Feeds

Info commission calls on business to protect bio data

Thumb gently inserted into dyke

Next gen security for virtualised datacentres

The UK's Information Commissioner has called for businesses to pull their socks up and protect their data.

Its latest campaign is to encourage businesses to "avoid embarrassing security breaches" that involve the loss or abuse of data about customers or employees by employing privacy technologies.

A guidance note issued today by the IC promoted the use of software that provides anonymity to computer users.

And it gave official sanction to a technology that is championed by civil liberties campaigners as an alternative to ID cards, known in the trade as federated identity management.

Deputy Information Commissioner Jonathan Bamford, said it was important for businesses and governments to retain the trust of their customers and citizens by nurturing their data.

"There's a competitive advantage in looking after people's personal information properly," he said.

The right controls ensure data doesn't get into the wrong hands, is used for anything other than its intended purposes, "so it doesn't become fair game in the information wild west", he added.

In the course of laying out its advice, the IC also threw some new technologies and principles into the same bag, which techies call privacy enhancing technologies (PETs), as anonymity software.

This included biometric scanners that do not retain the fingerprints they scan, banks that allow online users to edit their personal records, and privacy policies that stick to the information with which they are associated and ensure it is never used for anything but the purpose intended when it was divulged. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?