Protecting Information Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Protecting Information Privacy Equality and Human Rights Commission Research report 69 Protecting information privacy Charles Raab and Benjamin Goold University of Edinburgh and University of British Columbia Equality and Human Rights Commission 2011 First published Summer 2011 ISBN 978 1 84206 347 7 Equality and Human Rights Commission Research Report series The Equality and Human Rights Commission Research Report Series publishes research carried out for the Commission by commissioned researchers. The views expressed in this report are those of the authors and do not necessarily represent the views of the Commission. The Commission is publishing the report as a contribution to discussion and debate. Please contact the Research Team for further information about other Commission research reports, or visit our website: Research Team Equality and Human Rights Commission Arndale House The Arndale Centre Manchester M4 3AQ Email: [email protected] Telephone: 0161 829 8500 Website: www.equalityhumanrights.com If you require this publication in an alternative format, please contact the Communications Team to discuss your needs at: [email protected] Contents Acknowledgements iii Executive summary v 1. Introduction 1 1.1 Background 1 1.2 The aim of the report 4 1.3 Structure of the report 6 2. The changing landscape of privacy 9 2.1 Introduction 9 2.2 Information privacy: challenges, concerns, and responses 10 2.3 Opportunities for reform 13 2.4 Summary 14 3. Why privacy matters 15 3.1 Introduction 15 3.2 Making a case for privacy 15 3.3 Privacy and the state 19 3.4 The future of privacy 22 3.5 Summary 24 4. Information privacy in the UK 25 4.1 Introduction 25 4.2 Overview of the current law 25 4.3 Statutory protections 26 4.4 Common law protections 43 4.5 Guidelines, codes of practice, and ‘soft law’ 44 4.6 Weaknesses of the current approach 44 4.7 Summary 45 5. Complementary approaches for enhancing privacy 47 5.1 Introduction 47 5.2 Self-regulatory approaches 47 5.3 Designing privacy protection into information systems 50 5.4 Public awareness and education 53 5.5 Some regulatory developments abroad 55 5.6 Summary 56 i 6. Moving forward 58 6.1 Introduction 58 6.2 Approach One: a principled foundation 60 6.3 Approach Two: enhanced protection via legislative reform 66 6.4 Approach Three: improving the current regulatory regime 70 6.5 Approach Four: an increased role for the common law 71 6.6 Choosing a new path for privacy 72 7. Proposals for reform 74 7.1 Introduction 74 7.2 Recommendations 75 8. Conclusion 79 References 80 Endnotes 86 ii Acknowledgements We are grateful to the Equality and Human Rights Commission for their support during the writing of this report, and to the various experts and referees who offered comments and suggestions at formative stages and on subsequent drafts. We also thank Fiona McGrath for providing invaluable assistance and for her help in the preparation of the final report. Charles Raab Benjamin Goold January 2011 iii iv EXECUTIVE SUMMARY Executive summary Background This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state. It argues that current privacy laws and regulation do not adequately uphold human rights, and that fundamental reform is required. It identifies two principal areas of concern: the state’s handling of personal data, and the use of surveillance by public bodies. Privacy concepts have a long tradition in Britain and can be traced back in common law and, more recently, appear in the Universal Declaration of Human Rights. Today, the right to privacy is contained in Article 8 of the European Convention on Human Rights (ECHR), and is incorporated into UK law through the Human Rights Act (HRA) 1998. As a statutory body, the Commission has a duty to encourage compliance with the HRA and other human rights obligations under international treaties. Developments in information technology and the purposes of state policy and the private sector mean that we are now more vulnerable than ever to unwanted surveillance. There is a growing demand for personal information from both the public and private sectors. New technology allows organisations to store, analyse and share such information in increasingly complex ways. Although recent legislation has attempted to strengthen information privacy, the law has not kept pace with changes in technology and in the uses to which it is put. As a result, evidence suggests that the state is failing adequately to uphold the right to privacy. There has been widespread concern regarding the expansion of government databases and the processing of personal data. The Regulation of Investigatory Powers Act (RIPA) 2000, which governs the use of surveillance by the police, local authorities and other public bodies, is marred by ambiguity, leaving open the possibility of serious errors, inadvertent use of illegal surveillance techniques, and inappropriate use of surveillance powers. Surveillance is increasingly becoming a feature of everyday life in areas we previously considered private. There are concerns about the proliferation of CCTV and its lack of regulation, as well as about the potentially chilling effects of surveillance on, for example, peaceful protest. It is little wonder, in this context, that privacy has become a key public concern. Overall finding The central finding of this report is that the existing approach to the protection of information privacy in the UK is fundamentally flawed, and that there is a pressing v PROTECTING INFORMATION PRIVACY need for widespread legislative reform in order to ensure that the rights contained in Article 8 are respected. The report argues for the establishment of a number of key ‘privacy principles’ that can be used to guide future legal reforms and the development of sector-specific regulation. Key findings • The privacy landscape has been transformed in recent years by a series of landmark legislative reforms, including the HRA, the DPAs of 1984 and 1998, and RIPA. • There has also been a dramatic increase in the amount of personal information held by the public sector, due to technological developments and a steady expansion of the role of the state. • The current system has a weak, fractured and piecemeal approach to privacy. Acts such as the DPA and RIPA are riddled with gaps and contradictions, and are also interpreted, administered and overseen by a range of separate regulators, independent tribunals, and courts. As a consequence, it has become very difficult for individuals to understand what happens to their personal information, or what they should do when that information is misused. The current system has failed to protect privacy rights in a number of cases. • The problem is likely to become more acute. The state’s demands for personal information will continue to grow in relation to national security, law enforcement and citizens’ access to public services. So far, this expansion has been accompanied by only a relatively small increase in the powers or resources available to regulatory authorities such as the Information Commissioner’s Office or the various Commissioners in the field of surveillance. • A more flexible, comprehensive approach to privacy is needed, based on a firm commitment to Article 8 of the ECHR. This involves reforming the law and the regulatory system to create a comprehensive privacy protection regime to supersede the piecemeal inventory of measures or ‘tools’ implemented in a disjointed fashion by various agents. The relevant regulatory agencies need to be strengthened. • Law is essential: without legal specification of privacy rights, other instruments are likely to be incapable of providing the remedies that individuals may need. The law needs to be flexible enough to respond to the many and varied threats to privacy. vi EXECUTIVE SUMMARY • The principles written into law or underpinning it must be reflected in the specification of other instruments. These are seen as reinforcements and complements to the law and not as substitutes for, or weaker versions of, privacy laws. • There are many ways of protecting privacy in addition to legal provisions, including self-regulatory approaches, 'privacy-enhancing technologies', ‘privacy by design’, and public awareness and education. Such complementary, non-legal approaches to the protection of information privacy have an important part to play in upholding information privacy rights. Recommendations This report makes four main recommendations: (1) A clear set of ‘privacy principles’ should be developed and used as the basis for future legislation, and to guide the decisions of regulators and government agencies concerned with information privacy and data collection in different contexts. (2) Existing legislation that touches on privacy should be reformed to ensure that it is consistent with the privacy principles recommended earlier, and that it enhances – rather than undermines – the existing provisions of the HRA. At minimum, such reform should consolidate and improve the existing RIPA and data protection regimes in relation to information privacy and surveillance. (3) Greater regulatory coherence should be promoted. There should be an effort to rationalise and consolidate the current approach to the regulation of surveillance and data collection in the UK, with particular attention paid to the relationship between the various statutory Commissioners responsible for protecting information privacy. (4) Improved technological, organisational, and other means of protection should play an integral part in information privacy protection. The development and use of technological and non-legal solutions to the problem of information privacy protection should be encouraged by government, and more resources devoted to public education and awareness around privacy. The right to privacy is at risk of being eroded by the growing demand for information by government and the private sector. Unless we start to reform the law and build a regulatory system capable of protecting information privacy, we may soon find that it is a thing of the past.
Recommended publications
  • An Update on the UK Coalition Government's
    Statewatch Analysis Six months on: An update on the UK coalition government’s commitment to civil liberties Max Rowlands Contents Part I Introduction Part II The proposed measures 1. The Freedom (Great Repeal) Bill 2. Identity cards, the National Identity Register and the ContactPoint database 3. Fingerprinting in schools 4. The Freedom of Information Act 5. The DNA database 6. The right to trial by jury 7. The right to protest 8. Libel laws 9. The misuse of anti-terrorism legislation 10. The regulation of CCTV 11. The retention of communications data 12. The proliferation of unnecessary criminal offences 13. The Human Rights Act Part III What other reforms are needed? 14. The “database state” 15. The Digital Economy Act 16. Anti-social behaviour legislation 17. Anti-terrorism legislation Part IV Conclusion 1 Part I: Introduction Within weeks of its formation in May 2010, the coalition government announced with much fanfare its intention “to restore the rights of individuals in the face of encroaching state power.” An easy victory over Labour’s politically bankrupt National Identity Scheme followed, but since then the government’s approach has been characterised by caution and pragmatism rather than an unerring commitment to liberty. This is largely because there are splits within government on many of the key civil liberties issues that fundamentally define the relationship between citizen and state: how long and under what conditions can the government detain us, to what extent should the state surveil us, and what data on us should it hold? These internal divisions have been compounded by significant pressure from the civil service and security agencies to retain Labour policies that served to empower them.
    [Show full text]
  • The Conservative Party's Credibility Deficit Updated Tax and Spending
    The Conservative Party’s credibility deficit Updated tax and spending commitments April 2010 2 Contents Page Introduction 5 Summary 7 Methodology 8 Tables 10 Broken promises 13 45,000 new single rooms in the NHS 15 5,000 new prison places 19 Reducing taxes on savings 22 More places for science courses, training and apprenticeships 24 Maternity nurses for all 25 Reinstate the Defence Export Services Organisation (DESO) 28 National Loan Guarantee Scheme 30 Tax cuts 33 Corporation tax and investment allowance changes 35 Freeze council tax for two years 38 Reduce employers’ NICs for some small companies 41 Tax cuts for married couples 43 Inheritance tax cuts 50 Reverse impact of abolition of dividend tax credit 53 Tax reversals 57 Raise National Insurance Contributions thresholds 59 Oppose Broadband levy 61 Oppose cider duty increase 63 Tax increases 65 Non-domicile levy 67 Spending reductions 73 Cut Government “waste” 75 Savings on employment and skills programmes 78 Reduce spending on Building Schools for the Future 83 Reduce eligibility for tax credits 85 Reduce eligibility for Child Trust Funds 88 Reduce government spending on consultants and advertising 90 Reduce “bureaucracy” spending by a third 92 Welfare savings 95 Scrap ContactPoint 98 NHS IT Programme 100 Freeze pay and cap pensions for public sector workers 103 Reduce spending on Sure Start outreach workers 105 3 Scrap some Regional Development Agencies 107 Scrap regional assemblies 109 Scrap identity cards 110 “Cutting the cost of politics” 112 Scrap the Trade Union Modernisation
    [Show full text]
  • Privacy Online: a Report to Congress
    PRIVACY ONLINE: A REPORT TO CONGRESS FEDERAL TRADE COMMISSION JUNE 1998 FEDERAL TRADE COMMISSION Robert Pitofsky Chairman Mary L. Azcuenaga Commissioner Sheila F. Anthony Commissioner Mozelle W. Thompson Commissioner Orson Swindle Commissioner BUREAU OF CONSUMER PROTECTION Authors Martha K. Landesberg Division of Credit Practices Toby Milgrom Levin Division of Advertising Practices Caroline G. Curtin Division of Advertising Practices Ori Lev Division of Credit Practices Survey Advisors Manoj Hastak Division of Advertising Practices Louis Silversin Bureau of Economics Don M. Blumenthal Litigation and Customer Support Center Information and Technology Management Office George A. Pascoe Litigation and Customer Support Center Information and Technology Management Office TABLE OF CONTENTS Executive Summary .......................................................... i I. Introduction ........................................................... 1 II. History and Overview .................................................... 2 A. The Federal Trade Commission’s Approach to Online Privacy ................. 2 B. Consumer Privacy Online ............................................. 2 1. Growth of the Online Market ...................................... 2 2. Privacy Concerns ............................................... 3 C. Children’s Privacy Online ............................................. 4 1. Growth in the Number of Children Online ............................ 4 2. Safety and Privacy Concerns ...................................... 4 III. Fair
    [Show full text]
  • Principles of Internet Privacy
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2000 Principles of Internet Privacy Fred H. Cate Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Computer Law Commons, and the Law and Society Commons Recommended Citation Cate, Fred H., "Principles of Internet Privacy" (2000). Articles by Maurer Faculty. 243. https://www.repository.law.indiana.edu/facpub/243 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Principles of Internet Privacy FRED H. CATE* I. INTRODUCTION Paul Schwartz's InternetPrivacy and the State makes an important and original contribution to the privacy debate that is currently raging by be- ginning the process of framing a new and more useful understanding of what "privacy" is and why and how it should be protected.' The definition developed by Brandeis, Warren,2 and Prosser,3 and effectively codified by Alan Westin in 1967---"the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others"---worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
    [Show full text]
  • The Conservative Agenda for Constitutional Reform
    UCL DEPARTMENT OF POLITICAL SCIENCE The Constitution Unit Department of Political Science UniversityThe Constitution College London Unit 29–30 Tavistock Square London WC1H 9QU phone: 020 7679 4977 fax: 020 7679 4978 The Conservative email: [email protected] www.ucl.ac.uk/constitution-unit A genda for Constitutional The Constitution Unit at UCL is the UK’s foremost independent research body on constitutional change. It is part of the UCL School of Public Policy. THE CONSERVATIVE Robert Hazell founded the Constitution Unit in 1995 to do detailed research and planning on constitutional reform in the UK. The Unit has done work on every aspect AGENDA of the UK’s constitutional reform programme: devolution in Scotland, Wales, Northern Ireland and the English regions, reform of the House of Lords, electoral reform, R parliamentary reform, the new Supreme Court, the conduct of referendums, freedom eform Prof FOR CONSTITUTIONAL of information, the Human Rights Act. The Unit is the only body in the UK to cover the whole of the constitutional reform agenda. REFORM The Unit conducts academic research on current or future policy issues, often in collaboration with other universities and partners from overseas. We organise regular R programmes of seminars and conferences. We do consultancy work for government obert and other public bodies. We act as special advisers to government departments and H parliamentary committees. We work closely with government, parliament and the azell judiciary. All our work has a sharply practical focus, is concise and clearly written, timely and relevant to policy makers and practitioners. The Unit has always been multi disciplinary, with academic researchers drawn mainly from politics and law.
    [Show full text]
  • Re-Constructing Children's Identities: Social Work Knowledge And
    Re-Constructing Children’s Identities: Social work knowledge and practice in the assessment of children’s identities. Jane Thomas This thesis is submitted in candidature for the degree of Doctor of Philosophy Cardiff School of Social Sciences Cardiff University April 2010 UMI Number: U585453 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U585453 Published by ProQuest LLC 2013. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 DECLARATION This work has not previously been accepted in substance for any degree and is not concurrently submitted in candidature for any degree. Signed . f a £ & — ,rrr. ...... (candidate) Date ................................................................................. STATEMENT 1 This thesis is being submitted in partial fulfilment of the requirements for the degree of PhD. Signed 3 — «■——— ~ .....................(candidate) Date ................................. STATEMENT 2 This thesis is the result of my own independent investigations, except where otherwise stated. Other sources are acknowledged by footnotes giving explicit references. .(candidate)Signed .. .(candidate)Signed Date STATEMENT 3 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter-library loan, and for the title and summary to be made available to outside organisations.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • Internet Privacy and the State
    UC Berkeley UC Berkeley Previously Published Works Title Internet Privacy and the State Permalink https://escholarship.org/uc/item/37x3z12g Author Schwartz, Paul M Publication Date 2021-06-27 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Berkeley Law Berkeley Law Scholarship Repository Faculty Scholarship 1-1-1999 Internet Privacy and the State Paul M. Schwartz Berkeley Law Follow this and additional works at: http://scholarship.law.berkeley.edu/facpubs Part of the Law Commons Recommended Citation Paul M. Schwartz, Internet Privacy and the State, 32 Conn. L. Rev. 815 (1999), Available at: http://scholarship.law.berkeley.edu/facpubs/766 This Article is brought to you for free and open access by Berkeley Law Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Berkeley Law Scholarship Repository. For more information, please contact [email protected]. Interet Privacy and the State PAUL M. SCHWARTZ" INTRODUCTION "Of course you are right about Privacy and Public Opinion. All law is a dead letter without public opinion behind it. But law and public opinion in-1 teract-and they are both capable of being made." Millions of people now engage in daily activities on the Internet, and under current technical configurations, this behavior generates finely grained personal data. In the absence of effective limits, legal or other- wise, on the collection and use of personal information on the Internet, a new structure of power over individuals is emerging. This state of affairs has significant implications for democracy in the United States, and, not surprisingly, has stimulated renewed interest in information privacy? Yet, the ensuing debate about Internet privacy has employed a deeply flawed rhetoric.
    [Show full text]
  • Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected]
    Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected] 26 July 2019 Re: Access Now Responds to Privacy Shield Review Questionnaire - Third review Dear Mr. Gencarelli, Thank you for your invitation to provide information and observations on the European Commission’s third annual review of the EU-U.S. Privacy Shield arrangement, the mechanism to facilitate the transfer and processing of the personal data of individuals from the European Union to and within the United States. Access Now is an international organisation that defends and extends the digital rights of users at risk around the world.1 By combining innovative policy, user engagement, and direct technical support, we fight for open and secure communications for all. Access Now maintains a presence in 13 locations around the world, including in the policy centers of Washington, DC and Brussels.2 Access Now regularly analyzes data transfer arrangements under EU law, including the Safe Harbor arrangement that was invalidated by the Court of Justice of the European Union in 2015, and the Privacy Shield which replaced it.3 Users benefit from a free, open, and secure internet that is enabled by legal certainty for stakeholders to operate. Robust data transfer frameworks which ensure a high level of data protection in the free flow of data are key to deliver these benefits for all actors. The Privacy Shield continues to be inadequate to protect fundamental rights. Since negotiations began in 2016, Access Now has provided detailed analysis and recommendations to the EU Commission on how to improve the Privacy Shield.
    [Show full text]
  • Data Protection Directive 95/46/EC to the Internet, 25 J. Marshall J
    The John Marshall Journal of Information Technology & Privacy Law Volume 25 Issue 2 Journal of Computer & Information Law Article 2 - Spring 2008 Spring 2008 All or Nothing: This is the Question? The Application of Article 3(2) Data Protection Directive 95/46/EC to the Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008) Rebecca Wong Joseph Savirimuthu Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Rebecca Wong & Joseph Savirimuthu, All or Nothing: This is the Question? The Application of Article 3(2) Data Protection Directive 95/46/EC to the Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008) https://repository.law.uic.edu/jitpl/vol25/iss2/2 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. ALL OR NOTHING: THIS IS THE QUESTION? THE APPLICATION OF ARTICLE 3(2) DATA PROTECTION DIRECTIVE 95/46/ EC TO THE INTERNET REBECCA WONGt AND JOSEPH SAVIRIMUTHUtt I. INTRODUCTION The exponential growth of social networking Web sites, online per- sonal journals and the use of multimedia by individuals, raises impor- tant questions about the compatibility of Article 3(2) of the Data Protection Derivative 95/46/EC ("DPD") as applied to the internet.
    [Show full text]
  • Trends in Privacy and Data Security
    TRENDS IN PRIVACY AND DATA SECURITY JEFFREY D. NEUBURGER PARTNER PROSKAUER ROSE LLP Jeff is co-head of the firm’s Technology, Media & Telecommunications Group, head of the firm’s Blockchain Group, and a member of the firm’s Privacy & Cybersecurity Group. His practice focuses on technology, media, and intellectual property-related transactions, counseling, and dispute resolution. 24 April/May 2019 | Practical Law © 2019 Thomson Reuters. All rights reserved. As large-scale data breaches and other cyber incidents continue to pose significant threats worldwide, privacy and cybersecurity remain top priorities for regulators and companies alike. To minimize risks and reduce potential liability, companies and their counsel should stay updated on privacy and data security-related enforcement activity, notable litigation, new regulations, and key emerging issues. the-lightwriter /iStock photo © 2019 Thomson Reuters. All rights reserved. The Journal | Litigation | April/May 2019 25 ompanies must keep up with the dynamic legal Children’s privacy practices. The FTC approved obligations governing privacy and data security, modifications to the Entertainment Software Rating Board’s understand how these obligations apply in practice, (ESRB’s) COPPA safe harbor program. The ESRB is a self- improve their cyber intelligence, and manage their regulatory organization for the video game industry. Ccompliance to minimize risks. This article reviews important Mobile device security. The FTC issued a report titled FTC privacy and data security developments over the past year and Recommends Steps to Improve Mobile Device Security highlights key issues for 2019. Specifically, it addresses recent: Update Practices (available at ftc.gov), which makes several Federal regulation and enforcement actions.
    [Show full text]
  • A Surveillance Society?
    House of Commons Home Affairs Committee A Surveillance Society? Fifth Report of Session 2007–08 Volume I Report, together with formal minutes Ordered by The House of Commons to be printed 20 May 2008 HC 58-I [Incorporating HC 508-i–iv, Session 2006–07] Published on 8 June 2008 by authority of the House of Commons London: The Stationery Office Limited £0.00 The Home Affairs Committee The Home Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Home Office and its associated public bodies. Current membership Rt Hon Keith Vaz MP (Labour, Leicester East) (Chairman) Tom Brake MP (Liberal Democrat, Charshalton and Wallington) Ms Karen Buck MP (Labour, Regent’s Park and Kensington North) Mr James Clappison MP (Conservative, Hertsmere) Mrs Ann Cryer MP (Labour, Keighley) David TC Davies MP (Conservative, Monmouth) Mrs Janet Dean MP (Labour, Burton) Patrick Mercer MP (Conservative, Newark) Margaret Moran MP (Labour, Luton South) Gwyn Prosser MP (Labour, Dover) Bob Russell MP (Liberal Democrat, Colchester) Martin Salter MP (Labour, Reading West) Mr Gary Streeter MP (Conservative, South West Devon) Mr David Winnick MP (Labour, Walsall North) The following Members were also members of the Committee during the inquiry: Rt Hon John Denham MP (Labour, Southampton Itchen) Mr Jeremy Browne MP (Liberal Democrat, Taunton) Mr Richard Benyon MP (Conservative, Newbury) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the Internet via www.parliament.uk.
    [Show full text]