Feeds

Johnson reveals ID register linked to NI numbers

It's a one-stop data shop

The essential guide to IT transformation

Home Secretary Alan Johnson has confirmed that the National Identity Register contains National Insurance numbers and answers to 'shared secrets'.

In a revelation that is likely to intensify the arguments over the privacy implications of the database, Johnson claimed the NI numbers have been included to "aid identity verification checks for identity cards and, in time, passports".

They could also be used to cross-reference the register with other government databases, including tax and benefits.

The answers to shared secrets chosen by applicants will be used to allow them to identity themselves over the phone. Johnson said this method, commonly used by banks, would speed up the reporting of lost or stolen documents or a change of address.

He was responding to a written parliamentary question from shadow home secretary Chris Grayling, asking what information will be held on the National Identity Register which is not held on the UK Passport Database.

Johnson said the information held on both is similar, but that in addition to NI numbers and shared secrets, the register holds fingerprint biometrics, which will be required for passport issue in future, and a unique national identity registration number.

He added that between 20 October and 10 December last year more than 2,400 people had voluntarily enrolled, or made an appointment to enrol, for an identity card.

The Home Office has now begun to require skilled foreign workers to register for ID cards when renewing their visas – three months earlier than it had originally planned. It has estimated that this will lead to an extra 40,000 foreign nationals being issued with the cards each year.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

5 things you didn’t know about cloud backup

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.