Feeds

Foreign Office web security failed Data Protection Act, says info office

Visa details exposed

Secure remote control for conventional and virtual desktops

The Foreign Office has promised (pdf) to keep data safer in future, after its website exposed the details of those seeking visas for entry into the UK. An investigation by the Information Commissioner's Office (ICO) found a breach of the Data Protection Act.

The ICO investigated the security breach that affected the UKvisas site in May. The site is run by the Foreign and Commonwealth Office and the Home Office. The ICO found that personal data belonging to visa applicants was visible by site visitors. This broke the Data Protection Act, said the ICO.

"Organisations have a duty under the Data Protection Act to keep our personal information secure," said Mick Gorrill, ICO assistant commissioner. "If organisations fail to take this responsibility seriously, they not only leave individuals vulnerable to identity theft but risk losing individuals’ confidence and trust."

The ICO said that the Foreign Office co-operated with its investigation and provided the Commissioner with an independently produced report on the matter.

The Foreign Office has promised to close the website it was using and replace it with another, as well as to audit the procedures used. It also promised to undertake a strategic review of data processing.

"The data controller shall, as from the date of this undertaking and for so long as similar standards are required by the Act or other successor legislation from other data controllers in similar circumstances, ensure that personal data is processed in accordance with the Seventh Data Protection Principle," said the undertaking signed by the Foreign Office. The seventh data protection principle demands security for people's information.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?