Feeds

Shortlist for privacy 'Oscars' announced

Big Brother awards - as in the book, not the TV zoo

  • alert
  • submit to reddit

Seven Steps to Software Security

The shortlist for this year's Big Brother awards for nasty privacy invaders has been released. The awards include: Worst Public Servant, Most Invasive Company, Most Appalling Project, Most Heinous Government Organisation and Lifetime Menace Award - now renamed the David Blunkett Lifetime Menace Award.

Pressure group Privacy International, which organises the awards, said it was overwhelmed by nominations for Blunkett, the Home Office and national ID cards but they had been recognised in previous years.

Simon Davies, director of Privacy International, said: "The nominations reflect a broad and intensified assault on the right to privacy in the UK. There is a clear hostility within government to privacy and a general antagonism to it from within business. We have seen few instances where privacy has been genuinely respected by large organisations."

Contenders for Worst Public Servant are Margaret Hodge for her support for a database of children and "good behaviour" orders for children as young as eight. There is also a joint nomination in this category - Katherine Courtney and Stephen Harrison for their work in promoting the National ID card.

Two nominations for Most Invasive Company - LloydsTSB for its insistence that customers report to a branch with documents to prove their identities and FollowUS - a company which allows you to track mobile phones for "security or fun".

Favourite though is British Gas for blaming the Data Protection Act when an elderly couple died when British Gas disconnected their gas.

There are three contenders for the Most Appalling Project prize. Vodafone is in the running for its decision to bar all "adult" sites. The NHS is there for its plan to "computerise all patient records in a way that is both insecure and dangerous to patient privacy." The Safe Harbour Agreement - which governs transmission of data between EU countries and the US, also gets a mention despite not being a UK-initiative.

The awards ceremony takes place at the London School of Economics from 6.30pm on Wednesday 28 July. Full details are available here.

If you are interested in attending the awards you need to register at UKBBA@privacy.org ®

Related stories

Vodafone's adult filter is go
ID cards: a guide for technically-challenged PMs
Blunkett states ID card aims but can he achieve them?

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.