GET /congress/2025/event/693e18d6-e777-596b-a21d-dd9e9f0282e6/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "693e18d6-e777-596b-a21d-dd9e9f0282e6",
    "kind": "official",
    "name": "Live, Die, Repeat: The fight against data retention and boundless access to data",
    "slug": "live-die-repeat-the-fight-against-data-retention-and-boundless-access-to-data",
    "url": "https://api.events.ccc.de/congress/2025/event/693e18d6-e777-596b-a21d-dd9e9f0282e6/?format=api",
    "track": "ethics-society-politics",
    "assembly": "ccc",
    "room": "62251a07-13e4-5a72-bb3c-8528416ee0f2",
    "location": null,
    "language": "en",
    "description": "The Specter of Data Retention is back in the political arena, both as a harmonized, EU-wide approach as well as being part of the coalition agreement of the new German national government. Other countries have already recently implemented new data retention laws, i.e. Belgium or Denmark. \r\nIn parallel, access to all types of stored data – and not only data stored under a data retention regime – by law enforcement has been radically reformed by groundbreaking new legislation, undermining both exiting national safeguards as well as protections implemented by businesses aiming for a higher standard in cyber security and data protection.  \r\nThe talk will give an overview on recent developments for a harmonized “minimum” approach to data retention under the Polish and Danish EU presidency as well as the new German legislation currently under consideration. \r\nIt will introduce the upcoming international release mechanisms for stored data under the e-evidence legislation, the 2nd protocol to the EU cybercrime convention as well as future threats from the UN cybercrime convention. \r\nIt will address how a cross-border request for information works in practice, which types of data can be requested by whom, and who will be responsible for the few remaining safeguards – including an analysis of the threat model and potential “side channel” attacks by cybercrime to gain access to basically all data stored by and with service providers.",
    "schedule_start": "2025-12-28T14:45:00+01:00",
    "schedule_duration": "00:40:00",
    "schedule_end": "2025-12-28T15:25:00+01:00"
}