SlideShare a Scribd company logo
1 of 12
The Investigatory Powers Act 2016
HNC in Computing and Systems Development
Unit Number and Name
Lecturer Name: Tim Jackson
Date of Presentation: 28/11/2016
Brandon Skerritt (J893694)
Ashleigh Bhandari (J893691)
Francesca Beddingfield (J893950)
Contents
• Introduction
• What is it?
• How business should be preparing
• Key Impacts on E-commerce
• Privacy is so 2016
• How can businesses fight back?
• Who cares?
• Conclusion
• Bibliography
Introduction
On The Investigatory Powers Act of 2016 and its affect on
E-commerce
What is it?
The Investigatory powers bill, dubbed snoopers charter,
will allow the government to obtain all communication,
digital or not.
The three main facts are:
•All communication is monitored
•It’s harder to get a warrant to an interception warrant
•Ensure the government Is fit for the digital age
(“Investigatory Powers Bill – Gov.uk”)
How business should be preparing
• A complete review of every use of encrypted
• Having procedures in place for dealing with enquiries
• Training their employees on how to react to a encryption key request
• Reviewing their third party contacts and make sure they aren’t in
breach.
• Analysing how easy it will be to comply with the regulators request.
• Considering how the regulators may use the encryption data
• It forces internet and communication companies to retain
any of their customers browser history for up to a year.
(Roi Perez, 2016)
• Weakening the encryption and storing costumers
information could affect any e-commerce if they have a
data breach.
• Companies should prepare to put IP in place otherwise
they can face serious conscious.
• Companies can be asked to decrypt data on demand.
(Roi Perez, 2016)
• The government must be notify when any new security
feature in a product are added before lunching
(Roi Perez, 2016)
Key impacts on e-commerce
Privacy is so 2016
How can businesses fight back?
Who cares?
(Roger Gale MP, 2016)
Conclusion
Any Questions?
Bibliography
Web sites - citations
Services.parliament.uk. (2016). Investigatory Powers Act 2016 — UK Parliament . [online] Available at:
http://services.parliament.uk/bills/2015-16/investigatorypowers.html [Accessed 4 Dec. 2016].
Computerweekly(June 2000 ) Regulation of Investigatory Powers Bill: the story so far:
http://www.computerweekly.com/feature/Regulation-of-Investigatory-Powers-Bill-the-story-so-far (01/12/2016).
Roi Perez, C. (2016). The Investigatory Powers Bill is now set to become law. [online] SC Magazine UK. Available at:
http://www.scmagazineuk.com/the-investigatory-powers-bill-is-now-set-to-become-law/article/573616/ [Accessed 1 Dec. 2016].
ComputerWeekly. (2016). Regulation of Investigatory Powers Bill: the story so far. [online] Available at:
http://www.computerweekly.com/feature/Regulation-of-Investigatory-Powers-Bill-the-story-so-far [Accessed 1 Dec. 2016].
McGoogan, C. (2016). What is the Investigatory Powers Bill and what does it mean for my privacy?. [online] The Telegraph. Available at:
http://www.telegraph.co.uk/technology/2016/11/29/investigatory-powers-bill-does-mean-privacy/ [Accessed 1 Dec. 2016].

More Related Content

What's hot

Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...TrustArc
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 
Business Privacy & Facility Security
Business Privacy & Facility SecurityBusiness Privacy & Facility Security
Business Privacy & Facility SecurityMatt Walther
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementTrustArc
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...TrustArc
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIAL
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIALARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIAL
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIALSteven Rhyner
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clausesBrian Miller, Solicitor
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates#TheFraudTube
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 

What's hot (20)

Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 
Business Privacy & Facility Security
Business Privacy & Facility SecurityBusiness Privacy & Facility Security
Business Privacy & Facility Security
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIAL
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIALARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIAL
ARGENTINA TOPS LIST OF COUNTRIES WITH GREATEST BITCOIN ADOPTION POTENTIAL
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 

Similar to Student Assignment Presentation Template

GDPR training
GDPR training GDPR training
GDPR training ASL
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
 
Keynote: Unified decentralisation & the future of a consumer-led data economy
Keynote: Unified decentralisation & the future of a consumer-led data economyKeynote: Unified decentralisation & the future of a consumer-led data economy
Keynote: Unified decentralisation & the future of a consumer-led data economyNicholas Oliver
 
DV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeDV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeTealium
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Dan Storbaek
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedJanette Toral
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Enabling the Digital World
Enabling the Digital WorldEnabling the Digital World
Enabling the Digital WorldIQBG, Inc.
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Secure Privacy
 
Legal tech trends 2019 report
Legal tech trends 2019 reportLegal tech trends 2019 report
Legal tech trends 2019 reportDan Storbaek
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Dr. Donald Macfarlane
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinFranco Coin
 
Google Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyGoogle Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyTinuiti
 
FinTech Northern Breakfast Club 23 June 2016
FinTech Northern Breakfast Club 23 June 2016FinTech Northern Breakfast Club 23 June 2016
FinTech Northern Breakfast Club 23 June 2016Rob Cooper
 

Similar to Student Assignment Presentation Template (20)

GDPR training
GDPR training GDPR training
GDPR training
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
Keynote: Unified decentralisation & the future of a consumer-led data economy
Keynote: Unified decentralisation & the future of a consumer-led data economyKeynote: Unified decentralisation & the future of a consumer-led data economy
Keynote: Unified decentralisation & the future of a consumer-led data economy
 
DV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeDV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal Landscape
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons Learned
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Enabling the Digital World
Enabling the Digital WorldEnabling the Digital World
Enabling the Digital World
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
Legal tech trends 2019 report
Legal tech trends 2019 reportLegal tech trends 2019 report
Legal tech trends 2019 report
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Google Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First StrategyGoogle Solutions for Brands to Build a Privacy-First Strategy
Google Solutions for Brands to Build a Privacy-First Strategy
 
FinTech Northern Breakfast Club 23 June 2016
FinTech Northern Breakfast Club 23 June 2016FinTech Northern Breakfast Club 23 June 2016
FinTech Northern Breakfast Club 23 June 2016
 
All Things Digital
All Things DigitalAll Things Digital
All Things Digital
 
Marsden #icis2013
Marsden #icis2013Marsden #icis2013
Marsden #icis2013
 

Student Assignment Presentation Template

  • 1. The Investigatory Powers Act 2016 HNC in Computing and Systems Development Unit Number and Name Lecturer Name: Tim Jackson Date of Presentation: 28/11/2016 Brandon Skerritt (J893694) Ashleigh Bhandari (J893691) Francesca Beddingfield (J893950)
  • 2. Contents • Introduction • What is it? • How business should be preparing • Key Impacts on E-commerce • Privacy is so 2016 • How can businesses fight back? • Who cares? • Conclusion • Bibliography
  • 3. Introduction On The Investigatory Powers Act of 2016 and its affect on E-commerce
  • 4. What is it? The Investigatory powers bill, dubbed snoopers charter, will allow the government to obtain all communication, digital or not. The three main facts are: •All communication is monitored •It’s harder to get a warrant to an interception warrant •Ensure the government Is fit for the digital age (“Investigatory Powers Bill – Gov.uk”)
  • 5. How business should be preparing • A complete review of every use of encrypted • Having procedures in place for dealing with enquiries • Training their employees on how to react to a encryption key request • Reviewing their third party contacts and make sure they aren’t in breach. • Analysing how easy it will be to comply with the regulators request. • Considering how the regulators may use the encryption data
  • 6. • It forces internet and communication companies to retain any of their customers browser history for up to a year. (Roi Perez, 2016) • Weakening the encryption and storing costumers information could affect any e-commerce if they have a data breach. • Companies should prepare to put IP in place otherwise they can face serious conscious. • Companies can be asked to decrypt data on demand. (Roi Perez, 2016) • The government must be notify when any new security feature in a product are added before lunching (Roi Perez, 2016) Key impacts on e-commerce
  • 8. How can businesses fight back?
  • 12. Bibliography Web sites - citations Services.parliament.uk. (2016). Investigatory Powers Act 2016 — UK Parliament . [online] Available at: http://services.parliament.uk/bills/2015-16/investigatorypowers.html [Accessed 4 Dec. 2016]. Computerweekly(June 2000 ) Regulation of Investigatory Powers Bill: the story so far: http://www.computerweekly.com/feature/Regulation-of-Investigatory-Powers-Bill-the-story-so-far (01/12/2016). Roi Perez, C. (2016). The Investigatory Powers Bill is now set to become law. [online] SC Magazine UK. Available at: http://www.scmagazineuk.com/the-investigatory-powers-bill-is-now-set-to-become-law/article/573616/ [Accessed 1 Dec. 2016]. ComputerWeekly. (2016). Regulation of Investigatory Powers Bill: the story so far. [online] Available at: http://www.computerweekly.com/feature/Regulation-of-Investigatory-Powers-Bill-the-story-so-far [Accessed 1 Dec. 2016]. McGoogan, C. (2016). What is the Investigatory Powers Bill and what does it mean for my privacy?. [online] The Telegraph. Available at: http://www.telegraph.co.uk/technology/2016/11/29/investigatory-powers-bill-does-mean-privacy/ [Accessed 1 Dec. 2016].

Editor's Notes

  1. My names brandon, this is Francesca, this is Ashleigh. Please if you have any questions, apart from Tim, keep them to the any questions slide as this is quite a long presentation
  2. The investigatory powers bill, dubbed Snoopers Charter by the media, will allow the gobernment to obtain all communication whether it is digital or not. It’s harder to get an interception warrant, but what does that mean? It’s harder for the ‘powers’ which consists of every government organisation to actually look at your data. In order to do this, not only do they need to apply for a warrant like they normally would but the secretary of state, which includes people like Thersa May, Boris Johnson, Jeremy hunt. The last point may be seen as unusual, because on one hand the government does need to be fit for the digital age, but on the other hand the text specifically “This will restore capabilities that have been lost as a result of changes in the way people communicate.” from the same document sounds like that they have always been monitoring us. I would like to mention, encase the government is listening, that Orwell’s 1984 is a fictional book and not a guide book. DON’T READ THIS PART Dycotonmy is a split dichoctomy – theres a division of opinons as to why this is being implemented
  3. A complete review of every use of encrypted technology and a detailed report of what the encryption is protecting and why. Having procedures in place for dealing with possible Investigatory Power enquiries, ranging from police to Customs & Excise. Making sure their employees aware of how to handle a request for the key to an encrypted transmission is received (this also includes document with electronic signatures) Reviewing Any security or confidentially agreement in place with third party contacts, that could be breached by the regulators being given their encryption key and the potential impact and any future agreements Analysing how easy it will be to comply with the regulators request. (e.g. how will be holding the eruption key, will be key be in an intelligible form, what would be a cost of non-compliance, what happens once they’ve finished using it?) Considering how the regulators may use the encryption data and whether it is safe under RIP (will the key be misused) are sufficient. Reference Computerweekly(June 2000 ) Regulation of Investigatory Powers Bill: the story so far: http://www.computerweekly.com/feature/Regulation-of-Investigatory-Powers-Bill-the-story-so-far (01/12/2016).
  4. By companies having to do this could create a problem between the trust of the customer and the company as they are holding information against their will. This can cause sales to drop for the company as the customers may not appreciate their browser history being stored for over an year. This could be a massive impact on the e-commerce especially if they just came into e-commerce and their data got breached because of weak encryption. This means companies who fail to provide the key to encrypt the data will face a criminal offence carrying a maximum penalty of two years imprisonment or an unlimited fine This could be a huge impact on the e-commerce as they will be breaking the data protection act been the company and the customers. If the government does not approve of the new security in the product this could have a massive impact of the companies sales and profit if the product gets rejected and has been produced widely. The next slide features some primary research carried out by Brandon
  5. The IP bill is forcing all manufacturers of any encrypted products to hand over the keys to the kingdom. Who needs privacy, right? Foreign companies such as Private Internet Access and Proton Mail are allowed to keep their encryption keys since thye are based in foreign countries. But obviously this isn’t going to stop the Orwellian government, sorry, UK Government, from requesting and forcing people hand over the keys to encryption. Earlier this year, Whatsapp enabled the Signal protocol. An end to end, open source protocol loved by many cryptonerds. It was the biggest mass encryption of its kind, over 1 billion people were automatically encrypted, end to end. Signal has been implemented in Facebook, Whatsapp, Red Phone and many other applications. Is this the end for Signal? Only time will tell. In the meantime, all business information will no longer be secured. If the government wanted to find out what your staff are working on, they’re legally allowed to. Not to mention that the NSA has recetnyl gained a new super power, the ability to hack any and all machines in the entire world, regardless of countrie protection.
  6. Email your MP’s, encrypt EVERYTHING, cover your webcams. There are plenty of online guides out there which detail, very specifically, how to protect against this new act. But I guess, in a few years, talking about protecting yourself from this act will become illegal as its breaking the law.
  7. Who cares? Not out local MP Roger Gale. I emailed him, several paragraphs, of why the IP bill is wrong. What did he reply with? He does not share my opinion. Nice.
  8. The investigatory powers act is an act which could not only affect e-commerce but will affect our everyday lives. I thank you for listening to this paramount speech about the bill, and as always (next slide)