Feeds

Fidelity lost HP's employee data to impress HP

We'll show you

The Power of One eBook: Top reasons to choose HP BladeSystem

Given the recent spate of laptop losses affecting major companies, many of you have wondered why the likes of Fidelity and Ernst & Young would let crucial customer information leave their own servers and desktops in the first place. Well, in Fidelity's case, we've learned that the company had a really important demo to perform - one that apparently required it to load 200,000 HP workers' personal information on a laptop.

The Register has obtained a copy of the FAQ that HP handed out to employees to explain the data inFidelity. In it, we discover Fidelity's rather flimsy excuse for outfitting a laptop full of HP data. This laptop went missing earlier this month, exposing current and former HP workers.

"Fidelity indicates that the data was imported onto a laptop in order to support discussions for a meeting at HP, during which Fidelity demonstrated a new software product they believed would assist HP in addressing some administrative issues related to the HP retirement plans," HP told its staff yesterday. "It was not necessary for the discussions or the demonstration that the data be transmitted in this way, and HP was not informed ahead of time that this would occur. HP views this as a very serious problem."

Er, so how did a Fidelity employee manage to lose track of this laptop then?

"This seems to be an isolated incident, and simply the result of human error," HP said.

Human error indeed.

Have no fear though, HP has pulled out the belt on Fidelity.

"HP has escalated the issue to the highest levels of senior management at Fidelity. We are working aggressively to ensure that our employees are supported in the best ways possible. As we learn more surrounding the circumstances, we will revisit the remedies as needed."

Several of you have sent in letters complaining that you cannot access the special Fidelity website set up to handle this debacle. Others have complained that Fidelity hasn't been terribly helpful when you do make contact. So, it would seem, proactive is a relative term.

Fidelity should still receive some credit for seeming more on the ball than Ernst & Young, which waited weeks to notify customers about its run of laptop losses. Ernst & Young has lost information on workers from Sun Microsystems, Cisco, IBM and BP. You won't have heard much about this though, as other security reporters appear too busy to pick up the phone and call Ernst & Young about the incidents.

"I am finding the articles regarding Ernst & Young laptop thefts very interesting," writes reader Rich. "Curiously though, why are none of these reports appearing on websites such as Time, Newsweek, Business Week, CIO, Computerworld, New York Times, Wall Street Journal, USA Today etc."

"I searched those and found one article regarding the HP/Fidelity theft and that was about it. I ask because I was asked the very same question when discussing the subject with a colleague."

Very curious indeed. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.