Feeds

Surveying anonymity and the public good

Our survey shows researchers and the public disagree

Gartner critical capabilities for enterprise endpoint backup

Meanwhile, the Daily Mail have been stirring up shock and horror at the idea that the Equality and Human Rights Commission (EHRC) are planning to siphon off data from sources that include "visits to A&E departments, government surveys and the reporting of crimes to police" and place it on a "huge 'Lifestyle Database'".

Well: not quite. As the Mail later admits, "it will not be possible to identify individuals from the information on the database": but even that probably over-states the case. The database in question is an aggregated data system that El Reg was alerted to some months back.

We investigated it then and found it was little more than an online query tool designed to support the EHRC’s Equality Measurement Framework. The tool would allow researchers to pull down statistics on 10 domains of equality – such as life, health, productive activities, education, employment, etc. – broken down by group.

Although the Mail focusses on the fact that the database will attempt to hold data on sexual orientation and identity, a spokesman for the project told El Reg today that general reluctance to answer questions about sexuality meant that this tool would be most useful in respect of disability, gender and age.

So bearing in mind the caveats about identifiability expressed above, this base will contain no individual records and it is unlikely that any individual will be identifiable through it: however, data will be collected without direct consent.

In the end, there is no scandal here: just a mindset on the part of some officials that if the end is for the public good, then it doesn’t matter if the rules around data collection get slightly bent. That would appear to be joined, at the lower levels of government, by a poor understanding of the letter of the law when it comes to Data Protection. The same departments that are so obstructive when it comes to dishing out information are rather less well informed as to the scope of the Act when it comes to identifiability.

According to the Tories, they intend to shake up the lazy assumptions that public services are entitled to use our data just because they can, and require all such uses in future to be tested according to necessity. Whether anything will change – or whether the researchers will continue to win the day - remains to be seen. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
Pedals and wheel in that Google robo-car or it's off the road – Cali DMV
And insists on $5 million insurance per motor against accidents
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.