Feeds

Teachers break silence on fingerprinting children

Jenkins, get that OFF the scanner NOW

The Essential Guide to IT Transformation

The National Union of Teachers has said that schools should not fingerprint children without the consent of parents.

But UK teaching unions are being slow to formulate firmer policies on the issue because, it appears, teachers have not complained to their unions about the fingerprinting schemes that, according to parents' campaign group leavethemkidsalone.com, has already fingerprinted 700,000 primary school children in 3,500 schools without seeking parental consent.

A spokeswoman for the National Union of Teachers said today: "Fingerprinting has to be done in consultation with parents and teachers and not imposed."

"By consultation, we are talking about proper consultation, giving parents time to respond, not installing the machines and then asking parents," she said.

Schools like Porth County Comprehensive in South Wales have fingerprinted children within days of telling parents in take-home letters about the plans.

David Clouter, spokesman for Leavethemkidsalone, said in a statement today: "Parents should be informed and asked for prior written consent [for fingerprinting], as is required for a whole range of far less intrusive school activities."

"Parents should also be given clear assurances on exactly who will have access to the data on these systems and under precisely what circumstances," he added.

A spokesman for Britain's largest teaching union, the National Association of Schoolmasters Union of Women Teachers, said its policy people were deciding what to do about school fingerprinting. Neither unions had the activities reported to them by concerned members.

Clouter said it was a sign of the way the fingerprinting of school children was being managed: "Sliding it under people's noses and then presenting it as a fait accompli."®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.