Eric Howe

Last updated

Eric Howe
Born (1931-10-04) 4 October 1931 (age 91)
Education Liverpool University
TermAs UK Data Protection Registrar September 1984 – 1994
Successor Elizabeth France
Spouse
Patricia Schollick
(m. 1968)
Children2

Eric James Howe CBE (born 4 October 1931) is a British former business executive who in September 1984 became his country's first Data Protection Registrar. [1] [2] [3] [4]

Contents

Biography

Provenance and early years

Eric Howe was born at Stretford in the registration area of Barton-upon-Irwell, on the western edge of Manchester, the fourth of his parents' five children. [5] His father worked as a furrier. [6] He attended the nearby Stretford Grammar School and worked for two years in the textile industry before moving on to Liverpool University from which in 1954 he emerged with a degree in Economics. [1]

Coal and computers

Between 1954 and 1959 he worked initially in a team directed by the Medical Research Council examining and reporting on working conditions, above and below ground, of miners employed in the North Wales Area of the National Coal Board, Britain's nationalised coal mines operator. Following this, he worked in the same Area for the Coal Board itself leading a team installing new costing systems in collieries. [7] After a brief period at the British Cotton Industry Research Organisation, [1] where he advised on re-equipment proposals for textile mills, he moved on again, in 1961, to the English Electric Computer Company (EECC) which had emerged from the pioneering computer development undertaken under the auspices of the J. Lyons bakeries and catering conglomerate during the 1940s and 1950s. At EECC he became the area sales manager for North-west England.

His next move, in 1966, was to the National Computing Centre, a government-established not-for-profit membership and research organisation, based in Manchester. Here he rose through the hierarchy, serving as deputy director between 1975 and 1984. [1] [7] and served on its Board. The NCC was part of Harold Wilson's "White hot technological revolution" and was charged with promoting the efficient use of computing in the United Kingdom. Eric Howe joined the NCC at its inception and wrote its Corporate Plan for a House of Commons Committee investigating the computing industry, where, because of the colour of its covers, it was referred to as "The Little Red Book of Chairman Howe". On a number of occasions he supported Civil Servants at meetings on the computer industry in Brussels and was a member of the NEDO Computer Panel. He was also on the Regional Council of the CBI. He was responsible for the centre's activities in support of education and training and commercial computing. He was Chairman of the National Computer Users Forum which facilitated an exchange of views with those in government establishing computing policies. The European Commission invited him to lead in establishing a similar body for the European Union and he went on to be its UK representative.

Data protection

A need for data protection had been identified during the early 1970s in West Germany where the role of "Data Protection Registrar" had been developed, most notably, by Spiros Simitis. [8] The British government of that time had only limited interest in computers and data privacy, but enacted the necessary legislation in 1984 because of concerns that British businesses and agencies would otherwise be at risk of exclusion from information sharing with overseas partners. [9] Howe's initial approach was consciously cautious and low-key. [7] Nevertheless, he remained in post for ten years, [1] which was longer than any of his successors. A commentator looking back on his time as Data Protection Registrar would describe him as "avuncular but terrier-like". [10] A report in the Daily Telegraph described him as having the "soft cotton accent and open joviality of a Manchester corner grocer" and went on to say this could be "dangerously deceptive".

The Data Protection Act 1984 was the first legislation in the United Kingdom to address the use of computers. It gave new rights for individuals to find what information was held on computers about them. It also introduced new obligations for computer users processing personal data who needed to be open about their activities by putting details of these on a public register. Users must also follow the good practice laid down in a number of Principles. These Principles would need to be interpreted and applied consistently to the myriad of circumstances in which personal data would be used. The Registrar was placed in a position of independence reporting directly to Parliament. The Registrar was responsible for ensuring individual's rights; establishing the Register; interpreting the Principles and assisting and encouraging the adoption of appropriate good practice; enforcing the legislation and the jurisprudence which would ensue; raising awareness of data protection throughout the United Kingdom; and engaging with data protection developments in the European Union and worldwide to contribute a United Kingdom view and learn from experience in other legislations.

In his First Report in June 1985, Eric Howe listed over fifty group organisations representing all aspects of public, commercial and individual interests, with whom he had held discussions on the operation of the Act. Subsequent Reports dealt in detail with the activities of his Office with regard to each of his responsibilities. He undertook research into public concerns and as a result directed early attention to the use of personal data for credit referencing and direct marketing. His last Annual Report in 1994 refers to work in areas as diverse as Health, Police and Criminal Justice, Open Government, Banking, Insurance and Local Government. As part of his Fifth Report he set out the results of a wide-ranging survey of experience of the Act and proposed a number of changes which would benefit both individuals and computer users. In all his Reports he gave credit to a loyal, hard-working and very professional staff.

In a Personal Note to his Ninth Report in June 1993, Eric Howe said that data protection represents a massive long term educational exercise to change the attitudes and practices of a Nation. The Conclusions to his final Report in 1994 set out a perspective on the development of computing and the use of personal data. He refers to the problem of balancing conflicting public policies. How should privacy balance against freedom of speech, or the health of the nation, or the prevention of crime, or economic benefit? He also alludes to the power which knowledge and control of information about people might place in the hands of a totalitarian state. He describes justice, freedom and democracy as fragile flowers.

Eric Howe gave evidence to a number of Parliamentary Committees and in 1994 the House of Commons Committee of Public Accounts concluded that the registrar had carried out much good work in a difficult remit with limited resources and in rapidly changing circumstances.

Later career

Eric Howe was awarded the CBE after five years in office. He was a Fellow of the British Computer Society and served twice on its Council and a Fellow of the Institute of Data Processing Management. He undertook voluntary work, before retirement as Chairman of an Older People's Welfare Committee and after retirement as a board member and Chairman of a Housing Association.

Personal

Howe married Patricia Schollick at Blackpool in 1967. [7] [11] The births of their two daughters followed in 1969 and 1971. [1]

Government offices
Preceded by
new post
Data Protection Registrar
1984 - 1994
Succeeded by

Related Research Articles

<span class="mw-page-title-main">Encryption</span> Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

<span class="mw-page-title-main">Next-Generation Secure Computing Base</span>

The Next-Generation Secure Computing Base is a software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution that equaled the security of closed platforms such as set-top boxes while simultaneously preserving the backward compatibility, flexibility, and openness of the Windows operating system. Microsoft's primary stated objective with NGSCB was to "protect software from software."

<span class="mw-page-title-main">Data Protection Directive</span> European Union directive which regulates the processing of personal data

The Data Protection Directive, officially Directive 95/46/EC, enacted in October 1995, was a European Union directive which regulated the processing of personal data within the European Union (EU) and the free movement of such data. The Data Protection Directive was an important component of EU privacy and human rights law.

<span class="mw-page-title-main">Information Commissioner's Office</span> Non-departmental public body

The Information Commissioner's Office (ICO) is a non-departmental public body which reports directly to the Parliament of the United Kingdom and is sponsored by the Department for Science, Innovation and Technology. It is the independent regulatory office dealing with the Data Protection Act 2018 and the General Data Protection Regulation, the Privacy and Electronic Communications Regulations 2003 across the UK; and the Freedom of Information Act 2000 and the Environmental Information Regulations 2004 in England, Wales and Northern Ireland and, to a limited extent, in Scotland.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance enabled by the emergence of computer technologies.

A privacy policy is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, تاللةةتتالىىىى, تعفببةتنههن, and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

<span class="mw-page-title-main">Video Privacy Protection Act</span> 1988 American law on tape rental privacy

The Video Privacy Protection Act (VPPA) is a bill that was passed by the United States Congress in 1988 as Pub. L. 100–618 and signed into law by President Ronald Reagan. It was created to prevent what it refers to as ‘wrongful disclosure of video tape rental or sale records [or similar audio visual materials, to cover items such as video games and the future DVD format].’ Congress passed the VPPA after Robert Bork's video rental history was published during his Supreme Court nomination. It makes any "video tape service provider" that discloses rental information outside the ordinary course of business liable for up to $2500 in actual damages.

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.Morrison, Steven R. "What the Cops Can't Do, Internet Service Providers Can: Preserving Privacy in Email Contents". Va. JL & Tech.</ref>

Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore.

<span class="mw-page-title-main">Computers, Freedom and Privacy Conference</span>

The Computers, Freedom and Privacy Conference is an annual academic conference held in the United States or Canada about the intersection of computer technology, freedom, and privacy issues. The conference was founded in 1991, and since at least 1999, it has been organized under the aegis of the Association for Computing Machinery. It was originally sponsored by CPSR.

Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals. It also applies in the commercial sector to things like trade secrets and the liability that directors, officers, and employees have when handing sensitive information.

Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as hard and soft privacy technologies.

Information technology law concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitized) information and software, information security and electronic commerce aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction.

<span class="mw-page-title-main">General Data Protection Regulation</span> European Union regulation on personal data

The General Data Protection Regulation is a European Union regulation on Information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and human rights law, in particular Article 8(1) of the Charter of Fundamental Rights of the European Union. It also governs the transfer of personal data outside the EU and EEA. The GDPR's goals are to enhance individuals' control and rights over their personal information and to simplify the regulations for international business. It supersedes the Data Protection Directive 95/46/EC and, among other things, simplifies the terminology.

Howard George Willis Ware, popularly known as Willis Howard Ware was an American computer pioneer who co-developed the IAS machine that laid down the blueprint of the modern day computer in the late 20th century. He was also a pioneer of privacy rights, social critic of technology policy, and a founder in the field of computer security.

Google's changes to its privacy policy on March 16, 2012 enabled the company to share data across a wide variety of services. These embedded services include millions of third-party websites that use AdSense and Analytics. The policy was widely criticized for creating an environment that discourages Internet-innovation by making Internet users more fearful and wary of what they do online.

<span class="mw-page-title-main">Willi Birkelbach</span> German politician (1913–2008)

Willi Birkelbach CBE was a West German politician (SPD). He was a member of the West German Bundestag between 1949 and 1964. Between 1952 and 1964 he also served as an increasingly prominent Member of the European Parliament.

References

  1. 1 2 3 4 5 6 Howe, Eric James. 2001. p. 1021. ISBN   0-7136-5432-5.{{cite book}}: |work= ignored (help)
  2. Ian Walden. "13.4 Data protection and telecommunications" (PDF). Data Protection. Retrieved 30 April 2019.
  3. Duncan Campbell (21 October 1988). "The Data Protection Act is virtually worthless ..." (PDF). New Statesman & Society, London. Retrieved 30 April 2019.
  4. Paul Ticher in association with Bates Wells & Braithwaite Solicitors (2009). Enforcement, offences and penalties (PDF). p. 155. ISBN   978-1-903991-92-3 . Retrieved 30 April 2019.{{cite book}}: |work= ignored (help)
  5. "Index entry". FreeBMD. ONS. Retrieved 30 April 2019.
  6. "Baptisms at St Peter in the District of Stretford, Manchester". OnLine Parish Clerks for the County of Lancashire. Retrieved 30 April 2019.
  7. 1 2 3 4 Glyn Moody (October 1985). "Eric Howe — Data Protection Registrar". Practical Computing. p. 87. Retrieved 24 April 2022.
  8. "Professor Spiros Simitis". Der Spiegel (online). 14 November 1977. Retrieved 6 May 2019.
  9. "Mrs Thatcher's data protection legacy". Amberhawk. 10 April 2013. Retrieved 6 May 2019.
  10. Lynne Curry (19 September 1994). "A stickler for our privacy: The new Data Protection Registrar is taking on the banks". The Independent, London. Retrieved 30 April 2019.
  11. "Index entry". FreeBMD. ONS. Retrieved 1 May 2019.