Deputy commissioner David Smith tells seminar ICO supports Trusted Computing

The Information Commissioner's Office (ICO) is keen to support and promote Trusted Computing, according to deputy commissioner David Smith.

Warwick Ashford Warwick Ashford

Warwick Ashford is chief reporter at Computer Weekly. He joined the CW team in June 2007 and is focused on IT security, business continuity, IT law and issues relating to regulation, compliance and governance. Before joining CW, he spent four years working in various roles including technology editor for ITWeb, an IT news publisher based in Johannesburg, South Africa. In addition to news and feature writing for ITWeb’s print publications, he was involved in liaising with sponsors of specialist news areas on the ITWeb site and developing new sponsorship opportunities. He came to IT journalism after three years as a course developer and technical writer for an IT training organisation and eight years working in radio news as a writer and presenter at the South African Broadcasting Corporation (SABC).

View all articles by Warwick Ashford >>

warwick.ashford@rbi.co.uk 020 8652 8505 Active Warwick Ashford False True

The Information Commissioner's Office (ICO) is keen to support and promote Trusted Computing, according to deputy commissioner David Smith.

Trusted Computing (TC) is a set of open cross-platform specifications for hardware and software to manage and protect data and digital identities.

Developed and promoted by the Trusted Computing Group, Trusted Computing allows third parties to verify that only authorised code runs on a system.

"Trusted Computing is consistent with privacy by design, which is a key part of our agenda," David Smith (pictured) told attendees of the 2011 Trusted Computing Seminar hosted by Wave Systems in London.

The ICO is keen to see Trusted Computing embedded in the draft European data protection law to be published in November, he said.

With reference to future legislative changes to comply with EU requirements, Smith said the ICO would continue to work to ensure the UK had "a sensible legal instrument" for data protection.

This would include pushing for prison sentences for those found guilty of breaching UK data protection law.

"There should be serious penalties for those accessing personal information illegally," said Smith, adding that this did not refer only to journalists and hackers, but included private investigators and members of the UK police forces.

MetaKeywords MetaDescription Sensitive Landingpage False

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close