Feeds

UK pushes token security line on child database

Balls promise on ContactPoint

Top three mobile application threats

The British government is bending over backwards to try and calm fears that a new database of every child in the country will inevitably go the way of HMRC's child benefit database when it goes live next year.

ContactPoint will feature name, address, gender, date of birth, and a unique number for every child in the country, as well as basic identifying information about parents or carers. It will also feature details, including school and doctor, of all organisations "involved" with the child.

The planned database has already sparked concern, both that it will amount to a national ID registry in training, and that it will provide malefactors with unparalleled access to details on children, particularly the most vulnerable. In the wake of the HMRC debacle, the LibDems have called for the database to be encrypted.

As soon as the HMRC debacle broke last week, Ed Balls, secretary of children, schools and families moved to try and assuage fears over ContactPoint saying the department was reviewing its security strategy for the database.

But given that the entire government is supposed to be reviewing its data protection measures, this doesn't mean any special measures for the child database.

However, that didn't stop the department pushing the point again, with The Independent this weekend reiterating Balls' plan to do what the whole government is supposed to be doing anyway.

Today, a spokesperson for the department reiterated the existing security structure for the database. This will include a two stage authentication process, consisting of a password and a random number generating token.

The spokesperson said only cleared personnel subject to the highest level of Criminal Records Bureau check would be able to access the database.

Asked what the department would be doing to ensure that no one inadvertently downloads the whole database, he said there would be very strict access control. Users would only be allowed to view the records of children they are working with, he added.

All of which the department has said before, of course.

However, that will offer little assurance to critics of the scheme, either because they question the need for the database at all, regard it as simply a national ID database by stealth, or because they suspect that even the most stringent security procedures have a habit of being circumvented – just this once - when it helps senior management keep a lid on costs. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.