Feeds

UK pushes token security line on child database

Balls promise on ContactPoint

Gartner critical capabilities for enterprise endpoint backup

The British government is bending over backwards to try and calm fears that a new database of every child in the country will inevitably go the way of HMRC's child benefit database when it goes live next year.

ContactPoint will feature name, address, gender, date of birth, and a unique number for every child in the country, as well as basic identifying information about parents or carers. It will also feature details, including school and doctor, of all organisations "involved" with the child.

The planned database has already sparked concern, both that it will amount to a national ID registry in training, and that it will provide malefactors with unparalleled access to details on children, particularly the most vulnerable. In the wake of the HMRC debacle, the LibDems have called for the database to be encrypted.

As soon as the HMRC debacle broke last week, Ed Balls, secretary of children, schools and families moved to try and assuage fears over ContactPoint saying the department was reviewing its security strategy for the database.

But given that the entire government is supposed to be reviewing its data protection measures, this doesn't mean any special measures for the child database.

However, that didn't stop the department pushing the point again, with The Independent this weekend reiterating Balls' plan to do what the whole government is supposed to be doing anyway.

Today, a spokesperson for the department reiterated the existing security structure for the database. This will include a two stage authentication process, consisting of a password and a random number generating token.

The spokesperson said only cleared personnel subject to the highest level of Criminal Records Bureau check would be able to access the database.

Asked what the department would be doing to ensure that no one inadvertently downloads the whole database, he said there would be very strict access control. Users would only be allowed to view the records of children they are working with, he added.

All of which the department has said before, of course.

However, that will offer little assurance to critics of the scheme, either because they question the need for the database at all, regard it as simply a national ID database by stealth, or because they suspect that even the most stringent security procedures have a habit of being circumvented – just this once - when it helps senior management keep a lid on costs. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.