• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card?

Extracts from this document...

Introduction

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card? It is an undeniable fact that each time the issue of introducing the National Identity card in the United Kingdom has been raised, it has always been subject to great concern to many people and has provoked a hot debate. To understand the debate it is worth looking back at the history. There have been identity card systems in the UK during both World Wars. The scheme introduced at the outbreak of World War II was withdrawn in 1952; it has required people to produce their identity card on demand by the police, and this feature was eventually judged inappropriate in the peacetime post-war Britain. They were said to be unreliable in proving identity and damaged the relationship between the public and the police. But the whole idea of introducing National Identity card eventually relates to the issue of privacy, or should we say, anonymity. Before actually considering the effects of information technology on the said debate, it is worth asking ourselves what privacy actually is. Privacy is actually a wide subject area but fundamentally it is at the foundation or the basis of the human rights. ...read more.

Middle

This system is already being used for asylum seekers in the UK, whose Application Registration Card contain fingerprint biometric information. This makes sure that the same person does not apply for asylum more than once. They also put forward the fact that it would simplify the access to state/government services. The latter is actually why cards have become ingrained across much of Europe. With regards to the issue of privacy about the gathering and sharing of biometric data, proponents argue that the data can be encrypted when it has been gathered and the original data can then de discarded to prevent identity theft. Addressing the question of security, advocates of the cars scheme argue that security can be achieved only with a smart card that can cross-check various storehouses of personal data to determine whether someone could be viewed with suspicion. That would mean, for example, that an airline ticket agent swiping a card would be warned, by law enforcement, intelligence and some private databases, about an individual who overstayed a tourist visa, is on a government watch list or who is wanted for crime. The use of identity cards by citizens in certain European countries also allow these people to use their cards for cross border travel within the union, thus dispensing them of the use of bulky passports and ...read more.

Conclusion

It is also claimed by the proponents that the Human Rights Act was passed to further protect civil liberties and regular calls for the introduction of the ID cards have been rejected by Government for the last fifty years since Ministers have recognized that their aim is to seek to protect freedom and democracy, and if they are to undermine these values, terrorists will claim it as a victory. As mentioned earlier, the introduction of the national identity card has become a pressing issue in the aftermath of the September 11th in the US. There is growing concern for national security but the question to ask ourselves is whether this concern should be at the detriment of our privacy, since without privacy, other societal goals such as free speech, association, dignity and liberty will be compromised. As Roberto Unger wrote, "The most radical freedom is freedom to be, to be a unique person in the world as it is."4 To end with, "the success of any identity card scheme would depend on the confidence those using it and. There would have to be a balance between ensuring individual privacy but at the same time keeping loopholes firmly shut against fraudsters and criminals" as stated by Heather Green. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    we treat people how we like to be treated we are better for customers, simpler for staff and cheaper for Tesco. Select a management area and explain the different purposes for which information may be required. Task 1(P1.M) Tesco Aims * Make profits * Maximise sales * Provide good quality

  2. The Information Society and Information Technology: A New Mode of Production?

    Another definition of the information society comes from the spatial approach, which places a major emphasis on the impact of information networks on the organization of time and space. John Goddard (1992, in Webster 1995) identifies four interrelated elements in the transition to an information society: 1)

  1. Advantages and Disadvantages of Waitrose Technology - Handy Scan (quick Check) - Introduced 1995

    they have control on the amount they spend. Many customers don't like spending to much time in the store, when they go shopping they want to be in and out that's why Waitrose brought in the handy scan (quick check), they did this so that the customer can limit the time spent shopping.

  2. A Brief History of Information Technology

    The control of information within this new technological framework is more dispersed and decentralized than ever before and the roles of governments, commercial interests, and private individuals are often difficult to determine and understand. From the above short history, it should be clear that the development of information technology has

  1. The history behind the Boots.

    These factors determine the form of communication and approach taken. These are described below. * Formal * Informal * Important * Urgent * Optional * Open to all * Sent to a specific person * Person * Impersonal * Relaxed * Who its aimed towards * Who its from *

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    Delete functions used in a VB front end for the database does not delete record conation with the database table this needs to be readdressed. 3.1. Changes Managing change is fundamental to the successful completion of any project. The change management process ensures that each change included within the project, is defined, justifiable and evaluated prior to implementation.

  1. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    ATM enhancements with biometric support envisaged by vendors eliminate the need for PIN entry, and authenticate customer transactions by thumb-impressions. Biometric ATMs are introduced by us selectively in a few centers. In recent years the importance of biometrics has grown tremendously with an increasing demand of security in accordance of

  2. Business Idea

    prize draw, in which you could win free drinks on the house for a night of your choice. - About You - Name: ............................................................ Address: ......................................................... Age: ....................... Sex: Male Female - About Us - 1. What is your favourite sport?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work