Feeds

Becta gives schools biometric data guidance

In line with data protection laws

High performance access to file storage

The British Educational Communications and Technology Agency (Becta) has published guidance for schools on how to implement biometrics in line with data protection laws.

The guidance (pdf), published on 23 July by the government's schools ICT agency, advises schools to involve parents in any decision to introduce biometric or fingerprint technology. At the same time it insists schools have the freedom to run their own affairs.

Drawn up with support from the Information Commissioner's Office (ICO), the guidance stresses that head teachers and governing bodies should be clear and open with all parents and pupils about the use of biometric systems.

This could involve: explaining what biometric technology is; how it will be used; what is involved; what data will be stored; why it is required; how it will be secured; and how long it will be retained.

Schools are also advised to recognise some parents' or pupils' concerns over the introduction of biometric technology and offer alternative systems, such as smartcards, to access the same services if they opt out.

Becta chief executive Stephen Crowne underlined that schools must make their own decisions over the systems they employ but need to take account of the sensitivities surrounding the technology.

He said: "Schools must ensure that they engage fully with parents and pupils and consider the provision of alternative systems if there are strong objections to the use of biometric technology."

Biometric systems, says the guidance, are designed to validate a pupil's identity and should not hold any other data. They can help to speed up lunch queues, remove the need for children to take money into schools, and remove the stigma for pupils who claim free school meals. Biometric attendance systems can also be used to save time in taking registers and preventing unauthorised access to school premises.

Under the Data Protection Act 1998, schools can only use biometric information for the express purpose for which it was collected. They must also process data fairly and lawfully to ensure that all pupils, or their parents if they are not able to understand, know what personal information is held on record and how it will be used.

"Schools are well used to handling sensitive information like attendance registers, behaviour records, and home addresses," said schools minister Jim Knight.

"But we are absolutely clear that they have to comply with data protection laws. That means that this data can only be used for its stated purpose; cannot be shared with third parties beyond this stated purpose; and it must be destroyed when a pupil leaves their school."

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

High performance access to file storage

More from The Register

next story
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.