Feeds

Government keeps the secrets on ID scheme legal advice

'Trust us, it's OK on human rights'

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The Government is refusing to publish detailed legal advice on human rights and privacy aspects of the ID card scheme, according to a report in today's Guardian. The paper says that attorney general Lord Goldsmith has provided this to the Cabinet, but that it is not to be made public, nor will Parliament's Joint Committee on Human Rights be allowed direct access to the documents.

Immigration Minister and noted Home Office charmer Des Browne confirmed the story while claiming it was largely made up on BBC Radio 4's World at One today. Browne said that the Government had certified that the ID legislation was compatible with human rights law, that Goldsmith's advice was for internal use, and that there had never been any intention to publish it.

This line, however, merely confirms the Government's shameless approach to human rights in its legislation. One of the early moves of the Blair Government was to incorporate the European Convention on Human Rights into UK legislation in the Human Rights Act. This one might suppose would mean that the UK Government would be far more careful about human rights in its legislation, but instead of this it tends to be used as a kind of cloaking device. Instead of being accompanied by detailed assessments of human rights impact, UK legislation now tends to have just a one liner saying 'the provisions of this legislation are compatible with the European convention of human rights.' So, as Browne put it today, the Cabinet has advice on the impact prepared for it, and nobody else needs to see the advice because the legislation has been deemed to be compatible by the Cabinet. Trust us.

According to the Guardian, Goldsmith's advice considers whether people's rights would be infringed if they were denied access to public services, and covers access to personal details, medical records and financial data by the police, security services and other authorities. It's also broader than an assessment of privacy and human rights impact in that it would cover the strengths and weaknesses of the ID Bill.

An access request for the document by Chris Pounder, editor of Data Protection and Privacy Practice, was refused on the basis that its release "would harm the frankness and candour of internal discussion." Pounder has lodged an appeal. ®

Related Stories:

Clarke takes charge of Blunkett's Fear Agenda
Need a job? Get a card - arresting ID pitch to business
ID scheme, IT the key to Blunkett's new terror laws

Security for virtualized datacentres

More from The Register

next story
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.