• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card?

Extracts from this document...

Introduction

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card? It is an undeniable fact that each time the issue of introducing the National Identity card in the United Kingdom has been raised, it has always been subject to great concern to many people and has provoked a hot debate. To understand the debate it is worth looking back at the history. There have been identity card systems in the UK during both World Wars. The scheme introduced at the outbreak of World War II was withdrawn in 1952; it has required people to produce their identity card on demand by the police, and this feature was eventually judged inappropriate in the peacetime post-war Britain. They were said to be unreliable in proving identity and damaged the relationship between the public and the police. But the whole idea of introducing National Identity card eventually relates to the issue of privacy, or should we say, anonymity. Before actually considering the effects of information technology on the said debate, it is worth asking ourselves what privacy actually is. Privacy is actually a wide subject area but fundamentally it is at the foundation or the basis of the human rights. ...read more.

Middle

This system is already being used for asylum seekers in the UK, whose Application Registration Card contain fingerprint biometric information. This makes sure that the same person does not apply for asylum more than once. They also put forward the fact that it would simplify the access to state/government services. The latter is actually why cards have become ingrained across much of Europe. With regards to the issue of privacy about the gathering and sharing of biometric data, proponents argue that the data can be encrypted when it has been gathered and the original data can then de discarded to prevent identity theft. Addressing the question of security, advocates of the cars scheme argue that security can be achieved only with a smart card that can cross-check various storehouses of personal data to determine whether someone could be viewed with suspicion. That would mean, for example, that an airline ticket agent swiping a card would be warned, by law enforcement, intelligence and some private databases, about an individual who overstayed a tourist visa, is on a government watch list or who is wanted for crime. The use of identity cards by citizens in certain European countries also allow these people to use their cards for cross border travel within the union, thus dispensing them of the use of bulky passports and ...read more.

Conclusion

It is also claimed by the proponents that the Human Rights Act was passed to further protect civil liberties and regular calls for the introduction of the ID cards have been rejected by Government for the last fifty years since Ministers have recognized that their aim is to seek to protect freedom and democracy, and if they are to undermine these values, terrorists will claim it as a victory. As mentioned earlier, the introduction of the national identity card has become a pressing issue in the aftermath of the September 11th in the US. There is growing concern for national security but the question to ask ourselves is whether this concern should be at the detriment of our privacy, since without privacy, other societal goals such as free speech, association, dignity and liberty will be compromised. As Roberto Unger wrote, "The most radical freedom is freedom to be, to be a unique person in the world as it is."4 To end with, "the success of any identity card scheme would depend on the confidence those using it and. There would have to be a balance between ensuring individual privacy but at the same time keeping loopholes firmly shut against fraudsters and criminals" as stated by Heather Green. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    we treat people how we like to be treated we are better for customers, simpler for staff and cheaper for Tesco. Select a management area and explain the different purposes for which information may be required. Task 1(P1.M) Tesco Aims * Make profits * Maximise sales * Provide good quality

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    of a Change Request Form * The submission of the Change Request Form to the project board for review Change Request Form Change No: 1 Business Area: Stock control Change Requestor: implement a computer based stock control system Project Name: Cain Motors Change Request Date: 14/01/03 Project Manager: Mr Shirley

  1. Free essay

    Managing information

    Some may have only one target group and others have more than one. However fire and rocks products are consumed by all segments of the market. On the other hand for example we may produce a product which they aim for an age group as their main target market.

  2. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    ATM enhancements with biometric support envisaged by vendors eliminate the need for PIN entry, and authenticate customer transactions by thumb-impressions. Biometric ATMs are introduced by us selectively in a few centers. In recent years the importance of biometrics has grown tremendously with an increasing demand of security in accordance of

  1. A Brief History of Information Technology

    Taken alone, the electronic media and digital computer technologies are powerful enough but it has been the synergistic union of the two in what is broadly known as computer communications which has generated unprecedented technological possibilities. Time, space, and effective cost are continually being reduced by new combined applications of computer, mass storage, and electronic and optical transmission technologies.

  2. Recent Developments in Information Technology

    lead to chaos, loss of customers and low employee morale * If a computer is connected to the Internet, data can be easily stolen from anywhere from the world Information technology is very important to IKEA, for the following reasons: * It supports the business with appropriate and cost effective

  1. The Information Society and Information Technology: A New Mode of Production?

    This includes clerks, teachers, lawyers and entertainers. The shift from industrial labor to information work serves as an indicator of the arrival of the information age, and signals the end of class-based political conflict, more communal consciousness, and the development of equality between the sexes (Bell, in Webster 1995).

  2. Business Idea

    I am willing to change these goals to a certain extent depending on how well the business is going. If it is a success, I might be able to afford to open a new branch before the third year, or if it is not going as well as hoped then

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work