Feeds

Info commission calls on business to protect bio data

Thumb gently inserted into dyke

Beginner's guide to SSL certificates

The UK's Information Commissioner has called for businesses to pull their socks up and protect their data.

Its latest campaign is to encourage businesses to "avoid embarrassing security breaches" that involve the loss or abuse of data about customers or employees by employing privacy technologies.

A guidance note issued today by the IC promoted the use of software that provides anonymity to computer users.

And it gave official sanction to a technology that is championed by civil liberties campaigners as an alternative to ID cards, known in the trade as federated identity management.

Deputy Information Commissioner Jonathan Bamford, said it was important for businesses and governments to retain the trust of their customers and citizens by nurturing their data.

"There's a competitive advantage in looking after people's personal information properly," he said.

The right controls ensure data doesn't get into the wrong hands, is used for anything other than its intended purposes, "so it doesn't become fair game in the information wild west", he added.

In the course of laying out its advice, the IC also threw some new technologies and principles into the same bag, which techies call privacy enhancing technologies (PETs), as anonymity software.

This included biometric scanners that do not retain the fingerprints they scan, banks that allow online users to edit their personal records, and privacy policies that stick to the information with which they are associated and ensure it is never used for anything but the purpose intended when it was divulged. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.