Feeds

Child porn control goes too far, says privacy chief

Seize card, not whole account

High performance access to file storage

The Information Commissioner advised the Home Office against a key measure of its recent Data Protection Act amendment giving banks the power to administer an account without the knowledge of the account holders.

The measure has been put in place to prevent the re-use of payment cards to purchase child pornography and is explicitly limited only to that situation. Though the Information Commissioner's office mostly backs the change, it believes that it goes too far in one key respect.

"We were not persuaded that the part about administering the account was necessary," a spokeswoman for the Information Commissioner said. The Commissioner was consulted by the Home Office on the draft of the Home Secretary's Order amending the Act.

The draft Order says: "The processing of information about a criminal conviction or caution for an offence listed in paragraph (3) relating to an indecent photograph or pseudo-photograph of a child is necessary for the purpose of administering an account relating to the payment card used in the commission of the offence or for cancelling that payment card."

"We think it would have been enough to confiscate the card," said the spokeswoman, who confirmed that this would leave a person with an account but without the physical card that went with it.

The term "payment card" in the legislation refers to credit cards and to debit cards, so the "account" mentioned could be a full bank account, and not just a credit card account.

The measure has been established to prevent the use of credit cards to purchase child pornography at the request of payments body APACS. An APACS spokeswoman said the information could only go to the issuer of a card used for an offence. "There is nothing to stop that person going to another bank for another card," she said.

See:

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.