to avoid the use of PACE. In fact, under this Bill part 3 authorisations for communications data to identify or confirm a journalistic source are subject to more stringent safeguards than under PACE, because the Bill replicates those procedures but at a higher level of authorisation, with a serving or former High Court judge, as opposed to a circuit judge, making the authorisation.
Making communications data accessible to those who have a lawful need for them at the right level of authorisation is a fine balance, but it is struck most effectively in the Bill as drafted. I am sure that Opposition Members do not intend us to reach a position where communications that have been made for the intent of furthering a criminal purpose are missed or are not accessible as they would want them to be. For those reasons, I urge the hon. and learned Member for Holborn and St Pancras to withdraw the amendment.
I am afraid I simply do not follow the argument that transparency and accountability are lost if the protection that should properly be accorded to lawyers, journalists and MPs is spelled out in the Bill, with clear guidance to those who operate the authorisations on how to apply them. As I have indicated, these are matters of real concern that go to important issues in the Bill. In order to reserve my rights at a later stage, I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Clause 68 ordered to stand part of the Bill.
Clause 69
Collaboration agreements
Question put, That the clause stand part of the Bill.
(8 years, 8 months ago)
Public Bill CommitteesThis will be a long session: five hours. If anyone is worried about comfort breaks, I do not have the constitution of Mr Speaker, so I will call one at around 4 o’clock or 4.15 pm. We are then expecting a vote on a programme motion at around 6 o’clock. That will, I hope, break it up nicely.
On a point of order, Madam Chairman. I mentioned at the outset this morning that I had written to you and intended to make copies of that correspondence available to Committee members. In the course of the proceedings, I heard the Solicitor General report that I had also written to journalists. Hard copies of all that correspondence are available at the front of the room for collection by members, and I understand that it has also been sent to members by email.
Thank you very much.
Clauses 70 and 71 ordered to stand part of the Bill.
Clause 72
Lawfulness of conduct authorised by this Part
I beg to move amendment 246, in clause 72, page 57, line 35, leave out from “subsection (1)” to end of line 40.
This amendment ensures that if conduct cannot be justified it must remain unlawful.
With this it will be convenient to discuss amendment 148, in clause 72, page 57, line 36, leave out paragraph (b).
I think I can take this in fairly short compass. The clause deals with the lawfulness of conduct authorised by this part of the Bill. The amendment would delete clause 72(2)(b), the effect of which would be that conduct would have to remain unlawful if it could not be justified. As it is currently worded, the clause allows an exception to that principle, and that is not an appropriate exception. Conduct is either lawful or unlawful. If it is unlawful, it should be characterised as such and should not be justified. Strictly, if the amendment were to be passed, subsection (3) would have to be left out as well, for tidying-up purposes.
May I reassure the hon. and learned Lady that the provisions relating to lawfulness of conduct authorised by part 3 of the Bill replicate those that currently apply in the Regulation of Investigatory Powers Act 2000, and the Bill goes no further in providing indemnity from civil liability for conduct incidental to or reasonably undertaken in connection with a communications data authorisation? The clause is drafted to ensure that a person who engages in conduct only in connection with an authorisation cannot be subject to civil liability unless that activity could itself have been authorised separately under a relevant power. It must follow that the removal of that provision would mean that a person who was acting lawfully under an authorisation that had properly been granted under the Bill would be at risk of civil liability if some incidental or reasonably connected conduct were not expressly covered by the authorisation.
I can see the thrust of the hon. and learned Lady’s argument, but I hope that I have reassured her that the Bill does not go any further than the status quo. For that reason, I urge her to withdraw the amendment.
I beg to ask leave to withdraw the amendment for the time being.
Amendment, by leave, withdrawn.
Clause 72 ordered to stand part of the Bill.
Clause 73 ordered to stand part of the Bill.
Clause 74
Certain transfer and agency arrangements with public authorities
Question proposed, That the clause stand part of the Bill.
There are matters relating to this clause on which I would like to press the Minister. This is the clause that provides for what is effectively the transfer of certain functions between the Secretary of State and other public authorities. The functions to be transferred are the functions in clauses 58 to 60, at which we looked in some detail last week: the filtering arrangements for obtaining data. As set out in clause 58, it is for the Secretary of State to maintain and operate arrangements. It is then for the relevant public authority, acting through a designated senior officer, to effectively carry out the exercise, using authorisations as and where necessary and appropriate. We discussed that arrangement.
Clause 74 provides for a transfer of functions of the Secretary of State—which I take to include establishing, maintaining and operating arrangements—from the Secretary of State to another public authority. That seems to me to cut through the thrust and the purpose of clause 58, which has a clear hierarchy to it: the Secretary of State, then the designated senior officer. Subsection (1)(b) is freestanding and transfers any function exercisable by a public authority back the other way to the Secretary of State, so there is a complete provision for a swap of roles. Subsection (3) indicates that:
“Regulations under subsection (2) do not affect the Secretary of State’s responsibility for the exercise of the functions concerned”.
Then schedule 5, in the back of the Bill, is referred to, but that does not add a great deal.
The question for the Minister is: how is it anticipated that these powers are to be exercised? On the face of it, this is an odd structure for a Bill to set out. This structure goes from the Secretary of State down to the relevant public authority, with the Secretary of State having a much wider role of setting up the arrangements, only for us to find, several clauses later, that it is possible to flip the functions and have the public authority making the arrangements. That seems to remove some of the formality and the safeguards intended by clause 58.
The hon. and learned Gentleman, with his typical diligence—which is at least matched, by the way, by those on the Treasury Bench—has identified, quite properly, both the reasons for this clause and the character of the transfer of arrangements that it details. He accurately identified subsection (3), which emphasises that:
“Regulations under subsection (2) do not affect the Secretary of State’s responsibility for the exercise of the functions concerned”.
The transfer of arrangements will change neither the Secretary of State’s responsibility nor the process for authorising requests for data. It is about the technical running of the filtering capability. It is there to require flexibility; it might be appropriate at some future point for another authority to exercise the filtering function, but without responsibility moving from the Secretary of State. The Secretary of State will retain responsibility, but the operational running of the filter might change over time. This is essentially about future proofing.
I am grateful to the Minister. I am not being pernickety; I just want to be clear. Subsection (3) appears to apply only to regulations under subsection (2), which I think is about changing the powers of public authorities lest they should not have the power to carry out functions on behalf of the Secretary of State. In other words, when the Secretary of State is modifying the powers available to a public authority, that comes within subsection (3). On reflection, I wonder whether sub-clause 3 should say “regulations under subsections (1) and (2) do not affect the Secretary of State’s responsibility”, because I think that is the thrust of what the Minister said.
That is not an unreasonable point, actually. Someone who read the Bill could certainly come to the same conclusion as the hon. and learned Gentleman. I will look at that from a drafting perspective, because it is important that we are clear. First, in all these matters, filtering arrangements take effect only as the result of a lawful process; the process for permission will not change. Secondly, that permission rests with the Secretary of State; I do not want there to be any ambiguity—as the hon. and learned Gentleman suggests there might be—about which parts of this clause that affects. On re-reading the clause, I can see what he means, so I am happy to take it away and check whether the drafting needs to be amended in the way that he describes. In that spirit, and with that immensely generous offer, I hope we can move on.
I am grateful.
Question put and agreed to.
Clause 74 accordingly ordered to stand part of the Bill.
Schedule 5 agreed to.
Clause 75 ordered to stand part of the Bill.
Clause 76
Extra-territorial application of Part 3
I beg to move amendment 150, in clause 76, page 59, line 26, after “Kingdom”, insert
“the notice shall be served at that person’s principal office outside the United Kingdom where it is established for the provision of services. Where it is considered unfeasible or inappropriate in the circumstances,”.
With this it will be convenient to discuss amendment 151, in clause 76, page 59, line 39, leave out subsection (4) and insert—
“(4) Subsections (1) or (2) of section 57 shall not be applicable where the taking of any steps by a relevant operator outside the United Kingdom—
(a) would cause the operator to act contrary to any laws or restrictions under the law of the country or territory where it is established, for the provision of services, or
(b) could be achieved via a notice served pursuant to an international mutual assistance agreement or subject to an EU mutual assistance instrument.”.
We return to familiar territory here, in relation to the extraterritorial application of authorisations under part 3. When I made my observations last week, I outlined the concerns that a number of service providers and tech companies have; I do not intend to repeat them.
Amendment 150 would tighten the service provisions in relation to the extraterritorial application of part 3. Amendment 151 would introduce a restriction that had the effect of not requiring a relevant operator outside the UK
“to act contrary to any laws or restrictions under the law of the country or territory where it is established, for the provision of services,”
or to take steps that
“could be achieved via a notice served pursuant to an international mutual assistance agreement or subject to an EU mutual assistance instrument.”
We reached this point last week in relation to provisions that were not dissimilar. The Minister made various points, both about service and about other provisions—particularly those relating to the way international mutual assistance agreements currently work. I will not press these amendments to a vote, for the same reasons as last week, but would indicate that the thrust and purpose of the amendments was to anticipate the agreements on extraterritorial application that it is hoped will be reached—particularly with the US—and that are being negotiated at the moment.
The hon. and learned Gentleman will appreciate I was not chairing the Committee, so this is very much my own impression of what went on. Lord Murphy was, as one would expect, very keen to accommodate the service providers and the Committee Clerks proposed several dates. We were grateful for the written evidence and formed the view we did, but it would have been nice if they could have fitted us into their busy schedules.
We probably will not gain much by arguing the detail, particularly as I was not there. The point that the service providers wanted to get across was that in principle they did want to give evidence. They gave written evidence. It was simply that the dates would not work for them as a group, rather than any unwillingness to share their concerns.
The Minister for Security raised a point about the Sheinwald arrangements and the progress being made. As I said a moment ago, these amendments are intended to foreshadow the—I hope—new world of working arrangements, which will cover not only evidence for use in prosecutions but the facilitation of the exercise of powers of this Bill in much faster time than some of the current mutual assistance agreements. The Minister made a further point about the differing views of the companies concerned. There are different views about some aspects of the Bill, but on the issues of extraterritorial application they speak with one voice.
There is an important broader issue to put on the table. As we move forward to international agreements, particularly with the US, it is very important that not only our Government but the US Government are comfortable with the arrangements, because whatever arrangements are put in place will be reciprocal.
Finally, may I hand a schedule to you, Ms Dorries, to the Minister and his team and to the hon. and learned Member for Edinburgh South West? I do not intend to speak at great length to this document, which was prepared for me. What it points out is the inconsistency in approach on extraterritorial jurisdiction. It is quite telling in a number of respects. It tracks whether there is extraterritorial jurisdiction, which clauses give rise to it, whether there is a reasonableness test or a reference to conflict of laws built in, whether it is enforced by overseas service providers, whether there is an international mutual assistance framework and whether there is an obligation on the Secretary of State to consult. What struck me when I went through the document was the inconsistencies. If they are intentional inconsistencies that can be defended, all well and good. I am simply bringing it to the Minister’s attention that we have found these apparent inconsistencies. If they are not intentional, it might be a good idea if somebody looked at them to tidy up the provisions and ensure that where they should be consistent, they are.
I am looking at the hon. and learned Gentleman’s amendment 150, and of course it is necessary to serve someone so that they get notice. The provisions of service are always about the substance of whether the person gets the notice. It is clear to me from the current drafting that if there were service in accordance with any of clause 76(3), the company would get notice. I have a few concerns about the amendment. I am very wary, because people often take points of service to disrupt a substantive issue. It would be unfortunate if people could take the point that they were not properly served and therefore not comply. Does “principal office” have a meaning in other jurisdictions? If there are different services, will “provision of services” cause confusion? What is the meaning of “unfeasible or inappropriate” and how will it be applied? I believe that the clause will maintain what is desired, which is that it will come to the company’s attention, so I am slightly concerned about the amendment.
I am grateful to the hon. and learned Lady for her intervention. I am not pressing amendments 150 and 151. They have been put forward to draw attention to concerns. The hon. and learned Lady made submissions last week about service in relation to civil proceedings under the White Book, which I noted and could see the sense of. I do not want to push amendment 150 and accept that “unfeasible” and “inappropriate” may not be the best way to articulate the point.
What underlies both amendments is a genuine concern on the part of those who, when the Bill receives Royal Assent, will be called on to assist in relation to warrants and who want clarity on how the procedure is to operate, what they are to do and what the safeguards are, in particular when they find themselves, as we mentioned last week, required under penalty of criminal proceedings in this country to do something that constitutes an offence in the country in which they are operating. That is a very real concern for them.
I shall deal as pithily as is possible with the points the hon. and learned Gentleman made. The first was his helpful contribution in the form of this schematic, to which I will not respond now. He would not expect me to as I have only just seen it. It might form part of my next letter to the Committee to explain why in different parts of the Bill these matters are handled in different ways. In doing so, I will implicitly consider his point about whether that is healthy eclecticism or unhappy inconsistency.
Secondly, it is important to point out that clause 76 essentially maintains provisions on extraterritoriality as they are now, replicating the arrangements under RIPA, clarified by the Data Retention and Investigatory Powers Act 2014. The hon. and learned Gentleman is right, but there is nothing new here.
Thirdly, there is a need to retain flexibility about where the notices are served. I take the hon. and learned Gentleman’s point that companies may take a view on these things, and sometimes those might be overlapping or conflicting views about different aspects of the Bill, but in those terms it is important to maintain a degree of flexibility about the communications data notice and where it can be delivered.
Fourthly, on the hon. and learned Gentleman’s point about coming more speedily to an agreement that is more satisfactory than either current arrangements or those that might be delivered through a mutual legal assistance treaty, I can offer the Committee the assurance, as I have previously, that that work is under way. We are hopeful—indeed, confident—that we can achieve the sort of outcome that he has described. He referred, as I did, to the comments of David Anderson, which were critical of the mutual legal assistance treaty process on the grounds that it is slow. It is not always the best way of achieving the objective set out in the Bill, because it is not designed for that purpose but an entirely different one.
Finally, I would say that this is really important. Although the hon. and learned Gentleman is right that this is a particular part of a particular part of the Bill and so could be overlooked, it is important to understand that, in terms of the objectives we seek to achieve—that is, those of us who want the Bill to work well, which I think applies to the whole Committee—these powers are significant. Much of what happens is now happening overseas and much of the process by which we deal with overseas organisations is vital to the work of our security services and others. Dealing with extraterritorial matters is significant, but not straightforward. It is dynamic, for the reasons that we have both offered to the Committee. In that respect, I believe we have got the Bill about where it wants to be. I do not say that these things will not evolve over time, but for the purposes we have set out, the clause works.
As with all these things, I start from the perspective of wanting to be both convivial and conciliatory; both helpful and positive. I never ignore arguments put in these Committees or on the Floor of the House, as people know who know how I operate. The House has an important function in making government as good as it can be, and that is partly about the interaction and tension between Government and Opposition. Of course I am always prepared to listen, but I think we have got this right. With the appropriate humility, I suggest that we move on.
I indicated would not press the amendments at this stage. I beg leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Question proposed, That the clause stand part of the Bill.
I oppose the clause. I hear what the Minister has to say, but I am not reassured by the Government’s approach. Harking back to something I said last week, I do not think that the Government have got the balance right, because in seeking to gather to themselves an extraterritorial application through United Kingdom law, there are hidden dangers.
If international companies are required to arbitrate between conflicting legal systems, it is leaving the protection of human rights to the good will and judgment of those companies. Companies such as the ones the hon. and learned Member for Holborn and St Pancras mentioned have already expressed concerns to David Anderson, for his report “A Question of Trust”, that
“unqualified cooperation with the British government would lead to expectations of similar cooperation with authoritarian governments, which would not be in their customers’, their own corporate or democratic governments’ interests.”
In my view, the most appropriate way forward is to pursue the route, which I am pleased the Minister has assured us that the Government are well down, of mutual legal assistance agreements with other states. If we do not pursue that route in the way that both David Anderson and Sir Nigel Sheinwald recommended with appropriate alacrity, and instead rely simply on clauses such as this one, which are spread throughout the Bill, we will create real difficulty for corporate entities. We will also create difficulties for the international enforcement of human rights, which I consider a bit more important than difficulties for corporate entities, although we should not set the latter to one side, because they are significant. For that reason, notwithstanding the Minister’s assurances, the SNP opposes clause stand part.
I will not make a case again for the clause, but I shall say this, in the spirit of helpfulness and kindness. It is really important that the Committee sends out a combined message to overseas communications service providers—on which the obligations will have an important effect because their commercial endeavours have a significant relationship with the powers we are trying to cement in the Bill—so that they have a very clear impression that we as a Committee of this Parliament are clear that we expect them to do their bit to do what is right. We should not, out of a sense of good will, allow ourselves to be misled and encouraged not to have high expectations or make serious demands of those organisations.
I simply say to the hon. and learned Lady that clause 76 is about giving a clear signal, as does clause 57, with which it should be read in tandem, that telecommunications operators should comply with the notice given, whether or not they are in this country. I accept that that is difficult and challenging—I made that point at the outset—but my goodness, it is vital that we take these steps. I know that she is open-minded and a woman of great good will, but we should not allow that to dilute in any way that common message to those big companies. I do not want those companies to get away with anything that that should not get away with.
I am not so much concerned about the message we send out to the companies; I am more concerned about the message we send out internationally and potentially to authoritarian regimes. The difficulty is that if the British Government demand from these companies unqualified co-operation with British laws, that might encourage authoritarian Governments to do likewise. We clearly would not want that, so we need to be very careful about the messages we send out and think carefully about their full implications. That is why such matters should be approached by way of mutual legal agreement internationally, rather than the unilateral imposition of one Parliament’s will outwith the area where its sovereignty operates.
Question put, That the clause stand part of the Bill.
I beg to move amendment 164, in clause 78, page 61, line 5, leave out subsection (1) and insert—
“(1) A Judicial Commissioner may issue a data retention warrant under this Part to authorise the retention of relevant communications data if the Judicial Commissioner considers that the authorisation is necessary and proportionate for one or more of the following purposes—
(a) in the interests of national security, or
(b) for the purpose of preventing or detecting serious crime, or
(c) for the purpose of preventing death or serious injury.”
With this it will be convenient to discuss the following:
Amendment 165, in clause 78, page 61, line 10, leave out “A retention notice may” and insert “A data retention warrant must”.
Amendment 154, in clause 78, page 61, line 19, leave out “notice” and insert “warrant”.
Amendment 155, in clause 78, page 61, line 30, leave out “retention notice” and insert “retention warrant”.
Amendment 235, in clause 78, page 61, line 30, leave out second “notice” and insert “warrant”.
Amendment 156, in clause 78, page 61, line 32, leave out “notice” and insert “warrant”.
Amendment 157, in clause 78, page 61, line 33, leave out “notice” and insert “warrant”.
Amendment 158, in clause 78, page 61, line 34, leave out “notice” and insert “warrant”.
Amendment 159, in clause 78, page 61, line 36, leave out “notice” and insert “warrant”.
Amendment 160, in clause 78, page 61, line 37, leave out “notice” and insert “warrant”.
Amendment 161, in clause 78, page 61, line 38, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 162, in clause 78, page 61, line 41, leave out “notice” and insert “warrant”.
Amendment 166, in clause 79, page 62, line 26, leave out “notice” and insert “warrant”.
Amendment 220, in clause 79, page 62, line 26, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 168, in clause 79, page 62, line 28, leave out “notice” and insert “warrant”.
Amendment 169, in clause 79, page 62, line 30, leave out “notice” and insert “warrant”.
Amendment 170, in clause 79, page 62, line 31, leave out “notice” and insert “warrant”.
Amendment 171, in clause 79, page 62, line 32, leave out “notice” and insert “warrant”.
Amendment 172, in clause 79, page 62, line 33, leave out “notice” and insert “warrant”.
Amendment 173, in clause 79, page 62, line 35, leave out “notice” and insert “warrant”.
Amendment 174, in clause 79, page 62, line 35, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 176, in clause 80, page 62, line 38, leave out “notice” and insert “warrant”.
Amendment 198, in clause 80, page 62, line 40, leave out “back to the Secretary of State” and insert “to the Investigatory Powers Commissioner for review”.
Amendment 335, in clause 80, page 62, line 40, leave out “notice” and insert “warrant”.
Amendment 177, in clause 80, page 62, line 41, leave out “notice” and insert “warrant”.
Amendment 178, in clause 80, page 62, line 42, leave out “notice” and insert “warrant”.
Amendment 180, in clause 80, page 63, line 5, leave out “notice” and insert “warrant”.
Amendment 181, in clause 80, page 63, line 6, leave out “notice” and insert “warrant”.
Amendment 199, in clause 80, page 63, line 7, leave out “Secretary of State” and insert “the Investigatory Powers Commissioner”.
Amendment 182, in clause 80, page 63, line 7, leave out “notice” and insert “warrant”.
Amendment 183, in clause 80, page 63, line 8, leave out “notice” and insert “warrant”.
Amendment 200, in clause 80, page 63, line 10, leave out “Secretary of State” and insert “the Investigatory Powers Commissioner”.
Amendment 201, in clause 80, page 63, line 12, leave out subsection (b).
Amendment 184, in clause 80, page 63, line 14, leave out “notice” and insert “warrant”.
Amendment 185, in clause 80, page 63, line 16, leave out “notice” and insert “warrant”.
Amendment 193, in clause 80, page 63, line 19, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 194, in clause 80, page 63, line 24, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 202, in clause 80, page 63, line 25, leave out “Secretary of State” and insert “Investigatory Powers Commissioner”.
Amendment 249, in clause 80, page 63, line 25, leave out “and the Commissioner”.
Amendment 186, in clause 80, page 63, line 27, leave out “notice” and insert “warrant”.
Amendment 187, in clause 80, page 63, line 28, leave out “notice” and insert “warrant”.
Amendment 188, in clause 80, page 63, line 30, leave out “notice” and insert “warrant”.
Amendment 203, in clause 80, page 63, line 31, leave out “Secretary of State” and insert “Investigatory Powers Commissioner”.
Amendment 197, in clause 80, page 63, line 33, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 189, in clause 80, page 63, line 33, leave out “notice” and insert “warrant”.
Amendment 204, in clause 83, page 64, line 13, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 210, in clause 83, page 64, line 13, leave out “notice” and insert “warrant”.
Amendment 205, in clause 83, page 64, line 14, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 206, in clause 83, page 64, line 15, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 211, in clause 83, page 64, line 22, leave out “notice” and insert “warrant”.
Amendment 207, in clause 83, page 64, line 23, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 212, in clause 83, page 64, line 27, leave out “notice” and insert “warrant”.
Amendment 213, in clause 83, page 64, line 28, leave out “notice” and insert “warrant”.
Amendment 214, in clause 83, page 64, line 31, leave out “notice” and insert “warrant”.
Amendment 215, in clause 83, page 64, line 32, leave out “notice” and insert “warrant”.
Amendment 216, in clause 83, page 64, line 34, leave out “notice” and insert “warrant”.
Amendment 217, in clause 83, page 64, line 36, leave out “notice” and insert “warrant”.
Amendment 218, in clause 83, page 64, line 37, leave out “notice” and insert “warrant”.
Amendment 208, in clause 83, page 64, line 38, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 370, in clause 83, page 64, line 39, leave out “notice” and insert “warrant”.
Amendment 372, in clause 83, page 64, line 40, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 209, in clause 83, page 64, line 41, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 219, in clause 83, page 65, line 7, leave out “notice” and insert “warrant”.
Amendment 221, in clause 83, page 65, line 9, leave out “notice” and insert “warrant”.
New clause 7—Persons who may apply for issue of warrant—
“(1) Each of the following organisations may apply for a communications data retention warrant—
(a) a police force maintained under section 2 of the Police Act 1996,
(b) the Metropolitan Police Force,
(c) the City of London Police Force,
(d) the Police Service of Scotland,
(e) the Police Service of Northern Ireland,
(f) the British Transport Police Force,
(g) the Ministry of Defence Police,
(h) the Royal Navy Police,
(i) the Royal Military Police,
(j) the Royal Air Force Police,
(k) the Security Service,
(l) the Secret Intelligence Service,
(m) GCHQ, and
(n) the National Crime Agency.”
New clause 10—Requirements that must be met by warrants—
“(1) A warrant issued under this Part must name or otherwise identify the person or persons, organisation, premises, or location to which the warrant relates.
(2) A warrant issued under this Part must describe the investigation or operation to which the warrant relates.
(3) A warrant issued under this Part must relate to one or more of the following purposes—
(a) in the interests of national security, or
(b) for the purpose of preventing or detecting serious crime, where there is reasonable suspicion that a serious criminal offence has been or is likely to be committed, or
(c) for the purpose of preventing death or injury.
(4) A warrant may only be issued under this Part if there are reasonable grounds for believing that the material is likely to be of substantial value to the investigation or operation to which the warrant relates.”
I will not say, at this stage, that I am withdrawing all of those amendments.
It is a joke, Ms Dorries. We now come to a very important clause. In some respects, over the last part of Thursday and today we have been working backwards through the way in which the functions will be exercised, because clause 78 is the starting point in relation to communications data. It relates to the power to require retention of data in the first place, and everything we have discussed has been about how those data can be filtered and accessed after they have been retained. It is a very important clause.
I draw attention to the breadth of the clause, which states:
“The Secretary of State may by notice…require a telecommunications operator to retain relevant communications data if the Secretary of State considers that the requirement is necessary and proportionate for one or more of the purposes falling within paragraphs (a) to (j) of section 53(7)”.
The first thing that crops up in relation to the clause is what the test for retention is. The test is, of course, necessity and proportionality but the real question is: what does that necessity and proportionality bite on? That pushes us straight back to clause 53(7), which is problematic because it sets such a low threshold for these extensive retention powers.
There should be no doubt that this provision gives the Secretary of State the power to require the retention of a huge amount of data. There may be circumstances in which that is necessary and proportionate, but the test for whether that power is exercised is pushed all the way back to clause 53(7). To take an example that we touched on last week, extensive data can be retained
“for the purpose of preventing or detecting crime”—
any crime. Any crime of any level can trigger a power to retain data. The importance of the issue of retention over that of access is that at this stage it is about retaining the data of those who are not necessarily suspects or targets but anybody whose data come within the types that are intended to be retained. It is a very wide provision.
Sign-off is by the Secretary of State, so there is no double lock and no reference to a judicial commissioner here. The Secretary of State operates the powers, which are very wide. Clause 78(2) states that
“a retention notice may…relate to a particular operator”;
it may
“require the retention of all data or any”;
it may
“identify…periods for which data is to be retained”;
it may “contain…restrictions” and
“make different provision for different purposes,”;
and it may “relate to data” that are not even in existence at the time. These are very wide-ranging powers triggered by the test set out in clause 53(7), and that is a cause of significant concern. The retention period is 12 months, so this is an extensive hoovering-up exercise.
It is clear that the clause applies to internet connection records, because that is stated in subsection (9). We touched on internet connection records last week in relation to when internet connection records are to be accessed. Now, I touch on it for a different purpose: to highlight how all our internet connection records can be swept up in a data retention notice issued under this provision.
For that purpose, one obviously starts with the definition of internet connection record in clause 54(6)(a) and (b), which we looked at last week. I will not read it out again but just give some examples of what is intended to be included. I will do so in chronological order. The operational case for the retention of internet connection records was published in August last year. Page 3 made it clear that internet connection records are:
“a record of the internet services that a specific device connects to—such as a website or instant messaging application—captured by the company providing access to the internet”.
So that is within the scope of an internet connection record, as set out in the operational case of August 2015. An annexe setting out terminology and definitions was put in evidence before the Joint Committee in January this year, which made it clear that not only web and IP addresses are included, but names and addresses, email addresses, phone numbers, billing data, customers, users, and so on. In the explanatory notes to the Bill, paragraph 2.30, on clause 78(9) makes it clear that,
“communications data that can be retained includes internet connection records. Internet connection records, which are defined in clause 54(6), are a record of the internet services that a specific device connects to—such as a website”
That is therefore consistent with the operational case.
What is swept up under clause 78 are internet connection records, which means connections to the internet and websites to which any device has connected. When anyone uses a device to connect to a website, that is recorded by the provider and comes within the definition. It therefore comes within the retention order. That is what the clause gives the Secretary of State power to retain.
It is fair to point out that clause 54(4), which deals with accessing the data that are retained, says that the access through an authorisation can be allowed only if the purpose is to identify: which person is using the internet, which internet service is being used, where the person or apparatus whose identity is already known is, and so on. It is true to say that on the point of access there is restriction of the way in which internet connection records are accessed, but we need to be absolutely clear that for the purpose of retention, it is a record of all websites visited or accessed by a device.
I do not doubt that my hon. and learned Friend the Solicitor General will deal with these points at some length, but is it not fair to say—the hon. and learned Gentleman is in the mood to be fair—that the two subsequent clauses both build a set of safeguards into the system and provide for a review of the system? There is further work in the Bill that caveats what might be taken to be the extremes of his argument.
I am grateful for that intervention, and I accept that there are safeguards in subsequent provisions. I will be corrected if I am wrong, but on the face of it at least—I am not saying they are incapable of a review—the safeguards do not restrict the definition of an internet connection record in a way that would prevent websites visited being swept up in the retention order.
The message to my and all of our constituents is that, even if they are not a target, a record of the websites they have visited can be retained under a data retention order, and if retained will be retained for 12 months—every website they have visited. But if somebody later wants to access it, there is then a tighter test for that. The chilling effect of clause 78 is that the websites visited will be retained if a retention order is issued. We need to be absolutely clear about that. The tighter definition does not kick in until a later stage of the exercise, and that is a cause of real concern to our constituents, certainly to the people who have engaged with me on the topic, and to our fellows across both sides of the House.
I note what the hon. and learned Gentleman says about web addresses being revealed. Is it not also the case that we see from the data released by the Home Office, after being pressed about its factsheet accompanying ICRs, that what will be revealed is not only web addresses and IP addresses, but the names, addresses, email addresses, phone numbers and billing data of customers—our constituents?
I cannot double check on my feet, but that sounds like the further evidence that was put before the Joint Committee when it was in the middle of its deliberations. In fairness, the Home Office did go beyond websites to include some, maybe all, of the matters to which the hon. and learned Lady just referred.
The way this will operate in practice is a cause of real concern. The Secretary of State, without the double check of a judicial commissioner, and operating against a low-level threshold—clause 53(7)—can issue a retention order that will permit the retention of a record of all the websites that somebody has visited. That record will then be kept for 12 months, albeit with a different test if it is to be accessed later.
The amendments—I think you have called them the first set of amendments, Ms Dorries—are intended to construct in the first instance a different framework around this power, because it is so extensive, and put it in the hands of a judicial commissioner rather than the Secretary of State. That would provide a greater safeguard in relation to clause 78, with independent oversight through the function of the judicial commissioner. Alternatively, amendments 152, 153 and 222 would give the Investigatory Powers Commissioner some oversight. In other words, the intention behind these amendments is to put some rigour and independence into the exercise of what is a very wide power that, in fact, is the starting point for the exercise of all the other powers under the parts of the Bill that we are now concerned with.
Anxiety has been expressed on a number of occasions about cost. Huge amounts of data could be required for retention under clause 78. The Government have estimated the cost at £170 million. That is considered to be a gross underestimate by those who will no doubt be called upon to actually retain the data. For those reasons, these amendments are intended to tighten up a clause that is very wide and very loose. It permits a huge amount of data to be retained, including websites visited by you, by me, or by our constituents.
It is a great pleasure to rise as part of this ongoing scrutiny, and to offer my hon. and learned Friend the Member for Edinburgh South West brief respite in this Committee. It is also a great pleasure to serve under your chairmanship, Ms Dorries. It is great to follow the hon. and learned Member for Holborn and St Pancras, who in his customary fastidious and engaging manner has covered in a short space of time all the aspects of many amendments. Some of that bears repeating, and I will speak to new clause 10, which is tabled in my name and that of my hon. and learned Friend the Member for Edinburgh South West.
My hon. and learned Friend spoke at length about the important role that the judiciary, in the form of judicial commissioners, should bring to this process. We do not think it is good enough that the Bill only proposes to use judicial commissioners to review the process used by the Secretary of State in making a decision. The Government may claim that it is important that the Home Secretary retains the power to issue retention notices to internet service providers, as it will ensure that democratic accountability is a salient feature of the process, but I do not accept that to be the case. In fact, I would argue that because of the political arena that any Home Secretary operates in, it is right that this power is handed to and delegated to an independent official such as a judicial commissioner.
It is also worth noting that we know very little of the various notices that the Home Secretary issues, and as such there is no possible opportunity to hold her to account for them. Building the role of judicial commissioners into this part of the process will help to ensure that we have appropriate checks and balances when it comes to the retention of communications data. This is vitally important, because it is the proper constitutional function of the independent judiciary to act as a check on the use of intrusive and coercive powers by state bodies, and to oversee the application of law to individuals and organisations. Liberty rightly points out that judges are professionally best equipped to apply the legal tests of necessity and proportionality to ensure that any surveillance is conducted lawfully.
I turn now to new clause 7. Schedule 4 provides a lengthy list of bodies that are able to access or retain data, including several Government Departments, such as the Department for Transport, and a range of regulatory bodies, such as the Food Standards Agency and the Gambling Commission. This suggests that access to communications data may be allowed for a range of purposes which may be disproportionate and inconsistent with the guidance offered by the European Court of Human Rights.
I draw the hon. Gentleman’s attention to clause 79, which we are not debating at the moment but which is directly relevant to the point he made about proportionality. Clause 79(1)(a) states:
“(1) Before giving a retention notice, the Secretary of State must, among other matters, take into account—
(a) the likely benefits of the notice”.
To me, that would be a pretty strong way of enforcing proportionality. Yet the hon. Gentleman is in his peroration claiming that that would not be taken into account, or not sufficiently so.
I am grateful for the Minister’s intervention. I appreciate that that is a safeguard, but we must ask whether those Departments should be getting access in the first place.
I do not want to be unnecessarily brutal with the hon. Gentleman, but either he is making an argument about proportionality or he is not. If he is saying that nothing is proportional, then it should not happen at all, that is hardly an argument about proportionality. Those of us who take a more measured view of these things are considering whether such collection and access to data are proportionate. Proportions by their nature require an assessment of balance, do they not? Yet the hon. Gentleman is suggesting that the scales are weighted all on one side.
The Minister did not actually address why these Departments need access to these data in the first place. I appreciate the point that he is making, but these Departments should not, in my view, require access to this information.
The Minister talked about the duty to take into account the likely benefits of the notice, but does my hon. Friend agree that something may be beneficial without being necessary?
I agree with my hon. and learned Friend. We are not opposed to every measure in the Bill. There are benefits, but unfortunately they are not covered by enough safeguards and are not drawn tightly enough. I would like to make progress but I will give way once more.
I apologise if I missed the hon. Gentleman outlining the Departments, but could he tell me which ones should be excluded and not have access to this?
That has been dealt with at length. I have already mentioned the Food Standards Agency as one of the regulatory bodies. Schedule 4 does currently provide a lengthy list of bodies that should be able to access the data. New clause 7 would ensure that only the police forces and security agencies may request a communications data warrant, except where the warrant is issued for the purpose of preventing death, in which circumstances emergency and rescue services also fall within the definition.
New clause 10 outlines the requirements that must be met by warrants.
As, for example, the Food Standards Agency cannot itself bring a prosecution, may I conjure in the hon. Gentleman’s mind a situation whereby a criminal gang, as part of its activities, seeks to bring into the United Kingdom for sale to the British public a contaminated food source? Is that not something to which the Food Standards Agency should have access to information in order to ensure that citizens and consumers are safe?
I understand the hon. Gentleman’s point, but surely the police would be interested in that scenario and would have access.
In the abstract—by golly, isn’t this debate being held in the abstract?—the hon. Gentleman is absolutely right, but we invest the powers with the agency. The police are not an infinite resource. If we have the many who are charged with multiple areas of our lives—
These powers are very large and we should limit who has access to them. The police can pass on the relevant information to the agencies that can deal with that particular incident, but in my view, only the police and security forces should have access. I want to finish my point on new clause 10 but I will allow one last intervention.
I want to understand the hon. Gentleman’s understanding of how cases are prosecuted in England and Wales, if not in Scotland. Is the hon. Gentleman saying that Her Majesty’s Revenue and Customs, for example, should not have access to any of these powers? Is the hon. Gentleman saying that the investigation of economic crime that can potentially alter the GDP of another member state is not worthy of these powers? I wonder what the differentiation is between those organisations he thinks should have these powers and those that cannot. At the moment, it is not clear.
Order. May I just ask that interventions be kept short, please, or we will be here all night? Mr Newlands.
I appreciate what the hon. Lady says but, as I am not a lawyer, I am struggling to distinguish the difference between Scottish and English law. Perhaps my colleague could address that.
My hon. Friend will no doubt agree that, in Scotland at least, it is the police who investigate serious crime, under the direction of the Lord Advocate.
The point has been dealt with, and I think we need to move on. The effect of new clause 10 —[Interruption.] I will finish, amid the chuntering. These new clauses require data retention notices to be issued only for specific investigative or operational purposes, to obtain specified data where those data are believed to be of substantial value. We do not believe, however, that the role of communications data in the investigation of crime justifies the Secretary of State’s mandate for blanket retention of historical communications data for the entire population for 12 months.
I am delighted to see you back in the Chair, Ms Dorries, as I break my couple of sessions’ silence; it is always very reassuring. I certainly do not wish to keep the Committee here all night, but I will reiterate a point that I made earlier in our considerations, and that relates to the retention of certain data. As my hon. and learned Friend the Member for Holborn and St Pancras pointed out, we understand the need for data retention. However, on looking at the Bill, I am still not entirely satisfied that the Government have taken into account the need for additional security for data retention.
I look to the Minister for reassurance that, when telecommunications and internet providers and suchlike are obliged to retain data, there is a consequent obligation on them to maintain it securely. We know that several such providers have problems with internet security: we saw that with the TalkTalk hack, and we believe another large provider has been hacked recently. Those attacks were on personal data; the Solicitor General and I have had exchanges in this room about the potential for charging them as theft—about whether the sanctions against somebody who committed that offence would be contained in existing legislation.
This part of the Bill needs to look at obliging or maintaining a minimum acceptable level of security, to provide security and privacy for people whose data may have been accepted. I realise that it might not necessarily be covered in detail in the new clause, but now might be a good time for the Ministers to consider whether they believe internet security and the security of personal data held under the terms of clause 79 should be considered in the Bill. Do they believe guidance should be given to telecommunications providers to maintain that security, or do they feel that it is not relevant and that they are quite satisfied with the status quo? I must say that I am not. Notwithstanding the need for the retention of individual data, as described so eloquently by my hon. and learned Friend, it remains a major concern of mine that individual privacy and data are at risk: it puts a question mark over the whole clause and over the areas we are discussing.
I am grateful to hon. Members for a wide-ranging debate. I would first like to reiterate on behalf of the Government the position adopted by the Joint Committee on the draft Investigatory Powers Bill, which quite clearly indicated its conclusion that the case was made for a retention period of up to 12 months for relevant communications data. In the report from David Anderson QC, “A Question of Trust”, recommendation 14 is:
“The Home Secretary should be able by Notice (as under DRIPA 2014 s1 and CTSA 2015 s21) to require service providers to retain relevant communications data for periods of up to a year”.
There we have it: the Government are acting upon the specific endorsement of an independent reviewer and a Joint Committee of this House. There is an element of the waving of the proverbial shroud when it comes to the retention of data, because the word “relevant”, which is contained in the second line of clause 78(1), is the governing word here. It is very important to remember that this is not carte blanche for the Secretary of State to authorise communications service providers to retain everything for 12 months. That is not the case. Where there is no case of necessity and proportionality for a 12-month period, a shorter period must be adhered to. Indeed, if the material is not relevant, it falls outwith the ambit of any such authorisation.
I reassure the hon. Member for City of Chester, who makes quite proper points about the integrity of data, that he is right to make them. That issue affects all those in this room and beyond. He is also right to allude to the criminal law. I reassure him that communications service providers have to comply with the Data Protection Act 1998 and the Privacy and Electronic Communications (EC Directive) Regulations 2003, which together contain those requirements that the data is appropriately secured. When he has the time—which I am sure is as precious to him as it is to the rest of us—chapter 16 of the draft communications code of practice contains an entire set of provisions relating to the security, integrity and, indeed, destruction of retained data, which very much underpin the principles of why CSPs have to operate and will give him the reassurance that he properly seeks about the position with regard to individual data and people’s privacy.
Data retention legislation has existed in this country since the Anti-terrorism, Crime and Security Act 2001, which allowed the Secretary of State to enter into voluntary agreements with telecommunications operators so that they could retain data that otherwise would be deleted. The Data Retention (EC Directive) Regulations 2007 were the first piece of data retention legislation that provided for the Secretary of State to require the retention of such data. We currently have DRIPA 2014 and the data retention regulations of that year. We hope to replace those with the provisions in the Bill. A very important point is that there is nothing new about these proposals. Our data retention legislation has always had the Secretary of State involved in the process and there are very good reasons for that. It has worked successfully until now. As I have indicated, it has been recommended to us by David Anderson.
The amendments that have been tabled seek to drive a coach and horses through all of that. There is a simple and blindingly obvious reason why we wish to maintain the system of data retention. For example, when a crime happens or a child goes missing, it is impossible to know in advance which data would be relevant in any subsequent investigation. It is therefore important that we require the retention of all relevant communications data that matches a certain description wherever it is necessary and important. Because it is impossible to know which data will be the most relevant in advance of any crime, it is impossible to know whether a specific piece of data will be of value to MI5 in locating a terrorist, for example, or to the National Crime Agency in identifying a paedophile, or for any other legitimate purpose. For that reason it does not make sense for those authorities to apply for retention warrants individually. What makes sense is for the requirement of all relevant public authorities to be considered together. The person best placed to do that is the Secretary of State. Public authorities set out their requirements for data retention to the Home Office and they are then carefully considered. As they usually overlap, the Secretary of State is able to identify the specific telecommunications operators and specific data types that it is necessary and proportionate to make subject to data retention notices. As the full costs of data retention are covered by the Secretary of State, only he or she can decide whether or not the benefits of data retention are proportionate to the costs.
There has been some discussion about cost again today. The £170 million figure is based on the cost of our anticipated implementation, which takes into account data that is already obtained under existing legislation. We noted the evidence of BT when it talked about the costs being dictated by its implementation approach, and we continue to discuss implementation with those communication service providers likely to be inspected. Whatever the final cost, however, the important underwriting by the Government is a vital factor in giving reassurance to the industry, not only on the practicability of these measures, but on the importance therefore of involving the Secretary of State.
My worry is that if we went down the road proposed by the amendments, we would end up with a rather confused system that would not allow for the overall benefits of retaining a particular type of data, because the judicial commissioner would only ever be able to consider the benefits to the particular public authority applying for a warrant. It would therefore be impossible to judge the overall necessity and proportionality of requiring a particular company to retain a particular dataset.
We have heard about new clause 10 and its provisions. Given that it is impossible to predict in advance what data would need to be retained, this approach relies on data being retained only after a crime has been committed and/or an investigation has begun. Preservation only works if the data are there to preserve and it is of limited benefit without an existing retention scheme. Without data retention, data protection rules require that the data that are no longer needed for business purposes must be deleted. Without data retention, the data that are needed would not exist. Therefore, the regime of warrantry—the double lock, indeed the proposals put forward by Opposition Members—none of it would matter, because the material would not be there. That is particularly relevant when it comes to the increasing move of criminals and their ilk away from conventional telecommunications to the internet and internet connections.
A number of reports published by the EU Commission show the value of communications data and why the concept of data preservation, as envisaged in new clause 10, is not a viable alternative. In a Europe-wide investigation into online child sexual exploitation, of the 371 suspects identified here in the UK, 240 cases were investigated and 121 arrests or convictions were then possible. Of the 377 suspects in Germany, which does not have a data retention regime, only seven could be investigated and no arrests were made.
I have explained why the existing data retention regime that the Bill replicates is the appropriate model. May I deal with the change proposed by a set of amendments that involve changing the word “may” to “must” in clause 78(2)? That would require a data retention notice to cover certain issues. I am sympathetic to the aim of the amendment, because I am in favour of specific requirements, but the amendment is misconceived because subsection (7) already requires that a retention notice must specify the operator to whom it relates, the data which are to be retained, the period of retention, the requirements and restrictions imposed by the notice, and information on costs. Subsection (2) sets out the scope of what a notice may require and subsection (7) requires that the notice must make clear what is required. The two subsections are therefore aimed at different things.
The effect of this amendment would be to require a notice to cover issues that it might not have any reason to cover. For example, a retention notice may
“make different provision for different purposes”.
With respect, it therefore does not make sense to say it must make different provision for different purposes, because a notice may not relate to those different purposes. I would argue that there is therefore nothing to be gained by moving these amendments. That is all I wish to say, but for those reasons I urge hon. Members to withdraw the amendments.
Clause 78 is important for all the reasons that I have set out, but at this stage, I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 303, in clause 78, page 61, line 12, leave out—
“of all data or any description of data”
and insert
“of specified relevant communications data”.
With this it will be convenient to discuss the following:
Amendment 304, in clause 78, page 61, line 14, leave out paragraph (2)(d).
Amendment 305, in clause 78, page 61, line 16, leave out paragraph (2)(e).
I will not detain the Committee for too long; these issues have already largely been addressed. Amendments 304 and 305 seek to remove paragraphs (d) and (e) from clause 78(2). In a Bill replete with vagueness, those two subsections stand out as being particularly vague. The new clause that I will come to in a moment would require a data retention notice—or warrant, as we would wish—to be issued only for a specific investigative or operational purpose. The SNP has tabled amendments that will bring greater clarity to when and why a warrant would be issued.
As we know, communications data are defined as data that would be used to identify, or assist in identifying, the who, where and how. However, instead of allowing a blanket surveillance approach that treats everyone as a suspect, the amendments would allow the police to apply to a judicial commissioner for targeted retention warrants, in which data are required for the purposes of a specific investigation into serious crime, or for the purpose of preventing death or injury. I trust that these amendments are acceptable to the Government.
I rise to address the concerns of the hon. Gentleman. It is good to hear from him; I should have said that during the last group. He has made the point about his concerns of vagueness. However, I would argue that it is very important that a notice can have a degree of flexibility within it, because a single telecommunications operator may provide a number of different communications services, such as mobile telephony and internet access. However, there may be different complexities and sensitivities about the different types of communications data that are generated by those services. Considerable preliminary work is carried out between the Government and telecoms operators in advance of the service of a retention notice. That covers a number of issues, including the type of data that will be retained, the complexities of the operator’s systems, and the relevant security requirements. Flexibility is needed to ensure that the notice can appropriately reflect those issues, and that it imposes the minimum requirements necessary to meet the operational requirements.
What we are counter-intuitively getting at is to make sure that there is necessary give and take within the system to prevent what the hon. Gentleman and I would regard as an overweening approach from the Secretary of State, which would impede the ability of communications service providers to carry out their operations. For that reason, I respectfully urge him to withdraw the amendment.
I hear what the Solicitor General has said, but I do not wholly agree with him. I reserve the right to bring this back at a later stage. I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 306, in clause 78, page 61, line 18, at end insert—
‘(2A) A retention notice may not require a telecommunications operator to retain any data belonging to a third party data, unless that third party data is retained by the telecommunications operator for their own business purposes.”
With this it will be convenient to discuss amendment (a) to amendment 306, leave out “notice” and insert “warrant”.
Amendment 306 would insert at the end of clause 78(2) a provision in relation to third party data. Third party data are defined in the code of practice as data that a communications service provider is able to see
“in relation to applications or services running over their network…but does not process that communications data in any way to route the communication across the network”.
To its credit, the Home Office has been unequivocal that such third party data would not be covered in the Bill; the Home Secretary informed the House on 4 November 2015 that the Bill
“will not include powers to force UK companies to capture and retain third party internet traffic from companies based overseas”.—[Official Report, 4 November 2015; Vol. 601, c. 969.]
The draft code of practice for communications data states at paragraph 2.61:
“A data retention notice can never require a CSP to retain the content of communications or third party data”.
The overly broad definition of relevant communications data, which now extends to 16 different definitions and sub-definitions, could however be interpreted as giving the Secretary of State the power to require a communications service provider to retain third party data, since the definition does not expressly exclude third party data unless this amendment is agreed. There are currently no clauses in the Bill that explicitly state that communications service providers will not be required to retain third party data. That is the purpose of the amendment. Given that they have been so clear on the Floor of the House and in the code of practice that that is their intention, if the Government will not accept the amendment, the Minister must tell us why. Where we are dealing with such potentially intrusive powers, we must be as clear as possible.
Amendment 306 is tabled, quite properly, to tease out from the Government the more detailed reasoning behind the important statement made by the Home Secretary on Second Reading. The hon. and learned Lady is quite right to refer to that statement. I once again reiterate the Government’s position that we will not be requiring the retention of third party data through these provisions.
The question is how best to achieve that; therein lies the tension. Attractive though the approach advanced by the hon. and learned Lady might be, there are some drafting issues and problems about legal certainty, which mean that putting those provisions in the Bill with suitable detail is problematic.
One of the main functions of the Bill—and one of my desiderata—is to ensure that it is resilient and stands the test of time. My concern is that if we end up with a definition that is too technologically neutral, it will either fail the test of time in this place, or be subject to challenge. As a Law Officer, legal uncertainty is something I have to take very seriously when considering how legislation is presented. That is why I commend the detailed provisions within the draft code of practice on third party data—paragraphs 2.68 to 2.72—that the hon. and learned Lady referred to. That is not only an explicit reiteration of our commitment but the sort of detail needed for those operating the provisions, which could not be properly put in the Bill.
It is generally well understood what third party data are, but perhaps I should briefly explain the important areas of detail that could not be covered on Second Reading. Where one communications service provider is able to see the communications data in relation to applications or services that run over their network, but does not process that communications data in any way to route the communication across the network, then that is regarded as third party data. For example, an email provider, such as Yahoo or Gmail, knows that a certain internet access service, such as BT Internet, was used to send email, but that fact is not needed or used to send it. So it is in everybody’s interest, not least that of the service providers themselves, that there is sufficient clarity about the data that can be retained under the provisions. As I have said, I think the code of practice is the right vehicle for this. It is also the appropriate vehicle for ensuring that there can be a sufficiently detailed definition of third party data for the reasons I have outlined. In those circumstances, I respectfully ask the hon. Lady to consider withdrawing her amendment.
I am not happy about withdrawing the amendment in the absence of elaboration of what the Solicitor General means by drafting issues and problems of legal certainty. I am not clear at the moment why we cannot have both the amendment and the further elaboration that will be provided in the codes of practice.
Amendment proposed to amendment 306: (a), leave out “notice” and insert “warrant”.—(Gavin Newlands.)
Question put, That the amendment be made.
I beg to move amendment 317, in clause 78, page 61, line 34, leave out “(or description of operators)” and insert “or operators”.
With this it will be convenient to discuss the following:
Amendment 315, in clause 78, page 61, line 37, leave out “(or description of operators)” and insert “or operators”.
Amendment 319, in clause 78, page 61, line 42, leave out “(or description of operators)” and insert “or operators”.
Amendment 328, in clause 79, page 62, line 33, leave out “(or description of operators)” and insert “or operators”.
Amendment 338, in clause 80, page 62, line 42, leave out subsection (3).
Amendment 361, in clause 83, page 64, line 16, leave out “(or description of operators)” and insert “or operators”.
Amendment 374, in clause 83, page 65, line 1, leave out “(or description of operators)” and insert “or operators”.
Amendment 375, in clause 83, page 65, line 8, leave out “(or description of operators)” and insert “or operators”.
The SNP has tabled the amendments to provide for clear, appropriate and limited grounds on which data retention warrants may be issued. The amendments require that the data to be retained are specified and that organisations served with warrants to retain communications data should be identified rather than merely described.
Amendments 315 and 317 affirm that organisations that have been served a notice or warrant to retain the communications of their customers are properly and explicitly identified. The term “description of operators” is far too vague and we urge that it is changed to “or operators”. Amendment 328 ensures that those organisations are defined and named before a retention notice can be issued. Amendment 338 removes the possibility of the Home Secretary being able merely to describe the telecommunications operators that she wants to target. Amendments 361, 374 and 375 provide the basis for a concrete description to be included when there is any variation of a notice.
The amendments attempt to bring to the Bill some clarity, which is sadly lacking. It is not good enough that the Home Secretary can sign a notice that merely describes who is impinged on or directly affected by these intrusive powers, because that approach opens up the space for the powers to be abused. We need to act to ensure that, as much as possible, we operate a targeted approach.
I understand the purpose behind the amendment in that, in the opinion of the hon. Member for Paisley and Renfrewshire North, it would ensure greater specificity in the giving of notices. However, I shall give a brief example of what a “description of operators” might be. With this provision we would have been able to give the same retention notice to all wi-fi providers supplying wi-fi to the Olympic park in London during the 2012 Olympics. In these circumstances the operators are providing precisely the same kind of communications service and the data required to be retained are the same. Whether a notice relates to a description of operators or to a single operator, it can only contain what the Bill’s provisions allow and the Secretary of State must consult with the operators to which it relates. Operators also have the opportunity to refer the notice back to him or her in relation to any aspect of it. Therefore, on that basis, I invite the hon. Gentleman to withdraw his amendment.
I am content to withdraw the amendments at this stage. I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I rise to speak to amendment 152, in clause 78, page 61, line 36, at end insert “, and
(c) only when approved by the Investigatory Powers Commissioner.
(5A) In deciding whether to approve a notice, the Investigatory Powers Commissioner must determine whether a notice is—
(a) that the conduct required by the notice is necessary for one or more of the purposes in section 53(7); and
(b) that the conduct required by the notice is proportionate to what is sought to be achieved by that conduct.”
With this it will be convenient to discuss the following:
Amendment 153, in clause 78, page 61, line 38, leave out “Secretary of State” and insert “Investigatory Powers Commissioner”.
Amendment 222, in clause 83, page 64, line 21, at end insert “and
( ) the variation has been approved by the Investigatory Powers Commissioner.”
For better or for worse, I spoke to these amendments during my submission on earlier amendments. I do not have any additional points and I will not press the amendment.
I beg to move amendment 320, in clause 78, page 62, line 13, leave out subsection (9) and insert—
“(9) In this Part ‘relevant communications data’ means—
(a) communications data of the kind mentioned in the Schedule to the Data Retention (EC Directive) Regulations 2009 (SI 2009/859), or
(b) relevant internet data not falling within paragraph (a).
(9A) In this part ‘relevant internet data’ means communications data which may be used to identify, or assist in identifying, the sender or recipient of a communication (whether or not a person).”
Thus far while debating the clause we have covered providing for the judiciary, in the shape of judicial commissioners, to issue data retention warrants rather than notices, and removing the Secretary of State from the role, making it clear on the face of the Bill who is eligible to apply for a warrant; limiting the grounds for the issuing of warrants; ensuring that all targets are identified and not described; and that the data to be retained should be specified. The fact that we in opposition have had to table so many amendments highlights the main problem in the drafting of the Bill: vagueness. The Bill is wholly lacking in specificity and clarity and nothing highlights that more than the issue of internet connection records.
As trailed by my hon. and learned Friend the Member for Edinburgh South West during the debate on clause 54, the SNP has significant reservations about the provisions on internet connection records as drafted in the Bill. Not only are the definition and legality of the provisions unclear, but the Government's case for ICRs has simply not been made. Amendment 320, which stands in my name and that of my hon. and learned Friend, would effectively remove ICRs from the Bill and replicate the Data Retention and Investigatory Powers Act 2014 in its original form, to ensure that the definition of “relevant communications data” is consistent with current legislation. That will help provide the legal certainty and clarity that the industry needs to understand its legal obligations appropriately. At the moment the industry is having difficulty in understanding what exactly the Government want and require it to do. Although the industry is willing to work with the Government to try to implement their vision for ICRs, it does not know what ICRs are, and it looks as though the Government do not altogether know either.
Despite the significance of ICRs, very little detail about them has been provided, with the Government consistently saying that the detail can be worked out later. That lack of clarity is simply not good enough when the Government are asking us to sign off on legislation that will have a significant impact on the industry and impinge significantly on the right to basic privacy that our constituents, quite rightly, expect. Indeed, the Internet Service Providers Association says:
“The Investigatory Powers Bill deals with highly complex technical matters, however, our members do not believe that complexity should lead to a Bill lacking in clarity.”
I could not agree more. As has been mentioned already, the clearest definition of an ICR is not in the Bill itself but in the document “Operational Case for the Retention of Internet Connection Records” from the Home Office. That describes ICRs as
“a record of the internet services that a specific device connects to – such as a website or instant messaging application – generated and processed by the company providing access to the internet.”
A concrete definition of what specific data form an ICR, exactly who has access, precisely what for and exactly who must retain the data must be on the face of the Bill.
The Home Office may want to have a “flexible” definition, as typified in clause 54(6), but given that we are dealing with a Bill that may have the biggest impact on civil liberties than any other Bill for generations, that simply will not cut the mustard. The Intelligence and Security Committee helpfully referred to ICRs as providing information on the “who, when and where” of someone’s internet use. The Government claim that they have no plans to acquire the content of the said communications, but DRIPA and RIPA suggest that that does not matter, given that acquiring the sort of information that is going to be held under an ICR can provide important details on the date, time, location and type of communication used. Liberty suggests that ICRs will provide a detailed and revealing picture of somebody’s life in the digital age. That point was highlighted by the Information Commissioner when he said that ICRs can reveal a great deal about the behaviours and activities of an individual. In fact, Stewart Baker, former senior counsel to the United States National Security Agency, stated that it
“absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.”
Based on those statements alone, it is important to assess the proportionality and necessity of ICRs, but also question whether they are in accordance with the law. We live in a digital world and, quite rightly, our constituents place a lot of importance on their right to privacy as they use the internet. We accept that the security authorities need adequate powers to keep us safe and it is only proper that the Government consider what new powers they need for the digital age. However, like most people, I am deeply concerned about the complete lack of specifics about ICRs. In publishing such widely drafted legislation and telling the sector that the detail will come shortly, the Government are asking us all to trust them. They are asking us, as Members of this House, to pass and approve legislation without knowing what its full impact, costs or consequences—unintended or otherwise—will be. In effect, they are asking us to sign a blank cheque on much of the communications data powers. Is that really a proper and effective way to devise and develop legislation that has such civil liberty repercussions?
The SNP is not opposed to certain authorities having the power to obtain communications data or internet connection information critical to their investigations. We fully accept that some power is not only necessary, but crucial, for law enforcement in the 21st century. However, rather than a blanket collection of the websites that everyone in the UK has visited in the last 12 months, we prefer a specific, targeted solution. We agree that intercepting someone’s communication data can be an important part of any criminal investigation and it is important that we do that for those suspected of being engaged in criminal activity. There is an obvious difference, though, in intercepting the communications of those suspected of criminal activity and those of the vast majority of our constituents, who are, by and large, law-abiding citizens.
The Government are asking companies to hold and retain information on all the internet sites that an individual visits. It is unclear how much information the Government want those companies to hold, but it is clear that it is going to be a huge amount of data and we still do not know about the feasibility or costs involved. The sort of information that the Government want companies to retain could be sites that the person has mistakenly accessed; it could be a website that the person has spent only a few seconds on; it could also be an internet site that a person has accessed for deeply personal reasons, such as receiving advice on domestic violence or on health matters. Putting the sensitivity and privacy argument to one side, we need to consider whether the Government are going to have too much information at their disposal and thus, inadvertently, make it harder for our security services to complete their investigations.
During the evidence session I made a point about mobile devices always being connected to the internet via various apps, following a similar point made by the hon. and learned Member for Holborn and St Pancras. Those applications are constantly creating ICRs and that will increase as phones become even more advanced and able to process more information more quickly, with bigger memories.
It is unclear how many automatic ICRs are being created by my phone alone, but the Government are demanding that the various communications companies retain these ICRs for a period of 12 months. Conversations with people in the industry have shown that companies have yet to figure out how they will separate the automatic data that are generated through a third-party app from the data that are generated manually by a user. According to the definitions in the Bill, both will generate the same data, showing that the user has accessed an app and recording the date, location, time and so on of that use.
Another industry expert told me that a single app could generate up to 100 ICRs per minute—that is just one single app. I am unsure of the figures for over here, but in America there is an average of 27 apps on every smartphone. If it is the same in the UK, and taking into account the average number of apps and possible connections, this could lead to 2,700 ICRs per phone per minute, or 100,000 ICRs per phone per day. Well over 3 million ICRs could be generated just by the phones in this room. The third party app issue has been raised by the industry time and time again, but it has not been properly addressed by the Government. In evidence given to this Committee, the CEO of BT security, which has been working with the Government, said in response to the third party app issue:
“We are considering whether to propose an amendment to the Home Office on the third party data question, which is the case in point here, and how that should be approached. We think that the principle is that other providers who have that data are the ones who should be subject to it, and that it should be explicit in the Bill”.
I then pressed him on whether at the moment the Bill was not clear enough on that aspect. He replied:
“It could be clearer, and we are thinking about proposing an amendment specifically to over-the-top providers, making it clear that they are responsible for that”.––[Official Report, Investigatory Powers Public Bill Committee, 24 March 2016; c. 49, Q137-138.]
I have to say, if BT are unsure who is involved, how are the rest of the industry supposed to know? We have to ask whether or not it is necessary or proportionate for the Government to have information and data on the apps that I or anyone else has on their phone. Given these points, among others, I can understand why so many people are calling ICRs a Home Office solution to a police problem, instead of being a police solution to a police problem. This point was articulated during the evidence session by Sara Ogilvie of Liberty, who said:
“It seems clear that, given the bulk nature of these powers, they will not deliver that kind of information in a helpful manner. If anything, it seems more likely to drive criminals to use bits of the internet that will not be captured by the service”.––[Official Report, Investigatory Powers Public Bill Committee, 24 March 2016; c. 15, Q31.]
We also need to be mindful of the amount of information that we want to expose and the potential for this to be targeted by criminal hackers. When a similar plan to collect web logs was proposed in 2012, the Joint Committee on the draft Communications Data Bill concluded that it would create a
“honeypot for casual hackers, blackmailers, criminals large and small from around the world, and foreign states”.
This wealth of data in the wrong hands could be used for identity theft, scamming, fraud, blackmail and even burglaries, as connection records can show when internet access occurs in or out of the house, representing a daily routine. This is an unacceptable level of risk to inflict on innocent internet users. The Chair of the Science and Technology Committee said:
“There remain questions about the feasibility of collecting and storing Internet Connection Records (ICRs), including concerns about ensuring security for the records from hackers. The Bill was intended to provide clarity to the industry, but the current draft contains very broad and ambiguous definitions of ICRs, which are confusing communications providers. This must be put right for the Bill to achieve its stated security goals”.
Furthermore, not to be outdone, the Joint Committee tasked with scrutinising the draft Communications Data Bill said in its final report that,
“storing web log data, however securely, carries the possible risk that it may be hacked into or may fall accidentally into the wrong hands, and that, if this were to happen, potentially damaging inferences about people’s interests or activities could be drawn”.
Surely with these warnings, which were issued by such influential and important Committees, the Government should have listened and addressed some of their concerns, but it would seem not. With regard to some of the case studies laid out in “Operational Case for the Retention of Internet Connection Records”, the likelihood of ICRs proving vital in identifying criminals has been questioned by ISPs and technologists. The justification for ICRs being helpful relies on the assumption that online criminals offend using a regular browser or public file sharing service on their own device, using personal internet connections, without employing the most basic of the widely available anonymity tools to avoid detection. The use of VPNs or Tor helps anonymise users of the internet. As such, ICRs will be unusable and, in fact, misleading where such privacy tools have been used. It is obvious for all to see that the more information that is retained, the greater the costs entailed to either the industry or the taxpayer.
When I spoke to people at TechUK last week, they explained that the introduction of ICRs will be a significant change to the industry and that all organisations will have to re-adapt to meet the new expectations and responsibilities that are being put on them. In addition, they are concerned about the new types of technology that they will need to install to allow them to cope with the new demands from Government. For example, they are concerned that many in the industry will have to install new filtering systems to help companies deal with the vast amount of data they now have to retain. It is difficult even to question the feasibility of such demands due to the limited information and detail provided by the Home Office.
This is the first speech I have made in this place that has required an intermission. It has been suggested that I start from the beginning as I cannot remember where I had got to. I am nothing but a crowd pleaser, Ms Dorries, but I have found the place where I left off, so I shall continue.
I was saying that the question whether the Bill is in accordance with the law is up for debate. If this part is left unchanged, Liberty and others suggest that it will be in conflict with human rights law, including breaching the EU charter of fundamental rights and freedoms. In July 2015, the High Court upheld its challenge and struck down sections 1 and 2 of the Data Retention and Investigatory Powers Act 2014, finding them incompatible with the British public’s right to respect for private life and communications, and protection of personal data under articles 7 and 8 of the EU charter of fundamental rights.
In addition, we should be mindful that the challenge against DRIPA is ongoing and that the outcome will have an impact on whether this part of the Bill is lawful, although I suspect not. On that basis, I question whether ICRs will do the job the Government intend them to do. The Home Office has become entrenched with regard to ICRs and its fixation with them is clouding its ability not only to look at alternatives, but to assess whether ICRs are proportionate, necessary or in accordance with the law. The SNP believes that ICRs fail those three basic assessments.
I want to quote an unlikely ally, who, in 2009, said in Committee:
“Our consideration of the regulations comes against the backdrop of an increasingly interventionist approach by the Government into all of our lives, seemingly taking the maxim ‘need to know’ to mean that they need to know everything. Certainly, we need to know what the Government’s intentions are in relation to the creation of a new central database, which would create a central store of our electronic communications.”—[Official Report, Fourth Delegated Legislation Committee, 16 March 2009; c. 6.]
That ally was none other than the right hon. Member for Old Bexley and Sidcup (James Brokenshire), now Minister for Immigration at the Home Office, speaking in a Delegated Legislation Committee on an EC directive with very similar provisions to parts of this Bill. That statutory instrument was passed by the House, but notable opponents included Members who are now Scottish Secretary, Home Secretary and Minister for Security—the Minister in charge of this Bill.
We in the SNP are mindful of the evidence that has been presented and submitted to the Committee, but it is our opinion, backed up by case law, that the power to retain ICRs is incompatible with the right to privacy and the protection of personal data, and I urge hon. Members to amend the Bill and ask the Government to think again.
I am grateful to hon. Members for this important debate, which, although it relates to an amendment, inevitably strayed into what is, in effect, the stand part debate on communications data.
The hon. Member for Paisley and Renfrewshire North set out his case comprehensively, but his arguments relate to measures and proposals that are not before the Committee. We have moved a long way from 2009, and certainly from 2012, when the original draft Bill was considered by a predecessor Joint Committee. We are not in the situation where the Government will hold a centralised database. That sort of measure was rightly opposed by my right hon. Friend the Minister for Immigration and other of my hon. Friends at that time, because we are naturally suspicious of an organ of Government directly blanket-holding such data.
That is why this provision is not remotely like that. It does not contain anything like the provisions that the hon. Gentleman rightly cautions against, most importantly because the retention of that data is not in the hands of Government. That arm’s length approach is a key difference, which I am afraid undermines all the seeming quality of his argument.
Will the series of private databases under the Bill be any safer from hacking than a central Government database?
The hon. Gentleman makes a proper point about security. This, in respect of the code of practice and in collaboration with the industry, will be at the forefront of everybody’s mind. What is important is that the Government do not have a pick-and-mix or help yourself avenue within which they can mine data for their own capricious purposes.
The framework of the Bill quite properly severely circumscribes the circumstances within which the Government can seek access to that material. Most importantly, when it comes to content, the warrantry system—the world-leading double lock system we are proposing—will apply. An internet connection record is not content; it is a record of an event that will be held by that telecommunications operator. It relates to the fact of whether or not a customer has connected to the internet in a particular way. If it goes further into content, the warrantry provisions will apply. It is important to remember that framework when determining, and describing and putting into context, what we are talking about. The Committee deserves better than indiscriminate shroud-waving about prospects and concerns that simply do not arise from the measures in the Bill.
The hon. Gentleman quite properly raised the Danish experience. The Danish Government and authorities are in regular conversation with the United Kingdom Government. That dialogue goes on because they are naturally very interested to see how our model develops, although there are important differences that should be set out briefly. The Danish legislation was not technology neutral, unlike these proposals, because it specified two options that proved unworkable. We work with operators case by case so that the best option for their network at the appropriate time will be determined. The Bill builds on existing data retention requirements, such as the retention of data necessary to resolve IP addresses, which regime already exists under the Counter-Terrorism and Security Act 2015. The full cost recovery underpinning by the Government means that there is no incentive for communications service providers to cut corners, as I am afraid happened in Denmark. There are important differences between the two.
The hon. Gentleman rightly talks about IPV6. Although it is a great aim and something that all of us who have an interest in this area will have considered carefully, it still is, with the best will in the world, a way away, I am afraid. It will take a long time for all service providers to implement in full, and until then, there will be both types of system. Even with IPV6, CSPs may choose to implement address sharing or network address translation, meaning that it is not the guaranteed solution that perhaps has been suggested. Servers who host illegal material are much less likely to move to that system, meaning that, in practice, IPV4 may well remain with us. We therefore have to act in the interim, because, as has been said, the drift away from what I have called conventional telecommunications to the internet carries on whether we like it or not. We have to face up to the world as it is, rather than the world as we would love it to be, and therefore take into account the fact that we are in danger of being unable to detect criminality and terrorism.
The Solicitor General says we have to face up to the world as it is. Why is it, then, that no other democratic nation in the world is implementing legislation of this sort?
The hon. and learned Lady has asked that question before, and I have said to her before that somebody has to step up, try it and make that change. I am proud that the United Kingdom is prepared to do that, as we have done it in so many ways.
Is the Solicitor General aware that it is not that other countries have not looked at the problem? They have looked at the problem and decided that this is not the way to solve it.
I am afraid I do not agree with the hon. and learned Lady. What they have looked at is the sort of centralised, governmental-based database that all of us have quite properly rejected. They are looking with interest to see how this particular proposal develops, bearing in mind that it has now been refined through many Committees of the House. Accordingly, I think what we are doing is innovative, world leading and, with its technology-neutral approach to the definitions, striking the right balance.
The problem with the amendment as I see it is not only that it is technically deficient, but that, on close reading, it does not exclude the retention of internet connection records, because it talks about the sender and recipient of communications, which is either end of the communication we are talking about when it comes to ICRs. Let us assume that that is an error. Even if we consider its intention at face value, the problem with going back to the 2009 regulations is that we are returning to the language of dial-up—the sort of non-broadband, non-mobile internet access we were all used to 15 years ago, but which now belongs in a museum. If we imprison ourselves in that sort of language, the danger that I have outlined becomes very real.
What next? Are we going back to the telex or the marconigram? We have to make sure that the language of the Bill keeps pace with the breathtaking scale of technological change. In the words of the hon. Member for Paisley and Renfrewshire North, the amendment just does not cut the mustard and I urge that it be withdrawn.
I hear what the Minister has to say but I am not assuaged by his comments, so this shroud-waver would like to press the amendment to a vote.
Question put, That the amendment be made.
I beg to move amendment 175, in clause 79, page 62, line 34, at end insert—
“() the public interest in the protection of privacy and the integrity of personal data; and
() the public interest in the integrity of communications systems and computer networks.”.
Clause 79 sets out those matters to be taken into account before giving a retention notice, as well as likely benefits and the likely number of users. Amendment 175 would add two public interest matters to that list. My argument is similar to the one I made on other provisions. Where matters are to be taken into account, it is important that the protection of privacy and the integrity of personal data and of communications systems are specifically listed. I have moved to a position of thinking that an overarching privacy clause is probably the way to achieve this end; this is therefore a probing amendment and I will not press it to a vote.
I am grateful for the way in which the hon. and learned Gentleman states his case. To put it extremely simply, we would argue that the public interest in the protection of privacy and in the integrity of personal data are already factored in by the provisions of the Bill.
First, proportionality must include consideration of the protection of privacy. Secondly, the integrity of personal data being such an important public interest is why clause 81 requires any retained communications data to be of at least the same integrity as the business data from which they are derived. A retention notice will therefore not be permitted to do anything that would undermine the integrity of the data that the operator already holds for business purposes. That is all I want to say about the matter, but I assure hon. and learned Gentleman that those important considerations are at the heart of the processes we have followed.
I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Clause 79 ordered to stand part of the Bill.
Clause 80
Review by the Secretary of State
I beg to move amendment 179, in clause 80, page 62, line 40, leave out “Secretary of State” and insert “Judicial Commissioner”.
With this it will be convenient to discuss the following:
Amendment 190, in clause 80, page 63, line 7, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 191, in clause 80, page 63, line 8, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 192, in clause 80, page 63, line 10, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 195, in clause 80, page 63, line 25, leave out “Secretary of State” and insert “Judicial Commissioner”.
Amendment 196, in clause 80, page 63, line 31, leave out “Secretary of State” and insert “Judicial Commissioner”.
As members of the Committee will have observed, these tidying-up amendments are consistent with previous amendments that would have entrusted decision making to a judicial commissioner rather than the Secretary of State. We had the discussion in principle in relation to those earlier amendments, which I withdrew, and I will not repeat my arguments now, although I would like to return to them at a later stage.
As the hon. and learned Gentleman says, the amendments would require that review under clause 80 be by a judicial commissioner rather than the Secretary of State. Will the Government tell us why the provision of such a route of review would not, in their opinion, give the telecommunications providers greater reassurance that notices are not only lawful, necessary and proportionate but stable and legally certain? It seems to me that a review by a judicial commissioner, or at the very least by the Investigatory Powers Commissioner, would provide that reassurance.
The hon. and learned Lady asks a perfectly proper question. I reiterate the position that we have taken in principle: the Secretary of State is the appropriate and accountable person to be responsible for reviewing retention notices. However, although the Secretary of State must be responsible for giving notices and must therefore be the person ultimately responsible for deciding on the outcome of the review, that does not mean that she or he can make the decision on the outcome of the review without consultation—far from it.
Clause 80(6) ensures that the Secretary of State must consult both the Investigatory Powers Commissioner and the technical advisory board. The commissioner must consider the proportionality of the notice; the board must consider the technical feasibility and financial consequences of it; and both must consult the operator concerned and report their conclusions to the operator and the Secretary of State. Only then can the Secretary of State can decide whether to vary, revoke or give effect to the notice. That system provides rigorous scrutiny of the notice and maintains the accountability of the final decision resting with the Secretary of State. We therefore believe it is the best mechanism for review. Accordingly, I commend the unamended clause to the Committee.
I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Clause 80 ordered to stand part of the Bill.
Clause 81
Data integrity and security
Question proposed, That the clause stand part of the Bill.
I seek the Minister’s guidance. Throughout our considerations, I have spoken of my fears whether data held under this Act are held securely. I hope that clause 81 will address many of my fears; I seek the Minister’s advice on whether it lays responsibility on communications providers to maintain those data securely. I simply reiterate my concern that when theft does take place, there has to be a consideration of an offence of unlawful possession of stolen data, on the basis that the communications provider that has suffered the theft would also be legally responsible for that theft when the provider is in fact a victim of the theft itself. Bodies that seek to obtain illicitly a person’s private communications data may try to make financial gain as a result. Is the Minister confident that clause 81 gives me the kind of assurances that I have been looking for on internet security? Is there sufficient deterrent, in terms of possession of unlawfully obtained data, that might be included later in the Bill?
The hon. Gentleman has been consistent in stating his concerns. I assure him that clause 81 contains the sort of requirements that he would reasonably expect. It sets out the matter clearly. It should be read in conjunction not only with other legislation that I have mentioned, such as the Data Protection Act 1998 and the Privacy in Electronic Communications Regulations 2003, but with clause 210, which provides for the Information Commissioner to audit the security, integrity and destruction of retained data, and the codes of practice to which I referred earlier. The provisions in the communications data draft code of practice go into more detail about the security arrangements.
We had a discussion some days ago about the existence of adequate criminal legislation. The Bill has a number of provisions that relate to those who hold data, and we discussed whether existing legislation could cover those who come into possession of the data unlawfully. I say to the hon. Gentleman that I will take the matter away and consider it, and come up with a proper considered response to his query.
Question put and agreed to.
Clause 81 accordingly ordered to stand part of the Bill.
Clauses 82 and 83 ordered to stand part of the Bill.
Clause 84
Enforcement of notices and certain other requirements and restrictions
I beg to move amendment 225, in clause 84, page 65, line 20, after “not”, insert “, without reasonable excuse,”.
There are two points to make here. One is to state the principle that reasonable excuse defences are needed to protect those who are exposed in wrongdoing. We had that debate last week and I listened carefully to the response given. The practical reason is the inconsistencies may be intentional, or they may be unintentional. Clause 73(1), under which unlawful disclosure is made an offence under part 3, has a “without reasonable excuse” provision. Clause 84, which is in part 4, does not. There may be a very good reason for that, but it escapes me at the moment. That is either a point that the Solicitor General can deal with now, or I am happy for him to deal with it later on. It may be just one of those things when you draft a long, complicated Bill, but there is an inconsistency of approach here, because reasonable excuse is sometimes written in and other times not, for no apparent reason.
The hon. and learned Gentleman askes what the policy objective is of not having such a defence. The clear policy underlining this is the Government’s policy of not revealing the existence of data retention notices. They are kept secret because revealing their existence could damage national security and hamper the prevention and detection of crimes, because criminals may change how they communicate in order to use a provider that is not subject to data retention requirements. Clause 84 places a duty on providers not to reveal the existence of notices.
Just to be clear, I do not need to be persuaded about the policy objective of a clause that keeps a retention notice safe. It is the policy objective of not having a “reasonable excuse” defence to the provision, which operates as an exclusion to the prohibition, of which I need to be persuaded. I do not need persuading about the prohibition for safety.
I was coming to that. We are talking about a duty here; the earlier clause the hon. and learned Gentleman referred to is an offence. That will, I think, explain the importantly different context.
To deal with the question of “reasonable excuse”, the problem is that once the information is out in the public domain, it cannot be withdrawn—whether that information has been introduced with good or bad intentions does not matter. It cannot be right for the Bill to allow a person to release sensitive information in that way and then subsequently rely on a “reasonable excuse”.
May I deal with clause 84(4), which is relevant to this provision? It provides an exemption where the Secretary of State has given permission for the existence of the notice to be revealed. The Government intend that such permission would be given, for example, where a provider wishes to discuss the existence of their retention notice with another provider subject to similar requirements. Should the operator wish to reveal the existence of the notice, they should discuss the matter with the Secretary of State, and in such circumstances permission is likely to be given. There will be those sort of scenarios, as I am sure the hon. and learned Gentleman will understand, and they will help improve the operational model.
My concern about using the “reasonable excuse” provision in the context of a duty would be that it would undermine the important policy objective that I have set out. For that reason I would urge the hon. and learned Gentleman to withdraw the amendment.
I will withdraw the amendment. As to the difference between a duty and an offence, I understand that in principle, but I am pretty convinced that elsewhere in the Bill a breach of the duty becomes an offence, as otherwise it is an unenforceable provision, so I am not sure it is a distinction that withstands scrutiny. That being said, I am not going to press this to a vote. It would be helpful and reassuring if the Solicitor General would agree to set out the route by which a whistleblower brings this to attention. I think we have already agreed in general terms and it may come within the umbrella of the undertaking that has been given; if it does, all well and good. That would reassure those that have concerns about exposing wrongdoing. I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 223, in clause 84, page 65, line 21, after “person”, insert
“except the Investigatory Powers Commissioner or a Judicial Commissioner”.
With this it will be convenient to discuss amendment 224, in clause 84, page 65, line 26, leave out “Secretary of State” and insert “Investigatory Powers Commissioner”.
These amendments were consistent with earlier amendments that have now been withdrawn, the purpose of which was to put the decision-making power in the hands of the Investigatory Powers Commissioner or the judicial commissioner. The other amendments having been withdrawn, I will not press these to a vote; they do not make sense within the unamended Bill as it now stands.
We have already discussed the importance of protecting the identities of those companies subject to data retention notices, but there are circumstances where a telecommunications operator should be able to disclose the existence of a retention notice. Clause 84 allows the Secretary of State to give them permission to do so. The amendment would ensure that a telecommunications operator could disclose the existence or content of a retention notice to the IPC without the need for permission to be given. I would say the proposal is unnecessary, because it is absolutely the Government’s intention to give telecommunications operators permission to disclose the existence and content of the retention notice to both the relevant oversight bodies—the IPC and the Information Commissioner—at the point at which a notice is given. In any event, clause 203 as drafted would permit the telecommunications operator to disclose a retention notice to the IPC in relation to any of his functions.
Amendment 224 would mean that the IPC, not the Secretary of State, would be granting permission for a telecoms operator to disclose the existence of the notice. In practice the Secretary of State would consider, at the point that a retention notice was issued, to whom the telecommunications operator could disclose the existence of a notice. It would not make any sense for this issue to be considered separately by the commissioner following the issue of a notice by the Secretary of State.
Further requests by a telecommunications operator to disclose a retention notice are likely to cover administrative matters, such as disclosure to a new systems supplier. Such matters should appropriately be considered by the Secretary of State. I think that explanation not only justifies opposition to the amendments, which I know are being withdrawn, but supports clause 84.
I have nothing further to add, so I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 226, in clause 84, page 66, line 15, at end insert—
“(2B) No notice shall be served under subsection (1) where the relevant telecommunications operator outside the United Kingdom.
(a) is already subject to a comparable retention requirement in the country or territory where it is established, for the provision of services, or
(b) where there is no comparable retention requirement under its domestic law, any extraterritorial requirement is limited to the making of preservation requests to the telecommunications operator.”
Committee members will understand why this amendment has been tabled. It reflects the concerns of those who will be caught by these provisions in cases where a comparable retention requirement exists in the country in which they are working. The provisions in this part of the Bill are unnecessary in relation to them. That is the amendment’s intention and purpose.
I think we can deal with this briefly. I entirely agree with the hon. and learned Gentleman: where it was neither necessary nor proportionate to attempt to retain data in another place, we would not do so, so that is very straightforward. All data retention notices that are given to telecommunications companies, whether here or abroad, must pass the test of necessity and proportionality. Where they did not do so, it simply would not happen, because it would not be necessary, so for that purpose the amendment is unnecessary.
The second part of the amendment would remove the ability to serve data retention notices on telecommunications operators in countries that do not have a comparable data retention regime. Of course, the fact that they do not have a comparable data retention regime does not necessarily mean that there are no data to obtain, and I think that this part of the hon. and learned Gentleman’s proposal would add rigidity where flexibility is needed. I accept that there are not always comparable systems, but that does not mean that no system of any kind prevails. Again, with the caveat of proportionality and the proven need established, I think it would be unhelpful to limit our capacity to take action as necessary in the way that he suggests. The same could be said of the third element of his proposal, which is about the preservation of data. When there are no data to preserve, this does not really apply, but when there are, we need at least the capacity, born of the flexibilities provided by the Bill, to take action as is necessary and reasonable.
I am grateful to the Minister. I am sure that those who have the primary concern here will take some comfort from what is said about necessity and proportionality but, in practice, where there are comparable retention requirements in the country, it will rarely, if ever, be necessary or proportionate. Obviously, that will have to be determined case by case, or authorisation by authorisation, but I note what he has said on the record. I therefore beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Clause 84 ordered to stand part of the Bill.
Clause 85 ordered to stand part of the Bill.
Clause 86
Extra-territorial application of Part 4
Question proposed, That the clause stand part of the Bill.
The clause relates to extraterritorial effect and the SNP’s opposition is for the same reasons as outlined in relation to clause 76.
Question put, That the clause stand part of the Bill.
I beg to move amendment 381, in clause 88, page 66, line 38, leave out “information” and insert “specified data”.
This amendment seeks to more clearly outline what material may be obtained by hacking.
With this it will be convenient to discuss amendment 382, in clause 88, page 67, line 40, leave out from “6” to end of line 43.
This amendment requires that an examination warrant is required for the examination of all data, removing the exception of equipment data and the broad category of ‘not private information’ which is collected under bulk warrants.
We need to spend some time on this clause, because it is the one that deals with equipment interference under part 5. There are real concerns about the breadth of the clause, which provides for two kinds of warrant: a targeted equipment interference warrant and a targeted examination warrant. Those warrants allow interference with equipment, such as remote—not always remote—interference with equipment with your, my and many other people’s equipment, Ms Dorries, to secure any of the purposes under subsection (2).
The warrants allow others to interfere with our communications data equipment to obtain “communications”, “equipment data” or, to draw attention to subsection (2)(c), “any other information”—to hack into or interfere with equipment to obtain unlimited “any other information”. That is why the amendment seeks to limit subsection (2)(c) to “any other specified data”. In other words, the clause as drafted will in effect allow interference for pretty well any purpose, as long as it is to obtain information from your computer, my computer, my laptop, your laptop and so on. The provisions are very wide.
The equipment interference in subsection (4) includes interfering by
“monitoring, observing or listening to a person’s communications or other activities”
or
“recording anything which is monitored, observed or listened to.”
Let us pause there and reflect on how wide the provision is. In terms of invasion of privacy, that will put an incredibly powerful provision in the hands of those who will operate these measures.
I intervene merely because I know that the hon. and learned Gentleman is as much a stickler for accuracy as I am and is perhaps even less prone to hyperbole than me. He will therefore want the Committee to consider the draft code of practice, particularly where it deals with exactly the matters to which he is referring. I will discuss this at greater length than an intervention will allow in a moment, but he will see in the draft code of practice a comprehensive list of qualifications to the breadth that he is outlining.
I am grateful for that intervention. I have been referring throughout to the code of practice and its role. Consistent with the in-principle argument I have been making, the Bill and the code serve different functions. I understand the argument that a code is one way not only to give more detail to the provisions in the Bill, but to future-proof it. In other words, a code allows an approach that can be changed without amending the legislation.
As a matter of principle, though, I argue that where limits are to be put on the exercise of the power, and thus important safeguards are in place, they should be in the Bill. What should be resisted is a wide and generalised power in the Bill that finds constraint and limitation only in the code of practice. The extent of these powers should be set out in the Bill. The code of practice is the place for more detailed provision—provision that may change over time—and other obvious future-proofing techniques; it is not the right place for the limitations themselves.
Moving on, consistent with the earlier clauses on warrants, subsection (5) allows conduct in addition to the interference itself in order to do what is expressly authorised or required and any conduct that facilitates or gives effect to the warrant. I now want to take a bit of time on subsection (6).
I am grateful for that intervention. It is helpful to have such matters on the record so that others can follow how the clauses are intended to operate.
Returning to subsection (6), one of the welcome measures in the Bill is that clause 3(4) makes it clear that, when a communication is intercepted, interception includes the communication at
“any time when the communication is stored in or by the system”.
I know that sounds very technical, but it became a real issue in a number of cases in which the question was whether a voicemail that was accessed once it was on a voicemail machine was in the course of its transmission. If the answer to that was no, there was nothing unlawful about retrieving it, listening to it and publishing it. A lot of time and energy went into the interpretation of the relevant clause. One of the advantages of the Bill is that clause 3 spells out in no uncertain terms that communications are protected if they are intercepted in the course of transmission, including if stored either before or after transmission. That protects any communication, sent to us or anybody else, which is either listened to at the time or not, but is later stored either in a voicemail, on a computer or in any way. We all store communications all the time; it is very rare that they exist only in real time. That is a step in the right direction.
We then get to clause 88(6):
“A targeted equipment interference warrant may not, by virtue of subsection (3), authorise or require a person to engage in conduct, in relation to a communication other than a stored communication”.
It protects the communication and excludes its content from this part—I think that is the idea—but only half does the job and leaves quite a gap, in my view. We get back to the same problem. If there is equipment interference to obtain a communication, that communication would be protected from one of these warrants as long as it is in the course of its transmission. If it has arrived, it is not. If I am wrong about this I will stand corrected, but all of the good that was done by amending clause 3 will be undone by clause 88; the same ends could be achieved by using an equipment interference warrant, namely obtaining by interference a communication that is in the course of its transmission, either before or after it is sent.
I am grateful to the hon. and learned Gentleman for his humility in suggesting that he would stand corrected; I now stand to correct him. An equipment interference warrant would not allow interception of real-time information of the kind that he describes. He is right that to intercept that kind of information would require a different process, as we discussed earlier in our considerations. If further explanatory notes need to be made available to provide greater clarity about that I am more than happy to do so. I will talk more when I respond, before you rightly chide me for going on for too long, Ms Dorries.
I am grateful to the Minister. If he could point to the provision that makes good the submission he has just made, then that will deal with this particular point. Just to be clear, subsection (6) is intended to ring-fence and exclude from one of these warrants communications the interception of which would
“constitute an offence under section 2(1)”,
but only in relation to communications in the course of their transmission in the real sense of the term, not including those that are “stored”. I put on the record—if this is capable of being answered, so be it—that “stored” in subsection (6) has the same meaning as in clause 3, which is intended to include stored communications within the prohibition. I will not take it any further; the Minister has my point, which is that one would expect subsection (6) to protect the same content that is expressly protected by clause 3(4), but it does not—unless he or somebody else can point to another provision that adds to subsection (6), though that would be an odd way of doing it.
I will move on. Subsection (9) defines targeted examination warrants. This is important because subsections (1) to (8) deal with targeted equipment interference warrants—warrants issued in a targeted way; the targeted examination warrant deals with examining material obtained by way of a bulk warrant. It therefore serves a different purpose. Subsection (9) is an extremely wide provision:
“A targeted examination warrant is a warrant which authorises the person to whom it is addressed to carry out the selection of protected material…in breach of the prohibition in section 170(4)”.
To understand that, we need to turn to section 170(4), which raises questions that relate to an argument I made earlier on another, not dissimilar, provision. It states:
“The prohibition…is that the protected material may not…be selected for examination if (a) any criteria used for the selection of the material for examination are referable to an individual known to be in the British Islands at that time, and (b) the purpose of using those criteria is to identify protected material consisting of communications sent by, or intended for, that individual or private information relating to that individual.”
That is intended to give protection to individuals known to be in the British islands, by placing limits on the examination of their material: in relation to their material or their communications one needs a targeted examination warrant to get around the prohibition in clause 170(4). The point I make here is similar to the point that I made before: this is temporal. Whether a person is in the British islands or not depends on where they are physically. I am protected so long as I am in the British islands, but I fall out of protection—as would everybody else—the moment I leave them, whether I am leaving for a day, a week, a month or a year. That is a real cause for concern, as is the wide definition of protected material that immediately follows in clause 88(9); amendment 382 would limit the extent of that definition by stopping the clause after the words “Part 6”, which are on page 67, line 40, of the draft Bill.
In conclusion, this is a very wide-ranging clause, and it contains insufficient safeguards—if there are safeguards, they should be in the Bill. There are questions on subsections (6) in (9), taken in conjunction with clause 170(4), that the Minister will have to deal with.
I rise to support the hon. and learned Gentleman in his submissions on these two amendments. As we have just reached part 5, I want to take the opportunity to make some general comments on it. Powers to conduct equipment interference—or “hack”, which is the more generally used term—are new; they do not exist in any previous legislation. They therefore require significant scrutiny, by the Committee and by parliamentarians generally, before they are added to the statute book. By its very nature, hacking is an extremely intrusive power, because it grants the authority to see all past and future information and activity on a computer or other device. Beyond the implications for privacy, the potential ramifications for the whole country’s cyber-security and for fair trials mean that hacking should be used only as a tool of last resort. The SNP’s position is that stronger protections must be added to the Bill.
As the shadow Minister said, part 5 of the Bill is very important. It deals with equipment interference. He is right to say that equipment interference is, by its nature, quite a radical technique—I will explain that in a few moments—but of course it is for a purpose. It fulfils a proper function and allows those missioned to keep us safe to do so by means of the exercise of that power.
Let me deal with the hon. and learned Lady first. I thought that her contribution—I say this kindly because, despite all of my instincts, I cannot help liking her—[Interruption.] Someone said “saintly instincts”. I would not go as far as to say “saintly”; I would say “wholesome instincts”. I thought that her speech exemplified the curious cocktail at the heart of Scottish nationalism: a mix of paranoia and assertiveness.
I have two things to say in response to her. First, these powers are not new; they already exist in the Intelligence Services Act 1994 and the Police Act 1997. Secondly, the exercise of those existing powers has been scrutinised. They are particularly used by GCHQ.
Order. There is a Division in the House. We will suspend for 15 minutes, or 25 if there are two. Be back as quickly as you can if there are three.
Having characterised the Scottish National party in a vivid and, in some people’s view, slightly too generous way, I will move on to the specifics of what the hon. and learned Lady said. She is right that there need to be important safeguards in respect of equipment interference. I do not think that there is any difference between us on that. She is right that GCHQ’s use of equipment interference powers—although they are more widely available, it is GCHQ that uses them particularly—are central to its purpose and of course must be lawful. She will be pleased to know that the Investigatory Powers Tribunal found them to be just that when it looked at the matter as recently as February of this year. Of course it is right, given the radical character of those powers, that we put in place all the right checks and balances. One might say that transparency and stronger safeguards are part of what the Bill is defined by.
It is important to emphasise in that context the draft codes of practice, which I drew attention to in a brief intervention on the hon. and learned Member for Holborn and St Pancras. They are clear in two respects. I draw attention first, in general terms, to part 8 of the draft code of practice on equipment interference, which deals with handling information, general safeguards and so on, and secondly to the specific areas covered in part 4.10, which lists an extensive series of requirements for the information that a targeted equipment interference warrant should contain. I will not go through them exhaustively, Ms Dorries, because that would please neither you nor other Committee members. Suffice it to say that such a warrant should contain details of the purpose and background of the application, be descriptive and clearly identify individuals where that can be done. Those requirements also necessitate an explanation of why equipment interference is regarded as essential and refer to conduct in respect of the exercise of such powers, collateral intrusion, and so on. They are pertinent to the consideration of the clause.
There is always, as I predicted there would be in this case, a debate in Committee about what is put in the Bill and what is put in the supporting material. As you will be familiar with, Ms Dorries, having been involved in all kinds of Committees over time, Oppositions usually want more in Bills and Governments usually want more flexibility. Perhaps that is the nature of the tension between government and opposition. I have no doubt that were the Labour party ever to return to Government, the roles would be reversed; we would be the ones saying, “More in the Bill,” and that Labour Government would probably be arguing for more flexibility. The truth lies somewhere between the two: of course it is important to ensure that there is sufficient in the Bill both to ensure straightforward legal interpretation and to cement the safeguards and protections for which the hon. and learned Gentleman rightly calls, but in achieving those ends one must always be careful that specificity does not metamorphose into rigidity. Where we are dealing with highly dynamic circumstances, changing technology and, therefore, changing needs on the part of the agencies and others, rigidity is a particular worry.
In the Bill as a whole, and in this part of the Bill, we have tried to provide sufficient detail to provide transparency, navigability and a degree of resilience to legal challenge while simultaneously providing the flexibility that is necessary in the changing landscape. That is why the codes of practice matter so much, particularly in respect of this clause and these amendments, and it is why the codes of practice have changed in the light of the consideration of the Joint Committee of both Houses, and others. It is also why I predict—I put it no less strongly than that—that the codes of practice will change again as a result of the commentary that we have already enjoyed in Committee and will continue to provide over the coming days.
The need for equipment interference could not be more significant, and I will explain what it comprises. Equipment interference is a set of techniques used to obtain a variety of data from equipment that includes traditional computers, computer-like devices—such as tablets, smartphones, cables, wires—and static storage devices. Interference can be carried out remotely or by physically interacting with the equipment. Although equipment interference is increasingly important for the security, intelligence and law enforcement agencies, it is not new. Law enforcement agencies have been conducting equipment interference for many years, and I described the legislative basis for that in response to the hon. and learned Member for Edinburgh South West. It is probably fair to say that equipment interference is likely to become still more important as a result of the effect that changes in technology are having on other capabilities. I do not want to overstate this, but encryption, for example, is likely to make equipment interference more significant over time.
I will amplify the clarity with which I delivered my advice to the hon. and learned Member for Holborn and St Pancras. Warrants cannot be issued without specifying what information is being sought, and on that basis it is hard to see why clause 88 should be amended. Chapter 4 of the code of practice states:
“An application for a targeted equipment interference warrant should contain… A general description of any communications, equipment data or other information that is to be (or may be) obtained”.
Together, the provisions provide the issuing authority with the information it needs to assess an application and with the power to constrain the authorised interference as it sees fit on a case-by-case basis. Amendment 382 would extend the requirement to obtain a targeted examination warrant to circumstances where the agencies need to select for examination the equipment data and non-private information of an individual who is known to be in the British islands. I tend to agree with the argument made by the hon. Member for City of Chester in an earlier sitting of the Committee that it is right that there are particular provisions for UK citizens in what we do in this Bill, rather than with the argument made by the hon. and learned Member for Edinburgh South West.
I just want to clarify my concern, because I think the Minister just said, “UK citizens”. I understand that the distinction is made between UK citizens and others. My concern about this provision is that, whether someone is a citizen or not, if they are physically outside of the British Isles they fall outside the protection. That has been my driving concern, or one of my driving concerns, here. There may be a good reason for this and there may be a longer explanation for it, but I was surprised to see in the Bill that the protection was not to British citizens or to some other description of people with the right of residence in this country, but in fact depends on whether someone is physically in the country or not. On my understanding, I lose the protection that is provided by this Bill in this and other provisions if I go to France for a short period of time.
To be fair to the hon. and learned Gentleman, the Bill refers to people within “the British Islands”, so he is right, and there are very good reasons why enhanced safeguards should apply for the content of people in the UK. As he implied, we explored these issues in an earlier part of the debate.
I will conclude, but I want to do so on the basis of clarifying this matter, too. The subsection that the hon. and learned Gentleman described earlier makes it clear that when a warrant for equipment interference is used to examine a phone, the police can look at all data on the phone, including text messages, but not in real time. I wonder whether there has been a misunderstanding or misapprehension about this issue—either a mis- understanding about the meaning or misapprehension about the purpose.
I repeat this solely for the sake of convincing the hon. and learned Gentleman and others that we are doing the right thing. These are important powers with stronger safeguards with absolute determination to be clear about legal purpose; they can only be used when necessary and can only be used lawfully. They are fundamentally not new but a confirmation of what is already vital to our national interest and to the common good.
I am grateful to the Minister for taking us through in some detail how the clause is intended to work with the code of practice. I reiterate my point that the essential safeguards should be in the Bill. Amendments 381 and 382 would not delete the provisions in clause 88; they would tighten the provisions in clause 88, and I intend to push both of them to a vote.
Question put, That the amendment be made.
I beg to move amendment 384, in clause 89, page 68, line 13, leave out from “information” to end of line 15.
This amendment acknowledges that “data” relating to the fact of a communication or the existence of information has meaning and must not be exempt from privacy protections afforded to other categories of data.
This amendment deletes the words
“or from any data relating to that fact”.
It is important because an equipment interference warrant can permit interference with equipment data, as in clause 88(2)(b). As we have seen, clause 88(9) makes provision for protected material, the definition of which includes equipment data. Over the page, clause 89 deals with the meaning of “equipment data”:
“(a) systems data;
(b) data which falls within subsection (2).”
Subsection (2), broadly speaking, refers to systems data as identifying data that are included in, attached to or associated with a communication but that can be separated from it and that, if separated,
“would not reveal anything of what might reasonably be considered to be the meaning (if any) of the communication”.
That is a logical way of approaching it—data linked to a communication that can be separated from it, but if separated, they would not reveal the meaning of the communication. Thus, it does not undermine the special protection given to the communication.
Then the final part of clause 89(2), paragraph (c), says
“disregarding any meaning arising from the fact of the communication”.
As has been said today, the fact of the communication, in many respects, can be as revealing as the content. However, the provision goes on to say
“or from any data relating to that fact”,
which broadens even further the exclusion from protection intended for communications.
In that way, the clause undermines the very protection being given to communications, so this short amendment would omit the words that I have indicated, in order to limit the exclusion from protection for the communication.
May I add my supportive comments? This is a joint amendment from the Labour party and the Scottish National party.
I rise to add my support to amendment 384 on behalf of the Scottish National party. Historically, communications data were considered much less revealing than the content of the communication, and consequently the protections offered to communications data under RIPA were weaker than those existing in the interception regime. However, as communications have become increasingly digital, the data generated are much more revealing and copious than before, allowing the state to put together a complete and rich picture of what a person does and thinks, who they do it with, when they do it and where they do it.
As the Bill stands, clause 88(9) would allow for the examination of potentially vast amounts of data on people in Britain obtained under bulk equipment interference warrants, as vague categories of “data” in 88(9)(a) and (b) are asserted to have no meaning. Data relating to the fact of a communication or the existence of information do have meaning and must not be exempt from the privacy protections afforded to other categories of data.
I urge the Committee to ensure that the Bill does not treat data relating to the fact of a communication or the existence of information relating to that fact as unimportant. In fact, there is extraordinarily high value to such material, precisely because it is highly revealing. It therefore demands equal protection.
All these disruptions and delays are adding interest and variety to our affairs. There is a straightforward argument for why the amendment is unnecessary, which I will make. If that is insufficient to persuade the Committee, I will add further thoughts.
The straightforward reason why the amendment is unnecessary is that it would undermine the principle that the most robust privacy protections should apply to the most intrusive kinds of data. I simply do not agree with the hon. and learned Lady that, for example, systems data—the highly technical data that will be separated out as a result of the endeavours in this part of the Bill—are better excluded from those extra protections. The unintended consequence of the amendment—at least, I hope it is unintended—is that it would lead to disproportionate access requirements for less intrusive data. That would be unhelpful and could, through confusion, hamper the work of the services.
I want to be clear as to how clause 89 operates, because subsection (2) suggests it is an attempt to identify data associated with a communication that can be separated from the communication, but which, if separated, would not touch on the meaning of the communication, thereby protecting it. That is all good. That is a safeguard, which is supported and welcome, but after the comma, as I read it, disregarded from that protection is everything that follows on. At the moment, I do not follow how the amendment removes protection, because the last bit of clause 89(2)(c) after the comma disregards from the protection and thus leaves unprotected from the scheme of clause 89
“the fact of the communication or the existence of the item of information or from any data relating to that fact.”
If I am wrong about that, there is a problem with the amendment, but I understand that part of clause 89(2)(c) to detract from the protection that the subsection is otherwise intending to put in place.
Let me see if I can deal with that question specifically. Equipment data include identifying data. Most communications and items of information will contain information that identifies individuals, apparatus, systems and services, or events and sometimes the location of those individuals or events. Those data are operationally critical to the agencies, as the hon. and learned Gentleman understands. In most cases that information will form part of the systems data, but there will be cases where it does not.
The work that has been done to separate out and define data has been carefully designed to categorise logically the range of data generated by modern communications. Identifying data are operationally critical. It is important to be able to classify data correctly and coherently throughout the Bill. My assertion, therefore, drawing on the hon. and learned Gentleman’s question, is that the amendment would inhibit though not prevent that by making the distinction less clear.
We can talk at length if necessary, although I suspect that at this juncture it is not necessary, about inferred meaning and its importance and relevance here. Misunderstanding frequently arises on inference, but I do not think that that is critical to this particular part of our discussion. My case is that the work we have done in better categorising the difference between the kinds of data assists the application of this part of the Bill, and assists the agencies accordingly. As I said, the amendment, perversely, would afford to those bits of technical data, for example, the same protection that is deliberately granted to more sensitive data under the Bill.
I do not like to do this on every amendment, or we would drown in a sea of paper, but as I write to the Committee regularly, if it would be helpful to cement that point in my next letter, I will happily do so. I am, however, confident that what I have said to the Committee is an accurate reflection of the work that I have described and of the content of the Bill.
I am grateful to the Minister, first for spelling out in detail the intended operation of the clause and, secondly, for indicating his willingness to write on the matter. This is something that ought to be in the Bill. My clear reading is that the amendment would not ring-fence anything from examination; it would simply require a warrant under clause 88 if equipment data, having satisfied all the other provisions under subsection (2)(a) to (c), included anything where there was a meaning arising from fact communication and so on. I will therefore press the amendment to a vote.
I have nothing to add in support.
Question put, That the amendment be made.
I beg to move amendment 385, in clause 90, page 68, line 24, leave out paragraph (b)
This amendment, and others to Clause 90, refine the matters to which targeted equipment interference warrants may relate by removing vague and broad categories including “equipment interference for training purposes”.
With this it will be convenient to discuss the following:
Amendment 386, in clause 90, page 68, line 33, leave out paragraph (f).
Amendment 387, in clause 90, page 68, line 35, leave out paragraph (g).
Amendment 388, in clause 90, page 68, line 38, leave out paragraph (h).
Amendment 456, in clause 90, page 68, line 44, leave out subsection (2)(b).
Amendment 391, in clause 90, page 69, line 1, leave out paragraph (d).
Amendment 392, in clause 90, page 69, line 3, leave out paragraph (e).
Amendment 265, in clause 101, page 78, leave out lines 21 to 27.
Amendment 272, in clause 101, page 79, leave out lines 3 to 7.
Amendment 273, in clause 101, page 79, leave out lines 8 to 12.
Amendment 274, in clause 101, page 79, leave out lines 13 to 18.
Amendment 457, in clause 101, page 79, leave out lines 31 to 36.
Amendment 279, in clause 101, page 80, leave out lines 3 to 7.
Amendment 280, in clause 101, page 80, leave out lines 8 to 12.
We move to a different topic within the same general subject matter of thematic warrants.
Clause 90(1) sets out that a
“targeted equipment interference warrant may relate to”
and thereafter follows a long list from paragraph (a) to paragraph (h). Paragraph (a) specifies
“equipment belonging to, used by or in the possession of a particular person or organisation”.
Paragraph (b) deals with groups or those
“who share a common purpose or who carry on…a particular activity”.
Paragraph (c) deals with equipment
“in the possession of more than one person or organisation, where the interference is for the purpose of a single investigation or operation”.
Paragraph (d) deals with
“equipment in a particular location”.
And on it goes. In other words, the clause allows a very broad range of matters to be included in what is intended to be a targeted equipment interference warrant.
The evidence from the independent reviewer, David Anderson, was, in essence, that clause 90, or its forerunner, was so wide that he thought it was difficult to suggest anything that could not be included in a thematic targeted interference warrant. That gives rise to the suggestion that, in truth, this is a disguised bulk power. It is called a targeted equipment interference warrant, but it is so wide as to be tantamount to a bulk power. In so far as this sort of interference has been carried out in the past, it has been carried out under provisions of this sort rather than any bulk provision. It is an extremely wide and permissive thematic warrant that allows interference with equipment in a very wide range of circumstances, which of course includes monitoring, observing, listening to and so on. It is far too wide.
Amendments 385 and 386 are intended to cut out part of the wide thematic approach in subsection (1). Subsection (2) deals with a targeted examination warrant, and again there is a wide range of matters that the warrant may relate to, including
“a particular person or organisation…a group of persons”
and so on. As far as subsection (2) is concerned, the examination warrant is to operate in conjunction with or following on from a bulk warrant, so subsection (2) indicates the matters to which such a targeted warrant may relate, notwithstanding the wide breadth of the bulk warrant.
The powers are far too wide and they need to be better specified. The amendments are intended to draw in and narrow the scope of the thematic warrants, because otherwise it is hard to resist David Anderson’s conclusion that it is hard to think what would not be included in one or other of the descriptions I have outlined.
I want to add my voice in support of the hon. and learned Gentleman’s suspicions—sorry, submissions! We share suspicions about this clause. The clause unamended permits thematic, suspicion less warrants and these shade into general warrants. General warrants are anathema to the common law of England and Scotland and fall foul of international human rights law.
I am pleased that the hon. and learned Gentleman prayed in aid what David Anderson QC said about clause 90. If Members have read his supplementary written evidence to the Committee, they will have seen that at paragraph 5a he expressed grave concern about clause 90, describing it as “extremely broad” and continuing:
“The ISC noted this in relation to the EI power in February 2016…The Operational Case lodged with the Bill also acknowledged…that a targeted thematic EI”—
equipment interference—
“warrant may ‘cover a large geographical area or involve the collection of a large volume of data’. This matters, because as the Operational Case also acknowledged…the protections inherent in a thematic warrant are in some respects less than those inherent in a bulk warrant. The very broad clause 90 definition effectively imports an alternative means of performing bulk EI, with fewer safeguards. The Government’s explanation for this–that it will opt for a bulk warrant where extra safeguards are deemed necessary–may be argued to place excessive weight on the discretion of decision-makers.”
That concern—that it gives excessive discretion to decision makers—is one that the Scottish National party has as a thread running through the Bill. David Anderson goes on to say:
“If bulk EI warrants are judged necessary, then it should be possible to reduce the scope of clause 90 so as to permit only such warrants as could safely be issued without the extra safeguards associated with bulk.”
Even if the Minister does not consider the SNP’s and the Labour party’s concerns valid, what does he have to say about the lengthy passage that David Anderson has devoted to the matter in his supplementary written evidence?
Will the Minister tell us the legal basis of the existing powers?
I have done so already, but I will repeat it for the sake of the record. The powers are contained in the Intelligence Services Act 1994 and the Police Act 1997. I am more than happy to provide more information to the hon. and learned Lady on that detail, should she want me to do so.
I am looking at the 1994 Act and it seems to me that it contains broad and vague enabling powers, which bear no resemblance to the powers in the Bill. Can the Minister contradict that?
One of the stated purposes of the Bill is to bring together those powers—to cement them and to put in place extra clarification and further safeguards. I have argued throughout that the essence of the Bill is delivering clarity and certainty. I would accept the hon. and learned Lady’s point if she was arguing that, at the moment, the agencies draw on a range of legal bases for what they do, for that is a simple statement of fact. We are all engaged in the business of perfecting the Bill, because we know it is right that these powers are contained in one place, creating greater transparency and greater navigability, and making legislation more comprehensible and more resistant to challenge. That is at the heart of our mission.
I said I would talk about breadth. The breadth of the circumstances in which equipment interference could be used reflects the fact that, at the time of making an application for a warrant, the information initially known about a subject of interest may vary considerably. Last week, we spoke about the kind of case in which there may be an unfolding series of events, such as a kidnapping, where a limited amount might be known at the outset when a warrant is applied for. The warrant’s purpose will be to gather sufficient information as to build up a picture of a network of people involved in a gang or an organised crime. That is very common and I intend to offer some worked examples in a number of areas.
Identifying members of such a gang can often come from interception arising from a thematic warrant. That might apply to interception, but frankly it might also apply to equipment interference where that is a more appropriate and more effective means of finding the information. Another example may be a group of people involved in child sexual exploitation. Frequently, partial information will allow for further exploration of a network of people who are communicating over a wide area, and who are careful about how they communicate, mindful of the activity that they are involved in. They will not be easy to discover or find, as they will very often disguise their identity. For that reason, it may be necessary to start by looking at sites commonly used to share indecent images of children and from there uncover information that leads, through the use of equipment interference, to those who are driving that unhappy practice. Those examples are not merely matters of theory; they are matters of fact. I know that in cases of kidnapping and in cases of child sexual exploitation, those techniques have been used and continue to be used.
I understand the point the Minister is making and the need for these powers to be practical and effective in real time. He says that they are not theoretical but real, and I absolutely accept that, but David Anderson is someone who will have appreciated that more than many others. He has been working in this field and dealing with those issues for many years. He is hardly likely to make the mistake of theorising about something that he knows about in great detail in the practical examination, so is he just plain wrong when he raises this concern? He has raised it not just once, but on a number of occasions, in detail, and he knows how these things work.
I will return to that point because it is important and fair, and I will return to the Anderson critique in a moment, but before I do so, I want to be clear about the second thing that I said I would speak about—speed.
The kind of cases that I have outlined can move rapidly. The information that becomes available from the kind of initial inquiries that I have described, when the character or names of individual actors may not be known but will become known through these techniques, may require law enforcement agencies to act very quickly to avert further serious crime. Owing to the need for speed, it is vital that those missioned to protect us are able to exercise all the powers when they need to, with confidence and lawfully. The Anderson critique is why the codes of practice limit specifically how thematic warrants can be used. I draw the Committee’s attention to page 25 of the draft code of practice, which deals with such warrants and defines again, in some detail, exactly how they should be as specific as possible, given the breadth and speed requirements that I have set out.
I hear what is said about the David Anderson criticism. I think that we have gone further in being specific in the code of practice than we might have been expected to by our critics, but, rather as I said in relation to our consideration of an earlier group of amendments on warranting, I do not want to inhibit what is currently done; I do not want the Bill to leave the agencies and law enforcement with fewer powers; I do not want to leave them emasculated as a result of our consideration. It is right that we should have safeguards, definition, constraints and, where necessary, specificity, but these powers are vital to protect us from those who want to exploit our children and do us harm. Criminals are increasingly adaptable and sophisticated, rather like terrorists. We must outmatch them at every turn and I believe that those powers are vital for us to be able to do so. So I am unapologetic about making the case for them to the Committee and to Parliament.
I am grateful to the Minister for setting out his case in that way. To be clear, particularly in relation to his last point, I do not think that anyone is suggesting that those powers should not be available. The discussion is about whether they are rightly described as thematic warrants or whether they are, in truth, bulk warrants, which operate in different ways and have different safeguards, procedures and processes to go through. I do not want our challenging and probing to be portrayed as somehow to undermine the work that has to be done by law enforcement and others in real time, often in difficult circumstances.
That said, this is an important issue. I have listened to what has been said and I want to preserve the position. I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
I beg to move amendment 389, in clause 90, page 68, line 40, at end insert—
“(1A) A targeted equipment interference warrant may only be issued in relation to any of the matters that fall under subsection (1) if the persons, organisations or location to which the warrant relates are named or otherwise identified.”
With this it will be convenient to discuss the following:
Amendment 458, in clause 90, page 69, line 4, at end insert—
“(2A) A targeted examination warrant may only be issued in relation to any of the matters that fall under subsection (2) if the persons, organisations or location to which the warrant relates are named or otherwise identified.”
Amendment 266, in clause 101, page 78, line 18, leave out
“or a description of the person or organisation”
and insert
“or another identifier of the person or organisation”.
Amendment 474, in clause 101, page 78, line 27, leave out
“or a description of, as many of the persons or organisations as it is reasonably practicable to name or describe”
and insert
“or another identifier of, each person or organisation”.
Amendment 473, in clause 101, page 78, line 28, at beginning insert “The name and”.
Amendment 268, in clause 101, page 78, line 31, leave out
“or a description of, as many of the persons or organisations as it is reasonably practicable to name or describe”
and insert
“or another identifier of, each person or organisation”.
Amendment 269, in clause 101, page 78, line 36, leave out “description” and insert “specification”.
Amendment 270, in clause 101, page 78, line 38, at beginning insert “The name and”.
Amendment 271, in clause 101, page 78, line 40, leave out
“a description of as many of the locations as it is reasonably practicable to describe”
and insert “specification of each location”.
Amendment 276, in clause 101, page 79, line 29, leave out
“or a description of the person or organisation”
and insert
“or another identifier of the person or organisation”.
Amendment 278, in clause 101, page 79, line 40, leave out
“or a description of, as many of the persons or organisations as it is reasonably practicable to name or describe”
and insert
“or another identifier of, each person or organisation”.
Ms Dorries, you have been indulgent in allowing me to trespass on the territory of some of these amendments in my general remarks on the clause. That probably applies to the Minister in reply as well. In those circumstances, it is not necessary for me to say any more about this group.
I beg to ask leave to withdraw the amendment.
Amendment, by leave, withdrawn.
Clause 90 ordered to stand part of the Bill.
Clause 91
Power to issue warrants to intelligence services: the Secretary of State
With this it will be convenient to discuss amendments 396, 397, 398, 399, 400, 401, 402, 468, 469, 470, 403, 404, 407, 410, 411, 412, 413, 414, 283, 284, 285, 286, 287, 288, 289, 290, 291 and 292.
The clause deals with the power to issue warrants to the intelligence services. Subsections (1) and (2) deal with targeted equipment interference warrants, and subsections (3) and (4) deal with targeted examination warrants.
We have two concerns. First, although the test of necessity and proportionality is spelled out in the clause—in particular, in subsections (1)(a) and (b) and (3)(a) and (b)—the objective and aims to which the test of necessity and proportionality are attached, which are set out in subsection (5), are broad in the extreme. They are
“national security…preventing or detecting serious crime”
and our old friend,
“the economic well-being of the United Kingdom”.
We have concerns about the breadth of those powers. Examination warrants obviously allow the examination of the material as well as its interception, and they go with the bulk power.
The first batch of amendments is intended to put some rigour and independence into the scheme by replacing the Secretary of State with the judicial commissioner. We have been over this territory in depth once and in summary form at least once again. I am not sure anybody is going to benefit, and they certainly will not welcome, my going over it at great length again—[Hon. Members: “Hear, hear!”] The amendments would replace the Secretary of State with the judicial commissioner for the same reasons that I advanced a week ago today at a not dissimilar hour. I will not say more than that. In light of our discussion last week and the fact that I withdrew my amendments in relation to the scheme, I will not move these amendments; they are probing.
Amendment not moved.
Ordered, That further consideration be now adjourned. —(Simon Kirby.)