United Kingdom

Five Eyes founder navigating post-Brexit data protection divergence

Overview

The United Kingdom is a founding member of the Five Eyes intelligence alliance, a major signals intelligence partnership, established in 1946 through the UKUSA Agreement. GCHQ, MI5, and MI6 operate extensive surveillance capabilities. On the civilian side, the UK inherited the EU’s General Data Protection Regulation before Brexit and continues to operate a robust data protection framework under the UK GDPR, though it has begun diverging from EU standards.

Since leaving the European Union on January 31, 2020, the UK has embarked on a deliberate course of regulatory divergence from EU data protection standards. The EU GDPR was transposed into domestic law as the “UK GDPR” via the European Union (Withdrawal) Act 2018, but subsequent legislation, most significantly the Data (Use and Access) Act 2025, has introduced material differences in areas including legitimate interests, automated decision-making, cookie consent, and international data transfers. The European Commission renewed the UK’s adequacy status in December 2025, but the decision carries a sunset clause and remains contingent on the UK maintaining protections that are “essentially equivalent” to those in the EU.

On the surveillance side, the Investigatory Powers Act 2016, widely known as the Snoopers’ Charter, consolidated and expanded the UK’s bulk interception, bulk acquisition, and equipment interference powers under a single legislative framework. It introduced internet connection records, requiring telecommunications operators to retain records of every website visited by every user for twelve months. The 2024 amendment to this Act went further, imposing a duty on technology companies to notify the government before making technical changes, such as enabling end-to-end encryption, that could affect lawful access.

This page catalogs the UK’s complete privacy and surveillance legal framework as of February 2026, covering data protection, intelligence gathering, data retention, international transfers, and online content regulation.

Key Legislation at a Glance

Intelligence Services Act 1994 – Active. Placed MI6 and GCHQ on a statutory footing; established ISC parliamentary oversight.

Regulation of Investigatory Powers Act 2000 (RIPA) – Partially active. Directed/intrusive surveillance, CHIS, and encryption provisions remain in force; interception powers repealed by IPA 2016.

Data Retention and Investigatory Powers Act 2014 (DRIPA) – Repealed. Struck down by the High Court in 2015; formally repealed by IPA 2016.

Investigatory Powers Act 2016 (“Snoopers’ Charter”) – Active. Bulk surveillance, internet connection records, and data retention framework.

Data Protection Act 2018 – Active. UK GDPR supplement covering law enforcement and intelligence services processing.

UK GDPR (2018/2020) – Active (modified by DUAA 2025). General data protection regulation for civilian data processing.

Online Safety Act 2023 – Active (phased implementation). Online content regulation with deferred encrypted scanning provision.

Investigatory Powers (Amendment) Act 2024 – Active (being implemented). Bulk personal datasets and technology company notification duty.

Data (Use and Access) Act 2025 – Active (phased implementation). Post-Brexit GDPR reforms covering cookies, legitimate interests, and international transfers.

Data Protection Authority: The Information Commissioner’s Office

The Information Commissioner’s Office (ICO) is the UK’s independent supervisory authority for data protection and freedom of information. Established under the Data Protection Act 2018, it is a non-departmental public body sponsored by the Department for Science, Innovation and Technology (DSIT) that reports directly to Parliament.[1]

Commissioner

The current Information Commissioner is John Edwards, who was appointed for a five-year term beginning January 3, 2022. He was named as the new Commissioner on August 26, 2021, replacing Elizabeth Denham, and was approved by the DCMS Select Committee on September 9, 2021.[1]

Powers and Enforcement

The ICO can issue monetary penalty notices (fines) of up to GBP 17.5 million or 4% of annual global turnover, whichever is higher, under the UK GDPR. It can issue enforcement notices requiring organizations to take or cease specific actions, information notices compelling the production of documents, and it can conduct audits and assessments, issue warnings, and issue formal reprimands. Under the Data (Use and Access) Act 2025, the ICO gained additional powers including the authority to compel witnesses to attend interviews, require technical reports, and issue substantial fines under the Privacy and Electronic Communications Regulations (PECR).[2]

The ICO is primarily funded through data protection fees paid by organizations across three tiers (GBP 52 to GBP 3,763), which account for over 85% of annual expenditure. In 2022–23, the ICO collected approximately GBP 66 million through data protection fees and received GBP 10.3 million in government grants-in-aid.[3]

Notable Enforcement Actions

British Airways – GBP 20 million (October 2020): Fined for a data breach affecting over 400,000 customers’ personal and financial details. The penalty was reduced from an initially proposed GBP 183.39 million, the largest fine the ICO had ever proposed at the time, partly due to the economic impact of COVID-19.[4]

Marriott International – GBP 18.4 million (November 2020): Fined for a breach in the Starwood reservation system that exposed guest records over a four-year period. Reduced from an initially proposed GBP 99 million.[4]

Capita plc – GBP 14 million (October 2025): Fined for UK GDPR infringements arising from a March 2023 cyber breach affecting 6.66 million individuals. The fine was reduced from a proposed GBP 45 million through a voluntary settlement.[5]

TikTok – GBP 12.7 million (April 2023): Fined for collecting personal data of children under the age of 13 without proper parental consent, in breach of the UK GDPR.[4]

Clearview AI – GBP 7.5 million (2022): Fined for the illegal use of facial recognition technology to scrape images from the internet. The ICO also ordered Clearview AI to delete all data belonging to UK residents.[4]

23andMe – GBP 2.31 million (2025): Fined for failures in responding to a 2023 data breach that exposed the personal data of over 150,000 UK residents.[5]

Enforcement Trends

In the first half of 2025, the ICO issued six fines totalling approximately GBP 5.6 million, already double the GBP 2.7 million collected across 18 fines throughout all of 2024. Two-thirds of H1 2025 fines were for UK GDPR breaches, compared to just one-sixth in 2024, indicating a shift toward prioritizing data protection failures over PECR violations.[6]

UK GDPR and Data Protection Act 2018

When the UK left the EU on January 31, 2020 (with the transition period ending December 31, 2020), the EU GDPR was incorporated into UK domestic law as the UK GDPR via the European Union (Withdrawal) Act 2018. References to EU institutions were replaced with UK equivalents, and the UK began making its own adequacy decisions independently of the European Commission.[7]

Data Protection Act 2018

Royal Assent: May 23, 2018  |  Replaces: Data Protection Act 1998

The DPA 2018 works alongside the UK GDPR as the UK’s complete domestic data protection framework, supplementing the UK GDPR by addressing areas outside its scope. The Act is organized into seven parts:[8]

Part 1: Preliminary provisions.

Part 2: General processing – supplements the UK GDPR, including exemptions and conditions for processing special category data and criminal conviction data.

Part 3: Law enforcement processing – governs the processing of personal data by “competent authorities” (police, prosecutors, and similar bodies) for law enforcement purposes. Implements the EU Law Enforcement Directive (LED). This processing falls outside the scope of the UK GDPR.

Part 4: Intelligence services processing – governs processing by MI5, MI6 (SIS), and GCHQ. This processing is entirely outside the scope of the UK GDPR, subject instead to a separate, lighter-touch regime. National security certificates can exempt intelligence services from most data protection principles.[9]

Part 5: The Information Commissioner.

Part 6: Enforcement provisions.

Part 7: Supplementary and final provisions.

Key Differences from EU GDPR

The UK GDPR diverges from its EU counterpart in several important respects. Enforcement is centralized through the ICO alone, in contrast to the EU’s decentralized model with a data protection authority per member state and the one-stop-shop mechanism. Maximum fines are capped at GBP 17.5 million or 4% of global turnover, versus EUR 20 million or 4% under the EU GDPR. Organizations outside the UK that process UK residents’ data must appoint a UK-based representative. And the age of consent for children’s data processing is set at 13 years under UK GDPR, compared to 16 under EU GDPR (though EU member states may lower this to 13).[7]

Data (Use and Access) Act 2025

Royal Assent: June 19, 2025  |  Implementation: Phased between June 2025 and June 2026; most major provisions (Part 5) entered into force February 5, 2026

Originally introduced as the “Data Protection and Digital Information Bill” (DPDI Bill) by the previous Conservative government, this legislation was dropped after the July 2024 general election. The incoming Labour government introduced a replacement bill, the Data (Use and Access) Bill, which received Royal Assent on June 19, 2025. The DUAA has been described as the UK’s most significant post-Brexit divergence from EU data protection standards.[10]

Key Provisions

Recognized Legitimate Interests: Introduces a new lawful basis under Article 6 for “recognised legitimate interests” covering specified purposes including crime prevention, safeguarding, responding to emergencies, national security, and defense. These purposes no longer require a legitimate interests assessment (the balancing test). The Act also clarifies that direct marketing can constitute a legitimate interest.[10]

Automated Decision-Making: Relaxes the UK GDPR’s Article 22 restrictions on solely automated decision-making. Organizations may rely on the full range of legal bases (not just consent and contract), provided adequate safeguards are in place.[11]

Data Subject Access Requests (DSARs): Introduces a “stop the clock” provision allowing controllers to pause the response deadline while seeking clarification from the requester. Controllers need only conduct “reasonable and proportionate” searches rather than exhaustive ones, a meaningful relaxation of the previous standard.[10]

Cookies and e-Privacy: Removes explicit consent requirements for non-intrusive cookies (analytics, functionality, fraud detection, and user authentication). Requires only clear information and a simple opt-out mechanism instead, a significant departure from the EU’s strict opt-in consent model.[10]

International Transfers: Replaces the “essential equivalence” standard for adequacy decisions with a “not materially lower” standard, giving the UK considerably more flexibility in recognizing third countries for data transfers.[11]

Scientific Research: Broadens existing UK GDPR exemptions for scientific research, including provisions for the reuse of personal data for research purposes.[10]

ICO Powers: Strengthens ICO regulatory oversight with new powers to compel witness attendance at interviews and require technical reports from organizations under investigation.[2]

Investigatory Powers Act 2016 (“Snoopers’ Charter”)

Royal Assent: November 29, 2016  |  Replaces/Consolidates: Many provisions of RIPA 2000 and DRIPA 2014

The Investigatory Powers Act 2016 is a comprehensive surveillance law that consolidated and extended the UK’s surveillance capabilities. It consolidated and significantly extended the UK’s surveillance capabilities under a single legislative framework, earning the nickname the “Snoopers’ Charter” from civil liberties groups.[12]

Bulk Interception (Part 6, Chapter 1)

Authorizes intelligence agencies to intercept large volumes of communications content and metadata in bulk. Warrants must be signed by the Secretary of State and approved by a Judicial Commissioner under the “double lock” mechanism, a safeguard introduced to address the absence of prior judicial authorization under the previous regime.[12]

Bulk Acquisition of Communications Data (Part 6, Chapter 2)

Allows intelligence agencies to acquire communications data (metadata) in bulk from telecommunications operators. This covers the “who, when, where, and how” of communications, though not their content.[12]

Bulk Equipment Interference (Part 6, Chapter 3)

Authorizes intelligence agencies to hack into computers, smartphones, and other devices in bulk to obtain communications, equipment data, or other information. Three types of equipment interference warrant may be issued.[12]

Internet Connection Records (Part 4)

Requires telecommunications operators to retain records of websites visited (top-level domain, not specific pages), apps accessed, and communications services used for up to 12 months. This was the first time internet connection records (ICRs) were made available to public authorities in the UK. ICRs include which websites were visited but not what was searched for or which specific articles were read.[13]

Data Retention Notices (Part 4)

The Secretary of State can require telecommunications operators to retain communications data for up to 12 months. Notices must receive Double Lock authorization, reviewed by the Technical Advisory Board for feasibility and cost, and can be renewed within 30 days of expiry.[13]

Oversight Framework

The IPA 2016 established a multi-layered oversight structure. The Double Lock mechanism ensures that the most intrusive powers receive the required dual authorization. The Investigatory Powers Commissioner (IPC) provides independent oversight headed by a senior judge, replacing the former Interception Commissioner, Intelligence Services Commissioner, and Chief Surveillance Commissioner. The Investigatory Powers Tribunal (IPT) hears complaints about misuse of surveillance powers. And the Intelligence and Security Committee of Parliament (ISC) provides parliamentary oversight.[12]

Investigatory Powers (Amendment) Act 2024

Royal Assent: April 25, 2024

The 2024 amendment to the IPA introduced two provisions that have drawn significant concern from privacy advocates and the technology industry.[14]

Bulk Personal Datasets

Creates a separate regime for publicly or commercially available bulk personal datasets (BPDs). It introduces the concept of “third party bulk personal datasets”, datasets held by third parties such as government departments and commercial entities, that intelligence services can examine in situ under Part 7B without requiring the agency to retain the data itself.[14]

Technology Company Notification Requirement

Imposes a duty on operators of telecommunications services to notify the government in advance of any planned technical changes to their systems that could affect lawful access by authorities. Operators must maintain the status quo while any objections are being investigated. This provision is specifically aimed at preventing moves such as the introduction of end-to-end encryption from undermining surveillance capabilities.[15]

Draft regulations (Investigatory Powers (Codes of Practice, Review of Notices and Technical Advisory Board) Regulations 2025) were laid before Parliament in 2025, bringing into force eight new and revised codes of practice governing the exercise of these powers.[14]

Technical Capability Notices and Encryption

Section 253 of the Investigatory Powers Act 2016 grants the Secretary of State power to serve Technical Capability Notices (TCNs) on telecommunications operators. A TCN is a legal instrument requiring a provider to implement the technical capability necessary to comply with future interception warrants, equipment interference warrants, or communications data requests.[33]

The power is extraterritorial in scope: the UK government can impose TCN requirements on providers located outside the United Kingdom, and those requirements apply to the provider’s services globally, not just for UK users. TCNs are subject to the Double Lock mechanism, and providers may appeal to the Secretary of State on grounds of technical feasibility or cost.[33]

The Apple Advanced Data Protection Case (2025)

In January 2025, the UK Home Office served a Technical Capability Notice on Apple Inc. demanding that the company create a backdoor into its Advanced Data Protection feature, an optional setting that applies end-to-end encryption to iCloud backups, photos, notes, and other cloud-stored data. The UK government argued that enabling Advanced Data Protection in the UK would undermine lawful access to iCloud data under existing interception and production order frameworks.[34]

Apple faced two options under the TCN:

  • Build a backdoor – Engineer a mechanism to decrypt Advanced Data Protection content on demand, undermining the security model of end-to-end encryption
  • Block the feature in the UK – Prevent UK-based Apple users from enabling Advanced Data Protection

Apple chose the latter. As of February 2026, Advanced Data Protection remains unavailable to users in the United Kingdom, making the UK the only major jurisdiction where Apple has been compelled to restrict access to end-to-end encrypted cloud storage.[34]

Apple appealed the TCN to the Investigatory Powers Tribunal (IPT) in mid-2025, arguing that the notice was disproportionate, incompatible with the right to privacy under Article 8 ECHR, and technically unworkable without creating a global vulnerability. The IPT proceedings remain ongoing as of February 2026.[35]

Broader Implications for Encryption

The Apple case represents the first known instance of a democratic government using legal powers to prevent a technology company from offering end-to-end encryption to its customers. Civil liberties organizations, cryptography experts, and technology industry groups have warned that the precedent could:

  • Encourage other governments to issue similar demands under their own interception frameworks
  • Undermine the global availability of strong encryption, as companies may choose to limit features worldwide rather than create region-specific backdoors
  • Create security vulnerabilities if companies comply by building backdoor mechanisms, as such mechanisms are inherently exploitable by malicious actors as well as lawful authorities

The UK’s use of TCNs against end-to-end encryption sits alongside similar efforts in the EU (the proposed Chat Control regulation’s client-side scanning provisions) and ongoing “going dark” debates in the United States, Australia, and other Five Eyes member nations. Privacy advocates argue that legal mandates for encryption backdoors represent a coordinated effort to weaken cryptographic protections, while governments contend these measures are necessary for public safety.[36]

Regulation of Investigatory Powers Act 2000 (RIPA)

Royal Assent: July 28, 2000  |  Introduced by: Tony Blair Labour government

RIPA’s provisions relating to interception and acquisition of communications data have been repealed and replaced by the IPA 2016. However, several important regimes remain governed by RIPA:[16]

Directed Surveillance: Covert observation conducted in public or quasi-public places. Since the Protection of Freedoms Act 2012, local authorities require magistrate approval to exercise these powers.

Intrusive Surveillance: Covert surveillance in residential premises or private vehicles – subject to higher authorization thresholds.

Covert Human Intelligence Sources (CHIS): The legal framework governing informants and undercover agents deployed by law enforcement and intelligence services.

Encryption (Part III): Grants authorities the power to compel individuals and organizations to decrypt data or provide encryption keys. Failure to comply is a criminal offense carrying a maximum sentence of two years’ imprisonment (five years in cases involving national security or child indecency).[16]

RIPA’s framework was designed to comply with Article 8 of the European Convention on Human Rights (the right to respect for private and family life). All surveillance conducted under RIPA must meet tests of necessity and proportionality.[17]

Historical Note: Telecommunications Act 1984, Section 94

Section 94 of the Telecommunications Act 1984, now repealed by the IPA 2016, provided extremely broad powers for government regulation of telecommunications in the interests of national security. Any Secretary of State could issue secret directions to Ofcom or telecommunications providers instructing them “to do, or not to do” any particular thing specified, with no automatic expiry. On November 4, 2015, the Home Secretary revealed that following the September 11, 2001 attacks, MI5 had been secretly collecting bulk telephone communications data under Section 94 directions since 2001, a fact kept from Parliament using the national security exemption. When Prime Minister David Cameron asked the Interception of Communications Commissioner to oversee Section 94 directions in 2015, the Commissioner found “there does not appear to be a comprehensive central record of the directions that have been issued.”[32]

Intelligence Agencies

The UK operates three principal intelligence agencies, each established by statute and subject to distinct oversight regimes. Together with their American, Australian, Canadian, and New Zealand counterparts, they form the core of the Five Eyes alliance.

MI5 (Security Service)

Statutory Basis: Security Service Act 1989

MI5 is responsible for domestic counter-intelligence and counter-terrorism. It protects national security against threats including terrorism, espionage, cyber threats, and the proliferation of weapons of mass destruction. MI5 operates primarily within the UK and is subject to DPA 2018 Part 4 (intelligence services processing), IPC oversight, and ISC parliamentary oversight.[18]

MI6 (Secret Intelligence Service / SIS)

Statutory Basis: Intelligence Services Act 1994, Section 1

MI6 is the UK’s foreign intelligence service. Its statutory role is “to obtain and provide information relating to the actions or intentions of persons outside the British Islands; and to perform other tasks relating to the actions or intentions of such persons.” Its functions are exercisable in the interests of national security, economic well-being, or the prevention and detection of serious crime. Under Section 7 of the ISA 1994, the Foreign Secretary can grant immunity from British prosecution to SIS personnel for acts committed on operations abroad that would otherwise be illegal under British law.[19]

GCHQ (Government Communications Headquarters)

Statutory Basis: Intelligence Services Act 1994, Section 3

GCHQ is the UK’s signals intelligence (SIGINT) and information assurance agency. Its first statutory function is “to monitor or interfere with electromagnetic, acoustic and other emissions and any equipment producing such emissions and to obtain and provide information derived from or related to such emissions or equipment and from encrypted material.” Its second function is to provide advice and assistance on information security.[20]

Intelligence Services Act 1994

The ISA 1994 placed MI6 and GCHQ on a statutory footing for the first time, bringing them under the responsibility of the Foreign Secretary. It also established the Intelligence and Security Committee of Parliament (nine MPs) reporting to the Prime Minister, providing the first formal parliamentary oversight mechanism for the intelligence services.[19]

Five Eyes Alliance

Under the Five Eyes alliance, each member state conducts interception, collection, acquisition, analysis, and decryption activities, sharing all intelligence information obtained with the others by default.[21]

Known Surveillance Programs: Tempora

First tested in 2008 and operational since 2011, Tempora was a GCHQ program that gathered phone and internet traffic by tapping into undersea fibre-optic cables. Revealed by Edward Snowden in 2013, it was described by Snowden as the world’s first “full take” surveillance dragnet, collecting all online activity of the UK population. Data was shared with the US National Security Agency.[22]

The Investigatory Powers Tribunal found Tempora “in principle, legal” under RIPA 2000. However, in what was the first adverse ruling in the IPT’s 15-year history, the tribunal found that GCHQ’s access to and use of NSA-collected data (via the PRISM program) had breached human rights laws, violating the right to privacy and free expression.[23]

Commercial Surveillance Procurement

Despite operating an extensive intelligence infrastructure through GCHQ, MI5, and MI6, the UK government has increasingly turned to commercial surveillance vendors to supplement its capabilities. These contracts raise questions about oversight, accountability, and whether commercially procured surveillance is subject to the same safeguards that apply to intelligence services operating under the Investigatory Powers Act.

Palantir Technologies

The UK has become one of Palantir Technologies’ largest government clients outside the United States. In 2024, the Ministry of Defence awarded Palantir a £240 million contract for Defence Data and AI, integrating intelligence, surveillance, and reconnaissance capabilities across military operations. This followed a £330 million NHS contract (2020–2024) for the Federated Data Platform, centralizing health data from hospitals across England.[37]

Unlike intelligence collection under the IPA 2016, which requires Double Lock authorization, Palantir contracts are procured through standard government procurement processes with no equivalent judicial oversight. The platforms provide analytics and pattern-matching capabilities across datasets that, if accessed directly by intelligence services, would require statutory authorization.

Cognyte (Formerly Verint)

Multiple UK police forces have procured analytics systems from Cognyte, an Israeli-founded surveillance technology firm spun off from Verint Systems in 2021. These systems provide capabilities including communications monitoring, location tracking, and behavioral pattern analysis.[38]

The Oversight Gap

The UK’s surveillance legal framework makes a clear distinction between intelligence services (operating under DPA 2018 Part 4 and IPA 2016) and civilian data controllers (operating under UK GDPR). Commercial surveillance platforms occupy an ambiguous middle ground: they are procured by government agencies, process sensitive data for intelligence and law enforcement purposes, yet operate under civilian data protection standards rather than the heightened safeguards that apply to MI5, MI6, and GCHQ.

When the ICO fined Clearview AI £7.5 million in 2022 for scraping facial recognition data from the internet, it demonstrated the agency’s willingness to challenge commercial surveillance companies operating in the UK. Yet when government departments contract with similar vendors (Palantir, Cognyte, and others) for surveillance capabilities, those contracts are treated as ordinary procurement decisions rather than extensions of state surveillance power subject to IPC or IPT oversight.

This creates a regulatory asymmetry: intelligence services collecting data directly face the Double Lock mechanism, necessity and proportionality assessments, and Investigatory Powers Commissioner review, while government departments purchasing analytics platforms from commercial vendors face only standard procurement rules and civilian data protection obligations. The result is a pathway that may circumvent the safeguards Parliament imposed on surveillance through the Investigatory Powers Act.

Internet Backbone and Cable Surveillance

Beyond commercial surveillance contracts and the regulated framework of the Investigatory Powers Act, GCHQ operates a large-scale cable access program, intercepting internet traffic directly from the fiber-optic cables that carry the majority of global communications. These programs, conducted under bulk interception warrants, operate at a scale that dwarfs targeted surveillance.

Operation Tempora: Full-Take Cable Interception

The Tempora program intercepted and buffered internet traffic from over 200 fiber-optic cables landing in the United Kingdom. GCHQ documents describe the operation as achieving “full-take” collection, copying entire data flows for subsequent analysis rather than targeting specific communications.[22]

As of 2013, Tempora was processing over 21 million gigabytes of data per day, with the capability to buffer intercepted traffic for up to 30 days (metadata) and 3 days (content). The scale of the program is possible because GCHQ has access to cables at the point where they land in the UK, giving the agency a geographic advantage as a hub for transatlantic and European traffic.

GCHQ shares Tempora data with the NSA under the Five Eyes alliance. The NSA reportedly had 250 analysts assigned to sift through Tempora data as of 2012, with the UK providing what was described in disclosed documents as one of the NSA’s most valuable foreign intelligence sources.

Strategic Cable Access Points

TAT-14 (Trans-Atlantic Telephone Cable 14): A major transatlantic cable system connecting the United States and Europe, with landing points in the UK. GCHQ documents indicate access to TAT-14 traffic passing through the UK, affecting communications between the US, UK, France, Germany, Denmark, and the Netherlands.[39]

SEA-ME-WE 4 (South East Asia-Middle East-Western Europe 4): One of the world’s longest submarine cable systems, stretching from France to Singapore and connecting 17 countries across Europe, the Middle East, and Asia. GCHQ reportedly has access points where the cable lands in the UK and through partnerships in the Middle East, allowing interception of traffic between Europe, India, Pakistan, and Southeast Asia.[40]

Operation Socialist: Hacking Belgacom to Access Cables

In 2013, it was revealed that GCHQ had conducted Operation Socialist, a sophisticated cyberattack against Belgacom (Belgium’s primary telecommunications provider) to gain access to its network infrastructure. The operation used a watering hole attack and the NSA’s QUANTUM injection system to compromise Belgacom engineers, then installed GCHQ implants on routers and switches.[41]

The target was not Belgacom itself, but rather its position as a hub for European and international traffic. By compromising Belgacom’s infrastructure, GCHQ gained access to communications passing through Belgium, including traffic from EU institutions and other European governments routing through Brussels. Belgian prosecutors opened a criminal investigation, and the incident strained UK-Belgian relations, but no charges were filed against GCHQ personnel.

Oman Bases: Monitoring the Strait of Hormuz

GCHQ operates surveillance facilities in Oman, positioned to intercept traffic from nine major submarine cables passing through the Strait of Hormuz and the Arabian Sea. These cables carry communications between Europe, the Middle East, and Asia, giving GCHQ access to traffic from India, Pakistan, Iran, Iraq, Saudi Arabia, and other regional countries.[42]

The Oman facilities are part of a broader UK intelligence presence in the region, with the UK providing funding for infrastructure improvements and intercept equipment. Documents describe the Oman partnership as providing “unique access” to cable systems that would otherwise be difficult to intercept.

Legal Framework: Bulk Interception Warrants and Overseas Operations

GCHQ’s cable interception operates under bulk interception warrants issued under Part 6, Chapter 1 of the Investigatory Powers Act 2016. These warrants authorize the interception of communications in bulk, subject to the Double Lock mechanism and necessity/proportionality assessments.

However, the IPA’s protections apply primarily to warrants issued in the UK. For overseas operations, such as cable access in Oman or partnerships with foreign intelligence services, oversight is significantly weaker. The Intelligence Services Commissioner (now the Investigatory Powers Commissioner) reviews overseas warrants, but the standards for overseas operations are less stringent, and the public has limited visibility into what is authorized.

This creates a jurisdictional asymmetry: GCHQ can intercept traffic passing through cables in Oman or other foreign locations with fewer safeguards than would apply to the same interception conducted in the UK. For foreign nationals whose communications pass through UK-accessible cables, the protections of the Investigatory Powers Act are largely theoretical; their data is collected in bulk, and filtering occurs after collection, not before.

International Data Sharing Agreements

Beyond cable surveillance and the Investigatory Powers Act framework, the United Kingdom operates extensive international data sharing agreements that allow foreign law enforcement to access UK person data, and UK authorities to obtain data held abroad. These frameworks create pathways for data access that operate alongside, and sometimes bypass, the Double Lock safeguards Parliament imposed on domestic surveillance.

UK-US CLOUD Act Agreement: Direct Access to Tech Companies

On October 3, 2022, the UK-US CLOUD Act Agreement entered into force, making the United Kingdom the first country to finalize an executive agreement under the US Clarifying Lawful Overseas Use of Data Act. The agreement, which has a five-year term (expiring 2026-2027), allows UK law enforcement to directly serve legal process on US technology companies (Google, Microsoft, Meta, Apple, and others) to obtain communications data of UK persons.[43]

Under the traditional MLAT system, UK authorities seeking data held by a US company would submit a request through diplomatic channels to the US Department of Justice, with an average processing time of 10 months. The CLOUD Act agreement eliminates this process, allowing UK police and intelligence agencies to directly compel US tech companies to produce data within days or weeks.

Reciprocal Access: The agreement is reciprocal: US law enforcement can directly serve legal process on UK companies to obtain data, bypassing UK courts and the Investigatory Powers Commissioner. This creates a bilateral bypass: UK authorities can access data held by US companies without US judicial oversight, and US authorities can access data held by UK companies without Double Lock authorization.

Safeguards and Limitations: The agreement includes restrictions on death penalty cases and procedures for handling inadvertently obtained US person data. However, civil liberties organizations (EFF, ACLU, Privacy International) have argued that the CLOUD Act framework strips constitutional protections, bypasses domestic courts, and provides no notification to affected users when warrants are issued.

Mutual Legal Assistance Treaty with the United States

The UK maintains a long-standing bilateral MLAT with the United States, predating the CLOUD Act agreement. Despite the CLOUD Act streamlining access to tech company data, the traditional MLAT remains in force for other forms of evidence, witness testimony, asset freezing, and cases not covered by the CLOUD Act agreement.[44]

The MLAT allows UK law enforcement to request data on US persons, and US law enforcement to request data on UK persons, through diplomatic channels. Processing times average 10 months, with requests handled by the DOJ Office of International Affairs and the UK Home Office as central authorities.

Five Eyes Intelligence Sharing: Founding Member

As a founding member of the Five Eyes alliance, GCHQ shares all signals intelligence (SIGINT), human intelligence (HUMINT), military intelligence (MILINT), and geospatial intelligence (GEOINT) with partner agencies by default.[45]

The Five Eyes framework creates a reciprocal surveillance mechanism: GCHQ can collect data on US, Canadian, Australian, or New Zealand persons and share it with those countries’ intelligence agencies, circumventing restrictions on domestic surveillance in those countries. Conversely, the NSA, CSE, ASD, and GCSB can collect on UK persons and share with GCHQ, bypassing UK domestic legal restrictions.

According to Privacy International, data collected via Five Eyes programs can be shared with law enforcement, bypassing warrant requirements. The Snowden disclosures revealed that GCHQ and the NSA coordinate surveillance targeting to circumvent domestic legal restrictions, with GCHQ providing the NSA access to Tempora cable intercepts and receiving NSA intelligence in return.

Post-Brexit Data Sharing: Loss of EU Frameworks

Following Brexit, the United Kingdom lost direct access to several EU law enforcement data sharing systems:

Schengen Information System (SIS II): The UK no longer participates in the EU’s largest law enforcement database, which processes hundreds of thousands of queries daily on wanted persons, missing individuals, and objects. The loss of SIS II access represents a significant reduction in real-time intelligence sharing with EU member states.

European Investigation Order (EIO): The UK can no longer use the EIO framework for cross-border evidence gathering. The EIO allowed binding requests for witness hearings, telephone interceptions, banking information, and other investigative measures across EU member states, based on mutual recognition.

PrĂ¼m Convention: The UK lost access to automated DNA, fingerprint, and vehicle registration data comparison across EU member states.

I-LEAP Platform: In response to losing SIS II access, the UK government has stated its focus is on developing the International Law Enforcement Alerts Platform (I-LEAP) as an alternative for sharing alerts with international partners. However, the UK government has emphasized pursuing a “multilateral agreement with the EU” rather than bilateral deals with individual EU states.[46]

Bilateral Law Enforcement Cooperation

The UK maintains bilateral law enforcement cooperation agreements and extradition treaties with numerous countries, many of which include data sharing provisions. Notable agreements include:

  • US-UK Extradition Treaty: Includes provisions for sharing evidence and intelligence in extradition cases (e.g., the Julian Assange case, where UK-US cooperation involved data sharing related to the WikiLeaks investigation)
  • Commonwealth Cooperation: Law enforcement data sharing agreements with Commonwealth countries, leveraging historical relationships
  • Interpol I-24/7: Full participation in Interpol’s global information sharing network, processing 100,000+ messages daily across 195 countries

The Privacy Backdoor Effect

Despite the Investigatory Powers Act’s Double Lock mechanism for domestic surveillance, international data sharing agreements create alternative pathways for accessing UK person data:

  • CLOUD Act Bypass: US authorities can directly request data from UK companies without IPC oversight; UK authorities can directly request data from US companies without US judicial review
  • Five Eyes Laundering: NSA can collect on UK persons and share with GCHQ, circumventing IPA domestic restrictions; GCHQ can collect on US persons and share with NSA, circumventing US constitutional protections
  • MLAT Lower Standards: Foreign MLAT requests may involve lower evidentiary standards than the necessity and proportionality assessments required under the IPA

For UK persons, this means data nominally protected by the IPA’s rigorous oversight framework can be accessed through CLOUD Act requests (bypassing the Judicial Commissioner), MLAT channels (with foreign evidentiary standards), or Five Eyes intelligence sharing (default exchange with no individual notification). For foreign nationals whose data is held by UK companies or passes through UK cables, the IPA’s protections are even more limited; GCHQ’s bulk interception warrants authorize collection of foreign communications, and the CLOUD Act allows US authorities to compel UK companies to produce data without UK judicial oversight.

The result is that the Double Lock mechanism and Investigatory Powers Commissioner oversight, while robust for domestic surveillance conducted under UK warrants, do not extend to data obtained through international sharing agreements, creating a gap between domestic protections and international data sharing frameworks where strong domestic protections are undermined by international frameworks.

Data Retention

DRIPA 2014 (Data Retention and Investigatory Powers Act 2014)

Enacted: July 2014 (emergency fast-tracked legislation)  |  Status: Struck down and repealed

DRIPA was rushed through Parliament in just three days in response to a European Court of Justice ruling that invalidated the EU Data Retention Directive. The legislation was intended as a temporary measure to preserve telecommunications data retention capabilities.

On July 17, 2015, the High Court ruled sections 1 and 2 of DRIPA unlawful in Davis & Watson v. Secretary of State for the Home Department, finding them incompatible with Articles 7 (private life) and 8 (personal data) of the EU Charter of Fundamental Rights. The court suspended its order until March 31, 2016, to allow the government time for replacement legislation. DRIPA was formally repealed on December 31, 2016, by the Investigatory Powers Act 2016.[24]

Current Requirements (IPA 2016, Part 4)

The Secretary of State can issue retention notices requiring telecommunications operators to retain communications data (metadata, not content) for up to 12 months. Retention notices must receive Double Lock authorization. The Technical Advisory Board reviews technical feasibility and costs. Notices can be renewed within 30 days of expiry, and retained data may then be accessed via an authorization for the acquisition of communications data. The Home Office is responsible for issuing and serving retention notices.[13]

International Data Transfers

EU Adequacy Status

The UK’s ability to receive personal data freely from the EU and EEA depends on the European Commission’s adequacy determination. The original adequacy decision was adopted in June 2021 with a sunset clause expiring June 27, 2025. The EU temporarily extended the decision to December 27, 2025, to assess the impact of the Data (Use and Access) Act 2025.[25]

On December 19, 2025, the European Commission renewed both UK adequacy decisions, reaffirming that personal data may continue to flow freely between the EEA and UK. The EDPB concluded that the DUAA amendments maintain a regime “essentially equivalent” to the EU’s. Both renewed adequacy decisions last until December 27, 2031, after which they may be renewed for a further four years. The Commission will continue to monitor the UK framework and can revoke adequacy if standards deteriorate.[26]

UK–US Data Access Agreement (CLOUD Act)

The UK-US CLOUD Act agreement was renewed on November 25, 2024, three years early, by then-Attorney General Garland. As of October 2024, the UK had issued 20,142 requests to US providers (over 99.8% under IPA 2016), while the US had made just 63 requests to UK providers. The agreement expires after five years unless renewed.[28]

Online Safety Act 2023

Royal Assent: October 26, 2023

The Online Safety Act requires platforms, including end-to-end encrypted messaging services, to scan for child sexual abuse material (CSAM) and terrorism content. It empowers Ofcom to require providers to use “accredited technology” to identify illegal content on encrypted platforms.[29]

The fundamental problem is that no such technology currently exists that can scan content without undermining encryption. The government has acknowledged this and stated it will not enforce this provision until it becomes “technically feasible.” In February 2024, the European Court of Human Rights ruled that requiring degraded end-to-end encryption “cannot be regarded as necessary in a democratic society.”[30]

Industry stakeholders, including Apple, Signal, and WhatsApp, have warned that compliance may conflict with privacy obligations and compromise encryption security for all users. Signal’s president stated the organization would rather leave the UK market than compromise its encryption. The deferred encryption scanning provision remains on the statute books and could be activated at any time, creating persistent uncertainty for encrypted communications providers operating in the UK.[31]

When considered alongside the IPA 2024’s technology company notification requirement, the Online Safety Act forms part of a broader legislative pattern in which the UK government has sought to maintain, and in some cases expand, its ability to access the content of encrypted communications, even as the technical reality of strong encryption makes this increasingly difficult to achieve without undermining security for all users.

Recent Developments (2024–2026)

February 5, 2026: Most major provisions of the Data (Use and Access) Act 2025 (Part 5) entered into force, including recognized legitimate interests, relaxed DSAR requirements, and the “not materially lower” international transfer standard.[10]

December 19, 2025: The European Commission renewed the UK’s adequacy decisions until December 27, 2031, following an assessment that concluded the DUAA 2025 did not undermine essential equivalence with EU protections.[26]

November 25, 2024: The UK–US CLOUD Act Data Access Agreement was renewed three years early, reflecting the volume of cross-border data requests (over 20,000 from the UK to US providers by October 2024).[28]

October 2025: The ICO fined Capita plc GBP 14 million for UK GDPR infringements following a March 2023 cyber breach, reduced from a proposed GBP 45 million via voluntary settlement.[5]

April 25, 2024: The Investigatory Powers (Amendment) Act 2024 received Royal Assent, introducing the technology company notification requirement and expanded bulk personal dataset regime.[14]

June 19, 2025: The Data (Use and Access) Act 2025 received Royal Assent, marking a major legislative divergence from EU GDPR since Brexit.[10]

Ongoing: The Online Safety Act’s encrypted scanning provision remains deferred pending technically feasible solutions. Ofcom continues to develop codes of practice for platform compliance, while the IPA 2024’s technology company notification requirement creates a parallel obligation for operators to consult the government before implementing end-to-end encryption.[29]

Sources

[1] ICO: About the Information Commissioner – John Edwards appointment and role of the ICO
[2] ICO: Role and Power of the Commissioner – Enforcement powers including DUAA 2025 enhancements
[3] ICO: How We Are Funded – Data protection fee tiers, annual revenue, and grant-in-aid figures
[4] Skillcast: Biggest ICO Fines – British Airways GBP 20M, Marriott GBP 18.4M, TikTok GBP 12.7M, Clearview AI GBP 7.5M
[5] Measured Collective: ICO Enforcement in 2025 – Capita GBP 14M fine, 23andMe GBP 2.31M fine
[6] BDO: Trends in Recent ICO Enforcement Action – H1 2025 fine totals vs. 2024, shift toward UK GDPR enforcement
[7] DPO Consulting: UK GDPR vs EU GDPR – Key differences including enforcement structure, fines, children’s consent age
[8] Wikipedia: Data Protection Act 2018 – Seven-part structure and relationship to UK GDPR
[9] ICO: A Guide to the Data Protection Exemptions – Intelligence services exemptions under DPA 2018 Part 4
[10] ICO: The Data (Use and Access) Act 2025 – Recognised legitimate interests, DSAR changes, cookie reforms, implementation timeline
[11] Goodwin Law: The Data Shift – UK Sets a New Course (July 2025) – Automated decision-making relaxation, “not materially lower” transfer standard
[12] Wikipedia: Investigatory Powers Act 2016 – Bulk interception, bulk acquisition, equipment interference, oversight framework
[13] The Cyber Solicitor: Retention Notices Under the IPA 2016 – Internet connection records, 12-month retention, Judicial Commissioner approval
[14] Legislation.gov.uk: Investigatory Powers (Amendment) Act 2024 – Bulk personal datasets, third party BPDs, codes of practice
[15] DLA Piper: UK Investigatory Powers Amendment Act 2024 – Technology company notification requirement and status quo obligation
[16] Wikipedia: Regulation of Investigatory Powers Act 2000 – Directed/intrusive surveillance, CHIS, encryption powers
[17] GOV.UK: Regulation of Investigatory Powers Act 2000 – ECHR Article 8 compatibility, necessity and proportionality tests
[18] MI5: Law and Governance – Security Service Act 1989, oversight framework
[19] Wikipedia: Intelligence Services Act 1994 – MI6 statutory basis, Section 7 immunity
[20] GCHQ: Legal Framework – ISA 1994 Section 3, SIGINT and information assurance functions
[21] Privacy International: Five Eyes – UKUSA Agreement, intelligence sharing arrangements
[22] Privacy International: GCHQ and UK Mass Surveillance – Tempora program, Snowden disclosures, “full take” collection
[23] Amnesty UK: GCHQ Mass Surveillance Ruling – IPT ruling on PRISM data access, human rights breach
[24] Wikipedia: Data Retention and Investigatory Powers Act 2014 – High Court ruling, EU Charter incompatibility, repeal by IPA 2016
[25] Arnold & Porter: UK Remains Adequate Following DUAA 2025 (July 2025) – Original adequacy decision timeline, temporary extension
[26] Hunton: European Commission Renews UK Data Adequacy Decisions – December 2025 renewal, December 2031 expiry, EDPB assessment
[27] US DOJ: Landmark US-UK Data Access Agreement Enters Force – First CLOUD Act bilateral agreement, October 2022 entry into force
[28] Perkins Coie: The US-UK Data Access Agreement – November 2024 renewal, 20,142 UK requests, 63 US requests
[29] Wikipedia: Online Safety Act 2023 – Encrypted scanning provision, Ofcom enforcement role
[30] EFF: UK Online Safety Bill – Massive Threat to Privacy, Security, and Speech – ECHR ruling on encryption, technical feasibility concerns
[31] TechCrunch: Secure Messaging Apps Warn UK’s Online Safety Bill Risks Web Security (March 2023) – Industry opposition from Apple, Signal, WhatsApp over encryption-breaking provisions
[32] GOV.UK: Review of Directions Given Under Section 94 of the Telecommunications Act 1984 – Secret bulk data collection since 2001, absence of central records
[33] Issues in Cybercrime Law: Apple’s Encrypted iCloud Meets the UK Technical Capability Notices – IPA 2016 s.253, extraterritorial scope, double lock approval, appeal grounds
[34] EFF: The UK Is Still Trying to Backdoor Encryption for Apple Users – January 2025 TCN to Apple, Advanced Data Protection blocked in UK
[35] Computer Weekly: Apple’s Appeal to the Investigatory Powers Tribunal Over the UK’s Encryption Backdoor Explained – IPT appeal on proportionality, Article 8 ECHR compatibility, technical feasibility
[37] The Guardian: MOD Awards Palantir £240m Contract to Provide AI Analytics Platform (November 2024) – Ministry of Defence contract, NHS Federated Data Platform £330M contract history
[38] Privacy International: UK Police Forces Purchase Analytics Systems from Cognyte (Verint) – UK police procurement of Cognyte surveillance systems
[40] Der Spiegel: Shopping for Spy Gear: Catalog Advertises NSA Toolbox – SEA-ME-WE 4 and other submarine cable systems
[41] Der Spiegel: GCHQ Hacked Belgian Telecoms Firm – Operation Socialist, Belgacom compromise
[42] The Intercept: UK Spy Agency GCHQ Has Secret Middle East Base in Oman – Oman facilities monitoring 9 submarine cables through Strait of Hormuz
[43] GOV.UK: UK and US Sign Landmark Data Access Agreement – First CLOUD Act agreement, effective Oct 2022, 5-year term
[44] DOJ Office of International Affairs – US-UK MLAT, 10-month average processing time
[45] Privacy International: Five Eyes Intelligence Alliance – UKUSA Agreement 1946, default intelligence sharing, warrant bypass
[46] Statewatch: UK-EU Police Data Sharing Post-Brexit – Loss of SIS II access, I-LEAP platform development
← Back to Privacy Law Directory