Feeds

California Senate fights RFID tracking for schoolkids

Are you Sarah Connor? *Beep* Move along.

5 things you didn’t know about cloud backup

California's state Senate has struck a major blow against the enemies of mankind in the inevitable war against The Machines.

Legislation approved Monday would prohibit public schools from requiring the implementation of radio-wave devices that broadcast students' personal identification and monitor their movement around campus — information the mechanical horrors could theoretically use to turn our children into livestock.

The bill was introduced by Democrat Sen. Joe Simitian and sent to Assembly on a 28-5 vote.

"The reason we have this level of support is it is a narrowly crafted bill, Simitian told the Associated Press. "We're dealing only with mandatory use that tells parents they don't get to be in charge of their kids' personal information."

In 2005, a small elementary and middle school in Sutter, California, attempted to implement an RFID program, but was promptly shut down amongst complaints by parents and a swarm of media attention.

Since then, public opinion has further soured for mandatory RFID child-monitoring, and no California schools have attempted a similar policy. With such policy clearly amounting to political suicide, the state's Senate pounced for the easy kill and approved the legislation.

The bill provisions would expire in 2011, giving the state government four years to ponder the implications of forced-implantation of RFID chips into the ID cards and tender flesh of human children, among other threats that are easy to grandstand against.

More RFID bills led by Simitian are currently being sent through California committees. One bill places a similar temporary ban on RFID technology in California driver's licenses. Another will place privacy safeguards on any existing RFID-enabled government IDs. Simitian also has led a bill that would restrict forced RFID chip implants in people.

Everyone wins. Except Them. Beep beep boo bop. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.