----- Original Message -----
From: "Tim Trent" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, February 14, 2006 9:36 AM
Subject: Re: [data-protection] Another article of interest to Human Rights /
Privacy Practitioners
>
> I was also thinking of the wiser issue: What is on the chip and is read
> from it? And what happens if one is a chipophile and changes jobs to a
> new
> chip-insister?
>
> As a "secondary" issue (!), is this lawful in the UK?
Might one chip infect another system or be rejected by the other system?
Whether it is lawful, is it desirable?
Once someone is inside the building with an ID I can see that the person is
supposed to be there, whereas with the implant there is a sinister aspect to
it. I can't see that the other person has access permission.
Therefore one could argue that it suffers from lack of visibility. It
therefore really does smack of Big Brother.
Nick Landau
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|