Feeds

Boy Scouts to model for UK ID checks

CRB gets first dib dib dibs

Providing a secure and efficient Helpdesk

The Scouts are prepared to help the Identity and Passport Service design a model procedure for checking people's identities against the ID database.

A pilot in June will help the IPS decide how to incorporate passports and ID cards into the identity checking process used by authorised agents of the Criminal Records Bureau, which are organisations that approve or deny people permission to work with children and vulnerable people.

A spokesman for the IPS and CRB said the Scouts were being used in the trial because they were one of the highest-volume CRB agents. At least one other agent would take part in a trial to create the "proof of concept" for the procedure over the next six months.

He admitted that the procedure had not yet evolved enough for the IPS to have decided it was feasible. That was the point of the trial.

"It's to help the IPS design ID-related services that will provide benefit to other business partners," he said.

A feasibility study might compare the cost of running identity checks against people requesting CRB clearance for a job application with the benefits in reducing identity fraud.

The spokesman said the current identity checking procedure used by CRB agents was 99.97 per cent proof and most of the mistakes were spotted by the applicants themselves when the CRB linked them with criminal records that were not theirs, as opposed to people fraudulently trying to get access to sensitive work.

Nevertheless, it is feared that people wanting to fraudulently get approval for working with children will use false identities when they apply for a police check.

Current checks are done by checking applicants' "biographical footprints" using documents like utility bills against the identity services of credit reference agencies.

Guy Herbert, general secretary of No2ID, said that applying biometric ID to CRB checks appeared to be a marketing exercise to mitigate the burden placed on them originally by the obligation on them to do background checks on job applicants.

Another group of vulnerable adults - people with criminal pasts - have been discriminated against by employers, either by mistakes in the CRB data drawn from the patchy police national computer, by being refused jobs illegally for minor or irrelevant convictions, or by having checks run - again illegally - for irrelevant jobs. The CRB is trying to root the discrimination out of the system. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.