Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements; although sometimes interchangeable, not to be confused with the Data Protection Act 1998.
The different data retention policies weigh legal and privacy concerns against economics and need-to-know concerns to determine the retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.
In the field of telecommunications, data retention generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organisations. In the case of government data retention, the data that is stored is usually of telephone calls made and received, emails sent and received, and websites visited. Location data is also collected.
The primary objective in government data retention is traffic analysis and mass surveillance. By analysing the retained data, governments can identify the locations of individuals, an individual's associates and the members of a group such as political opponents. These activities may or may not be lawful, depending on the constitutions and laws of each country. In many jurisdictions access to these databases may be made by a government with little or no judicial oversight.
In the case of commercial data retention, the data retained will usually be on transactions and web sites visited.
Data retention also covers data collected by other means (e.g., by Automatic number-plate recognition systems) and held by government and commercial organisations.
Data retention policy
A data retention policy is a recognized and proven protocol within an organization for retaining information for operational use while ensuring adherence to the laws and regulations concerning them. The objectives of a data retention policy are to keep important information for future use or reference, to organize information so it can be searched and accessed at a later date and to dispose of information that is no longer needed.
The data retention policies within an organization are a set of guidelines that describes which data will be archived, how long it will be kept, what happens to the data at the end of the retention period (archive or destroy) and other factors concerning the retention of the data.
A part of any effective data retention policy is the permanent deletion of the retained data; achieving secure deletion of data by encrypting the data when stored, and then deleting the encryption key after a specified retention period. Thus, effectively deleting the data object and its copies stored in online and offline locations.
In 2015, the Australian government introduced mandatory data retention laws that allows data to be retained up to two years. The scheme is estimated to cost at least AU$400 million per year to implement, working out to at least $16 per user per year. It will require telecommunication providers and ISPs to retain telephony, Internet and email metadata for two years, accessible without a warrant, and could possibly be used to target file sharing. The Attorney-General has broad discretion on which agencies are allowed to access metadata, including private agencies.
The Greens were strongly opposed to the introduction of these laws, citing privacy concerns and the increased prospect of 'speculative invoicing' over alleged copyright infringement cases. The Labor Party initially opposed as well, but later agreed to passing the law after additional safeguards were put in place to afford journalists some protection.
On 15 March 2006, the European Union adopted the Data Retention Directive, on "the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC". It requires Member States to ensure that communications providers retain the necessary data as specified in the Directive for a period of between 6 months and 2 years in order to:
- Trace and identify the source of a communication;
- Trace and identify the destination of a communication;
- Identify the date, time, and duration of a communication;
- Identify the type of communication;
- Identify the communication device;
- Identify the location of mobile communication equipment.
The data is required to be available to "competent" national authorities in specific cases, "for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law".
The Directive covers fixed telephony, mobile telephony, Internet access, email, and VoIP. Member States were required to transpose it into national law within 18 months—no later than September 2007. However, they may if they wish postpone the application of the Directive to Internet access, email, and VoIP for a further 18 months after this date. A majority of Member States exercised this option. All 28 EU States have notified the European Commission about the transposition of the Directive into their national law. Of these, however, Germany and Belgium have only transposed the legislation partially.
It concluded that data retention was a valuable tool for ensuring criminal justice and public protection, but that it had achieved only limited harmonisation. There were serious concerns from service providers about the compliance costs and from civil society organisations who claim that mandatory data retention was an unacceptable infringement of the fundamental right to privacy and the protection of personal data. The Commission is now reviewing the legislation.
In response to the report, on May 31, 2011, the European Data Protection Supervisor expressed some concerns on the European Data Retention Directive, underlining that the Directive "does not meet the requirements imposed by the fundamental rights to privacy and data protection".
On 8 April 2014, the Court of Justice of the European Union declared the Directive 2006/24/EC invalid for violating fundamental rights. The Council's Legal Services have been reported to have stated in closed session that paragraph 59 of the European Court of Justice's ruling "suggests that general and blanket data retention is no longer possible". A legal opinion funded by the Greens/EFA Group in the European Parliament finds that the blanket retention data of unsuspicious persons generally violates the EU Charter of Fundamental Rights, both in regard to national telecommunications data retention laws and to similar EU data retention schemes (PNR, TFTP, TFTS, LEA access to EES, Eurodac, VIS).
Data Retention and Investigatory Powers Act 2014
The Data Retention and Investigatory Powers Act came into force in 2014. It is the answer by the United Kingdom parliament after a declaration of invalidity was made by the Court of Justice of the European Union in relation to Directive 2006/ 24/EC in order to make provision, about the retention of certain communications data. In addition, the purpose of the act is to:
- Amend the grounds for issuing interception warrants, or granting or giving certain authorizations or notices.
- Make provision about the extraterritorial application of that Part and about the meaning of “telecommunications service” for the purposes of that Act;
- Make provision about a review of the operation and regulation of investigatory powers; and for connected purposes.
The act is also to ensure that communication companies in the UK retain communications data so that it continues to be available when it is needed by law enforcement agencies and others to investigate committed crimes and protect the public. Data protection law requires data that isn't of use to be deleted. This means that the intention of this Act could be using data retention to acquire further policing powers using, as the Act make data retention mandatory.
The Data Retention and Investigatory Powers Act 2014 was referred to as the "snooper’s charter" communications data bill. Theresa May, a strong supporter of the Parliament Act, said in a speech that “If we (parliament) do not act, we risk sleepwalking into a society in which crime can no longer be investigated and terrorists can plot their murderous schemes undisrupted.”
The United Kingdom parliament its new laws increasing the power of data retention is essential to tackling crime and protecting the public. However, not all agree and believe that the primary objective in the data retention by the government is mass surveillance.
After Europe's highest court said the depth of data retention breaches citizens' fundamental right to privacy and the UK created its own Act, it has led to the British government being accused of breaking the law by forcing telecoms and internet providers to retain records of phone calls, texts and internet usage. From this information, governments can identify an individual's associates, location, group memberships, political affiliations and other personal information.
In a television interview, the EU Advocate General Pedro Cruz Villalón highlighted the risk that the retained data might be used illegally in ways that are "potentially detrimental to privacy or, more broadly, fraudulent or even malicious".
Retention of other data
- Postal data – retention period unknown
- Information written on the outside of a postal item (such as a letter or parcel), online tracking of postal items, records of special postal items (such as records of registered, recorded or special delivery postal items), records of parcel consignment, delivery and collection.
- Banking data – seven years
- The Economist reported that UK banks are required to retain data on all financial transactions for seven years though this has not been verified. It is not clear whether data on credit card transactions is also retained for seven years.
- Vehicle movement data – two years
- Documents leaked from the Association of Chief Police Officers (ACPO) have revealed that the UK is planning to collect data from a nationwide network of automatic numberplate recognition cameras and store the data for two years in a controversial new centre being built at Hendon. This data could then be linked to other data held by the government and watchlists from the police and security services.
Access to retained data
The bodies that are able to access retained data in the United Kingdom are listed in the Regulation of Investigatory Powers Act 2000 (RIPA). These are the following:
- Police forces, as defined in section 81(1) of RIPA
- National Criminal Intelligence Service
- Serious Organised Crime Agency, formerly the National Crime Squad
- HM Customs and Excise
- Inland Revenue (the latter two have been merged into HM Revenue and Customs)
- Security Service
- Secret Intelligence Service
- Government Communications Headquarters (GCHQ)
However, the Regulation of Investigatory Powers Act 2000 (RIPA) also gives the Home Secretary powers to change the list of bodies with access to retained data through secondary legislation. The list of authorised bodies now includes:
- Food Standards Agency
- Local authorities
- National Health Service
Reasons for accessing retained data
The justifications for accessing retained data in the UK are set out in the Regulation of Investigatory Powers Act 2000 (RIPA). They include:
- Interests of national security;
- Preventing or detecting crime or of preventing disorder;
- Economic well-being of the United Kingdom;
- Public safety;
- Protecting public health;
- Assessing or collecting any tax, duty, levy or other imposition, contribution or charge payable to a government department;
- Preventing death or injury in an emergency or any damage to a person's physical or mental health, or of mitigating any injury or damage to a person's physical or mental health;
- Any other purpose not listed above which is specified for the purposes of this subsection by an order made by the Secretary of State.
Implementation of the directive was part of Act. No. 259/2010 Coll. on electronic communications as later amended. Under Art. 97 (3), telecommunication data are to be stored between 6 and 12 months. The Czech Constitutional Court has deemed the law unconstitutional and found it to be infringing on the peoples right to privacy.
- Subscriber information
- Internet cafés and public telephone shops with at least three terminals must seek a license permit within 30 days from the Ministry of Home Affairs. They must also store traffic data for a period which may be determined later by administrative decree. Wi-Fi hotspots and locations that do not store traffic data have to secure ID information from users before allowing them to log on. For example, users may be required to enter a number from an ID card or driving license. It is not clear how this information is validated. Mobile telephony users must identify themselves before service activation, or before a SIM card may be obtained. Resellers of mobile subscriptions or pre-paid cards must verify the identity of purchasers and retain a photocopy of identity cards.
- Telephony data
- Data, including location data, on fixed line and mobile telephony must be retained for 24 months. There is no requirement to store the content of calls. Telephony operators must retain a record of all unsuccessful dial attempts.
- ISP data
- Internet service providers must retain all data for at least 12 months. The law does not specify exactly what traffic data must be retained. There is no requirement to store the content of internet communications.
- The legislation of July 2005 enables data retention by outlawing all the relevant data protection provisions until 31 December 2007. Under the data protection provisions, service providers are obliged to store traffic data and user data for no less than 365 days, even if they no longer need it to process the communication or to send bills, policy requires user id information, location, tracking data be stored and kept on file for easy access by law enforcement and/or other authorities who request this information (permission must be asked to view sensitive user ID data on file). The traffic data which will now be retained can be used for anti-terrorism purposes and for general penal enforcement of criminal offences large and small.
Italy already required the retention of telephony traffic data for 48 months, but without location data. Italy has adopted the EU Directive on Privacy and Electronic Communications 2002 but with an exemption to the requirement to erase traffic data.
Denmark has implemented the EU data retention directive and much more, by logging all internet flow or sessions between operators and operators and consumers.
- "2.2.1. Session logging (section 5(1) of the Executive Order) Providers of access to the internet must, in respect of the initiating and terminating package of an internet session, retain data that identifies the sending and receiving internet protocol address (in the following called IP address), the sending and receiving port number and the transmission protocol."
- "2.2.2. Sampling (section 5(4) of the Executive Order) The obligation to retain data about the initiating and terminating package of an internet session does not apply to providers in case such retention is not technically feasible in their systems. In that case, data must instead be retained for every 500th package that is part of an end user’s communication on the internet."
- "2.2.5. Hot spots (section 5(3) of the Executive Order) In addition to the internet data that must otherwise be retained, the provider must retain data that identifies the precise geographic or physical location of a hot spot and the identity of the communication equipment used. This means that a provider of internet access via a hot spot must retain data on a user’s access to the internet and, at the same time, retain data that identifies the geographic location of the hot spot in question."
Sweden implemented the EU's 2006 Data Retention Directive in May 2012, and it was fined €3 million by the Court of Justice of the European Union for its belated transposition (the deadline was 15 September 2007). The directive allowed member states to determine the duration data is retained, ranging from six months to two years; the Riksdag, Sweden's legislature, opted for six months.
In April 2014, however, the CJEU struck down the Data Retention Directive. PTS, Sweden's telecommunications regulator, told Swedish ISPs and telcos that they would no longer have to retain call records and internet metadata. But after two government investigations found that Sweden's data retention law did not break its obligations to the European Convention on Human Rights, the PTS reversed course. Most of Sweden's major telecommunications companies complied immediately, though Tele2 lodged an unsuccessful appeal. The one holdout ISP, Bahnhof, was given an order to comply by November 24 deadline or face a five million krona ($680,000) fine.
The German Bundestag had implemented the directive in "Gesetz zur Neuregelung der Telekommunikationsüberwachung und anderer verdeckter Ermittlungsmaßnahmen sowie zur Umsetzung der Richtlinie 2006/24/EG". The law became valid on 1 January 2008. Any communications data had to be retained for six months. On 2 March 2010, the Federal Constitutional Court of Germany ruled the law unconstitutional as a violation of the guarantee of the secrecy of correspondence. On 16 October 2015, a second law for shorter, up to 10 weeks long, data retention excluding email communication was passed by parliament. However, this act was ruled incompatible with German and European laws by an injunction of the Higher Administrative Court of North Rhine-Westphalia. As a result, on June 28, 2017, three days before the planned start of data retention, the Federal Network Agency suspended the introduction of data retention until a final decision in the principle proceedings.
The EU directive has been transposed into Romanian law as well, initially as Law 298/2008. However, the Constitutional Court of Romania subsequently struck down the law in 2009 as violating constitutional rights. The court held that the transposing act violated the constitutional rights of privacy, of confidentiality in communications, and of free speech. The European Commission has subsequently sued Romania in 2011 for non-implementation, threatening Romania with a fine of 30,000 euros per day. The Romanian parliament passed a new law in 2012, which was signed by president Traian Băsescu in June. The Law 82/2012 has been nicknamed "Big Brother" (using the untranslated English expression) by various Romanian non-governmental organizations opposing it. On July 8, 2014 this law too was declared unconstitutional by the Constitutional Court of Romania.
Slovakia has implemented the directive in Act No. 610/2003 Coll. on electronic communications as later amended. Telecommunication data are stored for six months in the case of data related to Internet, Internet email and Internet telephony (art. 59a (6) a), and for 12 months in the case of other types of communication (art. 59a (6) b).
In April 2014, the Slovak Constitutional Court preliminary suspended effectiveness of the Slovak implementation of Data Retention Directive and accepted the case for the further review. In April 2015 Constitutional court decided that some parts of Slovak laws implementing DR Directive are not in compliance with Slovak constitution and Convention for the Protection of Human Rights and Fundamental Freedoms. According to now invalid provisions of the Electronic Communications Act, the providers of electronic communications were obliged to store traffic data, localization data and data about the communicating parties for a period of 6 months (in the case Internet, email or VoIP communication) or for a period of 12 months (in case of other communication).
A 2016 anti-terrorist federal law 374-FZ known as Yarovaya Law requires all telecommunication providers to store phone call, text and email metadata, as well as the actual voice recordings for up to 6 months. Messaging services like Whatsapp are required to provide cryptographic backdoors to law-enforcement. The law has been widely criticized both in Russia and abroad as an infringement of human rights and a waste of resources.
The EU's Data Retention Directive has been implemented into Norwegian law in 2011, but this will not be in effect before 1 January 2015.
On 29 June 2010, the Serbian parliament adopted the Law on Electronic Communications, according to which the operator must keep the data on electronic communications for 12 months. This provision was criticized as unconstitutional by opposition parties and by Ombudsman Saša Janković.
As from 7 July 2016, the Swiss Federal Law about the Surveillance of the Post and Telecommunications entered into force, passed by the Swiss government on 18 March 2016.
Swiss mobile phone operators have to retain the following data for six months according to the BÜPF:
- Phone numbers of incoming and outgoing calls
- SIM- (Subscriber Identity Module), IMSI- (International Mobile Subscribers Identity) and IMEI-numbers (International Mobile Equipment Identity)
- „the location and the electrical boresight of the antenna of the mobile phone with which the monitored person is connected to the communications system at the time of the communication“
- date, time and duration of the connection
All Internet service providers must retain the following data for six months:
- type of the connections (telephone, xDSL, Cable, permanent line etc.) and if known login data, address information of the origin (MAC address, telephone number), name, address and occupation of the user and duration of the connection from beginning to end
- time of the transmission or reception of an email, header information according to the SMTP-protocol and the IP addresses of the sending and receiving email application.
The National Security Agency (NSA) commonly records Internet metadata for the whole planet for up to a year in its MARINA database, where it is used for pattern-of-life analysis. U.S. persons are not exempt because metadata are not considered data under US law (section 702 of the FISA Amendments Act). Its equivalent for phone records is MAINWAY. The NSA records SMS and similar text messages worldwide through DISHFIRE.
Leveraging commercial data retention
Amazon is known to retain extensive data on customer transactions. Google is also known to retain data on searches, and other transactions. If a company is based in the United States the Federal Bureau of Investigation (FBI) can obtain access to such information by means of a National Security Letter (NSL). The Electronic Frontier Foundation states that "NSLs are secret subpoenas issued directly by the FBI without any judicial oversight. These secret subpoenas allow the FBI to demand that online service providers or ecommerce companies produce records of their customers' transactions. The FBI can issue NSLs for information about people who haven't committed any crimes.
NSLs are practically immune to judicial review. They are accompanied by gag orders that allow no exception for talking to lawyers and provide no effective opportunity for the recipients to challenge them in court. This secret subpoena authority, which was expanded by the controversial USA PATRIOT Act, could be applied to nearly any online service provider for practically any type of record, without a court ever knowing". The Washington Post has published a well researched article on the FBI's use of National Security Letters.
Failed mandatory ISP retention legislation attempts
The United States does not have any Internet Service Provider (ISP) mandatory data retention laws similar to the European Data Retention Directive. Some attempts to create mandatory retention legislation have failed:
- In 1999 two models of mandatory data retention were suggested for the United States: What IP address was assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the ISP for an unspecified amount of time.
- The Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act (SAFETY Act) of 2009 also known as H.R. 1076 and S.436 would require providers of "electronic communication or remote computing services" to "retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user". This bill never became a law.
Arguments against data retention
It is often argued that data retention is necessary to combat terrorism, and other crimes. Data retention may assist the police and security services to identify potential terrorists and their accomplices before or after an attack has taken place. For example, the authorities in Spain and the United Kingdom stated that retained telephony data made a significant contribution to police enquires into the 2004 Madrid train bombings and the 2005 London bombings.
The opponents of data retention make the following arguments:
- The Madrid train bombings can also be seen as proof that the current data retention level is sufficient and hence the EU directive is not necessity.
- Schemes for data retention do not make provisions for adequate regulation of the data retention process and for independent judicial oversight.
- Data retention is an invasion of privacy and a disproportionate response to the threat of terrorism.
- It is easy for terrorists to avoid having their communications recorded. The Home Office Voluntary Code of Practice of Data Retention admits that there are some internet protocols which cannot be effectively monitored. It would be possible for terrorists to avoid monitoring by using anonymous P2P technologies, internet cafés, anonymous proxies or several other methods. Some police officers in the EU are sceptical about the value of data retention. For example, Heinz Kiefer, president of Eurocop, the European Confederation of Police, issued a press statement saying "it remains easy for criminals to avoid detection through fairly simple means, for example mobile phone cards can be purchased from foreign providers and frequently switched. The result would be that a vast effort is made with little more effect on criminals and terrorists than to slightly irritate them. Activities like these are unlikely to boost citizens’ confidence in the EU's ability to deliver solutions to their demand for protection against serious crime and terrorism".
- The hardware and software required to store all the retained data would be extremely costly. The costs of retaining data would not only fall on Internet Service Providers and telephone companies, but also on all companies and other organisations which would need to retain records of traffic passing through their switchboards and servers.
- Data retention gives excessive power to the state to monitor the lives of individual citizens.
- Data retention may be abused by the police to monitor the activities of any group which may come into conflict with the state; including ones which are engaged in legitimate protests. The UK police have used anti-terrorism powers against groups opposed to the war in Iraq and protesters at an arms fair. The definition of terrorism in the UK Terrorism Act 2000 includes not only action, but the threat of action, involving serious violence against a person, or serious damage to property, for the purposes of advancing a "political, religious or ideological cause". There is concern that the definition is vaguely worded and could be applied to supporters of animal liberation, anti-war demonstrators, and many others.
- Even if data retention may be justified, the retention periods proposed in some cases are excessive. It has been argued that a period of five days for web activity logs and ninety days for all other data would be adequate for police purposes.
Protection against data retention
The current directive proposal (see above) would force ISPs to record the internet communications of its users. The basic assumption is that this information can be used to identify with whom someone, whether innocent citizen or terrorist, communicated throughout a specific timespan. Believing that such as mandate would be useful is ignoring that some very committed community of crypto professionals has been preparing for such legislation for decades. Below are some strategies available today to anyone to protect themselves, avoid such traces, and render such expensive and legally dubious logging operations useless.
Anonymizing proxy services: Web
There are anonymizing proxies that provide slightly more private web access. Proxies must use HTTPS encryption in order to provide any level of protection at all. Unfortunately, proxies require the user to place a large amount of trust in the proxy operator (since they see everything the user does over HTTP), and may be subject to traffic analysis.
Some P2P services like file transfer or voice over IP use other computers to allow communication between computers behind firewalls. This means that trying to follow a call between two citizens might, mistakenly, identify a third citizen unaware of the communication.
Privacy enhancing tools
For security conscious citizens with some basic technical knowledge, tools like I2P – The Anonymous Network, Tor, Mixmaster and the cryptography options integrated into any many modern mail clients can be employed.
I2P is an international peer-to-peer anonymizing network, which aims at not only evading data retention, but also at making spying by other parties impossible. The structure is similar to the one TOR (see next paragraph) uses, but there are substantial differences. It protects better against traffic analysis and offers strong anonymity and for net-internal traffic end-to-end encryption. Due to unidirectional tunnels it is less prone to timing attacks than Tor. In I2P, several services are available: anonymous browsing, anonymous e-mails, anonymous instant messenger, anonymous file-sharing, and anonymous hosting of websites, among others.
Tor is a project of the U.S. non-profit Tor Project to develop and improve an onion routing network to shield its users from traffic analysis. Mixmaster is a remailer service that allows anonymous email sending.
JAP is a project very similar to Tor. It is designed to route web requests through several proxies to hide the end user's Internet address. Tor support has been included into JAP.
Initiative against extensive data retention
The Arbeitskreis Vorratsdatenspeicherung (German Working Group on Data Retention) is an association of civil rights campaigners, data protection activists and Internet users. The Arbeitskreis coordinates the campaign against the introduction of data retention in Germany.
An analysis of federal Crime Agency (BKA) statistics published on 27 January 2010 by civil liberties NGO AK Vorrat revealed that data retention did not make a prosecution of serious crime any more effective.
As the EU Commission is currently considering changes to the controversial EU data retention directive, a coalition of more than 100 civil liberties, data protection and human rights associations, jurists, trade unions and others are urging the Commission to propose the repeal of the EU requirements regarding data retention in favour of a system of expedited preservation and targeted collection of traffic data.
Plans for extending data retention to social networks
In November 2012, answers to a parliamentary inquiry in the German Bundestag revealed plans of some EU countries including France to extend data retention to chats and social media. Furthermore, the German Federal Office for the Protection of the Constitution (Germany's domestic intelligence agency) has confirmed that it has been working with the ETSI LI Technical Committee since 2003.
- Data security
- Data Retention Directive
- Data retention hardware
- Data Protection Act 1998
- Computer data storage
- Customer proprietary network information
- Data privacy
- Data Retention Directive
- Electronic discovery
- Lawful interception
- Mass surveillance
- NSA call database
- Secrecy of correspondence
- Traffic analysis
- I2P - The Anonymous Network
- Rouse, Margaret. "Data retention policy". TechTarget. Retrieved 30 October 2014.
- Rouse, Margaret. "Data retention". TechTarget. Retrieved 30 October 2014.
- Li, J; Singhal, S; Swaminathan, R; Karp, AH (19 October 2012). "Managing Data Retention Policies at Scale". IEEE Transactions on Network and Service Management. 9 (4): 393–406. doi:10.1109/TNSM.2012.101612.110203.
- "Australia passes controversial new metadata law". BBC News. 26 March 2015. Retrieved 28 March 2015.
- Scott, Elise (27 March 2015). "Metadata laws pass parliament". AAP. 7 News. Archived from the original on 8 April 2015. Retrieved 28 March 2015.
- Knott, Matthew (30 October 2014). "Malcolm Turnbull introduces legislation for metadata retention scheme". The Sydney Morning Herald. Retrieved 14 November 2014.
- Malcolm, Jeremy (3 November 2014). "To Nobody's Surprise, Australian "Terrorism" Law May Be Used for Copyright Enforcement". EFF. Retrieved 14 November 2014.
- Kerin, John. "What new metadata laws mean for you". Australian Financial Review. Retrieved 28 March 2015.
- Gardiner, Bonnie (8 April 2015). "Metadata regime to spur speculative invoicing, say Greens". CIO. Retrieved 8 April 2015.
- "Greens' Scott Ludlam provides tips on how to hide metadata from government". AAP. Guardian. 24 March 2015. Retrieved 8 April 2015.
- "Govt offers metadata laws breakthrough". AAP. Herald Sun. 16 March 2015. Retrieved 8 April 2015.
- Ramli, David (28 February 2015). "Metadata retention laws will pass as Labor folds". Sydney Morning Herald. Retrieved 8 April 2015.
- "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC". Official Journal of the European Union. April 13, 2006.
- John Leyden (December 14, 2005). "MEPs vote for mandatory data retention". The Register. Retrieved 2011-12-21.
- "Data retention". Directorate-General of the European Commission. Archived from the original on 11 March 2014. Retrieved 8 March 2014.
- "Evaluation report on the Data Retention Directive (Directive 2006/24/EC)" (PDF). European Commission. 18 April 2011.
- "Opinion of the European Data Protection Supervisor on the Evaluation report from the Commission to the Council and the European Parliament on the Data Retention Directive (Directive 2006/24/EC)" (PDF). European Data Protection Supervisor. 31 May 2011.
- "EU lawyers tell Member States: Blanket communications data retention "no longer possible"". Stoppt die Vorratsdatenspeicherung!. 23 June 2014. Retrieved 22 November 2014.
- Franziska Boehm; Mark D Cole (30 June 2014). "Data Retention after the Judgement of the Court of Justice of the European Union" (PDF). The Greens–European Free Alliance. Archived from the original (PDF) on 8 November 2014. Retrieved 11 August 2017.
- "Data Retention and Investigatory Powers Act 2014" (PDF). Office of Public Sector Information. Retrieved 31 October 2014.
- "Data Retention Legislation (Impact Assessment)" (PDF). Office of Public Sector Information. Retrieved 31 October 2014.
- "Data Retention and Investigatory Powers Act 2014 (Explanatory notes)" (PDF). Office of Public Sector Information. Retrieved 31 October 2014.
- Travis, Alan (30 September 2014). "Theresa May vows Tory government would introduce 'snooper's charter'". The Guardian. Retrieved 31 October 2014.
- Hern, Alex (24 June 2014). "British government 'breaking law' in forcing data retention by companies". The Guardian. Retrieved 31 October 2014.
- Emma Smith; Dipesh Gadher (13 November 2005). "Spy cameras to spot drivers' every move". Sunday Times. Archived from the original on 6 January 2006.
- John Lettice (15 November 2005). "Gatso 2: rollout of UK's '24×7 vehicle movement database' begins". The Register. Retrieved 21 December 2011.
- "Statutory Instrument 2000 № 2417 granting additional bodies access to retained telecoms data". The National Archives. 7 September 2000. Retrieved 21 December 2011.
- Seattle PI
- Archived October 10, 2012, at the Wayback Machine
- "Italy decrees Data Retention until 31 December 2007". European Digital Rights. August 10, 2005. Archived from the original on 25 January 2012. Retrieved 2011-12-24.
- "Bekendtgørelse om udbydere af elektroniske kommunikationsnets og elektroniske kommunikationstjenesters registrering og opbevaring af oplysninger om teletrafik (logningsbekendtgørelsen)" [Order on providers of electronic communications and electronic communications services recording and storage of information about telecommunications traffic (Retention Order)] (in Danish). Danish Ministry of Justice. 13 October 2006.
- "Sweden is ordered to make a lump sum payment of €3 000 000 for its delay in transposing the Data Retention Directive into national law" (PDF). Court of Justice of the European Union (No 66/13). 30 May 2013.
- "ECJ sets important legal precedent by striking down Data Retention Directive". Open Europe Blog. 8 April 2014.
- Tobias Olsson (26 May 2009). "Sverige stäms för datalagring" (in Swedish). SvD. Retrieved 2011-12-28.
- Ullman, Tommie (21 March 2012). "The Riksdag said Yes to Data Retention Directive". Stockholm News. Archived from the original on 3 August 2012. Retrieved 2012-09-19.
- Lagring av trafikuppgifter för brottsbekämpning (PDF) (in Swedish). Stockholm: Betänkande av Trafikuppgiftsutredningen. 1 November 2007. Archived from the original (PDF) on 14 November 2011. Retrieved 2011-12-24.
- Essers, Loek (11 April 2014). "Sweden won't enforce data retention law against ISP that deleted metadata". PCWorld.
- Tung, Liam (29 October 2014). "Swedish data retention back in full swing minus one ISP". ZDNet.
- Meyer, David (29 October 2014). "Swedish ISP Bahnhof threatened with fine for not storing customer data for law enforcement". GigaOm.
- "Gesetz zur Neuregelung der Telekommunikationsüberwachung und anderer verdeckter Ermittlungsmaßnahmen sowie zur Umsetzung der Richtlinie 2006/24/EG." Bundesgesetzblatt (BGBl.), Part I, No. 70, p. 3198, 31. December 2007.(in German)
- "BBC UK German court orders stored telecoms data deletion", BBC News website, English
- "Endgültiges Ergebnis der Namentlichen Abstimmung Nr. 1" (PDF). Deutscher Bundestag. 2015-10-16. Retrieved 2016-06-28.
- "Entwurf eines Gesetzes zur Einführung einer Speicherpflicht und einer Höchstspeicherfrist für Verkehrsdaten" (PDF). Deutscher Bundestag. 2016-06-09. Retrieved 2016-06-28.
- "Germany Just Introduced Data Retention. Politicians Should Be Ashamed". Tutanota. 2015-10-16. Retrieved 2017-06-22.
- "Bundesnetzagentur - Umsetzung §§ 110, 113 TKG - Speicherpflicht und Höchstspeicherfrist für Verkehrsdaten". Bundesnetzagentur. June 28, 2017. Retrieved November 16, 2017.
- "CE solicită României să transpună integral normele UE în privinţa păstrării datelolor - Romania Libera". romanialibera.ro. Retrieved 19 April 2018.
- "The Legality of the Data Retention Directive in Light of the Fundamental Rights to Privacy and Data Protection | Feiler | European Journal of Law and Technology". Ejlt.org. Retrieved 2014-01-26.
- Romanian Constitutional Court Decision no.1258 of Oct. 8, 2009, Official Gazette no. 798 of Nov. 23, 2009.In: http://ejlt.org//article/view/29/75
- "Traian Basescu a promulgat asa numita 'lege Big Brother' care prevede stocarea pentru sase luni a datelor de trafic ale tuturor utilizatorilor de telefonie si internet". hotnews.ro. Retrieved 19 April 2018.
- "EC drops case against Romania as data retention law passes". www.telecompaper.com. Retrieved 19 April 2018.
- "Preşedintele a promulgat "Legea Big Brother"". adevarul.ro. 12 July 2012. Retrieved 19 April 2018.
- Avocatnet.ro. "Legea Big Brother a intrat in vigoare! Operatorii de telefonie si internet vor putea stoca o serie de date ale abonatilor". avocatnet.ro. Retrieved 19 April 2018.
- "Legea "Big Brother", prin care furnizorii de telefonie şi internet erau obligaţi să reţină date ale abonaţilor, declarată neconstituţională". mediafax.ro. Retrieved 2014-07-08.
- Martin Husovec on April 28, 2014, FIRST EUROPEAN CONSTITUTIONAL COURT SUSPENDS DATA RETENTION AFTER THE DECISION OF THE COURT OF JUSTICE OF EU
- Heini Järvinen, Slovak Constitutional Court suspends data retention legislation
- "Archived copy" (PDF). Archived from the original (PDF) on 2015-05-20. Retrieved 2015-05-19.CS1 maint: archived copy as title (link)
- "Archived copy". Archived from the original on 2017-08-12. Retrieved 2017-08-11.CS1 maint: archived copy as title (link)
- "Russian ISPs will need to store content and metadata, open backdoors". Retrieved 2016-08-10.
- Khrennikov, Ilya. "Putin's 'Big Brother' Surveillance Law Criticized by Snowden". Bloomberg.com. Retrieved 2016-08-10.
- "Draconian Law Rammed Through Russian Parliament". 2016-06-23. Retrieved 2016-08-10.
- (www.dw.com), Deutsche Welle. "Are Russia's anti-terror laws designed to fight democracy? | Europe | DW.COM | 23.06.2016". DW.COM. Retrieved 2016-08-10.
- "Russia is on the verge of a new snooping law and 100,000 are not happy". 2016-08-10. Retrieved 2016-08-10.
- Norway (2011-04-05). "Updated: Parliament passes Data Retention Directive / News / The Foreigner — Norwegian News in English". Theforeigner.no. Retrieved 2014-01-26.
- "Høring om kostnadsfordelingsmodell for datalagringsdirektivet og ny bestemmelse som regulerer politiets adgang til uthenting av data i nødsituasjoner" [Consultation on Cost Allocation Model for Data Retention Directive and the New Provision Regulating Police Access to the Retrieval of Data in Emergency Situations] (in Norwegian). Government of Norway. 26 April 2013. Retrieved 21 June 2013.
- Tadić signs electronic communications law Archived 2015-04-03 at the Wayback Machine, B92
- Switzerland (2016-03-18). "Bundesgesetz betreffend der Überwachung des Post- und Fernmeldeverkehrs (BÜPF)" (PDF). admin.ch. Retrieved 2017-03-20.
- Digitale Gesellschaft (2015-09-05). "Überwachung". digitale-gesellschaft.ch. Retrieved 2017-03-20.
- James Ball. "NSA stores metadata of millions of web users for up to a year, secret files show". The Guardian. Retrieved 2014-01-26.
- Kevin Drum. "Washington Post Provides New History of NSA Surveillance Programs". Mother Jones. Retrieved 2014-01-26.
- James Ball in (16 January 2014). "NSA collects millions of text messages daily in 'untargeted' global sweep". The Guardian. Retrieved 16 January 2014.
- Gellman, Barton (6 November 2005). "The FBI's Secret Scrutiny". Retrieved 19 April 2018 – via www.washingtonpost.com.
- Akrivopoulou, Christina; Psygkas, Athanasios (2010). Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices. Idea Group Inc. p. 257. ISBN 978-1-60960-083-9.
These civil liberties organizations also highlighted the absence of such a data retention obligation for ISPs in the US...
- "ISP snooping gaining support". CNET. April 14, 2006. Retrieved 2009-03-17.
- "FBI, politicos renew push for ISP data retention laws". CNET. April 14, 2006. Retrieved 2009-03-17.
Based on the statements at Wednesday's hearing and previous calls for new laws in this area, the scope of a mandatory data retention law remains fuzzy. It could mean forcing companies to store data for two years about what Internet addresses are assigned to which customers (Comcast said in 2006 that it would be retaining those records for six months).
- "FBI wants records kept of Web sites visited". CNET. February 5, 2010. Retrieved 2010-02-06.
Federal regulations in place since at least 1986 require phone companies that offer toll service to "retain for a period of 18 months" records including "the name, address, and telephone number of the caller, telephone number called, date, time and length of the call." — "Eighteen million hits an hour would have to have been logged" ... The purpose of the FBI's request was to identify visitors to two URLs, "to try to find out...who's going to them."
- "Proposed Child Pornography Laws Raise Data Retention Concerns". Channel Web. February 20, 2009. Archived from the original on March 19, 2009. Retrieved 2009-03-17.
- "H.R. 1076: Internet Stopping Adults Facilitating the Exploitation of Today's Youth (SAFETY) Act of 2009". Govtrack.us. February 13, 2009.
- "Europe wide retention of telecommunications data unlikely to help law enforcement agencies in the fight against terrorism" (PDF). Eurocop. 2 June 2005. Archived from the original (PDF) on 26 July 2011.
- "Rights abuse claim at airbase". BBC News Online. 16 July 2003.
- "Police questioned over terror act use". BBC News Online. 10 September 2003.
- Inc., The Tor Project. "Tor Project - Privacy Online". www.torproject.org. Retrieved 19 April 2018.
- "About us". Stoppt die Vorratsdatenspeicherung!. 2006-05-01. Retrieved 2014-01-26.
- "Study finds telecommunications data retention ineffective (27 Jan 2011)". Stoppt die Vorratsdatenspeicherung!. Retrieved 2014-01-26.
- FM4 Online (ORF): Vorratsspeicherung für Facebook-Daten (in German). 2012-10-30. Retrieved 2012-11-08
- "Study on data retention effectiveness" (PDF). vorratsdatenspeicherung.de. Retrieved 19 April 2018.
- Patrick. "Stoppt die Vorratsdatenspeicherung! - Civil society calls for an end to compulsory telecommunications data retention (28 June 2010)". www.vorratsdatenspeicherung.de. Retrieved 19 April 2018.
- Patrick. "Stoppt die Vorratsdatenspeicherung! - Video: FDP-Pressekonferenz zur Vorratsdatenspeicherung (19.01.2011)". www.vorratsdatenspeicherung.de. Retrieved 19 April 2018.
- Statement by the German Secretary of Justice Archived January 29, 2011, at the Wayback Machine
- Data Retention on the Open Rights Group wiki
- The Politics of the EU Court Data Retention Opinion: End to Mass Surveillance?
- Bowden, Caspar: "Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention and the Emergency Anti-Terrorism Legislation". Computer and Telecommunications Law Review, March 2002.
- Boehm, F. and Cole, M.: Data Retention after the Judgement of the Court of Justice of the European Union (2014). (PDF-file)
- Breyer, P.: "Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR", European Law Journal, May 2005. (PDF-File, 82 KB)
- Centre for European Policy Studies (CEP): Policy Brief on Data Retention (2011). (PDF-File)
- Crump, C.: Data retention: privacy, anonymity, and accountability online (2003). 56 Stanford Law Review 191-229.
- Cybertelecom :: Records Keeping / Data Retention
- Digital Rights Ireland: Digital Rights Ireland's challenge against the EU Data Retention Directive and Irish retention legislation on the grounds of European and Irish constitutional law.
- Electronic Privacy Information Center: EPIC data retention page (to 2007)
- European Digital Rights: EDRI news tracking page on data retention (current)
- Feiler, L.: The Data Retention Directive (2008). Seminar paper. (PDF-File)
- Frost & Sullivan Whitepaper: "Meeting the challenges of Data Retention: Now and in the future"
- Ganj, C.: "The Lives of Other Judges: Effects of the Romanian Data Retention Judgment" (December 4, 2009). (PDF-File)
- Goemans, C. and Dumortier, J.: "Mandatory retention of traffic data in the EU: possible impact on privacy and on-line anonymity. Digital Anonymity and the Law, series IT & Law/2, T.M.C. Asser Press, 2003, p 161-183. (PDF-File)
- Milford, P.: "The Data Retention Directive: too fast, too furious a response? (2008). LLM Dissertation – Southampton Business School. (PDF-File)
- Mitrou, L.: "Communications Data Retention: A Pandora’s Box for Rights and Liberties?" From Digital Privacy: Theory, Technologies, and Practices edited by Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis and Sabrina di Vimercati. Auerbach Publications, 2008. (PDF-File)
- Morariu, M.: How Secure is to Remain Private? On the Controversies of the European Data Retention Directive (2009). Amsterdam Social Science, Vol. 1(2): p. 46-65. (PDF-File)
- Statewatch: The surveillance of telecommunications in the EU.
- UK Data Retention Requirements with full references to legislation, codes of practice, etc.
- UK Home Office: Consultation papers on data retention and on access to communications data.
- Walker, C., & Akdeniz, Y.: "Anti-Terrorism laws and data retention: war is over?". Northern Ireland Legal Quarterly, 54(2), Summer edition 2003, 159-182. (PDF-File, 97 KB)
- Working Group on Data Retention: List of documents relating to communications data retention in the EU (current)