The Front Page in the Digital Age: Institute of Advanced Legal Studies publishes report on protecting journalists’ sources

3 March 2017 by

newspapers-444447_1920A study raising concerns about journalists’ ability to protect sources and whistleblowers was launched in the House of Lords last Wednesday.

The Institute of Advanced Legal Studies (IALS), in collaboration with the Guardian, has published the results of a research initiative into protecting journalists’ sources and whistleblowers in the current technological and legal environment. Investigative journalists, media lawyers, NGO representatives and researchers were invited to discuss issues faced in safeguarding anonymous sources. The report: ‘Protecting Sources and Whistleblowers in a Digital Age’ is available online here.

The participants discussed technological advances which facilitate the interception and monitoring of communications, along with legislative and policy changes which, IALS believes, have substantially weakened protections for sources.

The sanctity of the source

The National Union of Journalists (NUJ) Code of Conduct requires that:

A Journalist protects the identity of sources who supply information in confidence and material gathered in the course of her/his work.’

Protection of sources is also enshrined in the Contempt of Court Act 1981, and in the Public Interest Disclosure Act 1998, which applies to whistleblowing. As the report recognises, those protections have been largely subsumed into Article 10 of the European Convention on Human Rights, which protects free speech.

Powers and protection under the law

IALS believes, however, that legal protection afforded to sources has been ‘honoured more in the breach’, pointing in particular to the court’s powers to make Norwich Pharmacal disclosure orders. These orders could require a journalist who is ‘mixed up’ in another’s wrongdoing to disclose information about their source (including their identity), for example when an employee has breached confidence by leaking sensitive company information to a newspaper.

The report highlights the state’s varied powers to obtain information, including under the Terrorism Act 2000 and the Police and Criminal Evidence Act (PACE) 1984. These acts attempt to balance source protection with the public interest in requiring disclosure in order to fight crime and administer justice. While the report describes confidential source protections under PACE as ‘reasonably strong’, the study is concerned that the Terrorism Act provides weaker protection.

However, the study’s true concern is that even those protections are eroded by contemporary technological and legal developments.

Technological advances and covert powers

The contributors believe that the legal safeguards in place are simply insufficient in the present circumstances, fearing that:

“ …legal protection against disclosure and delivery up orders are irrelevant if surveillance, retention of and access to communications data, or interception of communications allows investigating authorities an easy route to information.”

The report points at the Regulation of Investigatory Power Act (RIPA) 2000 which provides for the interception of communications and access to communications data, in some cases directly from internet service providers (ISPs). There is no specific mention in RIPA of protection for journalistic material, and although codes of practice have introduced safeguards in this respect, the IALS report remains concerned about the extent to which the codes are followed in reality.

IALS notes that a journalist may not know that covert powers have been used to obtain information until and unless they are used in legal proceedings. According to a 3-year review by the Interception of Communications Commissioner’s Office (IOCCO) in 2015, over 240 journalist sources’ communications data had been accessed between 2011 – 2014. Subsequent review of the lawfulness of such acts, the report says, is useless when the damage has already been done. If they are unable to guarantee anonymity, journalists fear that sources will be discouraged from providing information in the public interest.

The IALS panel discussed possible safeguards appropriate in the digital age, including legal privilege style protection for journalists, and a return to more traditional methods of gathering and storing information, such as face-to-face meetings, notebooks and post. Caution should be exercised with electronic methods for information gathering, such as drop-box systems, and the importance (and underuse) of encryption was noted.

What is a journalist and who owns the information?

The report also raised interesting issues around the definition of ‘journalist’ for the purposes of the legal framework. Do a blogger and her sources benefit from the same protection as a print journalist? When David Miranda, the partner of a Guardian journalist, was detained under the Terrorism Act while carrying sensitive material, was he acting as a ‘journalist’, a source, a whistleblower, or something else?

As to the ownership of information, while journalists own their notebooks and so can control their use, emails and electronic files are less straightforward. They may belong to the media organisation employing the journalist, and a disclosure order could be made against the company rather than the individual. The ownership of metadata is another unclear area. Metadata may ‘belong’ to the ISP, and the panel was concerned by its potential to allow sources, and even content, to be identified.

Update

An update to the report published on 16 February brings the news of an amendment to the Digital Economy Bill currently going through Parliament, adding a defence to the disclosure of personal information where its publication for the purposes of journalism is in the public interest (currently at clause 37(2)(i)), a welcome development for IALS.

Finally, the update places the report in the current international context:

“Events – such as the disclosures leading to the resignation of US national security adviser Michael Flynn – highlight the value and importance to democratic debate of whistleblowing in the public interest” (see more here)

No report can keep pace with international developments in this area. Only last Friday (24 February) President Trump decried ‘dishonest’ journalists:

“They shouldn’t use sources.  They should put the name of the person.  You will see stories dry up like you’ve never seen before.”

While the future for anonymous sources is uncertain, the turbulent political, legal and technological climate guarantees the issue plenty of headlines to come.

Read the full report here: http://infolawcentre.blogs.sas.ac.uk/files/2017/02/Sources-Report_webversion_22_2_17.pdf

Read the update here: http://infolawcentre.blogs.sas.ac.uk/files/2017/02/Update-Protecting-Sources-and-Whistleblowers-in-a-Digital-Age_22_02_17.pdf

1 comment;


  1. Geoffrey says:

    Should protection extend to a soi-disant journalist who is complicit in criminal activity? Where is the courage in protecting one’s sources if there is no risk of sanction involved?

Comments are closed.

Welcome to the UKHRB


This blog is run by 1 Crown Office Row barristers' chambers. Subscribe for free updates here. The blog's editorial team is:
Commissioning Editor: Jonathan Metzer
Editorial Team: Rosalind English
Angus McCullough QC David Hart QC
Martin Downs
Jim Duffy

Free email updates


Enter your email address to subscribe to this blog for free and receive weekly notifications of new posts by email.

Subscribe

Categories


Tags


7/7 Bombings 9/11 A1P1 Aarhus Abortion Abu Qatada Abuse Access to justice adoption AI air pollution air travel ALBA Allergy Al Qaeda Amnesty International animal rights Animals anonymity Article 1 Protocol 1 Article 2 article 3 Article 4 article 5 Article 6 Article 8 Article 9 article 10 Article 11 article 13 Article 14 article 263 TFEU Artificial Intelligence Asbestos Assange assisted suicide asylum asylum seekers Australia autism badgers benefits Bill of Rights biotechnology blogging Bloody Sunday brexit Bribery British Waterways Board Catholic Church Catholicism Chagos Islanders Charter of Fundamental Rights child protection Children children's rights China christianity citizenship civil liberties campaigners civil partnerships climate change clinical negligence closed material procedure Coercion Commission on a Bill of Rights common law communications competition confidentiality consent conservation constitution contact order contempt of court Control orders Copyright coronavirus costs costs budgets Court of Protection crime criminal law Cybersecurity Damages data protection death penalty defamation DEFRA deportation deprivation of liberty derogations Detention Dignitas diplomacy disability disclosure Discrimination disease divorce DNA domestic violence duty of care ECHR ECtHR Education election Employment Environment Equality Act Equality Act 2010 Ethiopia EU EU Charter of Fundamental Rights EU costs EU law European Convention on Human Rights European Court of Human Rights European Court of Justice evidence extradition extraordinary rendition Facebook Family Fatal Accidents Fertility FGM Finance foreign criminals foreign office foreign policy France freedom of assembly Freedom of Expression freedom of information freedom of speech Gay marriage gay rights Gaza Gender genetics Germany Google Grenfell Gun Control Health HIV Housing HRLA human rights Human Rights Act human rights news Human Rights Watch Huntington's Disease immigration India Indonesia injunction Inquests insurance international law internet inuit Iran Iraq Ireland islam Israel Italy IVF ivory ban Japan joint enterprise judaism judicial review Judicial Review reform Julian Assange jury trial JUSTICE Justice and Security Bill Law Pod UK legal aid legal aid cuts Leveson Inquiry lgbtq liability Libel Liberty Libya lisbon treaty Lithuania local authorities marriage Media and Censorship mental capacity Mental Capacity Act Mental Health military Ministry of Justice modern slavery morocco murder music Muslim nationality national security naturism neuroscience NHS Northern Ireland nuclear challenges Obituary parental rights parliamentary expenses scandal patents Pensions Personal Injury physician assisted death Piracy Plagiarism planning planning system Poland Police Politics Pope press prison Prisoners prisoner votes Prisons privacy Professional Discipline Property proportionality Protection of Freedoms Bill Protest Public/Private public access public authorities public inquiries quarantine R (on the application of EH) v Secretary of State for the Home Department [2012] EWHC 2569 (Admin) Radicalisation rehabilitation Reith Lectures Religion RightsInfo right to die right to family life Right to Privacy right to swim riots Roma Romania Round Up Royals Russia saudi arabia Scotland secrecy secret justice Secret trials sexual offence Sikhism Smoking social media social workers South Africa Spain special advocates Sports Standing starvation statelessness stem cells stop and search Strasbourg super injunctions Supreme Court Supreme Court of Canada surrogacy surveillance Syria Tax technology Terrorism tort Torture travel treason treaty accession trial by jury TTIP Turkey Twitter UK Ukraine universal jurisdiction unlawful detention USA US Supreme Court vicarious liability Wales War Crimes Wars Welfare Western Sahara Whistleblowing Wikileaks wildlife wind farms WomenInLaw Worboys wrongful birth YearInReview Zimbabwe

Disclaimer


This blog is maintained for information purposes only. It is not intended to be a source of legal advice and must not be relied upon as such. Blog posts reflect the views and opinions of their individual authors, not of chambers as a whole.

Our privacy policy can be found on our ‘subscribe’ page or by clicking here.

%d bloggers like this: