Feeds

Home Office coughs to five database breaches

The internal menace

Choosing a cloud hosting partner with confidence

Security at the British Home Office's Identity and Passport Service (IPS) database has been compromised four times, with individuals' data used inappropriately by Home Office employees and contractors. A fifth breach has hit a Prison Service database.

In three of the cases workers were able to access data they had no authority to use and in the fourth a worker who did have authority to access data used it inappropriately. The fifth case involves a worker accessing the Prison Service sentencing database, a Home Office spokesman said.

"Disciplinary action was taken that resulted in the dismissal of three of those people. A fourth resigned before the process of a charge of gross misconduct could be completed. Another was an employee at a private sector partner, who has been dismissed," said the spokesman.

The security breach has raised questions for some about the security of any database attached to identity cards, a major plank of current Government policy.

"Plainly, centralising all of our identity data into one register in the Home Office's control is going to expose our information to risk of abuse from staff," said Phil Booth, national co-ordinator of NO2ID, an anti-identity card pressure group.

"Many of the risks that attach are not so often about hacking from the outside but from the inside job, but this is something that the Home Office has completely and flatly denied throughout the process and said 'we'll have security protocols in place and procedures to stop this'," said Booth. "They've claimed this for other databases as well and yet we have highly publicised cases such as the chap at the DVLA who was passing information to [animal rights groups] not just a few times but over 13 months."

The Home Office spokesman said that remaining staff at the IPS have been warned about unauthorised access. "The IPS takes its security very, very seriously and has reminded staff that any breaches will involve a charge of gross misconduct which will result in dismissal and that any offender will be liable to prosecution," he said.

The Home Office could not confirm at time of going to press whether or not any further legal action or a prosecution will follow the dismissals.

The information came to light following a parliamentary question from the Liberal Democrat Party. NO2ID says it is compiling information on further potential for security breaches within the Home Office.

"NO2ID has been approached by a contractor at one of the companies tendering for the database for the ID card system who described to us how quite regularly he was able to break protocol and gain access to supposedly highly secure databases of another wing of the Home Office while on a job," said Booth.

The Home Office said it could not comment without further details on the identity of the contracting company and the databases in question. Booth said the group would not make those details public until later this week.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Secure remote control for conventional and virtual desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.