Feeds

Businesses will have graded access to ID database

That's OK then

Remote control for virtualized desktops

The Home Office said yesterday that businesses and public sector agency access to the national identity card database will be allowed on a graded basis, according to need. The idea is that so-called trivial checks on people's biometrics should not be allowed to overload the system.

According to The FT, Katherine Courtney, the ID card programme director at the Home Office, said that the government wanted to build safeguards into the scheme to avoid "people attempting frivolously to use the system when there is not a business justification for that".

Situations when a check would be justified included car rentals, for instance. A car hire firm would be able to access the database to confirm a potential customer's identity. At the time of writing, the Home Office has not been able to clarify exactly what information the firm would have access to in this scenario.

Employers would be able to use the database to check on candidates, and the database could be used to run much faster background checks on those applying to work as teachers, the officials said.

Courtney said it was unlikely that the ID card would be demanded for everyday shopping transactions, but went on to outline plans for the ID card to be linked into the next generation of chip and pin credit and debit card readers.

She argued that integrating the cards into business and public life would provide incentives for people to register for the card, even before they become compulsory. In effect, life without a card will become increasingly inconvienient, so most people will register for one, just to speed things up. ®

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.