Identity, Privacy and Trust

Recent Posts

  • The Seven Deadly Sins of the Internet

    Toby Stevens - Enterprise Privacy Group 08 Apr 2008
  • This really does not bode well for Phorm's chances of shaking off accusations that it is a privacy-invasive service, and one would hope that the responsible individual there is now re-evaluating ...

  • The stocks are too good for them

    Toby Stevens - Enterprise Privacy Group 08 Apr 2008
  • Apparently the normal network connection was unavailable, so a password-protected CD was burned and bunged in normal Royal Mail post.. '...typically, a person condemned to the stocks was subjected ...

  • The end of biometric security at airports?

    Toby Stevens - Enterprise Privacy Group 07 Apr 2008
  • If they were integrated into the e-Borders programme then this would make sense, but it seems a little odd that they're demanding them as independent controls, unless the plan would be an ...

  • Privacy bears its fangs for Phorm

    Toby Stevens - Enterprise Privacy Group 13 Mar 2008
  • It's clear that Phorm has given a lot of thought to the privacy implications of this service, which are potentially huge: after all, Phorm's servers will know everything about a user's online ...

  • Analysing the State of Play for ID Cards

    Toby Stevens - Enterprise Privacy Group 10 Mar 2008
  • His recommendations include restricting the objective of the scheme to citizen-centric identity assertion; operating the Scheme independently of government (with a direct report to Parliament); ...

  • A big day for the National Identity Scheme

    Toby Stevens - Enterprise Privacy Group 06 Mar 2008
  • These will include air-side workers at airports, of whom there are 200,000 who will have their contract of employment made conditional upon holding an ID card, and some Critical National ...

  • Last in line for the DNA database

    Toby Stevens - Enterprise Privacy Group 06 Mar 2008
  • Setting aside arguments about the legality under Human Rights legislation, there are three key reasons why I would not be prepared to volunteer my DNA for a government database, and why such a ...

  • Turning security into a game of Trivial Pursuit

    Toby Stevens - Enterprise Privacy Group 27 Feb 2008
  • It's quite common to rely on a mother's maiden name, first pet's name or other significant personal data to prove the identity of the caller. We've already discussed the problem of using ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close