Bonum Certa Men Certa

EPO Breaking the Law With Microsoft and Promoting Fake 'Encryption' That Violates Confidentiality on Many Levels

Video download link



Summary: An explanation of how truly ridiculous the EPO has become, handing over to Microsoft (and to the US government) just about all of the EPO's communications in direct violation of the law, as well, so the only question now is, will the law actually be enforced soon? Contact your local MP/MEP and report this to him/her.

THE EPO is breaking the law. The António Campinos regime is just as bad as Benoît Battistelli's, even when it comes to privacy and pressuring judges to allow unlawful patents, such as software patents.



Steve Rowan - Vice President DG1 - Patent Granting ProcessIn parts of the series prior to this one, including Part II, we explained what the EPO had done and why it's illegal. I recorded a video (the one above) prior to the publication of Part II.

It's a long video, we could add a lot of links to it (I thought of many that would be relevant while recording it, but failed to take notes throughout), though the ones that seem of most relevance are Microsoft and the NSA relations, the latest Exchange fiasco (as recently as hours ago they still try to distract from it), how end-to-end encryption (e2ee) really works and some background about Stephen Rowan. The full text of the communication is reproduced below:

04.02.2021

Home > Organisation > DG 1 > The Vice-President > Announcements > 2021

Outlook Migration to the Cloud



Data encryption requirements for sending highly confidential data via Outlook

As announced in previous intranet items published in May and December 2020, our Outlook mailboxes are being transferred to the cloud. The transfer will take place in phases and cover only emails since 1 January 2021. As regards the patent grant process, only the following documents are classed as "EPO strictly confidential" and must not be sent by email without encryption: (i) application documents of unpublished applications (EP, PCT, national) (ii) search reports, search opinions, communications and decisions relating to unpublished applications (iii) search statements resulting in the disclosure of unpublished application documents (Guidelines B-III, 2.4; B-IV, 2.4) (iv) documents excluded from file inspection (documents which are marked as non-public in DI+, such as dissenting opinions, medical certificates, PACE requests, etc.) Guidance for the storage of strictly confidential information in the cloud The storage of strictly confidential documents in the cloud should be avoided, and data should not be copied unnecessarily from the EPO's specialised document management systems such as DI+. In practice, this means that, instead of e.g. copying data into an email, you should send a link to the document in the document management system (see also "How to send an email with document links or zipped attachment via Outlook"). Where sharing of strictly confidential data is necessary, the data must be encrypted before storing it in the cloud or sending a link to it via email. It is strongly recommended that you do not send the data directly in an email but instead encrypt the document, store it in the cloud, e.g. on SharePoint or OneDrive, and then send the recipients a link to the encrypted document by email. The password then needs to be shared via a separate channel, e.g. in a Teams chat, via Skype or on the telephone. Sending encrypted attachments is strongly discouraged, as they might not pass spam filters: using encrypted attachments is a very common way to infect user computers, so our email gateways do not allow encrypted attachments to be sent from or to our Outlook cloud instance. The easiest and safest way of encrypting a document is to use the built-in capabilities of the Office programs. Simply protect the document with a password, which also will encrypt the document with a strong encryption algorithm. Obviously, this password should be safe. As a rule of thumb, it should be about as complex as our login passwords, but of course not identical to a password already used. Chat is a good way to send the password, as a long random password can be easily copied and pasted from the chat into the password prompt in the Office program. Examples of how to apply encryption in popular Office programs are in the document annexed here.

Reasons and background

The level of security provided by Microsoft's cloud services is very high and will even mean an improvement in information security for our email system. In the cloud, our mailboxes will be protected by the most sophisticated systems. Email in Microsoft's datacentres is stored with a high standard of encryption, both in transit and at rest. With the help of contract terms, a data protection agreement and technical implementation, the EPO has ensured the best possible protection for the data stored using Microsoft's cloud services. Microsoft guarantees that the data itself is stored on EU servers within the jurisdiction of the European data protection rules (GDPR). Under the US Foreign Intelligence and Surveillance Act (FISA) and the US Clarifying Lawful Overseas Use of Data Act (CLOUD Act), Microsoft is obliged to grant security and intelligence agencies access to data stored in its cloud, even when stored on EU servers. However, the protection level offered by Microsoft is still sufficiently high for DG 1 processes in place for confidential data exchange not to need encryption. By contrast, to comply with the highest standards, which of course include the requirements imposed under the GDPR, encryption is needed for strictly confidential data. The guidance on the use of cloud tools therefore states that it is only strictly confidential data that must not be stored in plain form in the cloud, whereas merely confidential information can be stored there without limitations. The EPO defines "strictly confidential" in its "policy for information classification" (document attached) as: EPO strictly confidential: Information unauthorised disclosure of which could compromise or cause severe damage to the EPO or could cause damage to an identifiable individual or his or her reputation. Access control cannot be delegated by the information owner, and is restricted to registered named persons only. See here for more information. The vast majority of DG 1 documents do not fall into this category, and this is true for typical performance related data too, since even poor performance must be regarded as "normal" working behaviour and cannot be considered to actually cause damage to an individual. For strictly confidential data, additional access control measures, such as registering people with access, are already implemented where required.

04.02.21 | Author: Steve Rowan - Vice President DG1 - Patent Granting Process


In Part III, which we will publish tomorrow, lots more will be shown.

Recent Techrights' Posts

SLAPP Censorship - Part 86 Out of 200: The Position of Courts on Computer-Generated Lawsuits and Filings From Another Continent (Made by Two Men Who Work for Slop Companies)
Lawsuits by proxy from California
IAM Magazine is in Effect Dead, It's Now Fused Into Microsoft's Patent Troll (Which It Has Promoted All Along)
Microsoft-connected patent trolls in Europe [...] Now, in his new job, Wild can use his 'expertise' to help guide blackmail/extortion to better harm Europe's industry
 
Gemini Links 24/05/2026: Impressions of Auckland, the Age of Left or Right Extremism, and .zim files
Links for the day
Microsoft's 'Hiring Freeze' (Layoffs) and Salary Freeze (While Inflation Approaches Double-Digit Rates)
If they get replaced by anyone, it'll be low-paid folks in low-salary regions [...] workers' stress levels shoot up, compensation goes down
Slop Will Not End Humanity, The Pushers of It Do (Artificial Scarcities and Global Warming)
Causing hunger and poverty in the name of "computation"
How Can the 'Broligarchs' Love Us When They Don't Even Love Themselves?
Their SLAPPs have their limits
Death at IBM Due to Overwork
Dying for IBM is never worth it
We Publish Less, We Get More Exposure
UbuntuPit is coming to realise that quantity isn't what comes to matter or truly "count", especially when quantity comes at expense of authenticity
Codecs and Software Patents - Part IX - GNU Project Has Chosen to Adopt AV1 for Its Videos, Conversion and Additions Underway
One of our readers is working to help GNU through the maze of software patents and maze of patent lawsuits, which aren't the same thing but are somewhat overlapping issues
Links 24/05/2026: SoftBank CEO Getting Conned by Scam Altman, Hotter 2026 and El Nino With Growing Impact
Links for the day
Links 24/05/2026: Ebola Outbreak and "Journalists Identify Murder Victims Of Trump’s Boat Strike Program"
Links for the day
A Huge Proportion of 'Articles' in The Register MS Are Actually Paid Spam of the Communist Party of China, Selling Compromised (for Wiretapping) Technology
The Register MS is having a go at becoming a marketing company or "B2B"
Top Officials Have Just Left Microsoft, Layoffs in Anything But Name
Microsoft's debt is very fast-growing
Local Staff Committee The Hague (LSCTH) Meets "Alicante Mafia" at the European Patent Office (EPO)
Report on meeting with VP1 and his team on 21 April 2026
UbuntuPit (ubuntupit.com) Has Deleted Slop Pages, Its Slopfarm Experiment Has Failed (Like Always!)
Turning one's site into a slopfarm is a death knell
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, May 23, 2026
IRC logs for Saturday, May 23, 2026
The "Next Big" Bonus for IBM's CEO Apparently Comes From American Taxpayers While Veteran IBMers Are PIP'd and RA'd (Laid Off)
the next big thing will be the CEO's bonus
Links 23/05/2026: Starbucks Scraps Disastrous Slopfest, Colbert’s Final ‘Late Show’
Links for the day
Gemini Links 23/05/2026: Poetry, Hobbies, ROOPHLOCH, and More
Links for the day
Government Bailouts Won't be Enough to Save IBM
Bailouts from taxpayers in the US
Links 23/05/2026: Social Media Bans and Demise of Userbase of LLM Chatbots
Links for the day
Legal Letters Are Not Postcards
It seems like intimidation, nothing more
SLAPP Censorship - Part 85 Out of 200: The United Kingdom's Rating for Press Freedom Has Improved, But We Can Do Even Better
we see the US at #64
Sites Realise That Becoming More Active by Using Bots (LLM Slop) is Self-Destructive
We'll soon (maybe next year) also show that some of the 85+ KG of legal papers sent our way are computer-generated garbage, which might run afoul of some rules
European Patent Office (EPO) Strikes Persist, EPO Management Tries to Give False Impression of "Happy Staff"
EPO is trying to broadcast to the world a totally phony image of itself
Gemini Links 23/05/2026: Patience, LLM Chatbts Being Bad, and Unexpected Computer Surgery
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, May 22, 2026
IRC logs for Friday, May 22, 2026
Links 22/05/2026: Ebola Crisis and Samsung Averts a Walkout With Big Bonuses
Links for the day
The End of FOSSPost (fosspost.org), It Has become an LLM Slopfarm Like FOSSLinux
These sites will never get lucky with slop. These experiments always end badly.
Links 22/05/2026: Inflation Fears and Thailand Tightens Visa Rules for Tourists From Dozens of Nations
Links for the day
EPO Staff Representation Speaks of This Week's Discussion With the EPO's Budget and Finance Committee (BFC) Amid Mass Strikes
The Central Staff Committee's outline (prepared in a rush) or the "flash report"
SLAPP Censorship - Part 84 Out of 200: New Legislation Against SLAPPs on the Way (After We Reached Out to Ministers)
They dealt with the matter individually too, but we won't share this in public, at least not at this time
The Corrupt Lecture the Non-Corrupt - Part XXX - Where Was "The Ethics and Compliance Team" When the Family of EPO President Campinos Was Caught Doing Cocaine?
It remains to be seen if national delegates will tolerate this in future meetings
Gemini Links 22/05/2026: Esperanto Music History, Suspicious Adoption of Signal, and Unauthorised LLM Slop in Code
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, May 21, 2026
IRC logs for Thursday, May 21, 2026