Home Office under fire for Phorm 'botch job'
The Government has been criticised for its handling of a consultation it has launched into UK communications interception laws.


The Home Office has come under fire for its attempts to close a loophole in UK law exposed by the Phorm furore of 2009.
Last year, privacy groups criticised BT's trialling of Phorm's behavioural advertising software and the European Commission called for the UK to change its laws.
The Government now faces legal action from Brussels over the case and has issued a consultation over proposed changes to the Regulation of Investigatory Powers Act (RIPA), which covers communications interception.
Under the proposals, even unintentional interception of communications could be punished.
Despite the Home Office's moves, the Open Rights Group (ORG) has slammed the way in which the Government has handled the issue, noting how there is little time to give responses to the consultation.
The deadline for responses is 7 December.
"Yes, it's good the Home Office is doing something but it's clear they've acted at the last minute possible and only because they've been coerced," Jim Killock, executive director of ORG, told IT PRO.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Killock said the consultation page had not been advertised and was not linked to from the Home Office consultation page.
"They haven't publicised it probably because they want to rush a decision to meet the EU's deadlines. That's really not acceptable. Consultations are absolutely necessary."
"This is the latest incident a series of Home Office botches regarding Phorm."
A Home Office spokesperson told IT PRO: "The consultation is not public, but is targeted at certain groups and interested parties."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
The IT industry’s shift to circular, low-carbon solutions
Maximize your hardware investment and reach your sustainability goals with HP’s Renew Solutions
-
Lenovo ThinkPad X9 14 Aura Edition review
Reviews This thin and light ultraportable will draw you in with its vibrant screen – but it isn't as powerful as some of its competitors
-
The UK cybersecurity sector is worth over £13 billion, but experts say there’s huge untapped potential if it can overcome these hurdles
Analysis A new report released by the DSIT revealed the UK’s cybersecurity sector generated £13.2 billion over the last year
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
-
Where will AI take security, and are we ready?
whitepaper Steer through the risks and capitalise on the benefits of AI in cyber security
-
Does your security strategy show continuous improvement?
Sponsored Content It’s important to do a regular check-up on your security systems and look at how you can implement continuous improvement as part of your security strategy
-
Protecting your cloud from malicious actors
SPONSORED In today’s multi-cloud world, there are more attack surfaces than ever for hackers to target - here’s what you can do to protect your business
-
The threats targeting operational technology and how to beat them
SPONSORED Attackers looking to exploit overlooked flaws in OT or infect networks laterally can only be stopped with comprehensive observability strategies