Quote:
Originally Posted by AlexanderHanff
The data is made available to potentially an unlimited number of people as it is made available to Phorm and OIX partners, I would suggest you read the notes that go with the Act too rather than just the Act itself. As for the Computer Misuse Act it very clearly states whether it is a person or automated system responsible for the violation (and even if I remember correctly any party who provides any equipment which is used to commit a breach of the Act).
Alexander Hanff
|
I believe it is made available to several people too. However I'm trying to see how phorm might argue that it isn't an interception. I will have a look at the notes as you suggest.
I'm only looking at the RIPA perspective at the moment. I know that's only 1 of half a dozen.