Feeds

Info Commissioner criticises ID Cards Bill

Privacy and Data Protection concerns

Internet Security Threat Report 2014

The Information Commissioner believes the measures set out in the National Identify Cards Bill go "well beyond" the requirements to set up a secure, reliable and trustworthy ID card system.

In a statement published on the organisation's website, to the Bill that was passed by Parliament on 18 October, Richard Thomas, the Commissioner expressed several issues of concern relating to privacy and data protection of personal information of an individual.

The document says that while the government is looking to develop a 'gold standard' for identity verification for the ID card that requires the recording and collecting of biometric and other data, once this process is completed and the standard established there is "little justification for retention of all such details in a central National Identity Register." It goes further by calling the holding of this data "unwarranted and intrusive" and "not easily reconciled with fundamental data protection safeguards."

In addition, the extensive nature of this data means the onus on the individual to ensure records are kept current is "excessive and disproportionate."

The development of the Register and its operation is considered by Mr. Thomas as another step towards a "surveillance society" that may lead to "unwarranted intrusion into individual’s lives by government and other public bodies." He also expressed concern over potential future use of the system as outlined in the bill, which allows for potential function creep into "unforeseen and perhaps unacceptable areas of private life."

The ICO's concerns follows a critical report published by the House of Lords Constitution Committee that was critical of government’s approach for ensure the integrity of the National Identity Register and called for national identity scheme commissioner with the power to investigate complaints and report directly to Parliament.

Read the statement here (42KB - PDF)

Copyright © eGov monitor Weekly

eGov monitor Weekly is a free e-newsletter covering developments in UK eGovernment and public sector IT over the last seven days. To register go here.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.