We operate from our Diegem office and employ around 122 people. As part of BT International, we serve multinational customers with dedicated products, platforms and people, helping them to meet the challenges and opportunities of AI-driven change head on. Our two brand-new, AI-ready, highly scalable, international platforms, Global Voice and Global Fabric, are designed to deliver highly secure and resilient communication and network services around the world supporting customers' growth and prosperity.
In Belgium, article 39bis of the Belgian Code of Criminal Procedure (BCCP) provides the legal framework for investigating seized IT systems and web filtering.
Article 90ter of the Belgian Code of Criminal Procedure grants an investigating judge the power to order real-time interception of communications under specific circumstances and for specific offenses. This article, along with Articles 46bis, 88bis, and 90quater, provides the legal basis for various measures related to electronic evidence, including identification of data, metadata, and content.
Article 88ter of the Belgian Code of Criminal Procedure provides the legal framework for remote searching and seizure in IT systems.
Article 90quater of the Belgian Code of Criminal Procedure outlines the conditions and procedures for obtaining orders for the identification, metadata, localisation, traffic, access, and content data of electronic communications. This article is a key legal basis for accessing electronic evidence in investigations.
Based on the level of intrusion on privacy of the user, specific procedural conditions and safeguards have been put in place for the different types of measures.
Lawful interception
Under Article 90ter of the Belgian Code of Criminal Procedure, for secret purposes, an investigating judge may intercept, examine and record communications that are not accessible to the public, or data from a computer system or part thereof, using technical means. The judge may also extend the search to a computer system or part thereof.
This measure may only be ordered in exceptional cases. It is only used when the requirements of the investigation so demand, and if other means of investigation are insufficient to establish the truth.
If national security is at stake, the Director General of the intelligence and safety services can order a draft authorisation for interception. This will either be accepted or rejected by a special committee in charge of surveillance. This process is governed by Articles 18/9, 18/10, 18/17 and 44 of the Intelligence and Safety Services Act of 30 November 1998.
The General Military Intelligence and Safety Service (GMISS) can also intercept communications that come from abroad. In December each year, the GMISS produces a list of organisations and institutions whose communications it plans to intercept, with a justification for each. The minister of defence has 10 days to accept or reject the list. If it is urgent, and there is a clear need, the GMISS can intercept communications for organisations or institutions that are not on the list. But the GMISS must let the minister of defence know about this as soon as possible and not later than the next business day after the start of the interception. If the minister disagrees with the interception, they can stop it (Article 44/3, 1° Intelligence and Safety Services Act).
Data Retention
Operators must retain data relating to subscribers and metadata for the purpose of the authorities as set out in articles 2, 74°, 91° to 93°, 126 to 126/3 and 127/2 of the Belgian Electronic Communications Act (ECA) dated 13 June 2005 and its associated regulations.
Operators are required to retain certain subscriber data in a generalised and undifferentiated manner for the purpose of emergency services, security and the proper functioning of the networks and electronic communications services, combating crime, fraud and specific malicious use or safeguarding national security.
The retention period varies depending on the data but is usually 12 months. Operators must also retain certain types of metadata for certain areas of the Belgian territory. A ministerial decree implementing Article 126/3, § 1, of the ECA provides a list of judicial districts and police zones that are subject to the retention obligation, as well as the retention period. The retention period depends on the area (six, nine or twelve months).
Data disclosure
Operators must co-operate with judiciary authorities when it comes to data disclosure (Articles 46bis of the BCCP for identification data and 88bis of the BCCP for geolocation and traffic data).
The public prosecutor and the examining magistrate may order operators to submit subscriber information such as the identification of the end user and the services used. (Article 46bis, §1 of the BCCP).
In an extreme emergency, the public prosecutor and the examining magistrate can authorise this verbally. However, they must confirm it in writing as soon as possible afterwards (Articles 46bis, §1 and 56, §2 of the BCCP).
An investigating judge may order operators to submit traffic and geolocation data related to electronic communications. They can only do this where there are serious indications that crimes are taking place which could result in a sentence of one year or more in prison, and where the examining magistrate believes it is necessary to get to the truth (Article 88bis of the BCCP).
An investigating judge can issue a warrant for a remote search and seizure of a computer system that is not in the physical possession of the investigators but is reachable from a distance. This measure can also be executed across borders. (Article 88ter of the BCCP)
Web blocking
Article 39bis of the Belgian Code of Criminal Procedure sets out the rules for the quick seizure of stored computer data. It establishes the legal framework for the seizure and preservation of electronic data in cases where there is reasonable suspicion of a crime. This article is crucial for investigations involving digital evidence, as it ensures that relevant data can be secured before it is altered or deleted.
The public prosecutor can through an order required operators to block access to particular unlawful sites, to stop damage caused by content published online.
Orders often include additional obligations to redirect users to a specific URL or to remove the content. Under intellectual property law, the court can make an internet service provider carry out any measure necessary to stop the infringement of their copyright or associated rights.
Internet service providers might also be required to block sites which carry child sexual abuse material, or promote terrorism, racial violence or hatred.
Digital Services Act
The Digital Services Act (DSA) came into force on November 16, 2022, with most obligations applying from February 17, 2024. It introduces a new legal framework for digital services within the EU, including requirements on hosting providers for blocking content and reporting on such blocking. Where the DSA is applicable to BT services, and to the extent that any such requests have been received, this reporting will be included in our next reporting.