Feeds

Sarah's Law review skewed by handpicked sample

Home Office research raises questions

Intelligent flash storage arrays

However, the police process throws up an intriguing anomaly, as the report reveals. After an initial application is made, step two is for police to trawl the PNC, sex offender and local criminal intelligence data in respect of the subject. Step four – after preliminary trawls have been made and possible flags set on these databases registering the fact of a check – is to decide whether or not the application is valid and falls within the scope of the CSORD.

On the same page, the researchers play down the finding that 18 per cent of applicants had applied to the police despite "having no particular concerns".

In other words - exactly as critics have claimed - it is possible for a sex offender check to be raised on the basis of simple curiosity. Assuming that the PNC and other official bases retain an audit trail of checks made, the fact that an individual has been checked will go on their record – ready to trip that individual up should they ever wish to apply for a job working with children in the future.

So, someone who has no history as a sex offender could generate a profile in the system as a result of repeated baseless inquiries - just as credit checks become a "fact" on credit databases even when there is no other source of concern over an individual's creditworthiness.

Last word to our blogger:

No data protection analysis or privacy impact assessment was made during the pilot with respect to disclosure. I believe the research does not provide a reliable basis for extending the scheme nationwide and that the disclosure procedures adopted by the police in relation to disclosure are flawed. Instead of a national roll-out (which risks being disastrous if it drives sex offenders underground), a more in-depth pilot is needed; one which includes some very important data protection considerations.

®

Remote control for virtualized desktops

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.