I am grateful to the hon. and learned Lady for the way in which she spoke to her new clause. I see that it very much follows new clause 3. Our argument with regard to new clause 4 is slightly different because it has a wider ambit than private telecommunication.
On the new clause, the interception tool was always intended to address the narrow area that was not covered by the interception offence in RIPA, which is replicated in the Bill. As noted, the communications data offence is intentionally narrower. It would therefore be equally inappropriate to introduce a tort or delict in relation to the obtaining of communications generally or in the areas not covered by the new offence. Under the provisions of the Data Protection Act 1998, communications data often constitute personal data. That act already provides for compensation for damage or distress resulting from non-compliance with the data protection principles and for enforcement in respect of failing to comply with the provisions of the act.
I am extremely grateful to my hon. and learned Friend. She is quite right. In fact, not only is there the offence of misconduct in public office, as it is now constituted, having been reformed from the old offence of misfeasance, but we have provisions in the Wireless Telegraphy Act 2006, the Computer Misuse Act 1990 and, as I have already mentioned, the Data Protection Act 1998. I therefore consider that the new offence we are introducing in clause 9, combined with relevant offences in other legislation, in particular the provision in section 13 of the Data Protection Act 1998, provides appropriate safeguards. On that basis, I respectfully invite the hon. and learned Lady to withdraw the amendment.
It is a pleasure to follow my hon. Friend because I want to develop the point. This is a welcome clause, it is right that it is here, and we support it. However, we question whether it goes far enough. It only covers obtaining communications data. We think that serious consideration should be given to an overarching offence of misuse of the powers in the Bill. At the moment, there are specific provisions in relation to intercept which are replicated frim RIPA and we now have this welcome provision, but there is no overarching offence of misuse of the powers in the Bill.
I have two short supplementary points. In subsection (3) there is a reasonable belief defence. It would be helpful if the Minister said a bit more about that. May I also foreshadow the inconsistency that we will need to pick up as we go along in the way reasonable excuse and reasonable belief are dealt with in the Bill? It is set out in subsection (3), but there is an inconsistency in other provisions that I will point to when we get there.
My other point is to ask the Minister to consider whether obtaining communications data unlawfully is a sufficient definition to make the offence workable in practice. I put my questions in the spirit of supporting the clause, but I also invite Ministers to go further and consider drafting a clause that covers the misuse of powers in the Bill, rather than simply saying that if we fish about in other bits of legislation or common law we might find something that fits on a good day. In my experience, that is not a particularly helpful way of proceeding.
The measure is all about making sure once again that those who hold office within a public authority are properly held to account for any abuses of power. The clause will make it an offence knowingly or recklessly to obtain communications data from a communications service provider without lawful authority. Somebody found guilty of that offence might receive a custodial sentence or a fine. The maximum punishment will vary according to whether the offence was committed in England and Wales, or in the jurisdiction of Scotland or Northern Ireland.
The hon. and learned Gentleman is right to point out the reasonable belief defence. The offence will not have been committed if it can be demonstrated that a person holding office acted in the reasonable belief that they had lawful authority to obtain the data. Where a communications service provider willingly consents to the disclosure of the data, including by making it publicly or commercially available, that would constitute a lawful authority.
The question about reasonable belief is about making sure that genuine error is not penalised, because there will be occasions when genuine errors are made. In the absence of such a defence, public authorities could be deterred by notifying genuine errors to the IPC. It is important that the Investigatory Powers Commission is an effective body monitoring failure and lack of best practice, and preventing future errors.
I think the hon. and learned Gentleman will agree that we both have fairly considerable criminal litigation experience. In this area, I think a regulatory approach will be just as effective, and in some ways more effective, than a criminal sanction. I am grateful to the hon. Member for City of Chester for reiterating the remarks that I remember him making on Second Reading, when he made some powerful points, but I caution that we are in danger of creating an entirely new criminal framework, catching people further down the line, which ultimately will only lead to more confusion and, I worry, the replication of existing offences.
An unauthorised disclosure by someone in a communications service provider would be covered by the Data Protection Act 1998, because those providers have duties and obligations under that Act just like any other holder of data. I hear what the hon. and learned Gentleman says, and I will consider the matter, but my initial reaction to his question and that of the hon. Member for City of Chester is that the Data Protection Act covers such a disclosure.
I am grateful to my hon. Friend, who served with distinction on the Joint Committee. That provision relates to creating a statutory duty, which, with respect to her, is slightly different from some of the arguments we are having about criminal sanctions. However, it is important to pray that in aid, bearing in mind the mixed approach we need to take in order to hold public office holders and public authorities to account when dealing with this sensitive area.
I hear what the hon. Gentleman says. I have already indicated that I will consider the matter further. I will simply give this solution. He mentioned the stealing of information. Information is property, like anything else, and of course we have the law of theft to deal with such matters. I do not want to be glib, but we must ensure we do not overcomplicate the statute book when it comes to criminal law. I will consider the matter further, and I am extremely grateful for his observations.
On a point of order, Ms Dorries, may I seek clarification on my position on new clause 4, which the Minister invited me to withdraw? I am minded to do so, having regard to what the Solicitor General said about the Data Protection Act and what the hon. and learned Member for South East Cambridgeshire said about misfeasance in public office, but as a novice in these Committees I seek some guidance. If I press the new clause to a vote now and it is voted down, does that prevent me bringing it back to the Floor of the House?
As I made clear at the beginning of our sitting, you could move the motion at the end of consideration, but that does not prevent you from bringing the new clause back on Report. This point in the proceedings is not the time to for it.
Having worked with the projects selected from across a range of geographies, scales and subjects over the course of 16 months, the data sharing initiative began with an introduction to data management and sharing concepts, as well as helping the projects to develop their own data management plans. Then, they carefully monitored and observed the implementation of those plans.
Over the course of the project, it became apparent that simply developing and implementing funder policies is not enough to change research culture. The question of how funder policy and implementation could support culture change both within research communities and within the funder itself became the focus of the initiative.
While the pilot project managed to identify a number of significant bottlenecks within both research institutions and for grantees that impede efficient data sharing practices, including, expectedly, lack of resources and expertise, the researchers specifically point out issues related to structural issues at the funder level.
The community of FORCE11, comprising scholars, librarians, archivists, publishers and research funders from around the globe, was born at the FORC Workshop held in Dagstuhl, Germany in August 2011. Ever since, the community have been working and striving together towards a change in modern scholarly communication through the effective use of information technology. Their aim has always been to facilitate the change to improved knowledge creation and sharing.
In 2016, the Scholarly Commons Working group within FORCE11 conducts two workshops in order to find the answers to the question how scholarly communication would have looked now, had it not been for the 350 years of traditional practices. They also focus on the implications of modern technology and modes of communications that could help bring the right change about.
In the spirit of the workshop itself, the report is now formally published in the form of a new scholarly communication artifact. Workshop Report is only one of the various innovative research publication types, provided by the open access journal Research Ideas and Outcomes(RIO), whose aim is to acknowledge and disseminate all quality and valuable research outputs from across all stages of the research cycle.
b37509886e