Feeds

Paul McCartney account details leaked on second user PC

Red faces at blue blood bank

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

An obsolete PC sold on by a blue blood bank "contained 108 files relating to Sir Paul McCartney's private cash dealings". The PC was released into the second-user market without first being wiped clean of data relating to money movements in Sir Paul's account.

According to The Express, merchant bankers Morgan Grenfell Asset Management had "simply failed to erase the memory contained on the computer's hard disk". Other client details contained on the PC included a "large charity for the blind, the Cancer Research Campaign, the International Association of Odd Fellows and a duchess".

Tonight, Channel 4 News will broadcast the findings of Jonathan Calvert and Peter Warren, a well-known investigative journalist who specialises in the IT industry. In their research of the second-user PC industry, they established that many "banks and government departments are failing to take sufficient care" with the PCs they sell on.

In an interview with The Express, Jon Godfrey, consultant at Technical Asset Management, the Welwyn, Herts PC disposal company, said: "There are tens of millions of second-hand computer systems freely available in the open market with commercially sensitive data on.

"Companies are careless when they replace computer systems, not thinking about what happens to the old PCs. But they have a duty to clients not to pass on confidential information. It's gross commercial neglect."

Under the Data Protection Act, it is an offence for organisations to allow the unauthorised disclosure of personal data. Computers containing sensitive information are supposed to be wiped free of data before being sold on. The only surefire way to achieve this is to overwrite information hundreds of times using software such as Sanitizer.

Deutsche Asset Management (as Morgan Grenfell Asset Management is now called) has issued an unreserved apology to any clients who are "embarrassed by this incident". It says it is reviewing its disposal procedures. What will it do to the unnamed disposal company that landed it in this mess? ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.