Feeds

Users don't trust websites with personal info

Big concerns, survey finds

Reducing security risks from open source software

Only 16 per cent of people are confident that internet sites will treat their personal information properly, according to a new survey by the Information Commissioner's Office that found widespread concern about data protection laws and practices.

Four out of five of us are concerned about how our finances or health and safety will be affected if our personal data falls into the wrong hands, according to the research published today.

The survey, carried out by research firm SMSR Ltd, shows that protecting personal information is now regarded as one of the top three most socially important issues in the UK – ranked only behind concerns over crime prevention and improving education standards.

“It may be surprising to some, but it is very significant that people are so concerned about how their personal information is handled,” said Information Commissioner Richard Thomas. “No doubt they are increasingly aware of the dangers of identity theft and the serious consequences if their health, financial and other personal records fall into the wrong hands or are otherwise misused.”

Without prompting, over half (52 per cent) of the 1,000 respondents told researchers that they were concerned that their personal details may be passed on to unknown organisations. When prompted, over 80 per cent expressed concerns about the use, transfer and security of personal information.

Less than half of respondents thought that bodies collecting information on customers handled the data fairly or properly or that the data was sufficiently protected by existing laws and practices.

The research shows that only 16 per cent of respondents were confident that internet sites would treat their personal information properly, and had little more confidence in retailers or telecoms companies (20 per cent). Thirty percent of respondents were confident in the abilities of tax and benefit agencies to handle their information, with the NHS coming top with a confidence rating of 64 per cent.

Fifty-eight per cent of respondents thought that individuals have lost control over the manner in which their information is collected and processed – up five per cent on a similar survey carried out last year.

“Members of the public can also do a lot to protect their own information, by only giving it out if they are sure that a request is genuine and if they know what their information will be used for,” advised Mr Thomas. “People can also take active steps, such as shredding personal documents like bank and credit card statements and bills, and checking statements to ensure that they recognise all the transactions.”

The Information Commissioner said that he is also concerned about less obvious risks, such as excessive intrusion or decisions made on the basis of incorrect or possibly damaging information that had been held too long by companies.

Individuals can check this information under the Data Protection Act, which, in general terms, gives people the right to access information about themselves, and obliges companies holding information on individuals to comply with certain standards.

According to the research, three-quarters of respondents were aware, when prompted, that they had the right to see information held on them, and 84% were aware of the Data Protection Act – down from 90% last year. According to the research, most organisations have now recognised that good data handling benefits their business.

Over 70 per cent of respondents found that they had seen higher levels of customer trust, information management and risk management as a result of complying with the Data Protection Act.

Seventy-three percent agreed that compliance brought extra work, but that it was necessary, while 10 per cent found it a waste of resources.

“It must be in their own self-interest for organisations to stick to the key principles of the Data Protection Act, such as making sure personal information is held securely, that it is accurate and up to date and that it is used for purposes which people have been told about,” said Mr Thomas. “Mishandling information leads to an erosion of trust in public authorities and businesses.”

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.