Surveillance and data retention in Poland


Autoria(s): Rosicki, Remigiusz
Data(s)

23/05/2016

23/05/2016

2014

Resumo

The object of analysis in the present text is the issue of operational control and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of “itemized phone bills and the so-called phone tapping.” Besides the quantitative analysis of operational control and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tribunal in 2011. It must be noted that the main problems concerned with the employment of operational control and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evidence which can be clandestinely acquired in an operational mode. Furthermore, with regard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to a wide array of data submitted to particular services. Also, the text draws on the so-called open interviews conducted mainly with former police officers with a view to pointing to some non-formal reasons for “phone tapping” in Poland. This comes in the form of a summary.

Identificador

Public Policy and Economic Development, 2014, Issue 2, pp.63-75.

http://hdl.handle.net/10593/14654

Idioma(s)

eng

Publicador

Petro Mohyla Black Sea State University

Direitos

info:eu-repo/semantics/openAccess

Palavras-Chave #operational control #kontrola operacyjna #surveillance #inwigilacja #data retention #retencja danych #teleinformation data #dane teleinformatyczne #police #policja #secret services #służby specjalne #phone tapping #podsłuchy #civil liberties #wolności obywatelskie #information security #bezpieczeństwo informacji
Tipo

Artykuł