To what extent do you believe that the Regulation of Investigatory Powers Act 2000 achieves a balance between upholding the right to privacy while also allowing the State to employ online surveillance techniques in the interests of national security?

Authors Avatar

To what extent do you believe that the Regulation of Investigatory Powers Act 2000 achieves a balance between upholding the right to privacy while also allowing the State to employ online surveillance techniques in the interests of national security?

Increasing level of surveillance permeates almost all aspects of our lives, leading to consequential reduction of personal privacy. The Information Commissioner warned against the dangers of ‘sleepwalking into a surveillance society’. The Information Commissioner went further in 2006 by introducing a report ‘A surveillance society’ commissioned by his office. In this report he acknowledges the benefits of surveillance in fighting terrorism and serious crime and improving entitlement and access to public and private services. However unseen or excess surveillance can encourage a climate of suspicion and undermine trust.

This essay will analyse the growth of data surveillance in the online world and see whether the Regulation of Investigatory Power 2000 achieves a balance to right of privacy and the States need to employ online surveillance to protect citizens from terrorist’s threats.

The main way in which privacy can be threatened is by placing the individual under surveillance. This surveillance can take a variety of forms. In 1971 Alan Westin identified three forms of surveillance physical, psychological and data.

Physical surveillance is an age old-established method of observing someone. As the name suggests it involves watching or listening to an individual with the aid of technology. However this method is an expensive form of surveillance and can only be applied to a limited number of individuals. Psychological surveillance includes forms of interrogation, again costs of using this method gives it a limited usage in society. 

Both the above surveillance techniques involve the watcher to play an active role. Data surveillance involves a more passive approach. Clarke describes dataveillance is the systematic use of personal data systems in the investigation or monitoring of actions of communication one or more person. Computers were originally developed for their high speed capabilities. But the advancement of technology means that data can now be captured, stored and accessed more readily even when their users are dispersed. The information revealed by an individual reveals something about that person. This method involves the collection and retention of this information. With the growth of the internet and the ability to digitise any form of information the distinct boundaries between the types of surveillance are disappearing with technology linking the different methods of surveillance into ‘a near seamless web of surveillance’. Furthermore, the development in data processing means that systems of physical surveillance significantly by the involvement of the computer to digitise and process the information.

Significant difficulties have to be overcome when attempting to give privacy a concrete legal meaning. A number of definitions for privacy had been formulated over the years. The classic definition was given by a United State judge, Judge Cooley who stated that it consists of a ‘right to left alone.’ The essential component as stated by Lloyd is that an individual has the right to control the extent to which their personal information is dispersed to other people. This notion of privacy has two main components. The first is the right to live free from the attention of others in essence to avoid being watched. The second element is to control the use of information once gained.

Whilst surveillance is seen as a stealthy and unwelcome way of collecting personal data, this is not the case. Although members of the public may claim they value privacy, they do very little to protect themselves. Thousands of individuals have applied for supermarket ‘loyalty cards’. These cards provide a link between details of individual transaction and the stock management computer system. Analysis of the information will reveal much about the individual’s habits and lifestyle which may be used as a basis of direct marketing.

Until 1985 the UK had no legislative framework available to deal with interception of communications. So for example phone tapping was only regulated by the police internal code of guidance, which was not made public. This state of affairs was challenged in the ECHR case of Malone v United Kingdom. Here the ECHR held the UK practice of interception was not under adequate legal regulation. The UK citizens could not assess whether their telephone would be tapped, nor could they determine the basis in law for such surveillance.

The UK's response was to pass the Interception of Communications Act which put interceptions by public bodies in a statute and provided some oversight of interception activities.

However, the 1985 Act fell short of a concrete regulatory mechanism as did not apply to telecommunications systems outside the public network, such as internal systems, and there was no other UK legislation to regulate the interception of communications on such systems. So employers engaging in the interception of both telephone calls and email within private networks appeared to be able to do so with relative ease without fear from prosecution under the law.

Join now!

This was illustrated in the case of Halford v United Kingdom. In this case Ms Halfords telephone conversations were tapped by her employer to obtain information detrimental to her. The office was part of a private internal network, so fell outside the scope of the ICA 1985. As she could not challenge the alleged tap in court, she brought an action against the UK government alleging a breach of the ECHR Article 8. The ECHR held that calls intercepted from her office telephone could fall within the scope of ‘private life’ in Article 8(1) ECHR, and that her employers had not ...

This is a preview of the whole essay