Committee (1st Day)
Scottish Legislative Consent sought.
15:23
Clause 1 agreed.
Clause 2: Low or no reasonable expectation of privacy
Amendment 1
Moved by
1: Clause 2, page 3, leave out lines 24 to 27 and insert—
“(b) the extent to which information contained within the personal data has been made public as a result of steps deliberately taken by the data subject;”Member’s explanatory statement
This amendment would ensure the definition of a low privacy bulk personal dataset is in line with the definition set out in Schedule 10 of the Data Protection Act 2018.
Lord Coaker Portrait Lord Coaker (Lab)
- Hansard - - - Excerpts

My Lords, before I get to the specifics of my Amendment 1, I will make some general remarks. I thank the Minister and all his officials for their very helpful briefing and the collaborative way in which they have approached the Bill. As he knows, we support the Bill, but we will seek clarification and further information about a number of clauses and the details in them.

It is important for me to say that this is the Committee stage, so some significant details will be explored that will be helpful to us. Indeed, on my own part, there may be one or two misunderstandings as to the actual meaning of certain parts of the Bill. None the less, it is an important Bill and an important step forward for our country and its security; I think we all want to see it be as successful as it can be.

This group of amendments deals with bulk personal datasets. These include personal data where a large majority of people included will not necessarily be relevant to an intelligence investigation. Currently, all BPD warrants must go through a double-lock process of approval via the Secretary of State and then a judicial commissioner, and must be renewed every six months. Agency heads must also perform certain functions associated with the warrant.

As the importance of data-based intelligence grows, the Bill rightly includes several measures to make it easier and quicker to analyse various datasets. Individual BPDs considered to have a low or no expectation of privacy could be approved by intelligence agency heads if urgent or if they fall into a category approved by a judicial commissioner. For urgent cases, judicial commissioners have three days to review the warrant.

BPD warrants will need to be renewed only after 12 months, instead of six, which seems sensible. Some functions can be delegated from heads of agencies to an official while maintaining overall responsibility. The Bill also ensures that third-party BPDs—mostly commercially held data—are regulated similarly to other BPDs. The double lock of the Secretary of State and the judicial commissioner would remain for all BPDs, apart from ones considered urgent by the Secretary of State. For urgent cases, a judicial commissioner would have three days to review the warrant. Again, much of that is very sensible and improves the current situation.

I tabled my amendments in the spirit of probing what the Government mean, and I will ask some questions for clarity. Amendment 1 probes why the definition of low-privacy datasets differs from existing data protection legislation. Being the sort of person I am, yesterday I read the relevant section of the Data Protection Act 2018. It differs from Clause 2, where the Minister lays out:

“Low or no reasonable expectation of privacy”


for authorisations and the various factors to be taken into account. Given that the Data Protection Act also talks about access to data, about intelligence services having to have consent and about intelligence agencies having various conditions applied to them when seeking authorisations to access data, it would be helpful to the Committee to understand which applies to the authorisations and how the various pieces of legislation interact with each other. Otherwise, we have what is included in this Bill as well as what is included in the Data Protection Act 2018. Amendment 1 seeks to understand where and how the two relate to each other, whether one supersedes the other and whether the Data Protection Act is now irrelevant to the authorisations laid out in the Bill. It would be helpful for us to understand that.

15:30
My Amendment 16 seeks to ensure that the Intelligence and Security Committee is involved in the overall oversight of what is happening. The Government included in new Section 226DA in Clause 2 an annual report, so they have accepted the idea, which my amendment lays out, of having an annual report. But noble Lords will see that my amendment, rather than having the report going just to the Secretary of State as the Government propose in new Section 226DA, seeks to understand why the Government would not want such a report to go to the Intelligence and Security Committee as well. Indeed, my noble friend Lord West has put a similar amendment exploring the same point. It would be useful for the Committee to understand why the Government have excluded the Intelligence and Security Committee from such oversight.
The Minister will know that I was exercised by the role of the Intelligence and Security Committee with respect to the National Security Act during its passage. Again, it is important to understand what role the Government feel the Intelligence and Security Committee has with respect to the changes and amendments included in this Bill. Therefore, at this stage, my Amendment 16 simply probes that. It is a probing amendment; I just want to understand what the Government’s view of the Intelligence and Security Committee should be and how they have come to a view, in new Section 226DA in Clause 2, that they feel an annual report is important but that it will go only to the Secretary of State and not to the Intelligence and Security Committee. It seems a bit strange.
Again, because it is important for the Committee to understand what the Government’s definition of serious crime is, noble Lords will see that my Amendment 17 to Clause 5 would use the definition of serious crime as in Section 263 of the Investigatory Powers Act 2016. It is just to ensure that we understand the definition of serious crime that we are using in the Bill vis-à-vis the earlier Act. My understanding is that in Section 263 of the Investigatory Powers Act 2016, serious crime is defined as
“an offence for which a person who has reached the age of 18”
in England and Wales, or 21 in Scotland or Northern Ireland,
“and has no previous convictions could reasonably be expected to be sentenced to imprisonment for a term of 3 years or more”,
or if various other conduct such as violence is included. Can the Minister confirm that that is the definition to be used? While he does that, can he just underline whether there is any problem with the difference in age in Section 263—18 in England and Wales, and 21 in Scotland and Northern Ireland—with respect to this? For my own clarity—I apologise to noble Lords if it is obvious to everybody else—how does this Act apply to children under 18 and what are the consequences with respect to that for the changes there?
I have some other specific questions for the Minister. How does the Bill ensure that the sensitivity of information is central to whether a dataset is used, not just whether it has been made public? How does the Bill ensure—within it, not necessarily in guidance—that sensitive information such as facial images and medical information is correctly identified as sensitive information that should go through the double lock? Frankly, there are some questions to be asked about what the access should be to that anyway.
What measures are there to know whether an individual’s data has been made public? What will be considered “editorial control”? How can the intelligence community ensure that it does not rely on others to assess data sensitivity? Again, to help us with the definition, what will count as urgent when considering whether a bulk personal dataset should be approved without prior involvement of the judicial commissioner?
As I said to the Minister, we accept the changes the Bill is bringing forward; it will improve the situation. There are much-needed amendments in this group and the others we will discuss, but the clarifications I have asked for should help those who seek to interpret the Bill, and, indeed, those who will use the increased powers in it. With that, I beg to move.
Lord Fox Portrait Lord Fox (LD)
- View Speech - Hansard - - - Excerpts

I rise to speak to Amendment 2 and several others in this group in my name. This amendment probes the extent to which paragraphs (d) and (e) of proposed new Section 226A(3) depart from current privacy laws. Like the noble Lord, Lord Coaker, we seek clarification. Also like the noble Lord, as far as we are concerned the purpose of this Committee is to probe, get information and understand how the Government interpret some of the measures in the Bill.

Bulk personal datasets represent the largest part of the Bill, and this amendment primarily probes the differences in the definitions in the Bill and those set out in Schedule 10 to the Data Protection Act 2018. The Bill creates a new and essentially undefined category of information where there is deemed to be low or no reasonable expectation of privacy: so-called low/no datasets. This is a departure from existing privacy law, in particular data protection law. With regard to low-privacy bulk datasets, the relevant circumstance, in Schedule 10 to the DPA, is that

“information contained in the personal data has been made public as a result of steps deliberately taken by the data subject”.

This is a different standard from the expectation of privacy in the new BPD category, whereby information is considered low privacy according to

“the extent to which the data is widely known about”

and if it

“has already been used in the public domain”.

As your Lordships will observe, there is a big difference between those two definitions. For example, whereas facial images from public CCTV may be considered low-privacy BPD under the Bill, they would be considered personal data and possibly subject to sensitive processing under the DPA. As the Minister knows, this is a contentious area of law, and a real-life example is Clearview AI’s database of 30 billion facial images harvested from social media platforms for highly facial recognition searches. Some could have been classified as low privacy, as the photos have already been made public by the individuals, but the Information Commissioner’s Office found Clearview AI in breach of the DPA.

Similarly, a database of all public Facebook or other social media posts could be argued to be a low-privacy database, despite the fact that it will be a comprehensive database of billions of people’s social networks, sexual orientations, political opinions, religion, health status and so on. Under the DPA, much of this data qualifies as sensitive personal data, incurring extra protections when it comes to retention and processing, regardless of whether the information can be considered to have been made public.

The DPA would still apply to the intelligence agencies in processing—at least, that is our view, and we would like to like the Minister to comment on that—but under the Bill as drafted the contradictory standards would also apply. How do these two standards work together? I assume the department has looked at the likelihood of possible challenges to this new category of data, and indeed the likelihood of such challenges being successful, so it would be helpful if the Minister could enlighten us in that regard.

Schedule 10 to the DPA sets out circumstances in which the agencies can conduct sensitive processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs or trade union membership; data concerning health or sexual orientation; biometric or genetic data that uniquely identifies an individual; and data regarding an alleged offence by an individual. Does Schedule 10 apply in the case of data identified as “low” or “no” by the Bill?

An example highlighting the potential divergence is data that has been hacked and then leaked out. While not deliberately made public, as per the DPA requirement, it is arguably public and available in the public domain. What is the Minister’s view as to how the Bill regards that sort of data in a low/no context? To test this, the amendment seeks to strengthen the condition in proposed new Section 226A(3)(b) by aligning it with the test in the Data Protection Act for sensitive processing. Data protection law is currently constructed according to the sensitivity of information rather than the individual’s expectations of privacy concerning personal information. As we know, expectations differ greatly from reality, and from person to person. The central questions this poses are: why does the new Bill deviate from Schedule 10 to the DPA, and how will the DPA and the IP work together using the new definition of this Bill?

We are debating a small number of quite large groups today which, unfortunately, means that quite a number of my amendments appear one after another. I will speak as briefly as I can, but I am afraid there is quite a lot of detail coming up. I will speak first to Amendments 4, 5, 6 and 7. Amendment 4 probes the purpose for which bulk datasets will be used by the intelligence services. Amendments 5 and 6 probe the circumstances in which an authorisation is urgent and therefore not authorised in advance by a judicial commissioner. Amendment 7 would require the person granting an authorisation in urgent cases to immediately notify the judicial commissioner that they have done so.

These amendments are similar in purpose and spirit to Amendment 3 from the noble Lord, Lord Anderson, which I have co-signed and support. The basic explanation from the Government for proposed new Part 7A has been that these datasets are needed to train tools using machine learning and that they already exist and are being used in the commercial world, but the Part 7 process makes them difficult for the intelligence services to use. If training AI tools is the stated prime mover for Part 7A, the inclusion of urgent data as one of the three types of data clearly indicates it is also needed for ongoing investigations.

In that regard, proposed new Section 226BC refers to a “relevant period” of three working days between the acquisition of the urgent data and the granting of full judicial approval, giving the relevant service three days to work with data and information that might eventually be ruled out of bounds by the judicial commissioner. All the amendments are intended to understand how Part 7A is to be used in operations, rather than tool training, and what urgent circumstances are envisioned that would negate the need for prior JC approval of an authorisation.

Amendment 4 seeks to restrict the application of Part 7A powers to training and learning functions of the intelligence services, meaning that operational purposes would be excluded. This is designed to get the Minister to explain the operational needs which define an urgent need.

Amendment 5 removes the ability of a person to grant an authorisation if there is an urgent need. Clearly, this gives the Minister a chance to justify why such data might be operationally needed. Amendment 6 provides a definition of what might be considered “urgent circumstances”. The Minister might want to contribute a different definition, but we feel the definition of “urgent” should be included in the Bill. Amendment 7 provides an additional safeguard by requiring a JC to be notified immediately where an authorisation has been granted in an urgent case. This essentially creates an opportunity to close the potential gap between when the data is deployed and when the JC rules on its admissibility—but not, of course, removing the gap entirely.

15:45
Amendment 8, also in my name, probes the meaning of “reasonably practicable”. We need an explanation from the Minister about the meaning of “reasonably practicable” in the context of new Section 226D(2). New Section 226D relates to circumstances where, during the course of the examination of bulk personal datasets, it becomes clear that the data is not in fact of a type where individuals could have no or low reasonable expectation of privacy in relation to the data. At that point, the head of the relevant intelligence service must, so far as is “reasonably practicable”, ensure that anything in the process of being done in relation to the bulk personal database stops as soon as possible. Quite simply, can the Minister please explain in what circumstance it would be possible to stop all activity in relation to that particular bulk personal dataset?
Amendment 9 takes that argument a little further. On the face of it, it is intended to ensure that, when an authorisation ceases to have effect or never had effect, the intelligence services must forget the information or knowledge acquired during the period the authorisation was done. This is connected with the previous amendment. As we have already discussed, using urgency as a reason, the new powers in Part 7A could lead to some bulk personal datasets with the lowest safeguards being used for at least three days before a JC rules the dataset out of scope.
So, in the circumstances described when discussing the previous amendment, where there is a realisation that the BPD being examined is not in fact of the kind where it could be authorised, how can we be sure that the intelligence services will essentially forget the information gleaned in the meantime—and similarly if the JC declines to warrant that activity? With this amendment we are giving the Minister a chance to tell us that of course there is no possible safeguard to ensure that the information or knowledge acquired during the time the authorisation was still in effect cannot be used or relied upon for anything once the authorisation ceases to have effect. In other words, once the information is in the consciousness of human beings, it is there and it is impossible to get rid of—so, at the very least, this means that the discussion we had over the preceding amendments is highly relevant. At worst, it indicates that we have an undefined urgency applied to a self-defined low/no dataset and therefore there is a wormhole in the rules allowing unwarranted datasets to be used for three days that would otherwise not qualify for a Part 7A warranty.
I am looking forward to hearing the noble Lord, Lord West of Spithead, on his amendments. In support of the third one, I will say that the latest ISC report into international partnerships recommends that the Prime Minister should provide the ISC with a full copy of the confidential annex of the annual report of the Investigatory Powers Commissioner. I believe this is probably pushing in that direction.
While we are discussing the ISC and a diversion from the Bill, we heard recently Dominic Raab admitting that while he was a Minister he ordered an intelligence-sharing activity that he knew opened up an individual to a real risk of torture elsewhere. I would be grateful if the Minister could confirm that this was the case and that the policy that excuses Ministers of the Crown when they do this is called the Fulford principle. Can he confirm that? Perhaps the Minister can explain to your Lordships’ House—as I say, either now or in writing—how this differs in substance from extraordinary rendition. Can he also explain how this self-confessed activity squares with the UK’s obligation under the convention on torture?
Returning to the Bill in hand, Amendment 11
“requires the annual report to include details of the number of authorisations sought and granted under new Part 7A”.
Bulk personal data appears to be widely used; 177 warrants were sought and approved in 2021. What is not clear is how many of these would qualify for the new 7A category of approval. It is also not clear from the Bill whether in future we will know the number of annual BPD warrants, as there is no explicit proposal for these to be included in the IPC’s annual report. This amendment seeks to make it explicit that they are reported in this way.
I am sure the Minister would agree that it is a reasonable—indeed, modest—request to understand how this permissive legislation is being used, not least because it seems that the application of the existing laws has not been totally smooth. In its most recent report, covering the period of 2020-21, the Investigatory Powers Commissioner’s Office, the IPCO, found that the Secret Intelligence Service had retained bulk personal datasets “in error” and “without a warrant”, and had “serious gaps” in its
“capability for monitoring and auditing of systems used to query and analyse BPDs”,
involving
“several areas of serious concern”.
It also found that the agencies were responsible for 29 errors involving BPDs, the second highest area of the investigatory powers for errors. Errors can include, for example, officers accessing an individual’s record without reason.
We say again that Part 7A contains extensive new powers. We need appropriate oversight and transparency. This is a small but important amendment to which I hope the Minister would have no difficulty agreeing.
Amendment 14 deals with Clause 5 of the Bill, and relates to third-party bulk datasets, where
“the intelligence service has relevant access … to a set of information that is held electronically by a person other than an intelligence service”.
The definition of “relevant access” includes where
“the type and extent of the access available to the intelligence service is not generally available”.
With this amendment, we are simply asking the Minister to put on record a more detailed explanation of what type of information this might consist of, and what is meant by “not generally available”.
Amendment 18
“is intended to confirm that genomic and genetic data is included in the definition of sensitive data under this section”.
It is a simple probing amendment, intended to ensure that our understanding of the Bill is correct. I suggest that the upcoming data Bill will also deal with this, so there are some cross-references we need to establish here before the next Bill arrives. In the Bill, “sensitive personal data” is defined under Section 202(4) of the 2016 Act, which in turn cross-references Section 86(7) of the Data Protection Act 2018. Section 86 of the DPA lists
“genetic data for the purpose of uniquely identifying an individual”
as sensitive personal information, so this amendment seeks to confirm that genomic and genetic data is included in the definition of sensitive personal data that might be included in health records, and that, as such, an application to examine any third-party dataset must explicitly state this.
In conclusion, Amendment 19
“requires the Secretary of State granting an authorisation in urgent cases to immediately notify a Judicial Commissioner that they have done so”.
This amendment is similar in intention to an amendment tabled to Clause 2, but this time regarding the powers in new Part 7B. Again, we are trying to understand what the urgent circumstances might be that would require examination of a third-party dataset without waiting for approval from a judicial commissioner, and therefore, as a safeguard, we would like the JC to be immediately notified that an authorisation has taken place. We have debated this to some extent under Part 7A, and I can imagine the crossover, but it would be useful to know if there are any differences between how Part 7A approval and Part 7B approval would be taken under these two circumstances.
Lord Anderson of Ipswich Portrait Lord Anderson of Ipswich (CB)
- View Speech - Hansard - - - Excerpts

My Lords, I welcomed this Bill at Second Reading, and the warmth of my welcome has not diminished. However, I am pleased to see so many amendments down to Part 1. As the noble Lord, Lord Fox, has said, the new rules for certain bulk personal datasets do not displace or dilute the currently applicable protections under the Data Protection Act, but they are probably the most operationally significant of the changes that we are looking at, and therefore can only benefit from careful scrutiny of the kind that noble Lords have so enthusiastically invited.

I have one general comment. Despite some of the kind words that were said about my report at Second Reading, I was not asked to design this Bill from scratch, nor to comment on anything as precise as a provisional text. Rather, my task was to assess proposals that were put forward by government and that in some cases evolved during the currency of my review. Although I did run a consultation as part of my review, its value was reduced by the rather limited amount I was able to say about the Part 1 proposals and some of the others. So although I did receive a handful of very helpful responses, there will certainly be points that did not occur to me and to which others were not able to alert me. The Bill is also, of course, in some respects more detailed than my recommendations. I look forward to hearing the Minister’s response to the various amendments in this group.

I will say a quick word about each of the amendments in my own name; there are only two. My probing Amendment 3 I offer to the Government as a Christmas present, as I thought it might suit them. If for any reason they do not like it—and I suspect they may not—then that is up to them; we can hardly force it on them. The background is this: it seemed to me that the question of whether individuals have a low, or no, expectation of privacy might depend in part on the use to which the datasets will be put. If, for example, an agency were prepared to commit to using a dataset only for training a large language model and not for operational purposes, perhaps that might be one of the factors pointing towards a low/no classification. The agencies and the Government politely explained to me—if I paraphrase correctly—that this was not a very practical suggestion, so I did not push it further, save to mention the point in paragraph 3.51 of my report.

Sure enough, the anticipated use of a dataset is not one of the factors listed in new Section 226A(3), where the factors are set out. But turn over the page to new Section 226BA, which deals with category authorisations, and there you see in subsection (3) that a category authorisation may describe a category of BPDs by reference to—among other things—

“the use to which the data will be put”.

My question to the Minister is simply this: if the use to which a dataset will be put can be relevant to the formulation of a category of low/no datasets, then why is it not relevant to the assessment of an individual dataset as low/no or otherwise? The Minister’s answer may be that the list in new Section 226A(3) is not exhaustive and that there is no reason why intended use should not be one of the circumstances taken into account under subsection (2) when considering whether a BPD is low/no. In that case, can he explain why intended use is not mentioned in new Section 226A when it is mentioned in new Section 226BA?

16:00
Is there a risk—I look here at the legal Benches—that the omission from new Section 226A of a factor that is included elsewhere might imply to whoever may have to interpret this new Act that we in Parliament did not wish intended use to be considered under new Section 226A? If we had, the argument would go, surely we would have said so, as we do later. As I said, I am probing only, but I would be glad for anything the Minister could say to help make this clear.
My Amendment 15 is a very minor one. It relates to the third-party bulk dataset regime—what will become Part 7B of the 2016 Act. The effect of Clause 5 of the Bill is to introduce a degree of regulation where there was none before in circumstances where an intelligence agency has relevant access to a third-party bulk dataset. My only point is that I am not clear why that access has to be electronic, as provided for in new Section 226E(2)(c) on page 14 of the Bill. That appears to mean that, if the third-party were to print the dataset off and press it into the eager hands of the intelligence agencies, there would be no relevant access and therefore no regulatory constraints.
Perhaps the Minister will tell me that this is very old-fashioned and that, in practice, in the modern world, access to an electronic dataset will always be electronic. Indeed, the Minister is nodding. In that case, surely my point still stands. If access is always electronic, why is it necessary to specify that access must be electronic before the safeguards kick in? Surely paragraph (c) on page 14 implies that access may be non-electronic and disapplies the safeguards in those circumstances. I am still a bit puzzled. If there is a point in the last line of new Section 226E, I hope the Minister will explain what it is.
Lord West of Spithead Portrait Lord West of Spithead (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, if I suddenly fall over, it is not excitement over my amendments but that I have a brand new starboard knee, which is still slightly wobbly, so I might look a little wobbly at times.

Noble Lords will recall that the Investigatory Powers Act was introduced as a result of the Intelligence and Security Committee of Parliament’s 2015 report, Privacy and Security, which recommended that a new Act of Parliament be created to

“clearly set out the intrusive powers available to the Agencies, the purposes for which they may use them, and the authorisation required”.

However, as the noble Lord, Lord Anderson, recognised in his recent report, which he referred to, there have been a number of changes since the Act was introduced. We now face a very different threat picture from that which we did in 2016, with an increased threat from state actors such as China, Russia and Iran, and a significant rise in internet-enabled crime, including ransomware and child exploitation. The pace of technological change has been incredible. Developments in the fields of data generation, cloud services, end-to-end encryption, artificial intelligence and machine learning have all created challenges, as well as opportunities, for law enforcement and the intelligence community.

The Intelligence and Security Committee, of which I am a member, therefore welcomes the introduction of this Bill. The ISC has considered classified evidence relating to the Bill and questioned all parts of the intelligence community and Ministers on the need for change. However, as ever, the devil is in the detail. The committee considers that there are several areas in which the Bill must be improved and, in particular, safeguards strengthened.

Parliament must ensure that the balance between privacy and security is appropriate, and that there is sufficient independent oversight of the work of the intelligence community, given the potential intrusiveness of its powers. The Bill seeks an expansion in the investigatory powers available to the intelligence services. While this expansion is warranted, any increase in investigatory powers must be accompanied by a concomitant increase in oversight. I have previously spoken about the refusal of the Government to update the remit of the ISC, or to provide the necessary resources for its functioning, such that it has

“oversight of substantively all of central Government’s intelligence and security activities to be realised now and in the future”,—[Official Report, Commons, Justice and Security Bill Committee, 31/1/13; col. 98.]

as was the commitment given by the then Security Minister in the other place during the passage of the Justice and Security Act.

The House has made known its views on this long-standing failure during debates on several recent national security Bills, including the National Security and Investment Act, the Telecommunications (Security) Act and the National Security Act. However, despite repeated attempts by this House to ensure effective oversight, this has been ignored by the Government. The Government cannot continually expand and reinforce the powers and responsibilities of national security teams across departments and not expand and reinforce parliamentary oversight of those teams as well. The committee expects the Government to take this opportunity to bolster the effective oversight they say they value. If they do not, then they should expect that Parliament will. I therefore call upon the Government once more to update the ISC’s memorandum of understanding to ensure sufficient oversight of all intelligence and security activities across government. Indeed, this was the quid pro quo that Parliament expected during the passage of the Justice and Security Act 2013, and I trust that Parliament will take the same view now.

I turn to Amendment 10, which is designed to close a gap in oversight. Proposed new Section 226DA requires that each intelligence service provide an annual report to the Secretary of State detailing the individual bulk personal datasets that they retained and examined under either a “category authorisation” or an “individual authorisation” during the period in question. My amendment would ensure that there is independent oversight of this information, rather than just political oversight. The amendment would provide that the annual report be sent also to the Intelligence and Security Committee of Parliament and the Investigatory Powers Commissioner. IPCO has a degree of oversight included in the Bill already, since judicial commissioners approve both individual and category authorisations at the point of issue and approve the renewal of any authorisations after 12 months. This is not full oversight. Further, there is currently no democratic oversight at all of category authorisation, which is not appropriate. My amendment would ensure that IPCO and the ISC have oversight of the overall operation of this new regime.

Noble Lords will note that I have also tabled an amendment to notify IPCO of any new individual datasets that are added to category authorisations by the intelligence services. That amendment would work alongside this, and the ISC considers that the combination would provide an appropriate balance of real-time and retrospective oversight for these new powers. It is vital that the robust safeguards and oversight mechanisms so carefully considered by Parliament in respect of the original legislation are not watered down by the changes under this new Bill. Instead, they must be enhanced in line with the increasing investigatory powers. This is what the ISC seeks to achieve by the amendments I have tabled today.

Amendment 12 is consequential on the amendments that I have just talked about.

I speak now to Amendment 13. Part 7A of the Bill provides for a lighter-touch regulatory regime for the retention and examination of bulk personal datasets by the intelligence services where the subject of the data is deemed to have a low or no reasonable expectation of privacy. Approval to use such a dataset may either be sought under a category authorisation—which encompasses a number of individual datasets that have similar content or may be used for a similar purpose—or by an individual authorisation, where the authorisation covers a single dataset that does not fall neatly within a category authorisation or is subject to other complicating factors. In the case of a category authorisation, a judicial commissioner will approve the overall description of any category authorisation before it can be used. A judicial commissioner will also approve any renewal of a category authorisation after 12 months and the relevant Secretary of State will receive a retrospective annual report on the use of all category and individual authorisations.

This oversight is all retrospective. What is currently missing from the regime is any form of real-time oversight. Under the current regime, once a category authorisation has been approved, the intelligence services then have the ability to add any individual datasets to that authorisation through internal processes alone, without any political or judicial oversight. This would mean relying on the intelligence service to spot and rectify any mission creep, whereby datasets might be added to a category authorisation in a way that was not consistent with the definition of the original authorisation, which lasts up until the 12-month marker for renewals.

While we have every faith in the good intentions of the intelligence services—and I do not mean that in a joking way, because we have been amazingly impressed by them—no legislation should be dependent on the good will of its subjects to prevent misuse of the powers granted therein, particularly where those powers concern national security. The ISC therefore seeks to fill that very worrying gap.

My amendment proposes a new section in Clause 2—proposed new Section 226DAA—which would ensure that the IPCO was notified whenever a new individual bulk personal dataset was added by the agencies to an existing category authorisation. Notification would simply involve the agencies sending to the Investigatory Powers Commissioner the name and description of the specific bulk personal dataset as soon as reasonably practicable after the dataset was approved internally for retention and examination by the intelligence services.

The amendment would require not that the use of the dataset be approved by the IPCO but merely that the commissioner be notified that it had been included under the authorisation. It therefore does not create extra bureaucracy or process. Indeed, it provides for a flow of real-time information between the intelligence services and IPCO, to allow for the identification of any concerning activity or trends in advance of the 12-month renewal period. Any such activity could then be investigated by the commissioner as part of its usual inspections. The ISC believes that this amendment strikes the right balance between protecting the operational agility of the intelligence services and safeguarding personal data at any level of sensitivity.

Noble Lords have already considered my related amendment, to provide the annual report to the IPCO and the ISC, as well as to the Secretary of State. The committee believes that this combination of real-time oversight through the notification stipulated in this amendment and retrospective oversight, through the involvement of judicial and political oversight bodies, is necessary to provide Parliament and the public with the reassurance that data is being stored and examined in an appropriate manner by the intelligence services.

I repeat my entreaty to the House: the robust safeguards and oversight mechanisms so carefully considered by Parliament in respect of the original legislation must not be watered down by the changes under this new Bill; they must be enhanced in line with the increasing investigatory powers.

Lord Hope of Craighead Portrait Lord Hope of Craighead (CB)
- View Speech - Hansard - - - Excerpts

My Lords, I have added my name to Amendments 3 and 15 in the name of the noble Lord, Lord Anderson. I have nothing to add to what he said in support of Amendment 15, but I shall add a word about Amendment 3, which was the subject of the Christmas present of the noble Lord, Lord Anderson. It requires one to look a little more carefully at proposed new Section 226A(2), which provides as follows:

“In considering whether this section applies to a bulk personal dataset, regard must be had to all the circumstances, including in particular the factors in subsection (3)”.


What the noble Lord, Lord Anderson, is seeking to offer the Minister the invitation to include is the use to which the datasets are to be put. He draws strength for that proposition from what one finds in new Section 226BA(3), in which express reference is made to the use to which the datasets will be put. It can be said in support of this proposal that it seems a little strange not to include the use to which the datasets are to be put, if they are mentioned expressly in new Section 226BA(3). I suppose that one could say that, since new Section 226A(2) is very widely phrased and includes all the circumstances, that the Christmas present of noble Lord, Lord Anderson, is already there as already there as one of the circumstances, but it is probably happier to include it expressly, just for the avoidance of doubt. It is for the avoidance of doubt that the strength can be found in the proposal that he has put forward.

16:15
To return to Amendment 1, what the noble Lord, Lord Coaker, was doing with it, as he explained, was to draw attention to a difference in the wording in Clause 2: the wording to be found in new Section 226A(3)(b) does not follow precisely what we find in Schedule 10 to the Data Protection Act. I respectfully suggest that the wording in the Bill unpacks the wording of the schedule that the noble Lord, Lord Coaker, has reproduced in his amendment. I think that unpacking it in the way that the Bill does is helpful: it identifies two situations in which one could say that the data subject has taken a step, deliberately, to make the information public. One is where the individual does so himself, and the other is where the individual consents to the data being made public.
I think that the Bill achieves greater clarity than did Schedule 10 to the Data Protection Act, and therefore I respectfully suggest that, while the noble Lord, Lord Coaker, is absolutely right to draw attention to the difference in the wording, what we see is improved wording and I would support the wording of the Bill rather than that in the amendment which he has put forward. I hope he will not mind my suggesting that, but it is very helpful that he has drawn our attention to it. To be able to congratulate the Bill on improving on wording is something worth noting.
Lord Murphy of Torfaen Portrait Lord Murphy of Torfaen (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, I support my noble friends Lord Coaker and Lord West with regard to the Intelligence and Security Committee amendments. In 2005, when I became the chair of the Intelligence and Security Committee, nearly two decades had passed since the committee originally started life, when people did not really understand what it was all about. It had not been accepted, particularly, by agencies or by the Government, but over those 20 years, it became accepted. After I left, in 2007, even more changes to the powers and responsibilities of the committee were made, to such an extent that the ISC is now a significant and serious part of our constitutional landscape. But I fear that, over the last number of years, that has slightly declined.

I understand, for example, that the ISC has not met a Prime Minister—there have been lots of them, of course—over the last number of years, nearly a decade. Certainly, when I chaired it, we met the Prime Minister every year or so. It is an indication, I suspect, of what the Government think about it if they do not see it as so important as to meet the head of the Government now and again. I hope that is wrong, but I am sure the Minister will enlighten the House later as to what he and the Government think about the importance of the ISC. It is hugely significant; it is serious.

I shall move briefly on to the significance of the ISC with regard to the passage of the original Investigatory Powers Act, some years ago now, in 2015-16. I had the privilege of chairing the Joint Committee of both Houses on that Bill, and the ISC simultaneously was taking a huge interest in what it contained. For example, I met the then chair of the ISC, Dominic Grieve KC, and the committee itself produced a report on how it thought the original Act could be improved. I just hope that this small but important Bill—which I entirely support, by the way—mirrors what happened to the original Bill, so that the Government can indeed meet the ISC, at a ministerial level and at an official level, and have a proper dialogue as to how they see the ISC working after the Bill goes into law. I hope I can get some assurances from the Minister that that will happen.

It is an important Bill, the ISC is an important body, and they should operate together in a very special way. I wholly support the Bill, but I support the amendments from my two noble friends.

Lord Carlile of Berriew Portrait Lord Carlile of Berriew (CB)
- View Speech - Hansard - - - Excerpts

My Lords, it is a pleasure to follow the noble Lord, Lord Murphy, who has served with such distinction on the issues we are discussing this afternoon. I do not want to repeat what I said at Second Reading; I spoke in support of the Bill in general terms, and I remain in support of it. The only additional thing I would say is that we should not allow unnecessary amendment of the Bill to create a sort of legislative game of Dungeons and Dragons in which a bureaucratic labyrinth would be created which can be met in a much more practical way. On the whole, the Bill is pretty practical about a modern problem—a more modern problem than existed, say, 10 years ago—which has to be addressed in real time and sometimes with great urgency in that real time.

I want to say something that follows from what the noble Lords, Lord Murphy and Lord West, said about the ISC. I hope that we can tease a little more information out of the Minister, who has been extremely helpful to all of us who are interested in the Bill. I can see, and I would be grateful if the Minister would tell us, that there might be some practical problems relating to national security in the way in which the ISC was informed about problems arising under the provisions in the Bill when it becomes an Act. It would be helpful to the Committee if the Minister were to say from the Dispatch Box that the Government certainly do not exclude the involvement of the ISC in the consideration of the Bill. I should also be very grateful if he would say that the Home Secretary would regard it as a duty to inform the ISC on his personal responsibility if issues arose which ought, in the national interest, to be the subject of information to the ISC. Thus, the ISC might be able to report on these issues without too much bureaucracy being involved and any arguments about what is or is not disclosable in a wider way concerning national security.

Baroness Manningham-Buller Portrait Baroness Manningham-Buller (CB)
- View Speech - Hansard - - - Excerpts

My Lords, I do not know whether I can help the noble Lord, Lord Fox, on his question of urgency. One of the things that the Security Service and the other intelligence agencies do is deal with matters of life and death, of imminent terrorist threats, of states pursuing one of their dissidents. There is many an occasion when moving at vast speed outside the hours when IPCO is available is necessary and proportionate. I am out of date, so it is hard to give lots of current examples, but many a time there is an urgent need to move fast to try to save life.

On the point from the noble Lord, Lord Murphy, about the ISC—we will come on to look at these amendments in more detail—as far as my service is concerned, we did not need to get used to the ISC in that we had been demanding its creation for a number of years, with resistance from the Prime Minister of the day until it actually came into being. And when it did, we very much welcomed it.

I have hardly had more pleasure since I have been in this House than from the amendment in the name of the noble Lord, Lord Fox, on seeking to forget stuff. Like some noble Lords, I have difficulty in remembering things—I am sorry, I should speak only for myself—but if I was legislated to forget something, it is almost certain that I would be capable of remembering it.

Lord Fox Portrait Lord Fox (LD)
- Hansard - - - Excerpts

That is exactly the case.

Lord Sharpe of Epsom Portrait The Parliamentary Under-Secretary of State, Home Office (Lord Sharpe of Epsom) (Con)
- View Speech - Hansard - - - Excerpts

My Lords, I am grateful for the contributions to this debate, which have been very interesting. I thank all noble Lords for the points raised. I shall do my very best to address all of them and apologise in advance for going into significant detail. I also thank everyone in the Committee for their broad support for the Bill.

I will start with the low/no privacy factors on bulk personal datasets, which I will henceforth call BPDs, and the various amendments relating to the test set out in Clause 2, to be applied when an intelligence service is considering whether a particular dataset is one that can be retained, or retained and examined, under new Section 226A in the new Part 7A. This test requires that regard must be had to all the circumstances, and that particular regard must be had to the factors set out in new subsection (3). The list of factors is not exhaustive and other factors may be considered, where relevant.

Schedule 10 to the Data Protection Act is related to Section 86 of that Act, which is concerned with sensitive processing of personal data by the intelligence services. Schedule 10 sets out a list of conditions which must be met for such processing to be lawful for the purposes of the Data Protection Act. There is a risk that applying these words here, in a different context and for a different purpose, may be seen to create a link, albeit fallacious, between the type of datasets that will be retained and examined under new Part 7A and sensitive processing under the Data Protection Act. For that reason, their inclusion here risks doing more harm than good, as the noble and learned Lord, Lord Hope of Craighead, noted.

In any case, the safeguards in new Part 7A are already sufficient to ensure due regard for privacy. Every dataset proposed to be retained, or retained and examined, must be individually authorised. In addition to the test at new Section 226A, as new Section 226B makes clear, an individual authorisation may be granted only if it is both necessary and proportionate.

The factors have been chosen because they are most relevant to the context in which the test will be applied and have been drawn from existing case law. They provide a guide to the decision-maker in reaching a conclusion as to the nature of the dataset. Furthermore, a form of prior judicial approval will apply to all authorisations so that there is independent oversight of the conclusions reached.

Amendment 1, tabled by the noble Lord, Lord Coaker, seeks to replace factor (b) with language drawn from Schedule 10 to the Data Protection Act 2018. Factor (b) is concerned with the extent to which an individual has made public the data in the dataset, or has consented to the data being made public. The Government do not consider the amendment necessary. I am sure the noble Lord’s aim is to improve the safeguards in the Bill, and he has drawn inspiration from existing precedent to do so in an effort to bring consistency across statute. However, the amendment fails to achieve that aim, and risks creating an unclear and unnecessary link between this Bill and the Data Protection Act, which I have already explained. I will return to the Data Protection Act in due course.

Amendment 2, tabled by the noble Lord, Lord Fox, probes the inclusion of factors (d) and (e), relating to publicly available datasets that are already widely known about or are already used in the public domain—for example, in data science or academia. As I mentioned, the test in new Section 226A is one in which

“regard must be had to all the circumstances”.

The removal of factors from new subsection (3) would not, therefore, fundamentally change the test; it would mean simply that the decision-maker would not be bound to have particular regard to the absent factors. This amendment would, in fact, result in less transparency in the considerations the intelligence services apply when assessing expectation of privacy in relation to Part 7A authorisations.

The Government consider it important that particular regard is had to these factors. I know that noble Lords particularly enjoy the example of the “Titanic” manifest. It is a useful example of where such factors would be relevant, as it is a dataset that is widely known about and widely used, and contains real data about real people who would, unfortunately, no longer have an expectation of privacy. I also point to the helpful example in the independent review by the noble Lord, Lord Anderson: the Enron corpus. This is a large dataset of emails that came into the public domain following the investigation into the collapse of the Enron Corporation. Although initially sensitive, the dataset has been available in various forms for almost 20 years and is widely used in data science. It is right that such datasets are in scope of the new regime.

The noble Lord, Lord Fox, asked specifically about the extent to which these factors depart from existing privacy laws. The law concerning the reasonable expectation of privacy is likely to develop over time, and new Section 226A is intended to be sufficiently flexible to accommodate future changes. Rather than departing from the law, new Section 226A is intended to ensure that the intelligence services can continue to apply the law as it develops.

On Amendment 3, I thank the noble Lord, Lord Anderson, for tabling this helpful probing amendment. I am afraid the Government do not think it is necessary in order to achieve what we understand the intended effect of the amendment to be. The amendment does, however, provide an opportunity to better explain the difference between what the Bill calls “individual authorisations” and “category authorisations”. An individual authorisation will authorise the retention, or retention and examination, of a dataset under the new Part 7A being inserted into the Investigatory Powers Act—which I will henceforth refer to as the IPA—by this Bill.

All datasets that are to be retained under Part 7A must have an individual authorisation. Individual authorisations are subject to prior approval by a judicial commissioner unless the dataset described falls within an existing category. A category authorisation will not authorise the retention, or retention and examination, of a dataset. Instead, it is a mechanism through which a judicial commissioner’s permission may be sought in order to depart from the normal rule on prior approval, but only in respect of datasets that meet a particular description.

16:30
The description of a category may set out the use to which the datasets will be put to assist the judicial commissioner in making their assessment. Once approved, this description is called a “category authorisation”. So, as your Lordships will see, although the nomenclature of each type of authorisation is similar, they serve quite different functions.
The noble Lord’s amendment is concerned specifically with the test in the new Section 226A. As is clear from the jurisprudence, the test to be applied when determining whether an individual has a reasonable expectation of privacy—and therefore whether a dataset could be authorised under Part 7A—is one that takes into account all circumstances. There is no one-size-fits-all test, but this language ensures that thorough consideration is given to all relevant information in support of each individual authorisation, as reflected in the wording of subsection (2) of new Section 226A.
Of course, the law does not stand still and the jurisprudence in this area will certainly change as society’s expectations change. New Section 226A is therefore intended to encapsulate the essence of the jurisprudence while remaining flexible enough to accommodate future changes. That is why the factors are a non-exhaustive list.
I assure the noble Lord, Lord Anderson, that the fact that a relevant consideration does not explicitly appear within the list of factors in subsection (3) does not mean that it cannot and should not also be considered. In fact, quite the opposite is true: subsection (2) of Section 226A makes it clear that regard must be had to all the circumstances, as noted by the noble and learned Lord, Lord Hope. That will include, so far as is relevant, the use to which the intelligence services intend the dataset to be put once it is authorised. Further detail on this is set out in the draft code of practice which was published on GOV.UK last week. I believe that it will be found in paragraphs 4.11 to 4.20.
It is not the case that the Government disagree with the noble Lord’s amendment, simply that our view is that the amendment is not necessary for the reasons I have outlined. I trust this has provided the clarity that the noble Lord sought. I ask him to not move his amendment, but I am open to discussing the Government’s position further should he not be satisfied by my explanation.
The noble Lord, Lord Fox, via Amendment 4, seeks to probe the purposes for which the datasets—with which Part 7A is concerned—will be used by the intelligence services. It is no secret to say that bulk personal datasets, or BPDs, are used by the intelligence services in multiple ways to support their statutory functions. For example, BPDs play an important role in investigations, notably as “building block” intelligence, where analysts can pull together an assessment of the possible meanings of disparate pieces of fragmentary intelligence.
It is also envisaged that Part 7A will better enable our intelligence services to use BPDs for the purpose of developing the capabilities they need to be able to continue to do their important work, such as the training of machine-learning models, as the noble Lord noted. I note that the review by the noble Lord, Lord Anderson, sets out the many important uses to which BPDs are put.
The amendment proposed would severely and unnecessarily curtail the use to which the datasets may be put and would unnecessarily impede the intelligence services in their ability to carry on their work should the regime not allow for the authorisation of datasets that support the full range of the agencies’ functions.
The noble Lord asked about editorial control and public versus private. The question of whether a dataset meets the low or no reasonable expectation of privacy test will be assessed on a case-by-case basis, having regard to all circumstances, including the factors set out in the Bill. The draft code of practice sets out further detail on this, with paragraph 4.16 stating:
“This might be relied upon if the dataset consists of a set of news articles where a level of responsible review and scrutiny has already been applied to the dataset”.
Other than that, it would be inappropriate for me to speculate as to how a particular dataset might be dealt with under the proposed regime.
The noble Lord also asked what happens if an officer examining a BPD discovers that it contains more sensitive data. Section 226D of the low/no regime contains a mechanism to ensure that any information of that type or particularly sensitivity is handled appropriately. The code of practice sets out that in the event of an analyst discovering sensitive data, the relevant intelligence service must take certain steps. First, the head of the intelligence service must ensure that anything in the process of being done in relation to that data is stopped as soon as is reasonably practicable—I will come back to that. The intelligence service must then treat that part of the low/no BPD as if the relevant authorisation has been cancelled. The relevant information must be removed from the low/no dataset and either deleted or a Part 7 warrant sought in respect of that information.
I now turn to Amendments 5 to 9 and 19, tabled by the noble Lord, Lord Fox. Proposed new Section 226 (6B) in Clause 2 of the Bill enables the head of an intelligence service to grant an individual authorisation in respect of Part 7A without prior judicial approval, in circumstances in which there is an urgent need to do so. I am sure noble Lords will understand that there are circumstances in which our intelligence services must act urgently, as the noble Baroness, Lady Manningham-Buller, has just noted. There are existing urgency provisions throughout the IPA for that reason. The circumstances in which an authorisation is considered urgent are set out in the draft 7A code of practice, which the Government published on GOV.UK last week. They include where there is a threat to life or of serious harm, or if there is an urgent intelligence or investigative opportunity. These circumstances are well understood in the operational world and there is no need to depart from the established criteria here.
Part 7B, the third-party bulk personal dataset regime, is intended to mirror the well-established urgency circumstances and the Part 7 processes, to the extent possible. To be clear, the urgency provision is not a means by which scrutiny can be avoided or safeguards weakened. As set out at proposed new Section 226B in Clause 2 of the Bill, with further detail in the draft code of practice for Part 7A, a judicial commissioner must review an authorisation within three working days and decide whether to approve the decision to grant it. Of course, it is envisaged that the circumstances in which a Part 7A authorisation is required will be rare. However, as the noble Lord, Lord Anderson, noted in his report, there are operational circumstances where urgent co-operation might be necessary, and it may not be possible to seek prior judicial authorisation in the operational window available, as the noble Lord, Lord Carlile, also observed. We discussed one such case at Second Reading, in which the MoD were co-located with the intelligence services in a hostile environment and were unable to fully collaborate due to the existing restrictions in Part 7. I hope I have set out clearly how the urgency procedures operate and that there may of course be circumstances in which they prove necessary.
Amendment 8 seeks to probe the meaning of the expression
“so far as is reasonably practicable”
in Clause 2, under proposed new Section 226D(2). This form of words is not novel. It is a well-known expression that appears elsewhere on the statute book, including at several places in the 2016 Act. These are important words because without them, the head of the intelligence service would be legally obliged to put a stop to anything that is being done both immediately and without any regard to the consequences of doing so.
Given the nature of the work that our intelligence services do to keep our country safe, I am sure noble Lords will appreciate that there are circumstances in which immediately stopping something that is already in train may not be possible, and if it is possible, it may not be safe to do so. The heads of our intelligence services are accountable for the actions of their respective organisations, as I explained earlier. They are best placed to make decisions of this kind, and it is important that they be able to do so. However, that does not give them carte blanche to do as they please. As I also explained, the Investigatory Powers Commissioner will be obliged to keep Part 7A under review, including compliance with proposed new Section 226D.
Turning to Amendment 9, I am sure noble Lords were as surprised as I was to hear that the noble Lord thinks that the intelligence services ought to “forget” intelligence they have gathered, creating a clear risk that could jeopardise national security and be contrary to their statutory functions, as well as Article 2 of the Human Rights Act, on the right to life.
Lord Fox Portrait Lord Fox (LD)
- Hansard - - - Excerpts

If the Minister and indeed the noble Baroness had listened to what I said, they would know that I do not think it is forgettable; I just wanted the Minister to confirm that point.

Lord Sharpe of Epsom Portrait Lord Sharpe of Epsom (Con)
- Hansard - - - Excerpts

Thank you; point taken.

Section 226D provides a mechanism to achieve what I understand the intent of the amendment to be. It is clear that remedial action must be taken if it is discovered that Section 226A does not apply or no longer applies to part of a dataset authorised under Part 7A. Anything in the process of being done must be stopped as soon as possible, and that part of the authorisation is treated as cancelled. The effect of that part of the authorisation being treated as cancelled is that the data to which it relates must be deleted unless there is some other lawful basis for its retention. It may well be that it is appropriate for the intelligence service to continue to retain the data. That is why subsection (3), in effect, puts that part of the dataset back into the decision-making machinery in Section 220 of Part 7 of the IPA—so that such a decision can be made. We provide a fuller explanation of that in the draft code of practice for Part 7A, at paragraphs 4.26 and 5.39.

In conclusion on this amendment, if the noble Lord is suggesting that any actionable intelligence that has been identified while the agency was operating on the basis of that retention and examination being lawful under Part 7A should not be acted on, I am afraid I must playfully suggest that it is he who ought to forget his amendment.

I turn now to the various amendments on reporting on BPDs, including several that seek to amend the provisions set out in Clause 2, under Section 226DA, which require the heads of the intelligence services to provide an annual report on Part 7A to the Secretary of State. The first amendment proposed by the noble Lord, Lord Fox, Amendment 11, seeks to mandate that certain statistical information in a given year—specifically, the numbers of authorisations sought and granted—be provided to the relevant Secretary of State. This amendment is not necessary or appropriate. First, those Secretaries of State who are politically accountable for the intelligence services will have in place arrangements to that end and may demand of the relevant intelligence service any additional information he or she feels necessary. This may go beyond the level of detail the noble Lord has proposed be included in the annual report and may be more frequent. This is not a matter for the Bill, because the exact information the Secretary of State requires may evolve over time. Secondly, if this sort of specific reporting requirement is found to be necessary or desirable, it is more appropriate for inclusion in a code of practice, rather than being in the legislation. Indeed, the draft code of practice for Part 7A sets out some relevant details under paragraph 7.4.

I turn now to Amendments 10 and 12, proposed by the noble Lord, Lord West, and I take this opportunity to reassure him and the noble Lord, Lord Murphy. On behalf of the Security Minister, we thank them for their valuable work on the ISC and for the constructive engagement with the Bill Committee to date. I am pleased to see the noble Lord, Lord West, in his place today, and I am glad that he is on a more or less even keel.

The amendments the noble Lord has tabled would require the intelligence services to provide the same annual report that they provide to their Secretary of State, on the operation of Part 7A, to the ISC and the Investigatory Powers Commissioner. I do not believe that this additional requirement would provide the enhanced oversight of the regime that the amendments purport to provide. The annual reporting requirement is a formal statutory mechanism by means of which the Secretaries of State will receive information from the intelligence services about their use of Part 7A on an annual basis. This is a mechanism intended to ensure effective political oversight by the Secretary of State.

The ISC is a committee of Parliament. Oversight by the ISC is neither of the same nature as, nor a replacement for, the oversight of the Secretary of State. The ISC, as a committee of Parliament, already has a long-standing and well-established role in the oversight of the intelligence services to which these provisions will apply, and that role will continue here.

Sending the annual report to the Investigatory Powers Commissioner will not increase the level of independent oversight provided, for the following reasons. First, the Investigatory Powers Commissioner will be required to keep this new regime under review, as he does with the current Part 7 regime, and he will continue to report annually on his findings. Secondly, the information these amendments seek to include in the annual report is already information that the draft code of practice will require the intelligence services to keep, as is clear from paragraphs 7.1. and 7.2. The commissioner, and anyone acting on his behalf, has access to all locations, documentation and information systems as necessary to carry out a full and thorough inspection regime. The intelligence services are legally obliged to provide all necessary assistance to the commissioner, or anyone acting on his behalf, including by providing documents and information.

The noble Lords, Lord Fox, Lord Murphy and Lord West, asked about the continued engagement with the ISC. On both the policy proposals informing the Bill and the Bill itself, through a combination of ministerial, operational and official engagement, we have maintained continual engagement, which includes recent sessions with the Security Minister and the agency heads. As I said earlier, we are grateful to the committee for its engagement and scrutiny of the Bill. We will continue to involve it throughout the Bill’s passage, and I am more than happy to take the noble Lords’ comments back to the Home Office and make sure they are widely understood.

Amendment 13 would see the intelligence agencies notify the Investigatory Powers Commissioner every time an individual authorisation is granted in reliance on a category authorisation. I have already set out the distinct processes for individual and category authorisations under new Part 7A. As I set out earlier, categories will be authorised only with the prior approval of a judicial commissioner. IPCO inspectors will then be able to review the individual authorisation granted in reliance on a category authorisation during their regular inspections of the intelligence services throughout that time. Category authorisations will expire at 12 months and will then need to be renewed and that decision reapproved by a judicial commissioner.

16:45
It is important to remember that the Government are delivering these reforms to ensure that the services have the operational agility they need to effectively carry out their statutory functions. The safeguards in new Part 7A are calibrated to reflect the level of intrusion associated with the dataset to which new Section 226A applies. The intelligence services do not presently notify IPCO when they add a new dataset to a class warrant under the existing Part 7 regime. The Investigatory Powers Commissioner’s Office reviews these additions on inspection as part of routine oversight, so there is no need for a more onerous dataset-by-dataset approach here. It would therefore not be appropriate to place greater restrictions where the data in question under the new Part 7A would have a lower expectation of privacy.
Amendment 16, proposed by the noble Lord, Lord Coaker, seeks to insert an annual reporting requirement into the Part 7B regime. Noble Lords will be aware from reading Clause 5 that, as with the rest of the existing Act and the Bill, the Part 7B regime will be subject to stringent and robust oversight by the Investigatory Powers Commissioner. For new Part 7B, this includes the application of the judicial double lock for warrants under this part. The Part 7B regime will also be included within the Investigatory Powers Commissioner’s annual report, which will provide further transparency and accountability. To add an extra requirement in the Part 7B regime for a similar report to be produced by the intelligence services for the Investigatory Powers Commissioner and the ISC would be unnecessary and duplicative. For these reasons, the proposed amendments do not provide additional meaningful oversight, and therefore I invite the noble Lord not to move them.
Amendments 14, 15, 17 and 18 all relate to third-party BPDs. The Government cannot agree with Amendment 15, tabled by the noble Lord, Lord Anderson of Ipswich, on the basis that it would damage the overall efficacy of the third-party BPD regime and impair the operational agility of the intelligence services. The Bill introduces safeguards regarding the intelligence services’ examination of third-party BPDs on the system of third parties. These safeguards are designed to mirror, to the extent possible, the existing IPA Part 7 regime. Under the existing Part 7 regime, a BPD exists only if it is available electronically for analysis, and it is the general rule that any examination of a BPD would also happen electronically. It does not follow that in this day and age an intelligence service would seek to examine a BPD in hard copy. Such an approach would be astonishingly inefficient given the sheer scale of the data available. It could also increase the intrusion on privacy and would prohibit the intelligence service from overlaying the results against other electronically retained datasets, which in turn would risk intelligence failure and general operational inertia. This is also true of third-party BPDs, as the access and examination of a third-party BPD will always take place electronically, and this concept needs to be clearly reflected in the third-party BPD regime to ensure clarity and consistency around when the third-party BPD regime is engaged and when it is not.
On Amendment 14, tabled by the noble Lord, Lord Fox, as noble Lords are aware, the proposed regime is designed to ensure that the intelligence services’ access and examination of third-party BPDs are clearly defined and underpinned by the appropriate level of safeguards and oversight. The inclusion of “not generally available” within the proposed regime sets clear guard-rails for the intelligence services to follow in respect of what does and does not constitute a third-party BPD. For example, if a third party sold or provided access to a dataset to the general public but offered a smaller customer base, such as Governments or law enforcement agencies, the ability to query or access extra data fields, this additional activity would clearly fall within the scope of the third-party BPD regime, as the access is not generally available. Removing this clear test from the proposed regime would seriously inhibit and impede the conduct and operational agility of the intelligence services, as it would bring into scope a much broader range of datasets that would be available to the general public, even going as far as requiring a warrant to undertake activity such as browsing the internet.
I thank the noble Lord, Lord Coaker, for tabling Amendment 17 and am happy to explain why the Government cannot support it. Section 263 of the IPA contains the definition of serious crime that is relied on by the majority of the powers contained in the Act, such as the interception and equipment interference provisions. It is this same definition of serious crime that is relied on in the Part 7B regime. It has been explicitly clear since the IPA came into operation that the definition of serious crime contained in Section 263 applied to the relevant provisions of the Act unless otherwise stated. It would therefore be inconsistent to explicitly reference the Section 263 definition in the Part 7B regime, when the rest of the IPA relies merely on the general definition of Section 263. This would create confusion and inconsistent interpretations around which serious crime definition is being applied.
On Amendment 18, tabled by the noble Lord, Lord Fox, the current definition of “sensitive personal data” contained in Clause 5 draws on the definition of sensitive personal data contained in the existing Part 7 BPDs regime, which in turn relies on provisions in the Data Protection Act 2018. It is therefore illogical to introduce a different definition in one section of the proposed third-party BPD regime in respect of sensitive personal data and to diverge from the Data Protection Act in this way. I also point out that the relevant provisions in the Data Protection Act already refer to genetic data where it is processed for the purposes of identifying an individual. Therefore, it is not necessary to reference it explicitly in Clause 5.
Finally on the subject of the age of children, my understanding is that this relates to the difference in the age of criminal responsibility in the relevant legislature for each devolved area, but I will confirm and write to the noble Lord if that is not correct.
I hope that my rather lengthy explanations—for which I apologise—have provided reassurance to noble Lords. There may be further conversations to be had on certain areas, but I hope that I have given a clear rationale to noble Lords for the Government’s position and that they will not seek to press their amendments.
Lord Coaker Portrait Lord Coaker (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, that was an extremely helpful response from the Minister and shows the importance of tabling probing amendment sometimes: to get things read into Hansard that can be referred to.

With respect to the point around children, I would be grateful for the letter to be made available to other Members of the Committee. Again, that was a helpful point and helpful clarification, should it be needed. I also very much agree with him—to show my point about the importance of things being read into Hansard—about my Amendment 17, but it was helpful for the Minister to read into the record the definition of serious crime to be used throughout the Bill, so that there is no ambiguity with respect to that.

I totally agree with what the noble and learned Lord, Lord Hope, said about my Amendment 1. I think the wording in the Bill is better than that contained in Schedule 10 to the Data Protection Act 2018, but I wanted that to be read into the record so that we had it there. I agree with his criticism of my Amendment 1, but the reason I tabled it was exactly to get the point that he made in criticising my amendment, which the Minister reinforced—if the noble and learned Lord understands my logic.

The points made by the noble Lord, Lord Anderson, with respect to Amendment 3 raise an issue. The Minister’s response to that was, “Well, it’s a non-exhaustive list so it’s not necessary, but I’m happy to talk to the noble Lord about it”. One wonders where that will get to. It will be interesting for the Committee to see the outcome of that. I thought that Amendment 3, of all the various amendments, was particularly useful and again drew out whether the factors listed in Clause 2 are the right ones, or whether they need adding to. It was important that the Minister clarified that it is not an exhaustive list.

There is one area that I think may need to be looked at further, as mentioned by my noble friends Lord Murphy and Lord West, and the noble Lord, Lord Carlile, if I understood his remarks properly. We need to clarify the role of the Intelligence and Security Committee. I note the Minister’s reassurances, but what is its role? The clear point of difference between what I would say and what my noble friends Lord Murphy and Lord West and others would say is that we are talking here about parliamentary oversight. The Government have an annual report which goes to the Secretary of State. That is political oversight of a sort but it is not parliamentary oversight. The whole point of the ISC being set up was to give parliamentary oversight to all these sorts of matters. We have a Bill before us called the Investigatory Powers (Amendment) Bill, which deals with all sorts of issues of national security and the powers that the intelligence agencies and others should have on our behalf. It is only right and proper that the Intelligence and Security Committee should have a role that is properly defined within the legislation before us. That is one aspect that I need to reflect on and discuss with other Members of your Lordships’ House and with my noble friend Lord West, as our member of that committee.

That is the one area where, to be honest, I was not satisfied with what the Minister had to say. Notwithstanding Amendment 3, and all the other points made to the noble Lord, Lord Fox, and many others, the definitions the Minister has helped clarify and the various ways he has sought to ensure that people understand the Government’s intent have been extremely helpful to the Committee. With that, I seek leave to withdraw the amendment.

Amendment 1 withdrawn.
Amendments 2 to 13 not moved.
Clause 2 agreed.
Clauses 3 and 4 agreed.
Clause 5: Third party bulk personal datasets
Amendments 14 to 19 not moved.
Clause 5 agreed.
Clauses 6 to 10 agreed.
Clause 11: Offence of unlawfully obtaining communications data
Amendment 20
Moved by
20: Clause 11, page 30, leave out lines 38 and 39
Member's explanatory statement
This amendment is intended to probe the legal basis for surveillance of the type of data described in new subsection (3A)(e).
Lord Fox Portrait Lord Fox (LD)
- Hansard - - - Excerpts

My Lords, Amendment 20 is intended to probe the legal basis for surveillance of the type of data described in new Section 11(3A)(e). This amendment would prevent public authorities—councils, police forces, intelligence agencies, government departments including the DWP and HMRC, the Gambling Commission, the Food Standards Agency, and many more—having “lawful authority” to obtain and use communications data from a telecommunications or postal operator solely because the information is available to the public or a section of the public even if only on a commercial basis.

Communications data is defined in the IPA as data that may be used to identify, or assist in identifying, the sender, recipient, time, duration, type, method, pattern, or fact of a communication, along with the system used to make a communication, its location and the IP address or other identifier of any apparatus used. The broad list of public authorities able to obtain communications data is set out in Schedule 4 to the IPA.

Clause 11 of the Bill before us now amends the Section 11 IPA offence of unlawfully obtaining communications data from a telecommunications or postal operator. Whereas the IPA currently defines an offender as,

“A relevant person who, without lawful authority, knowingly or recklessly obtains communications data from a telecommunications operator”,


this Bill would add a list of examples to the Act of what constitutes lawful authority.

17:00
We are, for example, concerned about one such example, in new subsection (3A)(e), which states that
“where the communications data had been published before the relevant person obtained it … ‘publish’ means make available to the public or a section of the public (whether or not on a commercial basis)”.
I hope that makes the point.
It is not the case in law that data that is available to the public or a section of the public is, as a result, information that can be subject to surveillance, absent a lawful authority. The public or semi-public nature of the information does not provide a lawful authority for intrusive surveillance in and of itself. Accordingly, it is well-accepted that a legal basis is required for various types of “public” surveillance.
This thesis is directly contradicted by the addition of paragraph (e) of new subsection (3A), which states that
“cases where a relevant person has lawful authority to obtain communications data from a telecommunications operator or postal operator”
include situations,
“where the communications data had been published before the relevant person obtained it”.
We are uneasy about the change proposed in the Bill to assert that there is a lawful authority to obtain communications data from operators simply on account of the data being publicly or semi-publicly available. This amendment probes that issue to get the Minister to explain to your Lordships where we are on that.
Your Lordships will be pleased to know that there are not quite as many of my amendments in this group, but there are two more to which I shall speak. Amendments 23 and 25 would restrict the changes relating to internet connection records in Clause 14 to use by the intelligence services only. I should say that these amendments are inspired by the report by the noble Lord, Lord Anderson.
Internet connection records, or ICRs, are essentially web logs that
“contain rich data about access to internet services”
and
“can reveal appreciably more about”
individuals “than their telephony records”. Can the Minister confirm, for example, that no other European or Five Eyes country has surveillance laws that allow for the compulsory generation and retention of ICRs or web logs?
That stated, this amendment is not seeking to make that no longer the case, because currently ICRs can be obtained under Section 62 of the IPA, where the time and use of a service is known or the person’s identity is known. Clause 14 would amend Section 62 of the IPA to add a further purpose for which ICRs can be used for target discovery—that is, generalised surveillance. I think it would be helpful for the Minister to put on record why this change is being made and to perhaps explain how in fact it will “improve target detection” and
“assist in detecting new subjects of interest”.
This is an important change and it is important that the reasons around it are fully articulated from the Dispatch Box.
The Explanatory Notes acknowledge the risks of such open-ended powers:
“It is recognised that such queries are highly susceptible to imprecise construction”.
The notes also acknowledge the complexity of utilising such broad query powers in practice and the requirement of
“subject matter expertise to formulate appropriate queries to derive the correct subset results”.
So the safeguards as they stand are few and essentially rely on the new condition being limited to national security and serious crime.
In his review of the operation of the IPA, the noble Lord, Lord Anderson, recommended that, if ICRs are expanded in the way currently proposed in this Bill, the new conditions should be restricted to the intelligence agencies, at least at first. However, the Bill goes further and provides these new powers to the NCA. We would like the Minister to explain why that decision was taken and why is it proportionate and necessary for the NCA to have these powers. The wider the use of these powers is spread, the more likely it is that the essential expertise that is required will not be available. I believe that was one of the motivations behind the contraction of that use. I beg to move.
Lord West of Spithead Portrait Lord West of Spithead (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, I stand to address the clause stand part notice for Clause 13 and also Amendments 21, 22, 24 and 26. The aim of looking at the clause relates to the communication data disclosure powers. The current IPA wisely restricted the number of public authorities that are able to compel the disclosure of communications data from telecommunications operators, given the potentially intrusive nature of this power. Consequently, authorities such as the Environment Agency or Health and Safety Executive are currently required to take further procedural steps in order to compel disclosure of communications data. They must obtain either an authorisation under the current IPA, a court order or other judicial authorisation, or regulatory powers in relation to telecommunications or postal operators, or they must obtain the communications data as secondary data as part of a valid interception or equipment interference warrant.

However, the Bill before us seeks to remove these restrictions for a wide range of public regulatory authorities and restore their ability to compel the disclosure of communications data from telecommunications operators in service of their statutory regulatory or supervisory functions. The Government’s argument for removing these restrictions is that a broader array of communications now fall into the category of communications data, and that a wider number of organisations now constitute telecommunications operators. As a result, the current restrictions prevent some regulatory authorities from acquiring the information necessary to exercise their statutory functions, in a way that was not anticipated at the time of the original legislation.

It is argued that this is particularly relevant to bodies with a recognised regulatory or supervisory function, which would collect communications data as part of their lawful functions but would be restricted under the current Act if their collection was not in service of a criminal investigation. In particular, the change is focused on improving the position of certain public authorities responsible for tax and financial regulation, whose powers were removed in 2018 as a result of the rulings of the European Court of Justice.

Clearly, such bodies must be able to perform their statutory functions effectively, but we have been told that this Bill delivers only “urgent, targeted changes needed”. That is not the case here. These sections represent a sweeping restoration of powers across a wide number of public bodies, most of which have no national security or serious crime function.

The original Act was very particular about the purposes for which communications data could be gathered under the legislation and by which bodies. It ensured that this power was tied to national security and serious crime purposes only, to avoid impinging on the right to privacy without very good reason. Clause 13 and its related schedule fly in the face of this very deliberate policy in the original Act, and overturn Parliament’s careful deliberation of the point.

Will the Minister confirm which bodies will have their powers restored under this legislation? Which of those bodies have reported a significant reduction in their ability to perform statutory functions as a result of the IPA? Have some bodies been more effective than others? Might it be possible and appropriate to significantly pare back this list of organisations?

At present, the case has not been made. We need to be satisfied that these powers are given to those bodies which cannot adequately function without them. It cannot be the case that some are simply given these powers back by default. I am prepared not to take this amendment to a vote if the Minister can assure the House the Government will bring forward their own amendment, which restores these powers in a more limited and targeted way.

The next stand part notice is consequential on that one being taken.

I move on to Amendments 21, 22, 24 and 26. These seek to remove the ability of the agencies to internally authorise the use of a new broader power to obtain internet connection records for target discovery. The agencies would instead be required to seek approval from IPCO, thereby creating an element of independent judicial oversight.

As I noted previously, Clause 14 creates a new broader power for the agencies and the NCA to obtain ICRs for the purpose of target discovery. It represents a significant change from the current position, removing the current demand that the exact service used and the precise time of use be known. Instead, the agencies will be able to obtain ICRs to identify which persons or apparatus are using one or more specified internet services in a specified period—a far broader formulation.

After consideration of the relevant classified evidence, the ISC agrees with the intent. However, the newly expanded power is potentially very intrusive. It allows the agencies to obtain ICRs from a range of internet services over a potentially long period of time and could, therefore, potentially intrude on a large number of innocent people. Parliament must therefore ensure that there are appropriate safeguards in place.

The ISC acknowledges that there are safeguards in place relating to the obtaining of ICRs. However, in all cases relating to national security and economic well-being, the agencies are able to authorise use of this newly expanded power internally. They make the assessment as to whether it is necessary and whether it is proportionate. There is no independent oversight of the agencies’ assessment.

The Government may argue that the ability of the agencies to authorise use of this power internally replicates the existing provisions when authorising the obtaining of ICRs for target discovery or target development. They will also no doubt refer to how the noble Lord, Lord Anderson, said in his report that “arguably” the potential intrusiveness of this newly expanded target detection power is no greater than the existing provisions for obtaining ICRs.

In the ISC’s view, the new provision—which is considerably broader than the existing target discovery power, removing the need to know the exact service used and the precise time of use—is significantly more intrusive than existing provisions. Consequently, greater oversight is required to ensure that the power is always used appropriately. This is not because we expect the agencies to act in bad faith but because independent oversight is essential, acting as a counterbalance to the intelligence community’s intrusive powers and providing vital assurance to Parliament and the public.

This amendment and the two linked Amendments 24 and 26 therefore remove the ability of the agencies to authorise use of this power internally. The agencies would instead be required to seek the approval of an independent judicial commissioner from IPCO in order to authorise the obtaining of ICRs under this new broader power.

Incorporating this independent judicial oversight would ensure that use of this power is always necessary and proportionate and strikes the right balance between security and privacy. It also aims to minimise any burden on the agencies. It does not, for example, incorporate the “double lock” mechanism, which is used for the most intrusive powers under the Investigatory Powers Act.

We recognise that the Government may wish to bring forward their own amendment to include provision for urgent cases; therefore, I do not propose to move this amendment to a vote at this stage. It should, however, indicate to the Government the ISC’s firm view that independent judicial oversight in this area is essential.

I will say a little more about Amendment 22. This amendment seeks to limit the purposes for which the new, broader target discovery power, which has been introduced under Clause 14, could be used. Clause 14 creates a new, broader power for the agencies, and the NCA, to obtain internet connection records for the purposes of target discovery. Target discovery is a great deal more intrusive than target development, potentially intruding on the privacy of a great number of innocent individuals. This is why we must tread very cautiously in this area and be quite satisfied of the need for the power, and that it is tightly drawn and properly overseen.

Currently, in order to obtain ICRs for target discovery, the agencies must unequivocally know the precise service used and the precise time of use by the unidentified individual. It is, therefore, very tightly drawn. The new target discovery power removes these requirements, allowing the agencies to obtain ICRs to identify which persons or apparatuses are using one or more specified internet services in a specified period. Noble Lords will recognise how potentially broad this is by comparison.

17:15
The ISC agrees with the noble Lord, Lord Anderson, who, in his excellent report reviewing the Government’s proposals for this Bill, agreed with the principle behind this change. The ISC has considered the classified evidence and recognises that, due to technological changes, the current power is less useful than envisaged due to the absolute precision it requires. We recognise that the agencies should be able to use ICRs and that this new target discovery power would help them and law enforcement in detecting and disrupting internet-enabled criminal activity.
However, as the noble Lord also recognised, Parliament deliberately imposed a high bar for authorising obtaining internet connection records given their potential intrusiveness. The noble Lord, Lord Anderson, also recommended that the purposes for which this new, broader target discovery power could be used should be limited to national security and serious crime, as well as limiting the use of such a power to the intelligence community. The Bill departs from the noble Lord’s recommendations in both respects. Not only does it include the National Crime Agency as well as the intelligence community but it allows the intelligence community to use the new, broader target discovery power for a third, far less defined purpose of
“the economic well-being of the United Kingdom so far as those interests are also relevant to the interests of national security”.
The ISC recognises that the inclusion of economic well-being in this clause is linked to the statutory functions of the agencies. MI5, for example, is required under the Security Service Act 1989
“to safeguard the economic well-being of the United Kingdom against threats”.
Equally, one of the purposes for which SIS and GCHQ can exercise their functions under the Intelligence Services Act 1994 is
“in the interests of the economic well-being of the United Kingdom”.
That does not mean, however, that those statutory functions should be transposed automatically. This new, broad power is potentially very intrusive, revealing communications data about how a large group of potentially innocent individuals are accessing the internet. It does not therefore follow that Parliament should permit it to be used for all agency work.
Given the potential intrusiveness of the new power, it must be constrained appropriately. Therefore, in addition to requiring independent judicial oversight, which is the subject of a separate amendment, this amendment would prevent the agencies using the newly expanded power for the purposes of economic well-being. This would restrict use of the power to national security and, in urgent cases, serious crime, thereby preventing the broadly defined and vague concept of “economic well-being” being used as a catch-all justification for its exercise. This seems a more proportionate response and more in line with the recommendations of the noble Lord, Lord Anderson. Perhaps the Minister could explain to the Committee why this purpose is needed—surely national security is what we should be primarily talking about—and indicate whether he will now reconsider this clause.
Lord Anderson of Ipswich Portrait Lord Anderson of Ipswich (CB)
- View Speech - Hansard - - - Excerpts

My Lords, I will make a brief comment on two aspects of Clause 14 which have been developed today and which were considered in my report. Amendments 23 and 25 in the name of the noble Lord, Lord Fox, would restrict the changes relating to internet connection records in Clause 14 to the intelligence services only. The noble Lord correctly noticed that, while I support the use of ICRs for the new target detection purpose in condition D1, I mentioned at paragraph 4.18 of my report that it would be

“open to Parliament to require further safeguards”

and suggested that those safeguards include

“making the extra condition available only to UKIC”—

in other words, the intelligence services—

“at least in the first instance”.

I pointed out a range of safeguards that already apply to ICRs. These are fully set out in the draft addition to section 9 of the code of practice that was helpfully provided in advance of these debates. I also pointed out, by way of mitigation to my proposal that only UKIC should have access, that

“working arrangements … could facilitate the use of UKIC powers in the service of NCA or CTP in particular”.

That is as much as I am told I can say on working arrangements, though noble Lords may be able to use their imaginations.

Clause 14, instead of going for this workaround, opted to give the NCA, though not counterterrorism policing, its own direct access to the new power. It is certainly true that the NCA has primary responsibility for many of the crimes where the new power may prove most useful—in particular, child sexual abuse, where it has strong potential. I will listen to what the Minister says about that, but I think there is no great division of opinion between us on this issue. We are really debating different mechanisms by which the NCA might get access to this material, and although it is not precisely what I suggested, I have no objection to the more direct route taken in the Bill.

I turn to Amendments 21, 24 and 26 in the name of the noble Lord, Lord West of Spithead, which would introduce a requirement for requests by the intelligence services and the NCA to be independently authorised by the Office for Communications Data Authorisations. This would be an exceptional state of affairs for communications data requests by the intelligence agencies. Existing ICR requests are internally authorised and some of those, in particular under condition B and C, will be arguably, as I said in my report, as intrusive as requests under the new condition.

However, the noble Lord has emphasised the undoubted intrusiveness of the new condition and I know from my own correspondence with the ISC that, very much to its credit, it has looked at this issue in considerable detail. Furthermore, I raised the possibility of independent authorisation for such requests in my report. While I said that the full double-lock procedure would be disproportionately burdensome, independent authorisation by OCDA, which is not a possibility on which I commented expressly, sounds as though it could be a more manageable proposition. I have some sympathy with Amendments, 21, 24 and 26. They raise an important issue on any view, and I look forward to hearing what the Minister has to say about them.

Lord Ponsonby of Shulbrede Portrait Lord Ponsonby of Shulbrede (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, I thank the three previous speakers in the short debate on this group. There are no opposition amendments in it, so I shall set out some more general questions that arise out of the amendments spoken to.

Why have the Government brought forward the widening powers to obtain communications data when the original Bill did the opposite? Can the Government provide an exhaustive list of the bodies that will be able to use these communications data collection powers? Why are they not in the Bill or the Explanatory Notes? Giving bodies such powers during any criminal investigation appears out of step with the rest of the Bill, which covers investigatory powers for national security or serious crime reasons. Why is this power so broad as to cover any criminal investigation? Given that the double lock exists for most of the powers in the Bill, why have the Government given wide-ranging powers for intelligence authorities and the NCA to self-authorise accessing internet connection records while undertaking subject discovery work? How does this compare to the powers for conditions A, B and C, which cover access to ICRs, for more restrictive purposes? Finally, what will the role of the IPC and the ISC be in monitoring how the new powers are used?

I was particularly interested in what the noble Lord, Lord Anderson, said when he was commenting on the two other speakers in this short group. I, too, will listen with great interest to what the Minister has to say on this, but this is all done in the spirit of exploration, as my noble friend Lord Coaker said. I look forward to the Minister's comments.

Lord Sharpe of Epsom Portrait Lord Sharpe of Epsom (Con)
- View Speech - Hansard - - - Excerpts

I thank all noble Lords who have spoken in this group. I will first speak to Amendment 20, tabled by the noble Lord, Lord Fox, which would amend Clause 11. I want first to make it clear that Clause 11 does not enable any new activity under the Investigatory Powers Act but places into primary legislation the existing position set out at paragraph 15.11 of the Communications Data Code of Practice.

Paragraph 15.11 clearly sets out that it is not an offence to obtain communications data where it is made publicly or commercially available by the telecommunications operator or postal operator or otherwise, where that body freely consents to its disclosure. In such circumstances, the consent of the operator provides the lawful authority for the obtaining of the data on which public authorities can rely. Making this position explicit within primary legislation will provide clarity that acquiring communications data in this way will amount to lawful authority for the purposes of the offence in Section 11. As such, there will be no doubt that acquiring communications data in this way means that an offence will not be committed in such circumstances.

The purpose of new subsection (3A)(e) is not permitting so-called surveillance, as the noble Lord’s amendment asserts. Rather, it is about clarifying the basis for lawful access to material which has already been published and should not require additional authority for its disclosure by a telecommunications operator, with the consent of that operator, to a public authority. I can assure noble Lords that telecommunications and postal operators will still need to satisfy themselves that any communications data disclosure is in accordance with the Data Protection Act, and any subsequent processing by public authorities must also be compliant.

The inclusion of this paragraph in the definition of “lawful authority” in the IPA will provide reassurance to public authorities on the basis for which they have lawful authority to acquire communications data where this authority falls outside the IPA itself. Inserting a definition of lawful authority does not remove the offence of knowing or recklessly obtaining communications data without lawful authority; it is still possible to commit this offence if the disclosure by the telecommunications operator is not lawful or if the public authority knowingly or recklessly acquires the communications data without lawful authority. The inclusion of this definition of lawful authority will encourage public authorities to ensure that they have lawful authority before they acquire communications data. I therefore respectfully ask the noble Lord to withdraw his amendment.

I turn to Clause 13 and the proposal from the noble Lord, Lord West, to remove this provision and the associated schedule from the Bill. The purpose of Clause 13 is to ensure that bodies with regulatory or supervisory functions are not inhibited in performing the roles expected of them by Parliament. It restores their important pre-existing statutory powers to acquire communications data in support of those functions. When the IPA was passed in 2016, it made specific provision, at Section 61(7)(f) and (j), for acquisition of communications data for the purposes of taxation and oversight of financial services, markets and financial stability.

As a result of the Tele2 and Watson judgment from the Court of Justice of the European Union in 2016, a number of changes were then made to the IPA. Crucially, not all the changes made at that time were a direct response to the judgment itself, but instead the opportunity was taken to streamline the statute book. This included the removal of the regulatory provisions contained in the IPA because, at that time, those public authorities with regulatory or supervisory functions were able to acquire the data they needed using their own information-gathering powers. At that point, much of the relevant data fell outside the definition of communications data and therefore outside the provisions of the IPA. However, as businesses increasingly move their services online, so many have become, in part at least, telecommunications operators under the definition in the IPA. Therefore, more of the data they collect, and which regulatory and supervisory bodies would have previously been able to access using their own information-gathering powers, now falls within the IPA’s definition of communications data, and regulatory and supervisory bodies are, inadvertently, unable to acquire it.

The Financial Conduct Authority, His Majesty’s Revenue and Customs and Border Force are all examples of public authorities in Schedule 4 to the IPA and already have the power to acquire communications data using a Part 3 request. However, many of the matters that these bodies regulate or supervise fall short of serious crime, as defined in the Investigatory Powers Act at both Section 263(1) and Section 86(2A), which means that they are unable to acquire a Part 3 authorisation to get the data they need to perform the statutory functions expected of them.

The UK is not alone on this issue; European colleagues have identified similar issues for their equivalent bodies with regulatory and supervisory functions. The functions these bodies perform on behalf of the UK are simply too important to let this situation continue. They go to the heart of our safety in preventing terrorist funding, seeking to ensure financial stability, and the oversight of banking and financial markets, among other matters. For example, the Financial Conduct Authority has responsibility for supervising some 50,000 regulated firms to ensure they have systems and controls in place concerning the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017. Border Force has the responsibility of quickly identifying from the huge volumes of packages crossing our borders each day, those that may contain illegal items such as drugs, firearms and other illicit goods that present a risk to the UK. It is vitally important that these bodies are not inhibited in carrying out their core functions because of the way the world has changed since 2016.

The changes to the IPA brought about by Clause 13 strike an appropriate balance between necessity and proportionality, making clear as it does that the acquisition by these regulatory bodies should only be in support of their civil functions and not used in support of criminal prosecutions. Additional safeguards are provided for within codes of practice governing how this should work in practice. To be clear, this applies to a relatively small cadre of public authorities in support of specific regulatory and supervisory functions; it is not creating a way to circumvent the safeguards of the IPA. It instead ensures that the acquisition routes and associated strong oversight by the Investigatory Powers Commissioner are reserved for those areas where it is most essential.

17:30
In answer to the noble Lord, Lord West, it is not possible to say with certainty how many public authorities have some form of regulatory responsibilities for which they may require data that would now meet the definition of “communications data”, but the intention of the amendment is to ensure that departments such as HMRC, which have to meet international obligations, and public authorities such as the FCA, as I have talked about, are able to carry out their core functions. Other bodies include Trading Standards, environmental agencies and the Insolvency Service, which would need to be able to rely on their statutory powers to execute their functions where they are required to provide oversight or administration over their respective areas of interest. I hope that this explanation has provided reassurance and that noble Lords will agree that Clause 13 and the Schedule should stand part of the Bill.
I turn to the amendments concerning internet connection records. Before I speak to the amendments themselves, I note that this group is designed to fill an increasing intelligence gap which results from communications moving from traditional telephony to internet communications such as instant messaging. Amendments 23 and 25, tabled by the noble Lord, Lord Fox, concern the question of access to the new condition D. They would limit access to only the intelligence services, thus prohibiting the National Crime Agency from utilising this condition. As noble Lords will be aware, the NCA leads the UK’s fight to cut serious and organised crime, pursuing the most dangerous offenders and developing as well as delivering specialist capabilities on behalf of law enforcement.
The NCA is the national lead in many of the areas where the new capability provided for by this measure will have the greatest impact. This includes child sexual exploitation and abuse, as noted by the noble Lord, Lord Anderson, cybercrime, fraud, money laundering and illicit finance. While the intelligence agencies have a serious crime function and carry out vital work in this area, the NCA is an indispensable part of the work against serious crime in the United Kingdom. As an example of the extent of the task the NCA faces in respect of child sexual abuse and exploitation, the agency estimates that as many as 830,000 people in the UK could pose a sexual threat to children, either through online or in-person abuse. Data from the Internet Watch Foundation shows that the prevalence of the most severe forms of online child sexual abuse has more than doubled since 2020, and an estimated 27 million images have been identified through UK law enforcement investigations of child sexual abuse. It is clear that this is a horrendous crime-type, happening at an unimaginable scale, so it is essential that we do everything in our power to address it.
The NCA has clearly shown that it has the necessary subject matter and technical expertise in respect of ICRs. It is the Government’s view that we should support it in its vital work. Access to condition D will significantly enhance its ability to identify serious criminals and protect victims from abhorrent crimes committed online by ensuring that, where there is an appropriate necessity and proportionality case, it is able to require the relevant data to identify offenders. Furthermore, in all but urgent circumstances, the NCA’s use of condition D will be subject to prior independent authorisation by the Office for Communications Data Authorisations, providing further assurance on the limitations in place for the acquisition of ICRs.
Turning to Amendments 21 and 22, tabled by the noble Lord, Lord West of Spithead, on the inclusion of economic well-being in the provisions, I start by emphasising that the statutory purpose concerning the economic well-being of the UK is permitted only in so far as those interests are also relevant to the interests of national security, as is the case with the rest of the IPA. Furthermore, the use of intelligence to protect nations from economic threats that are of sufficient scale to affect, or potentially affect, national security is not new. The intelligence produced under the economic well-being provision is highly valued across government and contributes to the formation of financial and energy policy. Including economic well-being, so far as is relevant to national security, provides greater transparency, including to the public, over how the Government use investigatory powers. It also aids consideration of the necessity and proportionality case for activities.
There is also an issue of consistency here. The Intelligence Services Act and the Security Service Act specify economic well-being as a basis for intelligence operations. Article 8 of the European Convention on Human Rights also states that economic well-being is a legitimate basis for interference in individual privacy. It is already the case that data can be acquired under a communications data authorisation for the purpose of economic well-being, including the existing conditions for ICRs. The Government do not see a reason to remove it as a purpose for this provision, as we would not wish unduly to inhibit the intelligence agencies in carrying out their statutory functions.
Finally, I turn to Amendments 24 and 26, also tabled by the noble Lord, Lord West of Spithead, regarding the internal authorisation of condition D by the intelligence agencies and, where urgent, by the NCA. The proposed authorisation routes in Clause 14 for condition D mirror the existing approach to internal authorisation for communications data in the IPA. As we do not assess that the new condition creates a significantly higher level of intrusion, it is appropriate that the consistency is maintained. The process of having designated senior officers’ approval is well-established, with robust oversight from the Investigatory Powers Commissioner’s Office. DSOs must be of a certain grade or ranking, and for the intelligence agencies they must be independent of both the operation and the line management chain of the applicant. The intelligence agencies can internally authorise communications data requests where the request is not solely in relation to serious crime. Section 229(1)(b) of the IPA sets out that:
“The Investigatory Powers Commissioner must keep under review (including by way of audit, inspection and investigation) … the acquisition or retention of communications data”
by public authorities under the Act.
For both the NCA and the intelligence agencies, internal approval is permitted for urgent applications where it is reasonably assessed that to follow the independent authorisation route would cause such delay as to place lives in danger. Further details are set out in Chapter 5 of the Communications Data Code of Practice on what will amount to “urgent”. Even in such circumstances, it is expected that the authorising officer be independent of the investigation, as set out at paragraph 5.17 of this code. In all other cases for serious crime, the requests are considered by the independent Office for Communication Data Authorisations, under the oversight of the IPC.
It is also worth noting that, in its 2021 inspection reports of GCHQ and MI5, IPCO concluded at paragraphs 10.27 and 8.26 respectively that processes used by these organisations to acquire communications data
“were working to a high standard, with applicants’ justifications satisfactorily completed and supported by strong internal governance procedures.”
I believe that I have set out clearly the Government’s position in respect of these important areas. Again, I thank noble Lords for prompting this debate, but I respectfully ask that they do not press their amendments, for the reasons I have set out.
Lord Fox Portrait Lord Fox (LD)
- View Speech - Hansard - - - Excerpts

My Lords, this has been a really worthwhile part of our debate, and I thank those who have tabled amendments and the Minister for his response. I was particularly interested to hear both the substance of and response to the amendments of the noble Lord, Lord West of Spithead. I think it best that we spend some time reviewing this in Hansard in deciding what, if anything, needs to come back. With that said, I beg leave to withdraw Amendment 20.

Amendment 20 withdrawn.
Clause 11 agreed.
Clauses 12 and 13 agreed.
Schedule agreed.
Clause 14: Internet connection records
Amendments 21 to 26 not moved.
Clause 14 agreed.
Clause 15 agreed.
Clause 16: Extra-territorial enforcement of retention notices etc
Debate on whether Clause 16 should stand part of the Bill.
Lord Fox Portrait Lord Fox (LD)
- Hansard - - - Excerpts

My Lords, in opposing that Clause 16 stand part of the Bill, I shall also speak to the clause stand part notices on Clauses 17 and 20.

This is one part of the Bill that has attracted a huge amount of external interest and deserves some positioning to understand why external parties might be suspicious of what they see. We should recognise that one of the most important security features available to protect personal information, both on a device and in the cloud, is end-to-end encryption. That encryption technology ensures that only users, and not the companies which provide the cloud services, can access their personal data and communications. Computer scientists and cryptographers have argued for many years that there is no safe way to decrypt one person’s messages without compromising the whole system’s security infrastructure. As soon as a backdoor, as it is called, is created to scan private messages, a security vulnerability is created that can be exploited by bad actors as well as good actors. I assume that that was why the Online Safety Bill left things hanging, waiting for a technological breakthrough, though I was not party to the processes of that Bill.

I remind your Lordships that once the company has created a backdoor key for encrypted systems, even for a single user in a single case, and certainly for any mass scanning, it has created a vulnerability that can eventually be abused by bad actors as well as law enforcement. I also remind your Lordships that the Home Office already can and presumably, on occasion, does require companies to weaken their security apparatus in the interests of law enforcement and national security.

To a great extent, the proximity of this Bill to the debate in the Online Safety Bill, has not helped matters: sensitivities were raised during that debate, and this is a chance for the Minister to try to calm them. As I mentioned earlier, the impending arrival of the Data Protection and Digital Information Bill is also putting people’s nerves on edge. There is a deal of management required here.

End-to-end encrypted messaging service providers were vociferous in their concerns during the passage of the Online Safety Bill, yet Section 121 of the Online Safety Act remains. However, Ministers clarified that Ofcom could only require scanning once it becomes technically feasible to do so—that is, when the technology is invented and allows scanning without violating encryption. But Ofcom retains the power to order service providers to use their “best endeavours” to develop that technology.

It is not surprising that some of those same encrypted message service providers were raising flags when it came to some of the clauses in the Bill. The IPA, as it stands, already enables the Home Office to instruct service providers to remove electronic protection for communications of interest to the police or security services by issuing them with a technical capability notice—a TCN. This effectively empowers the Home Secretary to require the removal of end-to-end encryption on those services across any number of suspects and criminal offences. Currently, for the Home Secretary to issue a TCN to a service provider under the IPA, they have to satisfy a number of considerations, which your Lordships will be pleased to hear I am not going to list. Even if the answers to all those conditions is positive and leads to a TCN, a process of checks and balances sits alongside the request, including informal and formal consultation between the Home Office and a service provider before the TCN is issued, oversight by the independent judicial commissioner assessing the request’s proportionality and, of course, recourse for the service provider to request a review of the TCN, allowing it and the Home Secretary to make representations to the judicial commissioner and the technical advisory board for assessment. Crucially, the service provider is not required to start acting on the notice until the review process is concluded.

17:45
The Home Office consulted this year on watering down some of these safeguards. Most notably, the changes now in the Bill would prevent changes being made to a service subject to a TCN immediately, even if the provider seeks to review it and requires some providers to inform the Home Office of any planned changes to their products’ safety features that might have a negative impact on advisory powers
“in good time … before relevant changes are implemented”.
The Bill will expand the notification requirement to a wider range of unspecified operators, who will be notified by the Secretary of State. Currently, the Secretary of State must navigate important oversight mechanisms before blocking a new product or service. The Bill proposes new authority to block, in secret, the release of a product or service, even before a notice can be reviewed by independent oversight bodies. We should be concerned about how the proposed changes could affect legal users of encrypted message services. In a wider sense, some critics of the encryption provisions argue that the very fact of a provision in the UK law that permits the Government to force decryption is crossing a line that will signal to authoritarian regimes that they should or could follow suit. Perhaps the Minister can comment on that.
Added to this, the IPA already seeks to apply extraterritorially, allowing the Home Office to impose secret requirements on providers located in other jurisdictions, and that apply to their users globally—in other words, foreign operators and their global users. The additional powers proposed here will exacerbate that, giving expanded authority for the Home Office to regulate foreign companies and the ability to pre-screen and block innovative security technologies. As Apple remarked in its consultation submission:
“Under this proposal, it’s possible that a non-UK company could be forced to undermine the security of all its users, simply because it has a UK user base”.
In effect, the UK seeks authority that no other country has—to prohibit a company from releasing a security feature unless the UK receives advance notice. This new notice regime would create serious conflicts with foreign law. For example, Article 32 of the European Union’s general data protection regulation—the famous GDPR—imposes a positive obligation on companies to implement technical and organisational measures to protect the privacy of their users’ personal data.
In addition, a notice requiring US companies to maintain the ability to decrypt data for any of its users worldwide would violate the US CLOUD Act and the implementation of the US-UK data access agreement. The CLOUD Act forbids the use of data access agreements to mandate the decryption of user data. The result, inevitably, is that a company must choose whether to subject itself to the preferences of the Home Office or deprive users around the world of critical safety features. While the benefits of pre-clearance to the Home Office are obvious, the danger to human rights activists, journalists and at-risk populations around the globe are also clear.
The sector fears that the Home Office could use the open-ended pre-clearance requirement in combination with the proposed expansion of the extraterritorial scope, and the proposed requirement to maintain the status quo during the review process to thwart the development of end-to-end encryption technology. This affects more than simply commercial interests. This modified process would stifle attempts to innovate encryption technology and would prevent companies responding quickly to growing data security threats—I would emphasise more the latter than the former. It empowers the Secretary of State effectively to issue an unreviewable extrajudicial injunction to prohibit the release of a new technology, and it would force companies to withhold end-to-end encryption features or other new technologies from users, even in the light of evolving threats to their users’ data services. I would welcome the Minister’s response to that. I hope he will be able to calm the nerves about this part of the Bill, which are very clear and prevalent.
If there are fears and those fears have some grounding, I recommend we turn to the measures in Amendments 27 to 32, which, taken together, propose ways of ameliorating the issues that I just set out. Amendments 27 and 28 would introduce procedural safeguards to the process of referring a notice back to the Secretary of State. They would impose a limit on the length of time that the Secretary of State may take to review a national security notice or a technical capability notice. In other words, they would not stop that happening but they would limit the open-endedness of it. They would also import a serious adverse effect threshold for the imposition of a stay on changes to a telecommunications service, pending the outcome of a review by the Secretary of State.
Amendment 29 seeks to confirm whether the changes to the telecommunications operator definition is intended to include non-UK entities that do not have a connection with the person providing the services in the UK, and non-UK entities in relation to non-UK persons. In other words, it probes the extraterritoriality, which is causing some concern.
Amendments 30 to 32 would ensure that the Secretary of State can impose a technical capability notice on a telecommunications operator in respect of the actions of another telecommunications operator only if it is reasonably practicable for the telecommunications operator receiving the notice to control the actions of the other telecommunications operator. I hope that makes sense. Essentially, it would put an obligation on another telecommunications officer only if they can actually effect that on the third party. Requiring operators to comply with a notice—effectively halting product updates—before the full appeals process is completed, as under Clause 17, would remove an important procedural safeguard that cannot be easily reversed. At a minimum, the Bill should be amended to include a statutory time limit, as I set out, for appeal, to avoid requiring compliance with a notice during, as currently drafted, an indefinite appeals process. In addition, the Bill should articulate a threshold, clearly defining when an operator would have to comply with a notice during the course of review. That is what our amendments to Clause 17 are designed to do.
On our amendments to Clause 18, the Bill extends the extraterritorial reach of the IPA regime and seems to make one company liable for the actions of another, as I just described. The Bill’s disproportionate breadth and vagueness, which I hope the Minister can narrow from the Dispatch Box, would create a significant amount of legal ambiguity. It is certainly important for the Minister to explain how these measures relate to the recently signed US-UK data access agreement—an important part of the relationship between the United Kingdom and the US, where the vast majority of the companies that we are talking about reside. Some important detail probably needs to be set out in writing as to how this Bill and that agreement interrelate. The obligations imposed by these changes should and could be clearer in the Bill. This text should make it clear that, to be within the scope of the proposed liability, a company must be directly offering services to customers in the UK. That is what we hope our amendments to Clause 18 will fill out.
Finally, Amendment 34 is a further attempt to place some safeguards into Part 4. Our final amendment to this part would ensure that the decision by the Secretary of State to give notice requiring operators to notify them of system changes is approved by a judicial commissioner. As we know, judicial commissioners play a crucial role in providing the independent oversight of the decisions around notices and other authorisations in this Bill. The 2016 Act essentially ushered in that role. There does not appear to be any good reason why the same safeguards should not apply for notices issued under Clause 20. We have also suggested that such notices be time limited but can be renewed following approval, again from the judicial commissioner. This is an attempt to ensure that there are appropriate safeguards around the Secretary of State’s powers in this regard.
Lord Ponsonby of Shulbrede Portrait Lord Ponsonby of Shulbrede (Lab)
- View Speech - Hansard - - - Excerpts

My Lords, I will briefly speak to the five amendments in this group in the name of my noble friend Lord Coaker. Amendments 35 and 37 would introduce a double-lock process to notices given under the notification of proposed changes to telecommunications services, bringing it in line with the procedure for the three existing types of notices that can be issued to telecommunications operators. Amendment 36 would add a further factor that the Secretary of State must consider when deciding to give a notice under this section, bringing this type of notice into line with the three existing types of notices that can be issued to telecommunications operators. Amendments 38 and 39, along with the others in my noble friend’s name, would introduce a potential double-lock process to the variation of notices given under the notification of proposed changes to telecommunications services, bringing it in line with the procedure for variation of the three existing types of notices that can be issued to telecommunications operators.

In introducing this group, the noble Lord, Lord Fox, set out very comprehensively the concerns of the various tech companies. I have read the same briefings that he has. He was right to see this as an opportunity for the Minister to address those concerns.

I have a few questions arising out of these amendments. First, why have the Government not included a double-lock structure of approval to this new type of notice, given that the three other types of notices that telecom companies can be issued have the same structure, along with many of the provisions in this Bill and the IPA? Further, why does it not have the same review structure as the other notices? What will companies be able to do to challenge this decision? New Section 258A states that companies must respond within “a reasonable time”. What would the Government consider a reasonable time to be in this regard? What assessment has been made of what other companies are doing to ensure they are aware of changes that would potentially impact national security? Finally, can the Government be more specific about the types of changes that would be considered relevant for this new notification of the proposed changes?

Lord Sharpe of Epsom Portrait Lord Sharpe of Epsom (Con)
- View Speech - Hansard - - - Excerpts

My Lords, once again, I thank noble Lords for their amendments and the points they have raised in this debate. I will do my very best to answer the questions that have been asked. Again, I am afraid I am going to do so in some detail.

The noble Lord, Lord Fox, has proposed removing Clause 16 from the Bill in its entirety. Clause 16 concerns the extraterritorial enforcement of retention notices. Under subsections (9) to (11) of Section 255 of the IPA, any technical capability notice—TCN—is already enforceable by civil proceedings against a person in the UK. Only TCNs that provide for interception and targeted communications data acquisition capabilities are enforceable against a person overseas. Section 95 of the IPA also provides that a data retention notice—DRN—is enforceable by civil proceedings against a person in the UK. DRNs already have extraterritorial applicability within the IPA, meaning that they can already be given to a person outside the UK. However, unlike TCNs, the current legislation does not permit the enforcement of a DRN against a person outside the UK.

Clause 16 therefore seeks to amend Sections 95 and 97 of the IPA to allow extraterritorial enforcement of DRNs to strengthen policy options and the legal levers available when addressing emerging technology, bringing them in line with TCNs. As technology advances, data is increasingly held overseas. The clause will ensure that, if required, there is a further legal lever to protect and maintain investigatory powers capabilities overseas. This will ensure that law enforcement and the intelligence agencies have access to the communications-related data that they need to tackle serious crime and protect national security. It will also ensure consistency across the regime.

18:00
Notices issued to overseas operators are subject to the same stringent standards within the IPA, including robust and independent oversight. Notices must be both necessary and proportionate, and subject to the “double lock”. If the operator is dissatisfied with the terms of the notice, they have a statutory right to refer the notice, or part of it, to the Secretary of State for review.
The consultation process by the Secretary of State before a notice is given is designed to ensure the notice is a collaborative process and that the operator’s concerns are addressed before the point of enforcement is ever reached. Enforcement is seen as a measure of last resort. I hope this reassures the noble Lord of the necessity of Clause 16, and that he will support its inclusion in the Bill.
Clause 17 is vital in ensuring that lawful access is maintained while a notice is being comprehensively reviewed. The review process is an important safeguard, and the right of appeal will remain available to companies. Public safety outcomes, however, must not be pre-empted in the boardrooms of big tech companies. That is not what Parliament intended and companies must respect that process.
Clause 17 ensures operators do not make changes during the review period that will negatively impact existing lawful access. It is important to note that operators will not be required to make changes to specifically comply with the notice, but they will be required to maintain the status quo. This means law enforcement and intelligence agencies do not lose access to operationally relevant data during the review period that they would have been able to access previously. It is critical to our intelligence agencies that this clause remains.
To be clear, companies can make changes to their services during a review. They could choose to roll out new technologies and services while it was ongoing, so long as lawful access was built into them as required. Furthermore, the status quo will apply only to whichever of their systems and services are covered by the notice in question. Anything outside the scope of the notice is naturally unaffected by the requirement.
The Government cannot agree with Amendments 27 and 28 tabled by the noble Lord, Lord Fox. They would constrain and caveat Clause 17 in a way that would fundamentally reduce its effectiveness in achieving its goal: to ensure that lawful access is maintained while a notice is being comprehensively and appropriately reviewed.
When giving a notice for the first time, the Secretary of State has a statutory obligation to engage in a consultation period with the relevant telecommunications operator. Following this consultation, and taking into consideration the views of the operator, the Secretary of State then considers whether to formally give the notice. Should they decide to do so, the notice must then be approved by an independent judicial commissioner and formally given to the company before its obligations become binding on them. If at this point the operator is still dissatisfied with the terms of the notice, they have a statutory right to refer the whole notice, or part of it, to the Secretary of State for review.
Clause 17 will not affect the fundamental process of the review or these current safeguards. The notice must still be approved by both the Secretary of State and a judicial commissioner before it is formally given to the company and its obligations become binding on them. They will continue to have the statutory right to refer the notice, or part of it, to the Secretary of State for review. The Secretary of State must then consult the Technical Advisory Board and an independent judicial commissioner—not the one who originally approved the notice. Both the Secretary of State and the operator are able to make representations to these two bodies to factor into their considerations before the judicial commissioner produces their report.
The review of a notice is a potentially complex process; there are four distinct parties involved, two of whom are independent and required to consider certain factors as laid out already in the IPA. Given the bespoke nature of a notice, it is only appropriate that any possible review of it is equally bespoke. We cannot therefore apply an arbitrary timeline, but we will further consider this point.
The existing formal consultation prior to the notice being given, alongside the introduction of Clause 20, will further strengthen collaborative working opportunities between operators and government. Discussions between operators and government will begin when the operator informs the Secretary of State of a relevant change. If, following this, the Secretary of State initiates a formal consultation period before issuing a notice, this is a further opportunity to work with the operator to discuss how lawful access might be maintained. This means there would have been extensive collaborative opportunities before a notice was issued and it should mitigate the requirement for a notice to be referred to the Secretary of State for a review.
These amendments further propose, in effect, removing the obligation on non-UK based companies which control telecommunication systems used to provide a service in the UK to maintain the status quo during the review period. I fear this underestimates the interconnectedness of telecommunications services. There is no neat delineation of telecommunications systems control at national borders. A person may control a system either partially or entirely from outside the UK, but that person or another may still use it to provide services in the UK. Therefore, this amendment would, in practice, render this vital clause meaningless by providing a ready-made excuse for those who wished to avoid its effect.
On Amendments 29 to 32 to Clause 18, also tabled by the noble Lord, Lord Fox, while we have seen changes in technology over the past seven years, we have also seen a change in how companies structure themselves. Clause 18 is necessary to ensure the IPA reflects these complex corporate structures. It does not seek to bring additional companies into the scope of the IPA, but clarifies that large companies are covered in their totality within the context of the IPA. It also does not override the position in the interception code of practice with regards to enterprise services. The definition is being amended out of an abundance of caution to ensure the IPA continues to apply to all those it was intended to and to ensure that any possible loopholes that might be deliberately exploited are closed. This will improve the effectiveness and efficiency of the regimes and the process of issuing notices.
Companies increasingly have multiple subsidiaries across the globe involved in the delivery of their services. We are not proposing to do anything that would affect this flexibility and the freedom that benefits both the UK economy and citizens as customers of these services. However, the IPA needs to reflect these complex corporate structures. It is ultimately a question of who controls the telecommunications system that is used to provide the service to persons in the UK.
For example, an email service could be provided using a telecommunications system controlled by a company that is headquartered in the US but that has multiple subsidiaries across the globe, and one of these subsidiaries could be the one listed in the terms and conditions of a UK user. However, that subsidiary is still not the person controlling the telecommunications system used to provide the email service that the person in the UK is using; the headquarters of the company is. It is that element of the company that this clause will ensure is also covered by the IPA, as well as the subsidiary.
However, this clarification to the definition of a telecommunication operator does not override the position in the interception code of practice with regards to enterprise services. By “enterprises”, we mean companies, academic institutions, non-profit organisations, government agencies, and similar entities that pay cloud service providers to store and or process their organisation’s electronic communications and other records.
The interception code of practice—which was amended last year following a public consultation—set out our long-standing policy position in formal guidance that must be considered by persons exercising functions relating to the code. The position is that when a cloud service provider is providing such services to an enterprise, an intercepting authority seeking targeted interception of data belonging to the enterprise can often obtain the same data from both the cloud service provider and the enterprise. However, although the Act allows the intercepting authority to serve the warrant on either the cloud service provider or the enterprise, the intercepting authority should—where it is reasonable to do so—always serve the warrant on the enterprise rather than the cloud service provider. There will be some exceptions to this; for example, if serving the warrant on the enterprise would endanger national security. These exceptions are incredibly important and the amendment from the noble Lord makes no allowances for them. Furthermore, as there is no contradiction between our existing position on enterprise and the clarification to the definition of a telecommunications operator, the amendment is unnecessary.
On Clause 20, it is critical that this clause remains in the Bill so that the intelligence agencies can keep the country safe. I will address some of the misconceptions that I have heard in this place and externally, one of which is that this is a backdoor to company services. This is an ill-defined and unhelpful analogy. Our legislation and principles should make it clear that we are not asking for a backdoor to enable unfettered access to communications, nor for an opening that hackers and other malicious actors can exploit. We are asking that technology companies strike a balance in their services between users’ privacy and our responsibility to keep citizens safe. Preserving a well-made front door with safeguards offers a better solution for tech companies, the public and Governments.
These concerns are misplaced. The Bill will not introduce significant changes to existing powers, ban end-to-end encryption or introduce a veto power for the Secretary of State regarding the rollout of new technologies and security measures by companies, contrary to what some are incorrectly speculating. The notification requirement is an obligation that can be placed on operators that provide, or may be expected to provide, lawful access of significant operational value to inform the Secretary of State of changes that they are intending to make that could affect existing lawful access capabilities. It is needed to provide the Secretary of State, and by extension operational partners, with time to understand the potential impact of the changes and ensure lawful access can be maintained to keep people safe. It does not give the Secretary of State any power to intervene in the rollout of these changes, nor is the Secretary of State’s consent required for the rollout to proceed.
Should the Secretary of State wish to intervene in any way with the change the operator intends to make, they would use the existing notices regimes in the same way that is currently available to them. However, I reassure all noble Lords that it does not automatically follow that any notified change will result in a notice. There is no correlation between the notification notice and the notice review provision in Clause 17. Clause 20 requires only a notification of an intended change, and it will not require the operator to maintain the status quo. If the Secretary of State does wish to intervene, they will initiate the formal consultation process with the operator, required before any notice is issued. If it is necessary for a notice to be issued under the IPA, this will be subject to approval by a judicial commissioner. More generally, the giving of a notification notice and the giving of a technical capability notice, or any other notice, are two distinct processes.
The question of the status quo arises only in the context of the review of a data retention, technical capability or national security notice. It is not applicable to notification notices. The obligation to maintain the status quo also arises only at the time the review of a notice is triggered by the operator. The notifications will be important in giving operational partners time to adjust their ways of working, to ensure the capabilities can be provided throughout the process of, and after, the change taking place. The primary motivation for this obligation is to create an opportunity for collaborative working, in order to protect capabilities and, as I have said many times, keep people safe.
Overall, the Government’s strong preference is to work with operators to achieve common goals. We would always seek collaboration where possible. However, we believe that the public would expect their Government to know in advance if tech companies are proposing to do something that puts public safety at risk. Currently, companies could deliberately avoid disclosing to the Government changes that negatively impact lawful access, in an effort to pre-determine an outcome that is for Ministers and judges to decide, based on necessity and proportionality considerations. An operator does not need to be subject to an IPA notice in order to receive and give effect to an IPA authorisation or warrant that is required to lawfully access data. It is this access to data—where IPA notices are not already in place—that the notification requirement intends to protect.
I reassure noble Lords, once again, that the IPA includes significant and stringent safeguards for the notices regimes, and Clause 20 seeks to replicate the relevant safeguards regarding a notification notice. This includes the notice being issued only where the Secretary of State considers it necessary and proportionate to do so. It also sets out other matters the Secretary of State must take into account, including the likely benefits of the notice, the likely number of users of a service to which a notice relates, the likely cost of complying and any other effect of the notice on the operator.
I turn now to the specific amendments to Clause 20. The Government oppose these on the basis that they do not account for the fundamental differences between the different notices regimes and would impact upon the ability of operational partners to keep the public safe. Amendment 36, tabled by the noble Lord, Lord Coaker, proposes to add the requirement of considering the technical capability of complying with a notice to this list. While this is an important factor for technical capability notices because a notification notice has no technical element to it, its inclusion here would be wholly unnecessary. All other relevant factors have already been replicated in Clause 20.
Furthermore, the Secretary of State must consult the relevant operator before issuing a notification notice. The consultation will result in an individualised and confidential specification. This will be provided as an annex to the notice and will set out applicable telecommunications services and systems, specific to the company to which the notification requirement applies. The operator will be required to provide the Secretary of State with a notification of change on these specific services and systems only where the proposed change will result in a negative impact on lawful access.
Amendment 34, tabled by the noble Lord, Lord Fox, would introduce an expiry date for notification notices, which would require the Secretary of State to renew the notice every 14 days. This proposal would mean that, once a fortnight, the Secretary of State would have to reconsider the necessity and proportionality of the notification notice as agreed with the operator 14 days earlier. Technology moves quickly, but it does not move that quickly, and we cannot foresee any circumstances in which a 14-day renewal would be necessary or proportionate. It would be impractical, burdensome and likely impossible to maintain, for the operator, operational partners and the Secretary of State. It is also a requirement that is not remotely in line with the other notices in the IPA, or even standard warrants and authorisations.
18:15
Amendments 35, 37, 38 and 39, tabled by the noble Lord, Lord Coaker, seek to place the so-called double lock on to notification notices. While the double lock is a vital safeguard to the use of intrusive powers, it is not required for notification notices as they do not intrude on user privacy. This is inherently different from the other types of notices, where there is the potential for interference with user privacy, and therefore the double lock is required to ensure that the necessity and proportionality considerations in this regard are subject to judicial oversight. Notification notices do not facilitate the acquisition of data in the way that technical capability, national security or data retention notices do. The same level of judicial approval is therefore not justified. The Secretary of State will still be required to consider the necessity and proportionality of the notification notice, as well as the other factors laid out in the Bill. As mentioned already, these replicate, as far as is applicable, the factors applied to other types of notice.
The noble Lord, Lord Fox, is mistaken on what the CLOUD Act and the UK-US data access agreement actually state with regard to end-to-end encryption. The CLOUD Act states that
“the terms of the agreement shall not create any obligation that providers be capable of decrypting data or limitation that prevents providers from decrypting data”.
What this means in practice is that the UK-US data access agreement needs to be encryption neutral. It does not prevent any domestic regime that could require decryption. The Government are well aware of the importance of the UK-US data access agreement, and nothing is being proposed here that would jeopardise that.
Finally, as noble Lords will have seen, the Government have tabled Amendments 33 and 42 to clarify that the route of judicial redress to the Investigatory Powers Tribunal applies to notification notices. Amendments 40 and 41 ensure consistency across the language used throughout the IPA. I trust that noble Lords will welcome and support those amendments and I ask them, respectfully, not to press their own amendments.
Lord Fox Portrait Lord Fox (LD)
- View Speech - Hansard - - - Excerpts

My Lords, I thank the Minister for an admirably comprehensive response. That was what we were looking for—perhaps not everyone, but certainly our Front Benches. There is a lot to get our heads around, so we will take this away and look into it.

There are a number of observations I would make. First, the Minister emphasised co-operation, collaboration and discussion. Of course, the legislation does not look like that, so it would help if the Government could find some confidence-boosting measures, be they from the code or the draft annexe, or something that enables the Government to signal their continued intention to co-operate and collaborate.

The Minister talked about an interconnected data world—that is exactly the point the operators are making. Because of that interconnection, a hiatus in delivering a service in the UK could also be a hiatus in delivering that service to the rest of the world, given that everyone is using the same service. That is one of the points that was not picked up by the Minister at the time. That interconnectedness is the very issue that some operators have: if they are prevented from doing it in one place, how do they do it elsewhere?

The issue of corporate entities is interesting. What the Minister described was something I used to call “corporate veil”, and I am interested to know how robust that is in corporate law. With corporate veil, it became very difficult, even at court level in the United States, to break down the corporate entities and their interconnections. For no other reason than making an observation, I am interested to see how that works. I certainly see why the Government are putting it forward in their legislation.

There is a lot for us to digest, which we certainly will, between now and the next stage; it gives us something to get our teeth into over Christmas. That said, I beg to withdraw my proposal that Clause 16 stands part of the Bill.

Baroness Fookes Portrait The Deputy Chairman of Committees (Baroness Fookes) (Con)
- Hansard - - - Excerpts

I am afraid that the noble Lord is not in a position to do that. This is a clause; one votes for it or against it.

Clause 16 agreed.
Clause 17: Review of notices by the Secretary of State
Amendments 27 and 28 not moved.
Clause 17 agreed.
Clause 18: Meaning of “telecommunications operator” etc
Amendments 29 to 32 not moved.
Clause 18 agreed.
Clause 19 agreed.
Clause 20: Notification of proposed changes to telecommunications services etc
Amendment 33
Moved by
33: Clause 20, page 39, line 5, leave out “as follows” and insert “in accordance with subsections (2) and (3)”
Member's explanatory statement
This amendment is consequential on the amendment in the name of Lord Sharpe of Epsom at page 41, line 14.
Amendment 33 agreed.
Amendments 34 to 39 not moved.
Amendments 40 to 42
Moved by
40: Clause 20, page 41, line 2, leave out “(or description of persons)”
Member's explanatory statement
This amendment and the amendment in the name of Lord Sharpe of Epsom at page 41, line 4 correct an inconsistency in clause 20 by omitting references to a notice under section 258A of the Investigatory Powers Act 2016 being given or revoked in relation to a description of persons.
41: Clause 20, page 41, line 4, leave out “(or description of persons)”
Member's explanatory statement
See the amendment in the name of Lord Sharpe of Epsom at page 41, line 2.
42: Clause 20, page 41, line 14, at end insert—
“(4) The Regulation of Investigatory Powers Act 2000 is amended as follows.(5) In section 65 (the Tribunal)—(a) in subsection (5)(czi)—(i) for “or 253” substitute “, 253 or 258A”;(ii) for “or technical capability” substitute “, technical capability or proposed changes to telecommunications services etc”;(b) in subsection (5)(czl)(iii), for “or 253” substitute “, 253 or 258A”;(c) in subsection (8)(bc), for “or 253” substitute “, 253 or 258A”.(6) In section 67 (exercise of the Tribunal’s jurisdiction), in subsection (7)(azc), for “or 253” substitute “, 253 or 258A”.(7) In section 68 (Tribunal procedure)—(a) in subsection (5)(b), for “or 253” substitute “, 253 or 258A”;(b) in subsection (7)(f), for “or 253” substitute “, 253 or 258A”;(c) in subsection (7)(ha), for “or 253” substitute “, 253 or 258A”.”Member's explanatory statement
This amendment provides for the Investigatory Powers Tribunal to consider complaints about notices given under new section 258A of the Investigatory Powers Act 2016 (proposed changes to telecommunications services etc) in the same way as it considers complaints about other notices given under Part 9 of that Act.
Amendments 40 to 42 agreed.
Clause 20, as amended, agreed.
House resumed.
18:23
Sitting suspended.