Feeds

Fidelity lost HP's employee data to impress HP

We'll show you

Remote control for virtualized desktops

Given the recent spate of laptop losses affecting major companies, many of you have wondered why the likes of Fidelity and Ernst & Young would let crucial customer information leave their own servers and desktops in the first place. Well, in Fidelity's case, we've learned that the company had a really important demo to perform - one that apparently required it to load 200,000 HP workers' personal information on a laptop.

The Register has obtained a copy of the FAQ that HP handed out to employees to explain the data inFidelity. In it, we discover Fidelity's rather flimsy excuse for outfitting a laptop full of HP data. This laptop went missing earlier this month, exposing current and former HP workers.

"Fidelity indicates that the data was imported onto a laptop in order to support discussions for a meeting at HP, during which Fidelity demonstrated a new software product they believed would assist HP in addressing some administrative issues related to the HP retirement plans," HP told its staff yesterday. "It was not necessary for the discussions or the demonstration that the data be transmitted in this way, and HP was not informed ahead of time that this would occur. HP views this as a very serious problem."

Er, so how did a Fidelity employee manage to lose track of this laptop then?

"This seems to be an isolated incident, and simply the result of human error," HP said.

Human error indeed.

Have no fear though, HP has pulled out the belt on Fidelity.

"HP has escalated the issue to the highest levels of senior management at Fidelity. We are working aggressively to ensure that our employees are supported in the best ways possible. As we learn more surrounding the circumstances, we will revisit the remedies as needed."

Several of you have sent in letters complaining that you cannot access the special Fidelity website set up to handle this debacle. Others have complained that Fidelity hasn't been terribly helpful when you do make contact. So, it would seem, proactive is a relative term.

Fidelity should still receive some credit for seeming more on the ball than Ernst & Young, which waited weeks to notify customers about its run of laptop losses. Ernst & Young has lost information on workers from Sun Microsystems, Cisco, IBM and BP. You won't have heard much about this though, as other security reporters appear too busy to pick up the phone and call Ernst & Young about the incidents.

"I am finding the articles regarding Ernst & Young laptop thefts very interesting," writes reader Rich. "Curiously though, why are none of these reports appearing on websites such as Time, Newsweek, Business Week, CIO, Computerworld, New York Times, Wall Street Journal, USA Today etc."

"I searched those and found one article regarding the HP/Fidelity theft and that was about it. I ask because I was asked the very same question when discussing the subject with a colleague."

Very curious indeed. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.