Austrian court axes data retention law following EU high court ruling

Regulations to fight crime should be in line with human rights, Austria's Constitutional Court said

A court in Austria has ruled that the country's data retention law is unconstitutional as it violates fundamental European privacy rights.

The decision by the Constitutional Court of Austria comes in the wake of a recent ruling of the EU's top court that found EU laws requiring communications providers to retain metadata to be invalid.

Austria's data retention law violates article 8 of the European Convention on Human Rights that covers the right to respect of private and family life, the Constitutional Court ruled Friday.

This means that the law will be officially invalidated once the verdict is published by the Austrian chancellor, which will probably happen within a week, court spokesman Christian Neuwirth said. "So you could say this is effective immediately," he added.

Austrian and other European telecommunications and Internet providers are required by the EU's Data Retention Directive to retain traffic and location data as well as related data necessary to identify the user. This is done in order to help law enforcement fight organized crime and terrorism.

However, the Constitutional Court of Austria and the High Court of Ireland doubted the validity of the directive and asked the Court of Justice of the EU (CJEU) if it violated fundamental privacy rights. The CJEU ruled in April that the data retention directive is indeed illegal.

However, this does not mean that all data retention laws in European member states are automatically void. The CJEU's ruling is binding though for national courts who have to dispose of cases in accordance with its decision.

That is what happened Friday in Austria, Neuwirth said.

Regulations such as the data retention law could be used to fight serious crime, but only if they are in line with data protection and the convention on human rights, the Constitutional Court ruled.

New communication technologies provide new challenges for the fight against crime. However, new technical possibilities also lead to potential threats to people's privacy, and this threat must be countered in an adequate way, the court said.

Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to

Join the CSO newsletter!

Error: Please check your email address.

Tags Constitutional Court of Austriaintellectual propertysecuritylegalprivacy

More about EUEuropean Convention on Human RightsIDGindeed

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Loek Essers

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts