Feeds

Gaping 'open data' loophole could leave your privates on display

Gov's white paper calls open season on enforced subject access*

The Essential Guide to IT Transformation

Comment The government has just published its ideas for allowing general access to data, which includes the intention to grant individuals online access to their own personal data. In general, I support this measure but sadly, the Open Data White Paper (PDF) has not even considered that it has widened the privacy problems associated with “enforced subject access”*.

In the white paper, the government states that it wants to make personal data available to the data subject by a secure portal. Indeed it intends to give NHS patients access to their own health records before the end of the Parliament (if the coalition lasts that long). This is, I suspect, the quid pro quo for the fact that the government wants wider use of medical records for research purposes (see here, where I show that the Data Protection Regulation has been changed at the UK government request's to support this move).

To illustrate the problems of online access to medical records, consider the following conversation:

Interviewer: ”Hello John. Thanks for coming to this job interview. Before we start, you have access to your medical records online. As you know, we want to make sure that you have all the hallmarks of a cooperative employee. I wonder whether you would allow us to look at your last five GP visits.”

John: “Well I am not sure of this. Doesn’t it breach the Data Protection Act?”

Interviewer: “No John, it doesn’t, and we are surprised that a cooperative individual like you could think so. All the protection you get from the Data Protection Act is unaffected. The first thing to say is that we would have your consent to your sharing your own personal details with us. 'Share' is a nice word isn’t it? Indeed we encourage all our employees to consent and share their details with us in this way on a regular basis.

“In addition, we are not going to record anything from your files in our databases. We are just going to look at your personal data. Because this information is not copied from your files to ours, we don’t have any 'data' and because of that, we don’t have any personal data. All we are doing is 'looking' but not 'recording'.

“In theory, because we don’t have personal data we don’t have to apply the act's principles. This means we don’t have to tell you what we're looking for or why, we can make use of irrelevant details in the file, and of course, if there are inaccuracies in your file, we can just accept them as being the truth. This process is very secure: after all, we can’t lose what we don’t have. But don’t worry about all these issues. Because we rely on consent, we think we are a very ethical company."

John: “Well that is reassuring. I will just log on to my GP by the secure portal.”

Interviewer: “Please give me time to look away – I don’t want to see your password, do I? This is an example of our ethics in action!

Interviewer (after inspecting health records): ”Oh. I forgot to ask. The job you are going for involves access to financial information. Do you, by chance have access to an online banking account?”

In summary, the white paper has ignored the obvious problem of individuals having to consent to access by others for whatever reason. Let us hope it is fixed before that portal is ever opened.

* The enforced subject access loophole

Enforced subject access is the technique used by employers to obtain copies of criminal record data about employees or prospective employees when they don’t have legal authority to obtain these details from the Criminal Record Bureau (CRB). Under section 56 of the Data Protection Act, the enforced subject access procedure is an offence.

However, the offence is dependent on the CRB being able to provide a “basic check” (or a “criminal conviction certificate” to use the Police Act 1997 terminology) to applicants (usually the data subject). For whatever reasons, the CRB have been unable to deliver this service.

Section 75(3) of the Data Protection Act states that section 56 (i.e. the enforced subject access offence) does not come into effect until the “criminal conviction certificate”, the “criminal record certificates” and the “enhanced criminal record certificates” are all available. As the CRB only provide the two criminal record certificates (ie they do not provide the “criminal conviction certificate”), the offence has never been commenced...

Government has refused to change this law. Statutory protection has thus been removed from data subjects for 15 years. For more on enforced subject access, see references below.

References

This story originally appeared at HAWKTALK, the blog of Amberhawk Training Ltd.

Build a business case: developing custom apps

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.