Home » Privacy » data » Data Retention Law In Cyprus

Data Retention Law In Cyprus

Disclosure: All information on this site is harmless and purely for educational purposes which is why we post only authentic, unbiased information! The affiliate links are really there for discounts for our readers and for us to earn small commissions that help us stay afloat! Thanks!

The Cyprus Constitution received in 1960 notwithstanding the insurance of each private and family life (Art 15) which is dependent upon exemptions necessary for the interests of security of the Republic or open wellbeing or request or general wellbeing or ethics or the assurance of the rights and freedoms of others explicitly ensures the mystery of correspondence and different interchanges. Artistry. The Constitution as it was before its correction given:

  • Each individual has the option to regard for, and to the mystery of, his correspondence and other correspondence if such other communication is made through methods not precluded by law. 
  • There will be no impedance with the activity of this privilege aside from as per the law and just in instances of indicted and unconvinced detainees and business correspondence and correspondence of bankrupts during the chapter 11 organization.” 

The 6th amendment to the Constitution goes in 2010 erased and supplanted Sub Article 

In this manner, these days obstruction with the privilege ensured by Article 17.1 is passable if a law permits it in the accompanying circumstances: 

On account of indicted or unconvicted detainees. 

 By a Court, Order issued according to the arrangements of a law on the utilization of the Attorney General of the Republic and if the impedance is a measure which is a majority rule society is fundamental just for the reasons for the security of the Republic or the counteractive action, discovery or arraignment of: 

  • Premeditated homicide or murder 
  • Trafficking of individuals (regardless of whether youngsters or grown-ups) and offences identifying with kid sex entertainment 
  • Supply, exchanging, development or creation of opiates or other psychotomimetic or risks drugs 
  •  Attacks identifying with the cash of the Republic 
  • Corruption offences for which on conviction the sentence gave is multi-year detainment or more 

By a Court Order issued compliant with the arrangements of a law with the end goal of recognition and arraignment of genuine violations for which the sentence gave in case of conviction is at least five years detainment and when the impedance identifies with the traffic information and area information and essential information required to recognize the endorser or the client. 

Lawful Framework

For an extensive stretch, the primary insurance managed for the classification of correspondence was article 17 of the Constitution and the Telecommunications Regulations which gave for the most part to the mystery of interchanges.

Law 92(I)/96 utilized it an offence deserving of three years detainment to catch, screen or reveal any private correspondence or utilize same realizing that it was the aftereffect of block attempt or endeavour to do any of the abovementioned or have or use any gear fit for capturing any correspondence.

The further substance of communication is characterized to incorporate issues stated, the personality of the gatherings in question, the presence, reason and importance of the conversation and the phone quantities of the imparting parties. The first individual cases to this total forbiddance of capture/revelation are: 

  •  The interference/exposure with the permission of both imparting parties. 
  •  The capture attempt/revelation of correspondence with the permission of the unfortunate casualty in case of revolting irritating or compromising calls. 
  • The coincidental or deliberate block attempt for the motivations behind the support of media transmission hardware or the planning of phone bills subject to the regard of the secrecy of the data got. 
  • The block attempt observing or exposure of a correspondence requested by a Court. Such request anyway must be issued on the use of the Attorney General and when the subject of observation is a detainee sentenced or unconvicted. 

Therefore the particular case to one side to privacy given by the Constitution was constrained to detainees. Law 112(I)/04 presenting the European Directives on Electronic Communication accommodate: 

  •  The maintenance of traffic information just for the period took into consideration issue with the phone bills and that from there on they ought to wind up indifferent. 
  • The maintenance of charging information just for the period took into consideration the recuperation of instalment. 
  •  The exposure of area information in crisis circumstances. 

Impact of the legitimate arrangements

In actuality, it very well may be securely said that the Confidentiality of Communications is more than adequately ensured in Cyprus. The substance is excluded, and it is an offence to record them or hold/protect them. Specialist co-ops are obliged to: 

  • Take the proper measures to guarantee that the safeguarded information are of similar quality and appreciate similar insurance and security as information of the system. 
  •  Take the proper specialized and hierarchical safety efforts to ensure the information against incidental or unlawful decimation, unintentional misfortune or modification, or illegal or unapproved access, stockpiling, handling or divulgence. 
  •  Take the fitting specialized and hierarchical safety efforts to guarantee that they can be gotten to by extraordinarily approved workforce as it were. 
  •  Take the appropriate specialized, and hierarchical measures for the programmed decimation of the known saved information following six (6) months of the correspondence. 

The block attempt and checking of electronic correspondences are permitted as it were: 

  •  when the conveying gathering is a detainee indicted or unconvicted or 
  • it is accomplished with the end goal of 
  •  security of the Republic of

For more details, visit: 



Unlock the power of online security with our in-depth reviews and expert insights. Discover the best VPNs, password managers, and privacy tools to safeguard your digital world.