Feeds

UK.gov issues death warrant for ID cards

Buh-bye now

Secure remote control for conventional and virtual desktops

ID cards will be history within 100 days, the government said today as it published laws to destroy the scheme.

The Home Office, for years tasked with promotion of the project under Labour, said it aims to pass the Identity Documents Bill before the Parliamentary recess starts in August.

It is the first legislation introduced by the ConDem coalition. Both parties campaigned against the scheme at the election.

The National Identity Register, the database that was set to centrally store an array of personal information about every British citizen, will also be consigned to the political dustbin. The next generation of biometric passports, which would also have fed the National Identity Register, will be scrapped in separate legislation.

"The wasteful, bureaucratic and intrusive ID card scheme represents everything that has been wrong with government in recent years," said Deputy Prime Minister Nick Clegg.

"By taking swift action to scrap it, we are making it clear that this government won't sacrifice people's liberty for the sake of Ministers' pet projects."

As previously announced, the 15,000 volunteers in the North West who paid £30 for an ID card in the final months of the previous government will not get a refund.

Their cards will become invalid one month after the Identity Documents Bill gains Royal Assent, to allow owners to fulfil travel plans. Shortly after the National Identity Register will be destroyed.

The decision will save £86m over the next four years, the Home Office said, taking into account decommissioning, contract termination and asset write-offs. The £800m operating cost of the scheme over ten years will also be saved, though Labour claimed this would be self-funding by charges to the public.

The oversight role of the Identity Commissioner, Sir Joseph Pilling, will be scrapped as soon as the Bill becomes law.

It will mark an abrupt end to the ID cards controversy, which has raged for almost 10 years since they were proposed by then-Home Secretary David Blunkett in the wake of 9/11. The Bill will mean contracts with IBM, CSC and Thales are torn up or changed.

A separate ID cards scheme for foreign nationals will go ahead. ®

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.