Feeds

Oz 'pseudo-ID card' database racked by identity fraud claims

19 sacked, 92 resigned

Beginner's guide to SSL certificates

Australia's citizen database was routinely searched for personal reasons by government agency employees, some of whom have been sacked. Police are now investigating allegations of identity fraud resulting from the security breaches.

There were 790 security breaches at government agency Centrelink involving 600 staff. Staff were found to have inappropriately accessed databases containing citizens' information.

The databases are used to administer social security, pension and unemployment benefits. Prime Minister John Howard is said to be considering a proposal which would use this database for a new national identity card which is under consideration.

In total 19 Centrelink employees have been sacked and 92 others have resigned. Police are conducting investigations into five employees, they said.

The man charged with protecting citizens' privacy in relation to the project said that the government must do more to prevent this kind of security breach when so much vital information is gathered in one place.

"The Centrelink revelations are deeply disturbing,” Professor Allan Fels told Australian ABC radio. “I take some comfort from the fact that the government has caught them and punished them, but there is still a huge weight now on the government to provide full, proper legal and technical protection of privacy with the access card.”

The police have confirmed that investigations are ongoing after five referrals were made to it from Centrelink. At least one of the cases is believed to involve allegations of the establishment of fake identities to be used to receive payments.

The investigation took two years and involved the use of sophisticated spying equipment. Union officials said that staff had repeatedly been warned about the inappropriate accessing of records.

"Customer records should only be accessed for business reasons and we do not tolerate staff surfing the details of family and friends or peeking at records of neighbours," said Centrelink chief executive Jeff Whalan. "As a result we revamped our techniques to assist us to keep improper conduct in check, and we are committed to maintaining that process."

Australian government minister Joe Hockey, who is responsible for the smart card project, told Channel Seven news there that the privacy breaches will not derail the plan, which will continue to be implemented.

Editor's note, 29/08/2006: Some of our Australian readers pointed out inaccuracies in the original version of this story. These have been corrected. OUT-LAW apologises for these errors.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Secure remote control for conventional and virtual desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.