Feeds

Councils give identity fraudsters a helping hand

Con-servatory application

Choosing a cloud hosting partner with confidence

Local planning authorities are giving identity criminals "all they need" by posting applicants' personal details online, according to the UK's fraud prevention service Cifas

The organisation said planning authorities were publishing applicants' personal details, including names addresses, telephone and signatures, on the web as part of their planning consultations.

Householders are particularly vulnerable to identity fraud as larger schemes are more likely to publish details of an agent.

Cifas chief executive Peter Hurst said: "This is Christmas come early for identity fraudsters. Local authorities are giving them all they need to adopt their (applicants') identities."

Identity fraud in the UK rose by 17 per cent in the first quarter of 2006. Last year there were 137,000 cases of identity fraud in the UK, up from just 20,000 in 1999.

Cifas said the government and local authority associations have indicated they are addressing the problem.

Changes include: making planning applicants more aware that their applications will be published online; encouraging applicants to only submit personal information they are happy will be made available on the internet; and confirmation that there is "no necessity for authorities to publish signatures".

"Local authorities have a role to play in combating this crime by striking the right balance between publishing details as part of a public consultation process and ensuring the security of the personal details entrusted to them," said Hurst.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

This article was originally published at Kablenet.

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.