Feeds

Home Office minister invites DNA database debate

As records hit four million

The Power of One Infographic

Home Office minister Meg Hillier has insisted on the need to debate the future of the National DNA Database.

Responding to parliamentary questions from two Conservative MPs, Hillier said the growth of the database, which now holds records of more than four million people, has made a debate on its future development necessary.

Tory MP Stephen Crabb asked Hillier if she "understood the enormous extent to which good will and support for the police and for her department are being undermined by a system in which DNA information is being recorded aggressively, but removed in a haphazard way and on a discretionary basis, dependent on police force area".

He highlighted the case of 75 year old Geoffrey Orchard, who was wrongfully arrested and received a written apology from the police, but who remains unable to get his DNA information removed from the system.

Hitting back, Hillier claimed the database had been used to solve 452 homicides, 644 rapes, and more than 8,000 domestic burglaries. She also stressed the fact that a person's DNA was held on the database was not an indication of guilt.

But a spokesperson for human rights pressure group Liberty said by holding the records of non-convicted individuals, the database creates a stigma of guilt.

She told GC News: "Liberty is very concerned about the effect of the national DNA database on young people, in particular, the estimated 100,000 under-18s whose DNA samples are being held despite the fact that they have not been cautioned or charged with any offence. This creates a stigma of guilt which is unwarranted and could lead to problems for individuals later in life."

In September this year, appeal court judge Lord Sedley put forward the case for the compulsory retrieval and storage of every citizen's DNA record.

Asked whether she agreed with Sedley's proposal, Hillier insisted the government had no plans for a universal database, and invited a debate on its future.

"Because it has grown to include more than four million people, it is important that we get the chance to debate how we proceed," the minister said. "I have already asked officials to look at the design of the forms on which people give their permission – if they have given it voluntarily – for that information to remain permanently on the database."

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.