Feeds

Parliament won't debate school fingerprinting

Just no time

Intelligent flash storage arrays

The question of whether it's necessary or desirable to take school children's fingerprints has not made it on the agenda for Parliament.

Greg Mulholland, MP for Leeds North West and the Liberal Democrat schools spokesman, requested a Parliamentary debate on school fingerprinting last Thursday.

"Legal opinion, including that of the British Educational Communications and Technology Agency, has stated that this practice contravenes the Data Protection Act 1998. Does he agree that it is time to debate this important subject in the House?" Mulholland asked Jack Straw, leader of the House of Commons.

Straw refused, claiming ignorance: "I am not aware of the practice [of fingerprinting children at school], but obviously people have accepted it," he said.

"There is a problem with ensuring people's identity, and one of the ways of doing that is to use biometric data," he went on, "Security in libraries is a big issue for younger and older people."

The matter could be left for an adjournment debate, Straw said.

In a written statement, Mulholland said: "It is precisely because of that ignorance among many MPs that I want to have a debate."

He said the DfES, which has promised to issue guidance for schools that want to fingerprint pupils, should consult with schools and parents before doing so.

"I'm concerned that there won't be proper consultation because ministers' top priority won't be children's rights but mitigating the political difficulty it would cause to admit that they'd allowed illegal practices to continue under their noses."

Mulholland has already tabled an Early Day Motion on school fingerprinting, to which 30 MPs have added their names.

It noted the MPs' "alarm" at schools taking biometrics off of children "as young as three".

"Collecting the data from children under 12 without parental consent directly contravenes the Data Protection Act. No child should have biometric information taken without the express written permission of their parents," it said. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.