• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card?

Extracts from this document...

Introduction

Proposals to introduce a national identity card in the UK have always generated hot debate. Do developments in information technology make any difference to the arguments for and against a national identity card? It is an undeniable fact that each time the issue of introducing the National Identity card in the United Kingdom has been raised, it has always been subject to great concern to many people and has provoked a hot debate. To understand the debate it is worth looking back at the history. There have been identity card systems in the UK during both World Wars. The scheme introduced at the outbreak of World War II was withdrawn in 1952; it has required people to produce their identity card on demand by the police, and this feature was eventually judged inappropriate in the peacetime post-war Britain. They were said to be unreliable in proving identity and damaged the relationship between the public and the police. But the whole idea of introducing National Identity card eventually relates to the issue of privacy, or should we say, anonymity. Before actually considering the effects of information technology on the said debate, it is worth asking ourselves what privacy actually is. Privacy is actually a wide subject area but fundamentally it is at the foundation or the basis of the human rights. ...read more.

Middle

This system is already being used for asylum seekers in the UK, whose Application Registration Card contain fingerprint biometric information. This makes sure that the same person does not apply for asylum more than once. They also put forward the fact that it would simplify the access to state/government services. The latter is actually why cards have become ingrained across much of Europe. With regards to the issue of privacy about the gathering and sharing of biometric data, proponents argue that the data can be encrypted when it has been gathered and the original data can then de discarded to prevent identity theft. Addressing the question of security, advocates of the cars scheme argue that security can be achieved only with a smart card that can cross-check various storehouses of personal data to determine whether someone could be viewed with suspicion. That would mean, for example, that an airline ticket agent swiping a card would be warned, by law enforcement, intelligence and some private databases, about an individual who overstayed a tourist visa, is on a government watch list or who is wanted for crime. The use of identity cards by citizens in certain European countries also allow these people to use their cards for cross border travel within the union, thus dispensing them of the use of bulky passports and ...read more.

Conclusion

It is also claimed by the proponents that the Human Rights Act was passed to further protect civil liberties and regular calls for the introduction of the ID cards have been rejected by Government for the last fifty years since Ministers have recognized that their aim is to seek to protect freedom and democracy, and if they are to undermine these values, terrorists will claim it as a victory. As mentioned earlier, the introduction of the national identity card has become a pressing issue in the aftermath of the September 11th in the US. There is growing concern for national security but the question to ask ourselves is whether this concern should be at the detriment of our privacy, since without privacy, other societal goals such as free speech, association, dignity and liberty will be compromised. As Roberto Unger wrote, "The most radical freedom is freedom to be, to be a unique person in the world as it is."4 To end with, "the success of any identity card scheme would depend on the confidence those using it and. There would have to be a balance between ensuring individual privacy but at the same time keeping loopholes firmly shut against fraudsters and criminals" as stated by Heather Green. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    we treat people how we like to be treated we are better for customers, simpler for staff and cheaper for Tesco. Select a management area and explain the different purposes for which information may be required. Task 1(P1.M) Tesco Aims * Make profits * Maximise sales * Provide good quality

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    Business Drivers: From a business prospective an estimate given in writing would stand for a month, the facility for storing estimates would remove the opportunity for the customer to haggle it would also allow the customer time to decide if the estimate given is fair.

  1. Business Idea

    What is your favourite rugby team? (If applicable) Rugby is unlikely to take precedence over football due to it being shown at the same time normally, but when there is a game which doesn't clash with football or is more important, then Leicester Tigers will be shown, as they are

  2. The law relating to organ transplantation

    The system is on aggregate incoherent and piecemeal, and when an organ is taken, no one knows for sure why - is it because the medical team has requested, or is it because the medical team has procured it under s1(2)

  1. Loyalty Card Proposal by Waitrose.

    1500 2000 2500 5000 10000 WHSmiths is another example to of a store that uses the loyalty card program, They operate on basically the same system as boots, collecting information from their customers in exchange for discounts on items, WHSmiths have more restrictions on what they offer point on though

  2. Business Ethics in Pakistan.

    exporters have to bribe or "tip" the tax officials to get payment of their legitimate refunds. At the same time, such corruption makes it possible for businesses to bribe the tax administration officials to process fraudulent claims as well. Because of this potentially lucrative situation for auditors, a substantial number

  1. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    TECHNOLOGY TRANSFER: " The broad set of processes covering the exchange of knowledge, money and goods amongst different stakeholders that lead to the spreading of technology for adapting to both for diffusion of technology and cooperation across and within countries.

  2. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    A simplified menu on ATMs coupled with possible audio guidance in local language enables easy use for rural masses. So far, bank ATMs are dependent on PIN (Personal Identification Number) verification. The fingerprint authentication method is non-PIN based, and this requires enhancements to the standard switch environment.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work