Quote:
Originally Posted by Portly_Giraffe
Well done manxminx! I note that:
In fact under RIPA it is the unlawful interception of data which is the offence (unless that interception has lawful authority), not how the interceptor uses or intends to use that data.
We need to keep this point on the agenda.
|
I've said this a number of times. They probably are compliant with DPA, it is RIPA and the rest of the mining process to come up with the data they keep that is the problem. Phorm consistently spins back to what they keep, not how they obtain it to try to obfuscate the issue.