SlideShare a Scribd company logo
Privacy Politics in the UK “After a long decade of privacy devastation in the UK, there is a sense of cautious optimism here about the new coalition government.” –Privacy International
Visual surveillance
DP and ECHR standards Interference with private life must be based on detailed, clear, precise, foreseeable law (Copland v UK) Systems must limit access to data to those who have a proportionate requirement for access (I v Finland) Bleeding-edge states have a particular duty to consider impact of databases upon privacy (S & Marperv UK) Only 5 of 46 databases reviewed met standards (Database State, R. Anderson et al. 2008)
Reserving the rise of the surveillance state - Tories “Fewer mammoth databases, that are better run. Fewer personal details held by the state, stored accurately and on a need-to-know basis. Greater checks and personal control over the sharing of our data by government. And stronger duties on government to keep our private information safe. These are followed by a series of practical measures from scrapping ID cards and Contact Point to strengthening the role of the Information Commissioner.”
Liberal Democrats “From allowing children's fingerprints to be taken at school without their parents' consent; to making us a world leader in CCTV; to wasting vast sums of taxpayers' money on giant databases that hoard our personal details… The government's staggering record on losing private data – leaving it in pub car parks and on commuter trains – just makes matters worse.”
National DNA Database Source: The Guardian, 9 Apr 2010
Identity management Central National Identity Register of all those over 16 living in UK longer than 3 months with biometrics, biographical data and audit trail, ID number to link other databases ContactPoint database of all 11m children in England and Wales with biographical data and links to services used Cabinet Office 18/5/11: “Our intention is to create a market of accredited identity assurance services delivered by a range of private sector and mutualised suppliers. A key improvement will be that people will be able to use the service of their choice to prove identity when accessing any public service. Identity assurance services will focus on the key imperative to ensure privacy.”
National Programme for IT Central Summary Care Records with biographical data, allergies and prescriptions Regional Detailed Care Records Central Secondary Uses Service for administration and research Patients can opt out of central “Spine”, but made administratively awkward
Criminal justice National DNA Database with 5.1m profiles ONSET system attempts to identify potential young offenders National Fraud Initiative collects much sensitive information but absolved from liability for any confidentiality breaches National ANPR system keeps up to 18bn records pa for up to 5 years Communications database proposed
The blagger’s price list “What price privacy?”, Information Commissioner’s Office (2006)
Source: The Guardian, 16 January 2011

More Related Content

What's hot

The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdpr
Mathew Chacko
 
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
Dr. Oliver Massmann
 
Maeve Mc Donagh
Maeve Mc DonaghMaeve Mc Donagh
Maeve Mc Donagh
guestbc7697
 
Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
guestbc7697
 
Thomas M. Susman,Ppt
Thomas M. Susman,PptThomas M. Susman,Ppt
Thomas M. Susman,Ppt
guestbc7697
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
Gayle Gorvett
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
David Erdos
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data Protection
David Erdos
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
Diganth Raj Sehgal
 
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy SheidlTransatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Daniel Parziale, CIPP/US
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)
alaninbelfast
 
Privacy and public trust
Privacy and public trustPrivacy and public trust
Privacy and public trust
blogzilla
 
Legislation
LegislationLegislation
Legislation
megabyte
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
Klamberg
 
Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]
Kamal Thakur
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
blogzilla
 
Your Internet provider can now sell your browser history without asking permi...
Your Internet provider can now sell your browser history without asking permi...Your Internet provider can now sell your browser history without asking permi...
Your Internet provider can now sell your browser history without asking permi...
News Feather
 
EDI 2009- Government Investigations
EDI 2009- Government InvestigationsEDI 2009- Government Investigations
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
bmanolea
 

What's hot (20)

The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdpr
 
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
Lawyer in Vietnam Dr. Oliver Massmann COMPLIANCE and CLEAR CONSENT - New EU G...
 
Maeve Mc Donagh
Maeve Mc DonaghMaeve Mc Donagh
Maeve Mc Donagh
 
Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
 
Thomas M. Susman,Ppt
Thomas M. Susman,PptThomas M. Susman,Ppt
Thomas M. Susman,Ppt
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data Protection
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy SheidlTransatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)
 
Privacy and public trust
Privacy and public trustPrivacy and public trust
Privacy and public trust
 
Legislation
LegislationLegislation
Legislation
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Your Internet provider can now sell your browser history without asking permi...
Your Internet provider can now sell your browser history without asking permi...Your Internet provider can now sell your browser history without asking permi...
Your Internet provider can now sell your browser history without asking permi...
 
EDI 2009- Government Investigations
EDI 2009- Government InvestigationsEDI 2009- Government Investigations
EDI 2009- Government Investigations
 
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
 

Similar to Privacy politics in the UK

Politics and privacy engineering
Politics and privacy engineeringPolitics and privacy engineering
Politics and privacy engineering
blogzilla
 
NDNAD notes
NDNAD notesNDNAD notes
NDNAD notes
Katie B
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
blogzilla
 
HIM-I 6-1 Stanzer Ed
HIM-I 6-1 Stanzer EdHIM-I 6-1 Stanzer Ed
HIM-I 6-1 Stanzer Ed
nstanzer
 
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
DataScienceConferenc1
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
Lyndsey Shaw
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
Terry O'Brien
 
Kanta services for healthcare: Prescription service and Patient Data Repository
Kanta services for healthcare: Prescription service and Patient Data RepositoryKanta services for healthcare: Prescription service and Patient Data Repository
Kanta services for healthcare: Prescription service and Patient Data Repository
THL
 
Building public trust in the use of health and care data
Building public trust in the use of health and care dataBuilding public trust in the use of health and care data
Building public trust in the use of health and care data
Health and Care Innovation Expo
 
4.3 Kate Hjelm
4.3 Kate Hjelm4.3 Kate Hjelm
Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)
rikhudson
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
blogzilla
 
Open Justice in Argentina
Open Justice in ArgentinaOpen Justice in Argentina
Open Justice in Argentina
Julio Gabriel Mercado
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
Klamberg
 
Open Data: Its Value and Lessons Learned
Open Data: Its Value and Lessons LearnedOpen Data: Its Value and Lessons Learned
Open Data: Its Value and Lessons Learned
Andrew Stott
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Axon Lawyers
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
ipspat
 

Similar to Privacy politics in the UK (20)

Politics and privacy engineering
Politics and privacy engineeringPolitics and privacy engineering
Politics and privacy engineering
 
NDNAD notes
NDNAD notesNDNAD notes
NDNAD notes
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
HIM-I 6-1 Stanzer Ed
HIM-I 6-1 Stanzer EdHIM-I 6-1 Stanzer Ed
HIM-I 6-1 Stanzer Ed
 
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
[DSC Adria 23]Josema Cavanillas How To Mitigate the Exposure Risk in Clinical...
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Kanta services for healthcare: Prescription service and Patient Data Repository
Kanta services for healthcare: Prescription service and Patient Data RepositoryKanta services for healthcare: Prescription service and Patient Data Repository
Kanta services for healthcare: Prescription service and Patient Data Repository
 
Building public trust in the use of health and care data
Building public trust in the use of health and care dataBuilding public trust in the use of health and care data
Building public trust in the use of health and care data
 
4.3 Kate Hjelm
4.3 Kate Hjelm4.3 Kate Hjelm
4.3 Kate Hjelm
 
Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Open Justice in Argentina
Open Justice in ArgentinaOpen Justice in Argentina
Open Justice in Argentina
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Open Data: Its Value and Lessons Learned
Open Data: Its Value and Lessons LearnedOpen Data: Its Value and Lessons Learned
Open Data: Its Value and Lessons Learned
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
blogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
blogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
blogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
blogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
blogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
blogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
blogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
blogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
blogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
blogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
blogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 

Recently uploaded

EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 

Recently uploaded (9)

EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 

Privacy politics in the UK

  • 1. Privacy Politics in the UK “After a long decade of privacy devastation in the UK, there is a sense of cautious optimism here about the new coalition government.” –Privacy International
  • 3. DP and ECHR standards Interference with private life must be based on detailed, clear, precise, foreseeable law (Copland v UK) Systems must limit access to data to those who have a proportionate requirement for access (I v Finland) Bleeding-edge states have a particular duty to consider impact of databases upon privacy (S & Marperv UK) Only 5 of 46 databases reviewed met standards (Database State, R. Anderson et al. 2008)
  • 4. Reserving the rise of the surveillance state - Tories “Fewer mammoth databases, that are better run. Fewer personal details held by the state, stored accurately and on a need-to-know basis. Greater checks and personal control over the sharing of our data by government. And stronger duties on government to keep our private information safe. These are followed by a series of practical measures from scrapping ID cards and Contact Point to strengthening the role of the Information Commissioner.”
  • 5. Liberal Democrats “From allowing children's fingerprints to be taken at school without their parents' consent; to making us a world leader in CCTV; to wasting vast sums of taxpayers' money on giant databases that hoard our personal details… The government's staggering record on losing private data – leaving it in pub car parks and on commuter trains – just makes matters worse.”
  • 6. National DNA Database Source: The Guardian, 9 Apr 2010
  • 7. Identity management Central National Identity Register of all those over 16 living in UK longer than 3 months with biometrics, biographical data and audit trail, ID number to link other databases ContactPoint database of all 11m children in England and Wales with biographical data and links to services used Cabinet Office 18/5/11: “Our intention is to create a market of accredited identity assurance services delivered by a range of private sector and mutualised suppliers. A key improvement will be that people will be able to use the service of their choice to prove identity when accessing any public service. Identity assurance services will focus on the key imperative to ensure privacy.”
  • 8. National Programme for IT Central Summary Care Records with biographical data, allergies and prescriptions Regional Detailed Care Records Central Secondary Uses Service for administration and research Patients can opt out of central “Spine”, but made administratively awkward
  • 9. Criminal justice National DNA Database with 5.1m profiles ONSET system attempts to identify potential young offenders National Fraud Initiative collects much sensitive information but absolved from liability for any confidentiality breaches National ANPR system keeps up to 18bn records pa for up to 5 years Communications database proposed
  • 10. The blagger’s price list “What price privacy?”, Information Commissioner’s Office (2006)
  • 11. Source: The Guardian, 16 January 2011

Editor's Notes

  1. http://www.guardian.co.uk/media/2011/jan/16/glenn-mulcaire-andy-coulson-sienna#